Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7b4Iaf58Rp.exe

Overview

General Information

Sample name:7b4Iaf58Rp.exe
renamed because original name is a hash value
Original sample name:fff6c4bcd537790156642c7010aac1fddd2a79f3143a71f5570dc19ab9ba25ba.exe
Analysis ID:1588266
MD5:1522da1337568f1f00aa81af4a9e345d
SHA1:7fdb6aeadc77a586f43d08a7a9adda5387933916
SHA256:fff6c4bcd537790156642c7010aac1fddd2a79f3143a71f5570dc19ab9ba25ba
Tags:exeRedLineStealeruser-adrian__luca
Infos:

Detection

MassLogger RAT, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Drops VBS files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 7b4Iaf58Rp.exe (PID: 768 cmdline: "C:\Users\user\Desktop\7b4Iaf58Rp.exe" MD5: 1522DA1337568F1F00AA81AF4A9E345D)
    • neophobia.exe (PID: 1796 cmdline: "C:\Users\user\Desktop\7b4Iaf58Rp.exe" MD5: 1522DA1337568F1F00AA81AF4A9E345D)
      • RegSvcs.exe (PID: 2168 cmdline: "C:\Users\user\Desktop\7b4Iaf58Rp.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • neophobia.exe (PID: 1976 cmdline: "C:\Users\user\AppData\Local\scrolar\neophobia.exe" MD5: 1522DA1337568F1F00AA81AF4A9E345D)
        • RegSvcs.exe (PID: 2344 cmdline: "C:\Users\user\AppData\Local\scrolar\neophobia.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
        • neophobia.exe (PID: 2080 cmdline: "C:\Users\user\AppData\Local\scrolar\neophobia.exe" MD5: 1522DA1337568F1F00AA81AF4A9E345D)
          • RegSvcs.exe (PID: 2352 cmdline: "C:\Users\user\AppData\Local\scrolar\neophobia.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 3684 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • neophobia.exe (PID: 3032 cmdline: "C:\Users\user\AppData\Local\scrolar\neophobia.exe" MD5: 1522DA1337568F1F00AA81AF4A9E345D)
      • RegSvcs.exe (PID: 6840 cmdline: "C:\Users\user\AppData\Local\scrolar\neophobia.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "SMTP", "From": "sendxpreview@ypcog.shop", "Password": "k4T*5ia*ES", "Server": "ypcog.shop", "To": "preview@ypcog.shop", "Port": 587}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x21db4:$a1: get_encryptedPassword
          • 0x4a0ec:$a1: get_encryptedPassword
          • 0x21d88:$a2: get_encryptedUsername
          • 0x4a0c0:$a2: get_encryptedUsername
          • 0x21e4c:$a3: get_timePasswordChanged
          • 0x4a184:$a3: get_timePasswordChanged
          • 0x21d64:$a4: get_passwordField
          • 0x4a09c:$a4: get_passwordField
          • 0x21dca:$a5: set_encryptedPassword
          • 0x4a102:$a5: set_encryptedPassword
          • 0x21b97:$a7: get_logins
          • 0x49ecf:$a7: get_logins
          • 0x21105:$a8: GetOutlookPasswords
          • 0x4943d:$a8: GetOutlookPasswords
          • 0x20619:$a9: StartKeylogger
          • 0x48951:$a9: StartKeylogger
          • 0x1f073:$a10: KeyLoggerEventArgs
          • 0x473ab:$a10: KeyLoggerEventArgs
          • 0x1f042:$a11: KeyLoggerEventArgsEventHandler
          • 0x4737a:$a11: KeyLoggerEventArgsEventHandler
          • 0x21c6b:$a13: _encryptedPassword
          Click to see the 30 entries
          SourceRuleDescriptionAuthorStrings
          2.2.neophobia.exe.b40000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 C1 88 44 24 2B 88 44 24 2F B0 7B 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          11.2.RegSvcs.exe.391e790.5.raw.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            11.2.RegSvcs.exe.391e790.5.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              11.2.RegSvcs.exe.391e790.5.raw.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                11.2.RegSvcs.exe.391e790.5.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  Click to see the 71 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs" , ProcessId: 3684, ProcessName: wscript.exe
                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs" , ProcessId: 3684, ProcessName: wscript.exe

                  Data Obfuscation

                  barindex
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\scrolar\neophobia.exe, ProcessId: 1796, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-10T23:16:02.394160+010028032742Potentially Bad Traffic192.168.2.849705132.226.8.16980TCP
                  2025-01-10T23:16:10.200043+010028032742Potentially Bad Traffic192.168.2.849711132.226.8.16980TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 11.2.RegSvcs.exe.391e790.5.raw.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "sendxpreview@ypcog.shop", "Password": "k4T*5ia*ES", "Server": "ypcog.shop", "To": "preview@ypcog.shop", "Port": 587}
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeReversingLabs: Detection: 91%
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeVirustotal: Detection: 68%Perma Link
                  Source: 7b4Iaf58Rp.exeVirustotal: Detection: 68%Perma Link
                  Source: 7b4Iaf58Rp.exeReversingLabs: Detection: 91%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeJoe Sandbox ML: detected
                  Source: 7b4Iaf58Rp.exeJoe Sandbox ML: detected

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: 7b4Iaf58Rp.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.8:49710 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.8:49712 version: TLS 1.0
                  Source: Binary string: _.pdb source: RegSvcs.exe, 00000007.00000002.2664241495.0000000002EB9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664119117.0000000002763000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: neophobia.exe, 00000002.00000003.1494562152.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000002.00000003.1494436080.0000000003990000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000004.00000003.1525158722.0000000003BF0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000004.00000003.1525781731.0000000003D90000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000006.00000003.1567516685.00000000039D0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000006.00000003.1569671446.0000000003EF0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 0000000A.00000003.1647543407.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 0000000A.00000003.1644978259.0000000003600000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: neophobia.exe, 00000002.00000003.1494562152.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000002.00000003.1494436080.0000000003990000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000004.00000003.1525158722.0000000003BF0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000004.00000003.1525781731.0000000003D90000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000006.00000003.1567516685.00000000039D0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000006.00000003.1569671446.0000000003EF0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 0000000A.00000003.1647543407.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 0000000A.00000003.1644978259.0000000003600000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FF445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00FF445A
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFC6D1 FindFirstFileW,FindClose,0_2_00FFC6D1
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00FFC75C
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FFEF95
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FFF0F2
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FFF3F3
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FF37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FF37EF
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FF3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FF3B12
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FFBCBC
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DA445A GetFileAttributesW,FindFirstFileW,FindClose,2_2_00DA445A
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DAC6D1 FindFirstFileW,FindClose,2_2_00DAC6D1
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DAC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_00DAC75C
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DAEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00DAEF95
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DAF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00DAF0F2
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DAF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_00DAF3F3
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DA37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00DA37EF
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DA3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00DA3B12
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DABCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_00DABCBC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h7_2_02DDE108
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05759021h7_2_05758D70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05759775h7_2_05759358
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05759775h7_2_057596A3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 05759775h7_2_05759348
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h11_2_0270E108
                  Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49705 -> 132.226.8.169:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49711 -> 132.226.8.169:80
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.8:49710 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.8:49712 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_010022EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_010022EE
                  Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000007.00000002.2664984338.000000000321C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.00000000029DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: RegSvcs.exe, 00000007.00000002.2664984338.000000000321C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2664984338.0000000003210000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.00000000029DC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.00000000029D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: RegSvcs.exe, 00000007.00000002.2664984338.0000000003199000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.0000000002959000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: RegSvcs.exe, 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664119117.0000000002752000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: RegSvcs.exe, 00000007.00000002.2664984338.000000000323C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.00000000029FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000007.00000002.2664984338.00000000031D8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.0000000002959000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664119117.0000000002752000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                  Source: RegSvcs.exe, 00000007.00000002.2664984338.000000000321C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.00000000029DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000007.00000002.2664984338.000000000321C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.00000000029DC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664119117.0000000002752000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_01004164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_01004164
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_01004164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_01004164
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DB4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_00DB4164
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_01003F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_01003F66
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FF001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00FF001C
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_0101CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0101CABC
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DCCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,2_2_00DCCABC

                  System Summary

                  barindex
                  Source: 2.2.neophobia.exe.b40000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 11.2.RegSvcs.exe.391e790.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.RegSvcs.exe.391e790.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.RegSvcs.exe.38f6458.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.RegSvcs.exe.38f6458.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.RegSvcs.exe.2591b9e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.RegSvcs.exe.2591b9e.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.RegSvcs.exe.391e790.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.RegSvcs.exe.391e790.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 4.2.neophobia.exe.1490000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 11.2.RegSvcs.exe.2591b9e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.RegSvcs.exe.2591b9e.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.RegSvcs.exe.38f5570.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.RegSvcs.exe.38f5570.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.RegSvcs.exe.2590cb6.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.RegSvcs.exe.2590cb6.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.RegSvcs.exe.2590cb6.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.RegSvcs.exe.2590cb6.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.RegSvcs.exe.38f6458.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.RegSvcs.exe.38f6458.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 7.2.RegSvcs.exe.5710000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 7.2.RegSvcs.exe.5710000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 6.2.neophobia.exe.2320000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 7.2.RegSvcs.exe.5710000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 7.2.RegSvcs.exe.5710000.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 11.2.RegSvcs.exe.38f5570.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 11.2.RegSvcs.exe.38f5570.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 10.2.neophobia.exe.ba0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000006.00000002.1571996988.0000000002320000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000004.00000002.1531826494.0000000001490000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0000000B.00000002.2664119117.0000000002752000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000002.00000002.1495389103.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0000000A.00000002.1648249221.0000000000BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: Process Memory Space: RegSvcs.exe PID: 2352, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 6840, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: This is a third-party compiled AutoIt script.0_2_00F93B3A
                  Source: 7b4Iaf58Rp.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: 7b4Iaf58Rp.exe, 00000000.00000000.1415226274.0000000001044000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_219f5567-3
                  Source: 7b4Iaf58Rp.exe, 00000000.00000000.1415226274.0000000001044000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_768c5505-d
                  Source: 7b4Iaf58Rp.exe, 00000000.00000003.1452805193.0000000003573000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c6e76b6e-4
                  Source: 7b4Iaf58Rp.exe, 00000000.00000003.1452805193.0000000003573000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_b4471c91-3
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: This is a third-party compiled AutoIt script.2_2_00D43B3A
                  Source: neophobia.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: neophobia.exe, 00000002.00000000.1453118731.0000000000DF4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f13f1f35-9
                  Source: neophobia.exe, 00000002.00000000.1453118731.0000000000DF4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_be3dcafc-7
                  Source: neophobia.exe, 00000004.00000002.1531504461.0000000000DF4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b65eb33a-4
                  Source: neophobia.exe, 00000004.00000002.1531504461.0000000000DF4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_c7f3b326-7
                  Source: neophobia.exe, 00000006.00000000.1529739888.0000000000DF4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d4075b23-6
                  Source: neophobia.exe, 00000006.00000000.1529739888.0000000000DF4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_dbc91b03-9
                  Source: neophobia.exe, 0000000A.00000000.1601670765.0000000000DF4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_507d38e0-c
                  Source: neophobia.exe, 0000000A.00000000.1601670765.0000000000DF4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_5ef0dbd8-7
                  Source: 7b4Iaf58Rp.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e758b166-f
                  Source: 7b4Iaf58Rp.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_ee141584-0
                  Source: neophobia.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_cfb688c2-e
                  Source: neophobia.exe.0.drString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_45d22e7f-b
                  Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00FFA1EF
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FE8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00FE8310
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FF51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00FF51BD
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DA51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,2_2_00DA51BD
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00F9E6A00_2_00F9E6A0
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FBD9750_2_00FBD975
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00F9FCE00_2_00F9FCE0
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FB21C50_2_00FB21C5
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FC62D20_2_00FC62D2
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_010103DA0_2_010103DA
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FC242E0_2_00FC242E
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FB25FA0_2_00FB25FA
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FA66E10_2_00FA66E1
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FEE6160_2_00FEE616
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FC878F0_2_00FC878F
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FF88890_2_00FF8889
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FC68440_2_00FC6844
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FA88080_2_00FA8808
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_010108570_2_01010857
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FBCB210_2_00FBCB21
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FC6DB60_2_00FC6DB6
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FA6F9E0_2_00FA6F9E
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FA30300_2_00FA3030
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FBF1D90_2_00FBF1D9
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FB31870_2_00FB3187
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00F912870_2_00F91287
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FB14840_2_00FB1484
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FA55200_2_00FA5520
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FB76960_2_00FB7696
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FA57600_2_00FA5760
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FB19780_2_00FB1978
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FC9AB50_2_00FC9AB5
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_01017DDB0_2_01017DDB
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FBBDA60_2_00FBBDA6
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FB1D900_2_00FB1D90
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FA3FE00_2_00FA3FE0
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00F9DF000_2_00F9DF00
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00CCA2100_2_00CCA210
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D4E6A02_2_00D4E6A0
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D6D9752_2_00D6D975
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D4FCE02_2_00D4FCE0
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D621C52_2_00D621C5
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D762D22_2_00D762D2
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DC03DA2_2_00DC03DA
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D7242E2_2_00D7242E
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D625FA2_2_00D625FA
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D566E12_2_00D566E1
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D9E6162_2_00D9E616
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D7878F2_2_00D7878F
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DA88892_2_00DA8889
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DC08572_2_00DC0857
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D768442_2_00D76844
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D588082_2_00D58808
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D6CB212_2_00D6CB21
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D76DB62_2_00D76DB6
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D56F9E2_2_00D56F9E
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D530302_2_00D53030
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D6F1D92_2_00D6F1D9
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D631872_2_00D63187
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D412872_2_00D41287
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D614842_2_00D61484
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D555202_2_00D55520
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D676962_2_00D67696
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D557602_2_00D55760
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D619782_2_00D61978
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D79AB52_2_00D79AB5
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DC7DDB2_2_00DC7DDB
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D61D902_2_00D61D90
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D6BDA62_2_00D6BDA6
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D53FE02_2_00D53FE0
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D4DF002_2_00D4DF00
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_012F43982_2_012F4398
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 4_2_017599704_2_01759970
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 6_2_0184A6A86_2_0184A6A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00408C607_2_00408C60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040DC117_2_0040DC11
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00407C3F7_2_00407C3F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00418CCC7_2_00418CCC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00406CA07_2_00406CA0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004028B07_2_004028B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0041A4BE7_2_0041A4BE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004182447_2_00418244
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004016507_2_00401650
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00402F207_2_00402F20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004187887_2_00418788
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00402F897_2_00402F89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00402B907_2_00402B90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004073A07_2_004073A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02DD5F2D7_2_02DD5F2D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02DD14487_2_02DD1448
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02DD14377_2_02DD1437
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02DD11997_2_02DD1199
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02DD11A87_2_02DD11A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05758D707_2_05758D70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0575B8287_2_0575B828
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_057521E87_2_057521E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05758D637_2_05758D63
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0575F3A07_2_0575F3A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0575F3907_2_0575F390
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0575B8187_2_0575B818
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 10_2_0115EF4010_2_0115EF40
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02705F2D11_2_02705F2D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0270144811_2_02701448
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0270143711_2_02701437
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_0270111811_2_02701118
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_027011A811_2_027011A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: String function: 00D60AE3 appears 70 times
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: String function: 00D68900 appears 42 times
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: String function: 00D47DE1 appears 35 times
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: String function: 00F97DE1 appears 35 times
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: String function: 00FB0AE3 appears 70 times
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: String function: 00FB8900 appears 42 times
                  Source: 7b4Iaf58Rp.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 2.2.neophobia.exe.b40000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 11.2.RegSvcs.exe.391e790.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.RegSvcs.exe.391e790.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.RegSvcs.exe.38f6458.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.RegSvcs.exe.38f6458.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.RegSvcs.exe.2591b9e.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.RegSvcs.exe.2591b9e.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.RegSvcs.exe.391e790.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.RegSvcs.exe.391e790.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 4.2.neophobia.exe.1490000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 11.2.RegSvcs.exe.2591b9e.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.RegSvcs.exe.2591b9e.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.RegSvcs.exe.38f5570.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.RegSvcs.exe.38f5570.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.RegSvcs.exe.2590cb6.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.RegSvcs.exe.2590cb6.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.RegSvcs.exe.2590cb6.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.RegSvcs.exe.2590cb6.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.RegSvcs.exe.38f6458.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.RegSvcs.exe.38f6458.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 7.2.RegSvcs.exe.5710000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 7.2.RegSvcs.exe.5710000.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 6.2.neophobia.exe.2320000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 7.2.RegSvcs.exe.5710000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 7.2.RegSvcs.exe.5710000.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 11.2.RegSvcs.exe.38f5570.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 11.2.RegSvcs.exe.38f5570.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 10.2.neophobia.exe.ba0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000006.00000002.1571996988.0000000002320000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000004.00000002.1531826494.0000000001490000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0000000B.00000002.2664119117.0000000002752000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000002.00000002.1495389103.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0000000A.00000002.1648249221.0000000000BA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: Process Memory Space: RegSvcs.exe PID: 2352, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 6840, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@18/8@3/2
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFA06A GetLastError,FormatMessageW,0_2_00FFA06A
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FE81CB AdjustTokenPrivileges,CloseHandle,0_2_00FE81CB
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FE87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00FE87E1
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D981CB AdjustTokenPrivileges,CloseHandle,2_2_00D981CB
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D987E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,2_2_00D987E1
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFB3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00FFB3FB
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_0100EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0100EE0D
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_010083BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_010083BB
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00F94E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00F94E89
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeFile created: C:\Users\user\AppData\Local\scrolarJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeFile created: C:\Users\user\AppData\Local\Temp\aut4F2F.tmpJump to behavior
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs"
                  Source: 7b4Iaf58Rp.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000007.00000002.2664984338.000000000327E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2664984338.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2664984338.00000000032BD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2664984338.000000000329C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2664984338.000000000328E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.0000000002A5C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.0000000002A7D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.0000000002A4E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2666782183.000000000396E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.0000000002A3E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: 7b4Iaf58Rp.exeVirustotal: Detection: 68%
                  Source: 7b4Iaf58Rp.exeReversingLabs: Detection: 91%
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeFile read: C:\Users\user\Desktop\7b4Iaf58Rp.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\7b4Iaf58Rp.exe "C:\Users\user\Desktop\7b4Iaf58Rp.exe"
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeProcess created: C:\Users\user\AppData\Local\scrolar\neophobia.exe "C:\Users\user\Desktop\7b4Iaf58Rp.exe"
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\7b4Iaf58Rp.exe"
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Users\user\AppData\Local\scrolar\neophobia.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe"
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe"
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Users\user\AppData\Local\scrolar\neophobia.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe"
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe"
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\scrolar\neophobia.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe"
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe"
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeProcess created: C:\Users\user\AppData\Local\scrolar\neophobia.exe "C:\Users\user\Desktop\7b4Iaf58Rp.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\7b4Iaf58Rp.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Users\user\AppData\Local\scrolar\neophobia.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Users\user\AppData\Local\scrolar\neophobia.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\scrolar\neophobia.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: 7b4Iaf58Rp.exeStatic file information: File size 1125888 > 1048576
                  Source: 7b4Iaf58Rp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: 7b4Iaf58Rp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: 7b4Iaf58Rp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: 7b4Iaf58Rp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: 7b4Iaf58Rp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: 7b4Iaf58Rp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: 7b4Iaf58Rp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: _.pdb source: RegSvcs.exe, 00000007.00000002.2664241495.0000000002EB9000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664119117.0000000002763000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: neophobia.exe, 00000002.00000003.1494562152.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000002.00000003.1494436080.0000000003990000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000004.00000003.1525158722.0000000003BF0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000004.00000003.1525781731.0000000003D90000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000006.00000003.1567516685.00000000039D0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000006.00000003.1569671446.0000000003EF0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 0000000A.00000003.1647543407.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 0000000A.00000003.1644978259.0000000003600000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: neophobia.exe, 00000002.00000003.1494562152.0000000003B30000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000002.00000003.1494436080.0000000003990000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000004.00000003.1525158722.0000000003BF0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000004.00000003.1525781731.0000000003D90000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000006.00000003.1567516685.00000000039D0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 00000006.00000003.1569671446.0000000003EF0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 0000000A.00000003.1647543407.00000000037A0000.00000004.00001000.00020000.00000000.sdmp, neophobia.exe, 0000000A.00000003.1644978259.0000000003600000.00000004.00001000.00020000.00000000.sdmp
                  Source: 7b4Iaf58Rp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: 7b4Iaf58Rp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: 7b4Iaf58Rp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: 7b4Iaf58Rp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: 7b4Iaf58Rp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00F94B37 LoadLibraryA,GetProcAddress,0_2_00F94B37
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FB8945 push ecx; ret 0_2_00FB8958
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D68945 push ecx; ret 2_2_00D68958
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0041C40C push cs; iretd 7_2_0041C4E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0041C50E push cs; iretd 7_2_0041C4E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040E21D push ecx; ret 7_2_0040E230
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0041C6BE push ebx; ret 7_2_0041C6BF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02DD4A8D push edi; retf 7_2_02DD4A8E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 11_2_02704A8D push edi; retf 11_2_02704A8E
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeFile created: C:\Users\user\AppData\Local\scrolar\neophobia.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbsJump to dropped file
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbsJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbsJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00F948D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F948D7
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_01015376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_01015376
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D448D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_00D448D7
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DC5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_00DC5376
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FB3187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00FB3187
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2352, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6840, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeAPI/Special instruction interceptor: Address: 12F3FBC
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeAPI/Special instruction interceptor: Address: 1759594
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeAPI/Special instruction interceptor: Address: 184A2CC
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeAPI/Special instruction interceptor: Address: 115EB64
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,7_2_004019F0
                  Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeAPI coverage: 4.5 %
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeAPI coverage: 4.8 %
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FF445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00FF445A
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFC6D1 FindFirstFileW,FindClose,0_2_00FFC6D1
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00FFC75C
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FFEF95
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FFF0F2
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FFF3F3
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FF37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FF37EF
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FF3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FF3B12
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FFBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FFBCBC
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DA445A GetFileAttributesW,FindFirstFileW,FindClose,2_2_00DA445A
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DAC6D1 FindFirstFileW,FindClose,2_2_00DAC6D1
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DAC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_00DAC75C
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DAEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00DAEF95
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DAF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00DAF0F2
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DAF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_00DAF3F3
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DA37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00DA37EF
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DA3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00DA3B12
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DABCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_00DABCBC
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00F949A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F949A0
                  Source: wscript.exe, 00000009.00000002.1602486630.000001BFCB2D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: neophobia.exe, 00000004.00000003.1495591783.0000000001554000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exe]
                  Source: neophobia.exe, 00000006.00000003.1531646365.0000000001644000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exei
                  Source: RegSvcs.exe, 00000007.00000002.2662898160.000000000128A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll*
                  Source: neophobia.exe, 0000000A.00000002.1648966763.0000000001079000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exe
                  Source: RegSvcs.exe, 0000000B.00000002.2662801382.0000000000B7D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: 7b4Iaf58Rp.exe, 00000000.00000003.1416024801.0000000000AC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exep
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeAPI call chain: ExitProcess graph end nodegraph_0-104419
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_01003F09 BlockInput,0_2_01003F09
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00F93B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F93B3A
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FC5A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00FC5A7C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,7_2_004019F0
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00F94B37 LoadLibraryA,GetProcAddress,0_2_00F94B37
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00CCA0A0 mov eax, dword ptr fs:[00000030h]0_2_00CCA0A0
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00CCA100 mov eax, dword ptr fs:[00000030h]0_2_00CCA100
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00CC8A80 mov eax, dword ptr fs:[00000030h]0_2_00CC8A80
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_012F4228 mov eax, dword ptr fs:[00000030h]2_2_012F4228
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_012F4288 mov eax, dword ptr fs:[00000030h]2_2_012F4288
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_012F2C08 mov eax, dword ptr fs:[00000030h]2_2_012F2C08
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 4_2_01759860 mov eax, dword ptr fs:[00000030h]4_2_01759860
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 4_2_017581E0 mov eax, dword ptr fs:[00000030h]4_2_017581E0
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 4_2_01759800 mov eax, dword ptr fs:[00000030h]4_2_01759800
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 6_2_0184A598 mov eax, dword ptr fs:[00000030h]6_2_0184A598
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 6_2_01848F18 mov eax, dword ptr fs:[00000030h]6_2_01848F18
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 6_2_0184A538 mov eax, dword ptr fs:[00000030h]6_2_0184A538
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 10_2_0115EE30 mov eax, dword ptr fs:[00000030h]10_2_0115EE30
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 10_2_0115D7B0 mov eax, dword ptr fs:[00000030h]10_2_0115D7B0
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 10_2_0115EDD0 mov eax, dword ptr fs:[00000030h]10_2_0115EDD0
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FE80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_00FE80A9
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FBA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FBA155
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FBA124 SetUnhandledExceptionFilter,0_2_00FBA124
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D6A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00D6A155
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00D6A124 SetUnhandledExceptionFilter,2_2_00D6A124
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040CE09
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040E61C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00416F6A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_004123F1 SetUnhandledExceptionFilter,7_2_004123F1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: FB8008Jump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 7A9008Jump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FE87B1 LogonUserW,0_2_00FE87B1
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00F93B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F93B3A
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00F948D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F948D7
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FF4C7F mouse_event,0_2_00FF4C7F
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\7b4Iaf58Rp.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\scrolar\neophobia.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\scrolar\neophobia.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FE7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00FE7CAF
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FE874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00FE874B
                  Source: 7b4Iaf58Rp.exe, neophobia.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: 7b4Iaf58Rp.exe, neophobia.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FB862B cpuid 0_2_00FB862B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,7_2_00417A20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FC4E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00FC4E87
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FD1E06 GetUserNameW,0_2_00FD1E06
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00FC3F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00FC3F3A
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_00F949A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F949A0
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.391e790.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f6458.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2591b9e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.391e790.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2591b9e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f5570.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2590cb6.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2590cb6.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f6458.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.5710000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.5710000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f5570.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.2664119117.0000000002752000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2352, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6840, type: MEMORYSTR
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.391e790.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f6458.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2591b9e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.391e790.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2591b9e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f5570.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2590cb6.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2590cb6.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f6458.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.5710000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.5710000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f5570.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.2664119117.0000000002763000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.391e790.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f6458.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2591b9e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.391e790.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2591b9e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f5570.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2590cb6.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2590cb6.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f6458.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.5710000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.5710000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f5570.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2352, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6840, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: neophobia.exeBinary or memory string: WIN_81
                  Source: neophobia.exeBinary or memory string: WIN_XP
                  Source: neophobia.exeBinary or memory string: WIN_XPe
                  Source: neophobia.exeBinary or memory string: WIN_VISTA
                  Source: neophobia.exeBinary or memory string: WIN_7
                  Source: neophobia.exeBinary or memory string: WIN_8
                  Source: neophobia.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.391e790.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f6458.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2591b9e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.391e790.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2591b9e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f5570.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2590cb6.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2590cb6.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f6458.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.5710000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.5710000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f5570.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2664984338.00000000032F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.2664477879.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2352, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6840, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.391e790.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f6458.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2591b9e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.391e790.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2591b9e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f5570.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2590cb6.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2590cb6.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f6458.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.5710000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.5710000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f5570.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.2664119117.0000000002752000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2352, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6840, type: MEMORYSTR
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.391e790.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f6458.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2591b9e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.391e790.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2591b9e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f5570.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2590cb6.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2590cb6.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f6458.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.5710000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.5710000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f5570.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.2664119117.0000000002763000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.391e790.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f6458.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2591b9e.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.391e790.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2591b9e.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f5570.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2590cb6.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.2590cb6.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f6458.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.5710000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.5710000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.RegSvcs.exe.38f5570.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2352, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6840, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_01006283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_01006283
                  Source: C:\Users\user\Desktop\7b4Iaf58Rp.exeCode function: 0_2_01006747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_01006747
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DB6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,2_2_00DB6283
                  Source: C:\Users\user\AppData\Local\scrolar\neophobia.exeCode function: 2_2_00DB6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_00DB6747
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information111
                  Scripting
                  2
                  Valid Accounts
                  2
                  Native API
                  111
                  Scripting
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt2
                  Valid Accounts
                  2
                  Valid Accounts
                  3
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCron2
                  Registry Run Keys / Startup Folder
                  21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS137
                  System Information Discovery
                  Distributed Component Object Model21
                  Input Capture
                  13
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  1
                  Masquerading
                  LSA Secrets241
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
                  Registry Run Keys / Startup Folder
                  2
                  Valid Accounts
                  Cached Domain Credentials2
                  Process Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem1
                  System Owner/User Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Network Configuration Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588266 Sample: 7b4Iaf58Rp.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 42 reallyfreegeoip.org 2->42 44 checkip.dyndns.org 2->44 46 checkip.dyndns.com 2->46 64 Found malware configuration 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 Multi AV Scanner detection for submitted file 2->68 72 9 other signatures 2->72 10 7b4Iaf58Rp.exe 4 2->10         started        14 wscript.exe 1 2->14         started        signatures3 70 Tries to detect the country of the analysis system (by using the IP) 42->70 process4 file5 40 C:\Users\user\AppData\Local\...\neophobia.exe, PE32 10->40 dropped 82 Binary is likely a compiled AutoIt script file 10->82 16 neophobia.exe 2 10->16         started        84 Windows Scripting host queries suspicious COM object (likely to drop second stage) 14->84 20 neophobia.exe 1 14->20         started        signatures6 process7 file8 38 C:\Users\user\AppData\...\neophobia.vbs, data 16->38 dropped 52 Multi AV Scanner detection for dropped file 16->52 54 Binary is likely a compiled AutoIt script file 16->54 56 Machine Learning detection for dropped file 16->56 62 2 other signatures 16->62 22 neophobia.exe 1 16->22         started        25 RegSvcs.exe 16->25         started        58 Writes to foreign memory regions 20->58 60 Maps a DLL or memory area into another process 20->60 27 RegSvcs.exe 2 20->27         started        signatures9 process10 signatures11 76 Binary is likely a compiled AutoIt script file 22->76 29 neophobia.exe 1 22->29         started        32 RegSvcs.exe 22->32         started        78 Tries to steal Mail credentials (via file / registry access) 27->78 80 Tries to harvest and steal browser information (history, passwords, etc) 27->80 process12 signatures13 86 Binary is likely a compiled AutoIt script file 29->86 88 Writes to foreign memory regions 29->88 90 Maps a DLL or memory area into another process 29->90 34 RegSvcs.exe 15 2 29->34         started        process14 dnsIp15 48 checkip.dyndns.com 132.226.8.169, 49705, 49711, 80 UTMEMUS United States 34->48 50 reallyfreegeoip.org 104.21.80.1, 443, 49710, 49712 CLOUDFLARENETUS United States 34->50 74 Tries to steal Mail credentials (via file / registry access) 34->74 signatures16

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  7b4Iaf58Rp.exe68%VirustotalBrowse
                  7b4Iaf58Rp.exe91%ReversingLabsWin32.Trojan.AutoitInject
                  7b4Iaf58Rp.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\scrolar\neophobia.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\scrolar\neophobia.exe91%ReversingLabsWin32.Trojan.AutoitInject
                  C:\Users\user\AppData\Local\scrolar\neophobia.exe68%VirustotalBrowse
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  reallyfreegeoip.org
                  104.21.80.1
                  truefalse
                    high
                    checkip.dyndns.com
                    132.226.8.169
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                          high
                          https://reallyfreegeoip.org/xml/false
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://reallyfreegeoip.orgRegSvcs.exe, 00000007.00000002.2664984338.000000000321C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.00000000029DC000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://checkip.dyndns.orgRegSvcs.exe, 00000007.00000002.2664984338.000000000321C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2664984338.0000000003210000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.00000000029DC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.00000000029D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://checkip.dyndns.comRegSvcs.exe, 00000007.00000002.2664984338.000000000321C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.00000000029DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000007.00000002.2664984338.00000000031D8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.0000000002959000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.telegram.org/bot-/sendDocument?chat_id=RegSvcs.exe, 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664119117.0000000002752000.00000004.08000000.00040000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.org/qRegSvcs.exe, 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664119117.0000000002752000.00000004.08000000.00040000.00000000.sdmpfalse
                                        high
                                        http://reallyfreegeoip.orgRegSvcs.exe, 00000007.00000002.2664984338.000000000323C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000B.00000002.2664477879.00000000029FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          132.226.8.169
                                          checkip.dyndns.comUnited States
                                          16989UTMEMUSfalse
                                          104.21.80.1
                                          reallyfreegeoip.orgUnited States
                                          13335CLOUDFLARENETUSfalse
                                          Joe Sandbox version:42.0.0 Malachite
                                          Analysis ID:1588266
                                          Start date and time:2025-01-10 23:14:43 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 8m 34s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:15
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:7b4Iaf58Rp.exe
                                          renamed because original name is a hash value
                                          Original Sample Name:fff6c4bcd537790156642c7010aac1fddd2a79f3143a71f5570dc19ab9ba25ba.exe
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.expl.evad.winEXE@18/8@3/2
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 96%
                                          • Number of executed functions: 57
                                          • Number of non-executed functions: 275
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                          • Excluded IPs from analysis (whitelisted): 172.202.163.200, 20.12.23.50
                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          TimeTypeDescription
                                          23:15:49AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          132.226.8.169b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • checkip.dyndns.org/
                                          UF7jzc7ETP.exeGet hashmaliciousMassLogger RATBrowse
                                          • checkip.dyndns.org/
                                          V7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • checkip.dyndns.org/
                                          FylY1FW6fl.exeGet hashmaliciousMassLogger RATBrowse
                                          • checkip.dyndns.org/
                                          v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • checkip.dyndns.org/
                                          ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • checkip.dyndns.org/
                                          CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                          • checkip.dyndns.org/
                                          xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                          • checkip.dyndns.org/
                                          3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                          • checkip.dyndns.org/
                                          r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                          • checkip.dyndns.org/
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          reallyfreegeoip.orgrXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 104.21.96.1
                                          4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 104.21.112.1
                                          Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 104.21.112.1
                                          b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 104.21.80.1
                                          UF7jzc7ETP.exeGet hashmaliciousMassLogger RATBrowse
                                          • 104.21.48.1
                                          9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 104.21.32.1
                                          VQsnGWaNi5.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • 104.21.48.1
                                          6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 104.21.80.1
                                          JgE2YgxSzB.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 104.21.16.1
                                          lsc5QN46NH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 104.21.80.1
                                          checkip.dyndns.comrXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 132.226.247.73
                                          4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 132.226.247.73
                                          Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 193.122.6.168
                                          b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 132.226.8.169
                                          UF7jzc7ETP.exeGet hashmaliciousMassLogger RATBrowse
                                          • 132.226.8.169
                                          9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 132.226.247.73
                                          VQsnGWaNi5.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • 193.122.130.0
                                          6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 132.226.247.73
                                          JgE2YgxSzB.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 132.226.247.73
                                          lsc5QN46NH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 193.122.130.0
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CLOUDFLARENETUSrXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 104.21.96.1
                                          4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 104.21.112.1
                                          gH3LlhcRzg.exeGet hashmaliciousFormBookBrowse
                                          • 104.21.96.1
                                          Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 104.21.112.1
                                          M7XS5C07kV.exeGet hashmaliciousFormBookBrowse
                                          • 172.67.186.192
                                          b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 104.21.80.1
                                          UF7jzc7ETP.exeGet hashmaliciousMassLogger RATBrowse
                                          • 104.21.48.1
                                          9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 104.21.32.1
                                          VQsnGWaNi5.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • 104.21.48.1
                                          6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 104.21.80.1
                                          UTMEMUSrXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 132.226.247.73
                                          4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 132.226.247.73
                                          b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 132.226.8.169
                                          UF7jzc7ETP.exeGet hashmaliciousMassLogger RATBrowse
                                          • 132.226.8.169
                                          9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 132.226.247.73
                                          6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 132.226.247.73
                                          JgE2YgxSzB.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 132.226.247.73
                                          V7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 132.226.8.169
                                          upXUt2jZ0S.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • 132.226.247.73
                                          2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 132.226.247.73
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          54328bd36c14bd82ddaa0c04b25ed9adrXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 104.21.80.1
                                          4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 104.21.80.1
                                          Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 104.21.80.1
                                          b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 104.21.80.1
                                          UF7jzc7ETP.exeGet hashmaliciousMassLogger RATBrowse
                                          • 104.21.80.1
                                          9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 104.21.80.1
                                          VQsnGWaNi5.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • 104.21.80.1
                                          6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                          • 104.21.80.1
                                          JgE2YgxSzB.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 104.21.80.1
                                          lsc5QN46NH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 104.21.80.1
                                          No context
                                          Process:C:\Users\user\Desktop\7b4Iaf58Rp.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):200932
                                          Entropy (8bit):7.978807839515265
                                          Encrypted:false
                                          SSDEEP:3072:5vbT/8z5CL24Lk7j03CJ1k8VXbcTDEjCULY54n4BvCAaunlyY0:KtS297NRXoTATY5hVMAyZ
                                          MD5:1CA39C02B0B94B192A9E6F1975932480
                                          SHA1:6BEC7A5F43314457B5BBE22EA942DB101BDDD354
                                          SHA-256:A8F3DBB9A72A40BD88EC748338DAD5376F6031538C053F6ECE0C1E8E9F8C40D0
                                          SHA-512:A0F9D2B6E76C0CE55DC2E5AB2DA2EC653C5726F096F91E0B872382696E7AA78DC9A24A554D0C2FA8C7190ED1750712AF2A80E5021CB2DF934883E3382AC0D05F
                                          Malicious:false
                                          Reputation:low
                                          Preview:EA06..4..Dz...VsF.N&5.W".E...J$.c....tY..nk@..N..4..>4......'7.R.#.R.RZ\.GJ.M.IT..5..d...._[..q..j.f......O..'fe%..4...+7.Q....&.f.I-T.d.g....}..$.N#...........g....N..........gV...9 ....jt....?U.....!7..a.Z.M..I.j....'.....u........J.'"..5P.8...t..L.......'.Z..p..k.Y...8...p....i..r..W..BwZ.......OY...}.\En.%.l...Y.j..5.,.....}.I.r}0..%......4w'3.......g3...E%.T+S\...h..(.J.....'|.P....O.....4Fh.I..4....~..j...M.t9..i...5.q1.M&..,..s..Ug0`....7..C.G.3;5.s].....5_..4....sF.T...T....V.?\V#...~.x|O.-..T....ka....]T.I.Lk.[>.........0..S.N.h!..........$....M.|Z.v;4.n......z.c.Uo..w8......"s..q..u..:..........S...u.V..z4....|m..k.@..&../+...~+.n..c...&3p.....m.;y..SZ.]lT..4..E.....f.L.P.-.u..\c4.Wq.....m.N....T..m".J..1.n.o...X.y.W...~..\.P...>>:q...;..O..q.ry.kk..eU.d.....c....._...|.,jcX...J...L...Z...o.Nk.Y.........\.;I..(...V...p 1.t.m..W.......u8.j,.c.......U.........G..@a....mP......`....a...`.^.:.5.....zs....];H.....g4J&.d.\x.
                                          Process:C:\Users\user\AppData\Local\scrolar\neophobia.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):200932
                                          Entropy (8bit):7.978807839515265
                                          Encrypted:false
                                          SSDEEP:3072:5vbT/8z5CL24Lk7j03CJ1k8VXbcTDEjCULY54n4BvCAaunlyY0:KtS297NRXoTATY5hVMAyZ
                                          MD5:1CA39C02B0B94B192A9E6F1975932480
                                          SHA1:6BEC7A5F43314457B5BBE22EA942DB101BDDD354
                                          SHA-256:A8F3DBB9A72A40BD88EC748338DAD5376F6031538C053F6ECE0C1E8E9F8C40D0
                                          SHA-512:A0F9D2B6E76C0CE55DC2E5AB2DA2EC653C5726F096F91E0B872382696E7AA78DC9A24A554D0C2FA8C7190ED1750712AF2A80E5021CB2DF934883E3382AC0D05F
                                          Malicious:false
                                          Reputation:low
                                          Preview:EA06..4..Dz...VsF.N&5.W".E...J$.c....tY..nk@..N..4..>4......'7.R.#.R.RZ\.GJ.M.IT..5..d...._[..q..j.f......O..'fe%..4...+7.Q....&.f.I-T.d.g....}..$.N#...........g....N..........gV...9 ....jt....?U.....!7..a.Z.M..I.j....'.....u........J.'"..5P.8...t..L.......'.Z..p..k.Y...8...p....i..r..W..BwZ.......OY...}.\En.%.l...Y.j..5.,.....}.I.r}0..%......4w'3.......g3...E%.T+S\...h..(.J.....'|.P....O.....4Fh.I..4....~..j...M.t9..i...5.q1.M&..,..s..Ug0`....7..C.G.3;5.s].....5_..4....sF.T...T....V.?\V#...~.x|O.-..T....ka....]T.I.Lk.[>.........0..S.N.h!..........$....M.|Z.v;4.n......z.c.Uo..w8......"s..q..u..:..........S...u.V..z4....|m..k.@..&../+...~+.n..c...&3p.....m.;y..SZ.]lT..4..E.....f.L.P.-.u..\c4.Wq.....m.N....T..m".J..1.n.o...X.y.W...~..\.P...>>:q...;..O..q.ry.kk..eU.d.....c....._...|.,jcX...J...L...Z...o.Nk.Y.........\.;I..(...V...p 1.t.m..W.......u8.j,.c.......U.........G..@a....mP......`....a...`.^.:.5.....zs....];H.....g4J&.d.\x.
                                          Process:C:\Users\user\AppData\Local\scrolar\neophobia.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):200932
                                          Entropy (8bit):7.978807839515265
                                          Encrypted:false
                                          SSDEEP:3072:5vbT/8z5CL24Lk7j03CJ1k8VXbcTDEjCULY54n4BvCAaunlyY0:KtS297NRXoTATY5hVMAyZ
                                          MD5:1CA39C02B0B94B192A9E6F1975932480
                                          SHA1:6BEC7A5F43314457B5BBE22EA942DB101BDDD354
                                          SHA-256:A8F3DBB9A72A40BD88EC748338DAD5376F6031538C053F6ECE0C1E8E9F8C40D0
                                          SHA-512:A0F9D2B6E76C0CE55DC2E5AB2DA2EC653C5726F096F91E0B872382696E7AA78DC9A24A554D0C2FA8C7190ED1750712AF2A80E5021CB2DF934883E3382AC0D05F
                                          Malicious:false
                                          Reputation:low
                                          Preview:EA06..4..Dz...VsF.N&5.W".E...J$.c....tY..nk@..N..4..>4......'7.R.#.R.RZ\.GJ.M.IT..5..d...._[..q..j.f......O..'fe%..4...+7.Q....&.f.I-T.d.g....}..$.N#...........g....N..........gV...9 ....jt....?U.....!7..a.Z.M..I.j....'.....u........J.'"..5P.8...t..L.......'.Z..p..k.Y...8...p....i..r..W..BwZ.......OY...}.\En.%.l...Y.j..5.,.....}.I.r}0..%......4w'3.......g3...E%.T+S\...h..(.J.....'|.P....O.....4Fh.I..4....~..j...M.t9..i...5.q1.M&..,..s..Ug0`....7..C.G.3;5.s].....5_..4....sF.T...T....V.?\V#...~.x|O.-..T....ka....]T.I.Lk.[>.........0..S.N.h!..........$....M.|Z.v;4.n......z.c.Uo..w8......"s..q..u..:..........S...u.V..z4....|m..k.@..&../+...~+.n..c...&3p.....m.;y..SZ.]lT..4..E.....f.L.P.-.u..\c4.Wq.....m.N....T..m".J..1.n.o...X.y.W...~..\.P...>>:q...;..O..q.ry.kk..eU.d.....c....._...|.,jcX...J...L...Z...o.Nk.Y.........\.;I..(...V...p 1.t.m..W.......u8.j,.c.......U.........G..@a....mP......`....a...`.^.:.5.....zs....];H.....g4J&.d.\x.
                                          Process:C:\Users\user\AppData\Local\scrolar\neophobia.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):200932
                                          Entropy (8bit):7.978807839515265
                                          Encrypted:false
                                          SSDEEP:3072:5vbT/8z5CL24Lk7j03CJ1k8VXbcTDEjCULY54n4BvCAaunlyY0:KtS297NRXoTATY5hVMAyZ
                                          MD5:1CA39C02B0B94B192A9E6F1975932480
                                          SHA1:6BEC7A5F43314457B5BBE22EA942DB101BDDD354
                                          SHA-256:A8F3DBB9A72A40BD88EC748338DAD5376F6031538C053F6ECE0C1E8E9F8C40D0
                                          SHA-512:A0F9D2B6E76C0CE55DC2E5AB2DA2EC653C5726F096F91E0B872382696E7AA78DC9A24A554D0C2FA8C7190ED1750712AF2A80E5021CB2DF934883E3382AC0D05F
                                          Malicious:false
                                          Preview:EA06..4..Dz...VsF.N&5.W".E...J$.c....tY..nk@..N..4..>4......'7.R.#.R.RZ\.GJ.M.IT..5..d...._[..q..j.f......O..'fe%..4...+7.Q....&.f.I-T.d.g....}..$.N#...........g....N..........gV...9 ....jt....?U.....!7..a.Z.M..I.j....'.....u........J.'"..5P.8...t..L.......'.Z..p..k.Y...8...p....i..r..W..BwZ.......OY...}.\En.%.l...Y.j..5.,.....}.I.r}0..%......4w'3.......g3...E%.T+S\...h..(.J.....'|.P....O.....4Fh.I..4....~..j...M.t9..i...5.q1.M&..,..s..Ug0`....7..C.G.3;5.s].....5_..4....sF.T...T....V.?\V#...~.x|O.-..T....ka....]T.I.Lk.[>.........0..S.N.h!..........$....M.|Z.v;4.n......z.c.Uo..w8......"s..q..u..:..........S...u.V..z4....|m..k.@..&../+...~+.n..c...&3p.....m.;y..SZ.]lT..4..E.....f.L.P.-.u..\c4.Wq.....m.N....T..m".J..1.n.o...X.y.W...~..\.P...>>:q...;..O..q.ry.kk..eU.d.....c....._...|.,jcX...J...L...Z...o.Nk.Y.........\.;I..(...V...p 1.t.m..W.......u8.j,.c.......U.........G..@a....mP......`....a...`.^.:.5.....zs....];H.....g4J&.d.\x.
                                          Process:C:\Users\user\AppData\Local\scrolar\neophobia.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):200932
                                          Entropy (8bit):7.978807839515265
                                          Encrypted:false
                                          SSDEEP:3072:5vbT/8z5CL24Lk7j03CJ1k8VXbcTDEjCULY54n4BvCAaunlyY0:KtS297NRXoTATY5hVMAyZ
                                          MD5:1CA39C02B0B94B192A9E6F1975932480
                                          SHA1:6BEC7A5F43314457B5BBE22EA942DB101BDDD354
                                          SHA-256:A8F3DBB9A72A40BD88EC748338DAD5376F6031538C053F6ECE0C1E8E9F8C40D0
                                          SHA-512:A0F9D2B6E76C0CE55DC2E5AB2DA2EC653C5726F096F91E0B872382696E7AA78DC9A24A554D0C2FA8C7190ED1750712AF2A80E5021CB2DF934883E3382AC0D05F
                                          Malicious:false
                                          Preview:EA06..4..Dz...VsF.N&5.W".E...J$.c....tY..nk@..N..4..>4......'7.R.#.R.RZ\.GJ.M.IT..5..d...._[..q..j.f......O..'fe%..4...+7.Q....&.f.I-T.d.g....}..$.N#...........g....N..........gV...9 ....jt....?U.....!7..a.Z.M..I.j....'.....u........J.'"..5P.8...t..L.......'.Z..p..k.Y...8...p....i..r..W..BwZ.......OY...}.\En.%.l...Y.j..5.,.....}.I.r}0..%......4w'3.......g3...E%.T+S\...h..(.J.....'|.P....O.....4Fh.I..4....~..j...M.t9..i...5.q1.M&..,..s..Ug0`....7..C.G.3;5.s].....5_..4....sF.T...T....V.?\V#...~.x|O.-..T....ka....]T.I.Lk.[>.........0..S.N.h!..........$....M.|Z.v;4.n......z.c.Uo..w8......"s..q..u..:..........S...u.V..z4....|m..k.@..&../+...~+.n..c...&3p.....m.;y..SZ.]lT..4..E.....f.L.P.-.u..\c4.Wq.....m.N....T..m".J..1.n.o...X.y.W...~..\.P...>>:q...;..O..q.ry.kk..eU.d.....c....._...|.,jcX...J...L...Z...o.Nk.Y.........\.;I..(...V...p 1.t.m..W.......u8.j,.c.......U.........G..@a....mP......`....a...`.^.:.5.....zs....];H.....g4J&.d.\x.
                                          Process:C:\Users\user\Desktop\7b4Iaf58Rp.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):209920
                                          Entropy (8bit):7.799150922066439
                                          Encrypted:false
                                          SSDEEP:3072:zNUfw6O4wnyRD8PrNTtrUKm1q9UrbnSUjPwjrMCrQ3UIAmUgG2i7CHV/sFbdBSqK:BUYDnyGj5ZUKoHdjPwjgkMdAi/qJrs
                                          MD5:0F110D0BEE6DCF22DF1EB5980E491B34
                                          SHA1:E7CB671EB902CC3851A1C30EA1A8E1A8F729CEEE
                                          SHA-256:C913B5740D45357D060DB482923D37A8D548D2A275D53B8A0DF534308140B5AF
                                          SHA-512:024E7C0175868D444F34035C0AC802F96E281F4CB5376AC2377475752E3ED893C0487C37D401FC79AB9496B3AD8920B57B868B0A38EB9BC5FF37C743682154D5
                                          Malicious:false
                                          Preview:z..9YU9F@81Z..KE.ZU9FD81.57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9F.81Z;(.K9.\.g.9}..c#,Jz%K)#JP7.T*+W5!.$!.C/[."+...jf)WU?.:FO.ZU9FD812%.fiH.+.7.F.+.IyfF$jH.:3..K.:.Gv$.8.I.$..%;%+.GtgQO.D.5w.!+.7.Fc3V_g4.$U9FD81Z57KE9ZU9F..57KEi.U9.E<1..7.E9ZU9FD8.Z.6@D0ZU.GD8.[57KE9u.9FD(1Z5.JE9Z.9FT81Z77K@9ZU9FD84Z57KE9ZU.ED85Z5.pG9XU9.D8!Z5'KE9ZE9FT81Z57KU9ZU9FD81Z57.P;Z.9FD8QX5.YD9ZU9FD81Z57KE9ZU9FD81Z57K..[U%FD81Z57KE9ZU9FD81Z57KE9ZU9F.53Zu7KE9ZU9FD81Z.6K.8ZU9FD81Z57KE9ZU9FD81Z57KE9t!\>081Z-.JE9JU9F.91Z17KE9ZU9FD81Z57kE9:{K"%LPZ5.&E9Z.8FDV1Z5.JE9ZU9FD81Z57K.9Z.."%LPZ57.u9ZU.DD8'Z57AG9ZU9FD81Z57KEyZU.h6KC957K.+[U9&F81N47Ke;ZU9FD81Z57KE9.U9.D81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z57KE9ZU9FD81Z
                                          Process:C:\Users\user\Desktop\7b4Iaf58Rp.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):1125888
                                          Entropy (8bit):7.095988140717257
                                          Encrypted:false
                                          SSDEEP:24576:8u6J33O0c+JY5UZ+XC0kGso6FaAtBghPYz9dEIrdRyRWY:mu0c++OCvkGs9FaAtwY5LR3Y
                                          MD5:1522DA1337568F1F00AA81AF4A9E345D
                                          SHA1:7FDB6AEADC77A586F43D08A7A9ADDA5387933916
                                          SHA-256:FFF6C4BCD537790156642C7010AAC1FDDD2A79F3143A71F5570DC19AB9BA25BA
                                          SHA-512:1F41A2697FFC96AC4BD6A66F7BCFFAF675D91880B28FFCFA49666E613DAB082789328CD8DFABB2FAE58BCF61A3778745C9D5AC8B14830B6B981280DE72378C59
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 91%
                                          • Antivirus: Virustotal, Detection: 68%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}.r}.r}.4,".p}.....s}../..A}../#..}../".G}.{.@.{}.{.P.W}.r}.R....)."}.....s}../..s}.r}T.s}.....s}.Richr}.................PE..L...q&Vg.........."..........L.......}............@.................................v.....@...@.......@.....................L...|....p..`.................... ...q...+..............................pH..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...`....p......................@..@.reloc...q... ...r..................@..B........................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\AppData\Local\scrolar\neophobia.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):276
                                          Entropy (8bit):3.384638339753146
                                          Encrypted:false
                                          SSDEEP:6:DMM8lfm3OOQdUfclwL1UEZ+lX1WlG6qrmLnriIM8lfQVn:DsO+vNlwBQ1SmA2n
                                          MD5:7DC726A2F518B2D2AC7C064E2FD0B2B9
                                          SHA1:8911D028F21B677A9F515B2A8202606C5868DC6B
                                          SHA-256:5C8CED4B9A6C965C9175B1E91EFEA4E335815C2DFC798F5385F413FD0FCC8686
                                          SHA-512:9C1CC3B4E09ABAE37D617462318BD641FFCDA78D326CED0E8E0440E251F2E593322F6BE34415B5154FA5C0EF986047E4A87A46826691CF32F8412320E783D716
                                          Malicious:true
                                          Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.h.u.b.e.r.t.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.s.c.r.o.l.a.r.\.n.e.o.p.h.o.b.i.a...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):7.095988140717257
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:7b4Iaf58Rp.exe
                                          File size:1'125'888 bytes
                                          MD5:1522da1337568f1f00aa81af4a9e345d
                                          SHA1:7fdb6aeadc77a586f43d08a7a9adda5387933916
                                          SHA256:fff6c4bcd537790156642c7010aac1fddd2a79f3143a71f5570dc19ab9ba25ba
                                          SHA512:1f41a2697ffc96ac4bd6a66f7bcffaf675d91880b28ffcfa49666e613dab082789328cd8dfabb2fae58bcf61a3778745c9d5ac8b14830b6b981280de72378c59
                                          SSDEEP:24576:8u6J33O0c+JY5UZ+XC0kGso6FaAtBghPYz9dEIrdRyRWY:mu0c++OCvkGs9FaAtwY5LR3Y
                                          TLSH:0F35BE2273DDC360CB669173BF69B7056EBF3C614630B85B2F980D7DA950162262CB63
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                          Icon Hash:aaf3e3e3938382a0
                                          Entrypoint:0x427dcd
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x67562671 [Sun Dec 8 23:06:25 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:5
                                          OS Version Minor:1
                                          File Version Major:5
                                          File Version Minor:1
                                          Subsystem Version Major:5
                                          Subsystem Version Minor:1
                                          Import Hash:afcdf79be1557326c854b6e20cb900a7
                                          Instruction
                                          call 00007FE45CE0B55Ah
                                          jmp 00007FE45CDFE324h
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          push edi
                                          push esi
                                          mov esi, dword ptr [esp+10h]
                                          mov ecx, dword ptr [esp+14h]
                                          mov edi, dword ptr [esp+0Ch]
                                          mov eax, ecx
                                          mov edx, ecx
                                          add eax, esi
                                          cmp edi, esi
                                          jbe 00007FE45CDFE4AAh
                                          cmp edi, eax
                                          jc 00007FE45CDFE80Eh
                                          bt dword ptr [004C31FCh], 01h
                                          jnc 00007FE45CDFE4A9h
                                          rep movsb
                                          jmp 00007FE45CDFE7BCh
                                          cmp ecx, 00000080h
                                          jc 00007FE45CDFE674h
                                          mov eax, edi
                                          xor eax, esi
                                          test eax, 0000000Fh
                                          jne 00007FE45CDFE4B0h
                                          bt dword ptr [004BE324h], 01h
                                          jc 00007FE45CDFE980h
                                          bt dword ptr [004C31FCh], 00000000h
                                          jnc 00007FE45CDFE64Dh
                                          test edi, 00000003h
                                          jne 00007FE45CDFE65Eh
                                          test esi, 00000003h
                                          jne 00007FE45CDFE63Dh
                                          bt edi, 02h
                                          jnc 00007FE45CDFE4AFh
                                          mov eax, dword ptr [esi]
                                          sub ecx, 04h
                                          lea esi, dword ptr [esi+04h]
                                          mov dword ptr [edi], eax
                                          lea edi, dword ptr [edi+04h]
                                          bt edi, 03h
                                          jnc 00007FE45CDFE4B3h
                                          movq xmm1, qword ptr [esi]
                                          sub ecx, 08h
                                          lea esi, dword ptr [esi+08h]
                                          movq qword ptr [edi], xmm1
                                          lea edi, dword ptr [edi+08h]
                                          test esi, 00000007h
                                          je 00007FE45CDFE505h
                                          bt esi, 03h
                                          jnc 00007FE45CDFE558h
                                          Programming Language:
                                          • [ASM] VS2013 build 21005
                                          • [ C ] VS2013 build 21005
                                          • [C++] VS2013 build 21005
                                          • [ C ] VS2008 SP1 build 30729
                                          • [IMP] VS2008 SP1 build 30729
                                          • [ASM] VS2013 UPD4 build 31101
                                          • [RES] VS2013 build 21005
                                          • [LNK] VS2013 UPD4 build 31101
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x4a460.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1120000x711c.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0xc70000x4a4600x4a60062da4cfc762aa5bc0f5418ce9de2b531False0.911062237394958data7.857378023445686IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x1120000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                          RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                          RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                          RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                          RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                          RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                          RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                          RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                          RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                          RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                          RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                          RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                          RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                          RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                          RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                          RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                          RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                          RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                          RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                          RT_RCDATA0xcf7b80x41727data1.0003394623066277
                                          RT_GROUP_ICON0x110ee00x76dataEnglishGreat Britain0.6610169491525424
                                          RT_GROUP_ICON0x110f580x14dataEnglishGreat Britain1.25
                                          RT_GROUP_ICON0x110f6c0x14dataEnglishGreat Britain1.15
                                          RT_GROUP_ICON0x110f800x14dataEnglishGreat Britain1.25
                                          RT_VERSION0x110f940xdcdataEnglishGreat Britain0.6181818181818182
                                          RT_MANIFEST0x1110700x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                          DLLImport
                                          WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                          VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                          MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                          WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                          PSAPI.DLLGetProcessMemoryInfo
                                          IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                          USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                          UxTheme.dllIsThemeActive
                                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                          USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                          GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                          COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                          SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                          OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishGreat Britain
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2025-01-10T23:16:02.394160+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849705132.226.8.16980TCP
                                          2025-01-10T23:16:10.200043+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849711132.226.8.16980TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 10, 2025 23:15:57.166055918 CET4970580192.168.2.8132.226.8.169
                                          Jan 10, 2025 23:15:57.170952082 CET8049705132.226.8.169192.168.2.8
                                          Jan 10, 2025 23:15:57.173957109 CET4970580192.168.2.8132.226.8.169
                                          Jan 10, 2025 23:15:57.174272060 CET4970580192.168.2.8132.226.8.169
                                          Jan 10, 2025 23:15:57.179024935 CET8049705132.226.8.169192.168.2.8
                                          Jan 10, 2025 23:16:00.047271967 CET8049705132.226.8.169192.168.2.8
                                          Jan 10, 2025 23:16:00.063252926 CET4970580192.168.2.8132.226.8.169
                                          Jan 10, 2025 23:16:00.068027020 CET8049705132.226.8.169192.168.2.8
                                          Jan 10, 2025 23:16:02.343054056 CET8049705132.226.8.169192.168.2.8
                                          Jan 10, 2025 23:16:02.354680061 CET49710443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:02.354717970 CET44349710104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:02.354806900 CET49710443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:02.364574909 CET49710443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:02.364603996 CET44349710104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:02.394160032 CET4970580192.168.2.8132.226.8.169
                                          Jan 10, 2025 23:16:02.835916042 CET44349710104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:02.836015940 CET49710443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:02.841547012 CET49710443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:02.841572046 CET44349710104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:02.841866970 CET44349710104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:02.894083023 CET49710443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:02.901658058 CET49710443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:02.943330050 CET44349710104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:03.115793943 CET44349710104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:03.115847111 CET44349710104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:03.115936041 CET49710443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:03.132353067 CET49710443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:04.868712902 CET4971180192.168.2.8132.226.8.169
                                          Jan 10, 2025 23:16:04.873642921 CET8049711132.226.8.169192.168.2.8
                                          Jan 10, 2025 23:16:04.875927925 CET4971180192.168.2.8132.226.8.169
                                          Jan 10, 2025 23:16:04.876127958 CET4971180192.168.2.8132.226.8.169
                                          Jan 10, 2025 23:16:04.880980968 CET8049711132.226.8.169192.168.2.8
                                          Jan 10, 2025 23:16:07.685738087 CET8049711132.226.8.169192.168.2.8
                                          Jan 10, 2025 23:16:07.694042921 CET4971180192.168.2.8132.226.8.169
                                          Jan 10, 2025 23:16:07.698904991 CET8049711132.226.8.169192.168.2.8
                                          Jan 10, 2025 23:16:10.156029940 CET8049711132.226.8.169192.168.2.8
                                          Jan 10, 2025 23:16:10.172553062 CET49712443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:10.172585011 CET44349712104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:10.172662973 CET49712443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:10.177314043 CET49712443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:10.177340031 CET44349712104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:10.199973106 CET8049711132.226.8.169192.168.2.8
                                          Jan 10, 2025 23:16:10.200042963 CET4971180192.168.2.8132.226.8.169
                                          Jan 10, 2025 23:16:10.637379885 CET44349712104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:10.637531996 CET49712443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:10.639298916 CET49712443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:10.639322042 CET44349712104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:10.639766932 CET44349712104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:10.691001892 CET49712443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:10.711543083 CET49712443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:10.759342909 CET44349712104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:10.933824062 CET44349712104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:10.933897018 CET44349712104.21.80.1192.168.2.8
                                          Jan 10, 2025 23:16:10.933990955 CET49712443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:16:10.964124918 CET49712443192.168.2.8104.21.80.1
                                          Jan 10, 2025 23:17:07.338828087 CET8049705132.226.8.169192.168.2.8
                                          Jan 10, 2025 23:17:07.338956118 CET4970580192.168.2.8132.226.8.169
                                          Jan 10, 2025 23:17:14.995863914 CET8049711132.226.8.169192.168.2.8
                                          Jan 10, 2025 23:17:14.996022940 CET4971180192.168.2.8132.226.8.169
                                          Jan 10, 2025 23:17:42.349926949 CET4970580192.168.2.8132.226.8.169
                                          Jan 10, 2025 23:17:42.355021000 CET8049705132.226.8.169192.168.2.8
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 10, 2025 23:15:57.153175116 CET5161053192.168.2.81.1.1.1
                                          Jan 10, 2025 23:15:57.160032988 CET53516101.1.1.1192.168.2.8
                                          Jan 10, 2025 23:16:02.346396923 CET6131553192.168.2.81.1.1.1
                                          Jan 10, 2025 23:16:02.353791952 CET53613151.1.1.1192.168.2.8
                                          Jan 10, 2025 23:16:10.162197113 CET5414253192.168.2.81.1.1.1
                                          Jan 10, 2025 23:16:10.171426058 CET53541421.1.1.1192.168.2.8
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Jan 10, 2025 23:15:57.153175116 CET192.168.2.81.1.1.10xb8f4Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:02.346396923 CET192.168.2.81.1.1.10x856bStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:10.162197113 CET192.168.2.81.1.1.10xc237Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Jan 10, 2025 23:15:57.160032988 CET1.1.1.1192.168.2.80xb8f4No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                          Jan 10, 2025 23:15:57.160032988 CET1.1.1.1192.168.2.80xb8f4No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:15:57.160032988 CET1.1.1.1192.168.2.80xb8f4No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:15:57.160032988 CET1.1.1.1192.168.2.80xb8f4No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:15:57.160032988 CET1.1.1.1192.168.2.80xb8f4No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:15:57.160032988 CET1.1.1.1192.168.2.80xb8f4No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:02.353791952 CET1.1.1.1192.168.2.80x856bNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:02.353791952 CET1.1.1.1192.168.2.80x856bNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:02.353791952 CET1.1.1.1192.168.2.80x856bNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:02.353791952 CET1.1.1.1192.168.2.80x856bNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:02.353791952 CET1.1.1.1192.168.2.80x856bNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:02.353791952 CET1.1.1.1192.168.2.80x856bNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:02.353791952 CET1.1.1.1192.168.2.80x856bNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:10.171426058 CET1.1.1.1192.168.2.80xc237No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:10.171426058 CET1.1.1.1192.168.2.80xc237No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:10.171426058 CET1.1.1.1192.168.2.80xc237No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:10.171426058 CET1.1.1.1192.168.2.80xc237No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:10.171426058 CET1.1.1.1192.168.2.80xc237No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:10.171426058 CET1.1.1.1192.168.2.80xc237No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                          Jan 10, 2025 23:16:10.171426058 CET1.1.1.1192.168.2.80xc237No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                          • reallyfreegeoip.org
                                          • checkip.dyndns.org
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.849705132.226.8.169802352C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 10, 2025 23:15:57.174272060 CET151OUTGET / HTTP/1.1
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                          Host: checkip.dyndns.org
                                          Connection: Keep-Alive
                                          Jan 10, 2025 23:16:00.047271967 CET682INHTTP/1.1 502 Bad Gateway
                                          Date: Fri, 10 Jan 2025 22:15:59 GMT
                                          Content-Type: text/html
                                          Content-Length: 547
                                          Connection: keep-alive
                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                          Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                          Jan 10, 2025 23:16:00.063252926 CET127OUTGET / HTTP/1.1
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                          Host: checkip.dyndns.org
                                          Jan 10, 2025 23:16:02.343054056 CET682INHTTP/1.1 502 Bad Gateway
                                          Date: Fri, 10 Jan 2025 22:16:02 GMT
                                          Content-Type: text/html
                                          Content-Length: 547
                                          Connection: keep-alive
                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                          Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.2.849711132.226.8.169806840C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          TimestampBytes transferredDirectionData
                                          Jan 10, 2025 23:16:04.876127958 CET151OUTGET / HTTP/1.1
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                          Host: checkip.dyndns.org
                                          Connection: Keep-Alive
                                          Jan 10, 2025 23:16:07.685738087 CET682INHTTP/1.1 502 Bad Gateway
                                          Date: Fri, 10 Jan 2025 22:16:07 GMT
                                          Content-Type: text/html
                                          Content-Length: 547
                                          Connection: keep-alive
                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                          Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                          Jan 10, 2025 23:16:07.694042921 CET127OUTGET / HTTP/1.1
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                          Host: checkip.dyndns.org
                                          Jan 10, 2025 23:16:10.156029940 CET682INHTTP/1.1 502 Bad Gateway
                                          Date: Fri, 10 Jan 2025 22:16:09 GMT
                                          Content-Type: text/html
                                          Content-Length: 547
                                          Connection: keep-alive
                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                          Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                          Jan 10, 2025 23:16:10.199973106 CET682INHTTP/1.1 502 Bad Gateway
                                          Date: Fri, 10 Jan 2025 22:16:09 GMT
                                          Content-Type: text/html
                                          Content-Length: 547
                                          Connection: keep-alive
                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                          Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.849710104.21.80.14432352C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          TimestampBytes transferredDirectionData
                                          2025-01-10 22:16:02 UTC73OUTGET /xml/ HTTP/1.1
                                          Host: reallyfreegeoip.org
                                          Connection: Keep-Alive
                                          2025-01-10 22:16:03 UTC769INHTTP/1.1 200 OK
                                          Date: Fri, 10 Jan 2025 22:16:03 GMT
                                          Content-Type: text/xml
                                          Content-Length: 362
                                          Connection: close
                                          cf-cache-status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rfRnaus%2BTY6YGIr3Z1TMUI9IJhAYITW4HDGAAvziXZa1d1uSB%2BtivJWSOFXcLbbosgE2LcaAp9MzXqJWtTEIy1aA%2B48KWYZG4Dwy0a7hkTTi0yWe7ZJl5YjAKASRTaN3vMhvb%2BY8"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 9000077a7a51c443-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          server-timing: cfL4;desc="?proto=TCP&rtt=3973&min_rtt=1679&rtt_var=2165&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=687&delivery_rate=1739130&cwnd=244&unsent_bytes=0&cid=1f111647326dd96d&ts=288&x=0"
                                          2025-01-10 22:16:03 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.2.849712104.21.80.14436840C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          TimestampBytes transferredDirectionData
                                          2025-01-10 22:16:10 UTC73OUTGET /xml/ HTTP/1.1
                                          Host: reallyfreegeoip.org
                                          Connection: Keep-Alive
                                          2025-01-10 22:16:10 UTC770INHTTP/1.1 200 OK
                                          Date: Fri, 10 Jan 2025 22:16:10 GMT
                                          Content-Type: text/xml
                                          Content-Length: 362
                                          Connection: close
                                          cf-cache-status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kY4cAQk5QIJ3%2F23Ynk14CXokFEuIvMfwzM4%2Fk0Nrj26Krk7oMVlrDPjPv0H7NnLQyNXbhoUfuY2K9ExEd16gAWzb91K3wZQ%2BCSUnZNA2NabFFvnSg%2F21FgtBCA%2BXqhwBsQLuqhIQ"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 900007ab4f030f36-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          server-timing: cfL4;desc="?proto=TCP&rtt=1472&min_rtt=1429&rtt_var=622&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=687&delivery_rate=1645070&cwnd=231&unsent_bytes=0&cid=b7041a31c5f2b313&ts=302&x=0"
                                          2025-01-10 22:16:10 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:17:15:40
                                          Start date:10/01/2025
                                          Path:C:\Users\user\Desktop\7b4Iaf58Rp.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\7b4Iaf58Rp.exe"
                                          Imagebase:0xf90000
                                          File size:1'125'888 bytes
                                          MD5 hash:1522DA1337568F1F00AA81AF4A9E345D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:17:15:43
                                          Start date:10/01/2025
                                          Path:C:\Users\user\AppData\Local\scrolar\neophobia.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\7b4Iaf58Rp.exe"
                                          Imagebase:0xd40000
                                          File size:1'125'888 bytes
                                          MD5 hash:1522DA1337568F1F00AA81AF4A9E345D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.1495389103.0000000000B40000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          Antivirus matches:
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 91%, ReversingLabs
                                          • Detection: 68%, Virustotal, Browse
                                          Reputation:low
                                          Has exited:true

                                          Target ID:3
                                          Start time:17:15:47
                                          Start date:10/01/2025
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\7b4Iaf58Rp.exe"
                                          Imagebase:0x260000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:17:15:48
                                          Start date:10/01/2025
                                          Path:C:\Users\user\AppData\Local\scrolar\neophobia.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Local\scrolar\neophobia.exe"
                                          Imagebase:0xd40000
                                          File size:1'125'888 bytes
                                          MD5 hash:1522DA1337568F1F00AA81AF4A9E345D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000004.00000002.1531826494.0000000001490000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:low
                                          Has exited:true

                                          Target ID:5
                                          Start time:17:15:51
                                          Start date:10/01/2025
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\AppData\Local\scrolar\neophobia.exe"
                                          Imagebase:0x160000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:17:15:51
                                          Start date:10/01/2025
                                          Path:C:\Users\user\AppData\Local\scrolar\neophobia.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Local\scrolar\neophobia.exe"
                                          Imagebase:0xd40000
                                          File size:1'125'888 bytes
                                          MD5 hash:1522DA1337568F1F00AA81AF4A9E345D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000006.00000002.1571996988.0000000002320000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:low
                                          Has exited:true

                                          Target ID:7
                                          Start time:17:15:55
                                          Start date:10/01/2025
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Local\scrolar\neophobia.exe"
                                          Imagebase:0xc40000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2664984338.00000000032F4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                          • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000007.00000002.2667760848.0000000005710000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                          Reputation:high
                                          Has exited:false

                                          Target ID:9
                                          Start time:17:15:58
                                          Start date:10/01/2025
                                          Path:C:\Windows\System32\wscript.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neophobia.vbs"
                                          Imagebase:0x7ff749a10000
                                          File size:170'496 bytes
                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:10
                                          Start time:17:15:58
                                          Start date:10/01/2025
                                          Path:C:\Users\user\AppData\Local\scrolar\neophobia.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Local\scrolar\neophobia.exe"
                                          Imagebase:0xd40000
                                          File size:1'125'888 bytes
                                          MD5 hash:1522DA1337568F1F00AA81AF4A9E345D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000000A.00000002.1648249221.0000000000BA0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:low
                                          Has exited:true

                                          Target ID:11
                                          Start time:17:16:03
                                          Start date:10/01/2025
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Local\scrolar\neophobia.exe"
                                          Imagebase:0x4b0000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000B.00000002.2666782183.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000B.00000002.2663292675.0000000002550000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2664477879.0000000002AB4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 0000000B.00000002.2664119117.0000000002752000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000B.00000002.2664119117.0000000002752000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000B.00000002.2664119117.0000000002763000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:3.3%
                                            Dynamic/Decrypted Code Coverage:0.4%
                                            Signature Coverage:9%
                                            Total number of Nodes:2000
                                            Total number of Limit Nodes:50
                                            execution_graph 104158 fcfdfc 104176 f9ab30 Mailbox _memmove 104158->104176 104162 fb0db6 59 API calls Mailbox 104162->104176 104163 f9b525 104272 ff9e4a 89 API calls 4 library calls 104163->104272 104166 fb0db6 59 API calls Mailbox 104183 f99f37 Mailbox 104166->104183 104167 fd09e5 104277 ff9e4a 89 API calls 4 library calls 104167->104277 104168 fd0055 104267 ff9e4a 89 API calls 4 library calls 104168->104267 104170 f9a057 104172 f9b475 104268 f98047 104172->104268 104174 fd0064 104175 f98047 59 API calls 104175->104183 104176->104162 104176->104163 104176->104170 104176->104183 104192 f9b2b6 104176->104192 104195 fd086a 104176->104195 104197 fd0878 104176->104197 104199 fd085c 104176->104199 104200 f9b21c 104176->104200 104203 fe6e8f 59 API calls 104176->104203 104207 100df23 104176->104207 104210 100df37 104176->104210 104215 f99ea0 104176->104215 104239 f99c90 104176->104239 104258 100c193 85 API calls 2 library calls 104176->104258 104259 100c2e0 96 API calls Mailbox 104176->104259 104260 ff7956 59 API calls Mailbox 104176->104260 104261 f97de1 104176->104261 104265 100bc6b 331 API calls Mailbox 104176->104265 104266 fe617e 59 API calls Mailbox 104176->104266 104178 f9b47a 104178->104167 104178->104168 104182 f97667 59 API calls 104182->104183 104183->104166 104183->104168 104183->104170 104183->104172 104183->104175 104183->104178 104183->104182 104184 fe6e8f 59 API calls 104183->104184 104185 fb2d40 67 API calls __cinit 104183->104185 104187 fd09d6 104183->104187 104189 f9a55a 104183->104189 104213 f9c8c0 331 API calls 2 library calls 104183->104213 104214 f9b900 60 API calls Mailbox 104183->104214 104184->104183 104185->104183 104276 ff9e4a 89 API calls 4 library calls 104187->104276 104275 ff9e4a 89 API calls 4 library calls 104189->104275 104257 f9f6a3 331 API calls 104192->104257 104196 f99c90 Mailbox 59 API calls 104195->104196 104196->104199 104274 ff9e4a 89 API calls 4 library calls 104197->104274 104199->104170 104273 fe617e 59 API calls Mailbox 104199->104273 104244 f99d3c 104200->104244 104202 f9b22d 104204 f99d3c 60 API calls 104202->104204 104203->104176 104204->104192 104278 100cadd 104207->104278 104209 100df33 104209->104176 104211 100cadd 130 API calls 104210->104211 104212 100df47 104211->104212 104212->104176 104213->104183 104214->104183 104216 f99ebf 104215->104216 104234 f99eed Mailbox 104215->104234 104217 fb0db6 Mailbox 59 API calls 104216->104217 104217->104234 104218 fb2d40 67 API calls __cinit 104218->104234 104219 f9b475 104220 f98047 59 API calls 104219->104220 104233 f9a057 104220->104233 104221 f9b47a 104222 fd0055 104221->104222 104238 fd09e5 104221->104238 104477 ff9e4a 89 API calls 4 library calls 104222->104477 104224 fb0db6 59 API calls Mailbox 104224->104234 104227 fd0064 104227->104176 104228 f98047 59 API calls 104228->104234 104231 f97667 59 API calls 104231->104234 104232 fe6e8f 59 API calls 104232->104234 104233->104176 104234->104218 104234->104219 104234->104221 104234->104222 104234->104224 104234->104228 104234->104231 104234->104232 104234->104233 104235 fd09d6 104234->104235 104237 f9a55a 104234->104237 104475 f9c8c0 331 API calls 2 library calls 104234->104475 104476 f9b900 60 API calls Mailbox 104234->104476 104479 ff9e4a 89 API calls 4 library calls 104235->104479 104478 ff9e4a 89 API calls 4 library calls 104237->104478 104480 ff9e4a 89 API calls 4 library calls 104238->104480 104241 f99c9b 104239->104241 104240 f99cd2 104240->104176 104241->104240 104481 f98cd4 59 API calls Mailbox 104241->104481 104243 f99cfd 104243->104176 104245 f99d4a 104244->104245 104255 f99d78 Mailbox 104244->104255 104246 f99d9d 104245->104246 104249 f99d50 Mailbox 104245->104249 104247 f98047 59 API calls 104246->104247 104247->104255 104248 f99d64 104250 f99dcc 104248->104250 104251 f99d6f 104248->104251 104248->104255 104249->104248 104252 fcfa0f 104249->104252 104250->104255 104482 f98cd4 59 API calls Mailbox 104250->104482 104253 fcf9e6 VariantClear 104251->104253 104251->104255 104252->104255 104483 fe6e8f 59 API calls 104252->104483 104253->104255 104255->104202 104257->104163 104258->104176 104259->104176 104260->104176 104262 f97df0 __NMSG_WRITE _memmove 104261->104262 104263 fb0db6 Mailbox 59 API calls 104262->104263 104264 f97e2e 104263->104264 104264->104176 104265->104176 104266->104176 104267->104174 104269 f9805a 104268->104269 104270 f98052 104268->104270 104269->104170 104484 f97f77 59 API calls 2 library calls 104270->104484 104272->104199 104273->104170 104274->104199 104275->104170 104276->104167 104277->104170 104316 f99837 104278->104316 104282 100cdb9 104283 100cf2e 104282->104283 104288 100cdc7 104282->104288 104383 100d8c8 92 API calls Mailbox 104283->104383 104286 100cf3d 104286->104288 104289 100cf49 104286->104289 104287 f99837 84 API calls 104306 100cbb2 Mailbox 104287->104306 104347 100c96e 104288->104347 104299 100cb61 Mailbox 104289->104299 104294 100ce00 104362 fb0c08 104294->104362 104297 100ce33 104369 f992ce 104297->104369 104298 100ce1a 104368 ff9e4a 89 API calls 4 library calls 104298->104368 104299->104209 104302 100ce25 GetCurrentProcess TerminateProcess 104302->104297 104306->104282 104306->104287 104306->104299 104366 100fbce 59 API calls 2 library calls 104306->104366 104367 100cfdf 61 API calls 2 library calls 104306->104367 104307 100cfa4 104307->104299 104312 100cfb8 FreeLibrary 104307->104312 104309 100ce6b 104381 100d649 107 API calls _free 104309->104381 104312->104299 104314 f99d3c 60 API calls 104315 100ce7c 104314->104315 104315->104307 104315->104314 104382 f98d40 59 API calls Mailbox 104315->104382 104384 100d649 107 API calls _free 104315->104384 104317 f9984b 104316->104317 104318 f99851 104316->104318 104317->104299 104334 100d7a5 104317->104334 104319 fcf5d3 __i64tow 104318->104319 104320 f99899 104318->104320 104321 f99857 __itow 104318->104321 104325 fcf4da 104318->104325 104395 fb3698 83 API calls 3 library calls 104320->104395 104385 fb0db6 104321->104385 104327 fb0db6 Mailbox 59 API calls 104325->104327 104332 fcf552 Mailbox _wcscpy 104325->104332 104326 f99871 104326->104317 104328 f97de1 59 API calls 104326->104328 104329 fcf51f 104327->104329 104328->104317 104330 fb0db6 Mailbox 59 API calls 104329->104330 104331 fcf545 104330->104331 104331->104332 104333 f97de1 59 API calls 104331->104333 104396 fb3698 83 API calls 3 library calls 104332->104396 104333->104332 104425 f97e4f 104334->104425 104336 100d7c0 CharLowerBuffW 104429 fef167 104336->104429 104343 100d810 104454 f97d2c 104343->104454 104345 100d81c Mailbox 104346 100d858 Mailbox 104345->104346 104458 100cfdf 61 API calls 2 library calls 104345->104458 104346->104306 104348 100c989 104347->104348 104352 100c9de 104347->104352 104349 fb0db6 Mailbox 59 API calls 104348->104349 104351 100c9ab 104349->104351 104350 fb0db6 Mailbox 59 API calls 104350->104351 104351->104350 104351->104352 104353 100da50 104352->104353 104354 100dc79 Mailbox 104353->104354 104360 100da73 _strcat _wcscpy __NMSG_WRITE 104353->104360 104354->104294 104355 f99b3c 59 API calls 104355->104360 104356 f99b98 59 API calls 104356->104360 104357 f99be6 59 API calls 104357->104360 104358 f99837 84 API calls 104358->104360 104359 fb571c 58 API calls std::exception::_Copy_str 104359->104360 104360->104354 104360->104355 104360->104356 104360->104357 104360->104358 104360->104359 104465 ff5887 61 API calls 2 library calls 104360->104465 104363 fb0c1d 104362->104363 104364 fb0cb5 VirtualProtect 104363->104364 104365 fb0c83 104363->104365 104364->104365 104365->104297 104365->104298 104366->104306 104367->104306 104368->104302 104370 f992d6 104369->104370 104371 fb0db6 Mailbox 59 API calls 104370->104371 104372 f992e4 104371->104372 104373 f992f0 104372->104373 104466 f991fc 59 API calls Mailbox 104372->104466 104375 f99050 104373->104375 104467 f99160 104375->104467 104377 f9905f 104378 fb0db6 Mailbox 59 API calls 104377->104378 104379 f990fb 104377->104379 104378->104379 104379->104315 104380 f98d40 59 API calls Mailbox 104379->104380 104380->104309 104381->104315 104382->104315 104383->104286 104384->104315 104388 fb0dbe 104385->104388 104387 fb0dd8 104387->104326 104388->104387 104390 fb0ddc std::exception::exception 104388->104390 104397 fb571c 104388->104397 104414 fb33a1 DecodePointer 104388->104414 104415 fb859b RaiseException 104390->104415 104392 fb0e06 104416 fb84d1 58 API calls _free 104392->104416 104394 fb0e18 104394->104326 104395->104321 104396->104319 104398 fb5797 104397->104398 104408 fb5728 104397->104408 104423 fb33a1 DecodePointer 104398->104423 104400 fb579d 104424 fb8b28 58 API calls __getptd_noexit 104400->104424 104403 fb575b RtlAllocateHeap 104404 fb578f 104403->104404 104403->104408 104404->104388 104406 fb5733 104406->104408 104417 fba16b 58 API calls 2 library calls 104406->104417 104418 fba1c8 58 API calls 7 library calls 104406->104418 104419 fb309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104406->104419 104407 fb5783 104421 fb8b28 58 API calls __getptd_noexit 104407->104421 104408->104403 104408->104406 104408->104407 104412 fb5781 104408->104412 104420 fb33a1 DecodePointer 104408->104420 104422 fb8b28 58 API calls __getptd_noexit 104412->104422 104414->104388 104415->104392 104416->104394 104417->104406 104418->104406 104420->104408 104421->104412 104422->104404 104423->104400 104424->104404 104426 f97e62 104425->104426 104428 f97e5f _memmove 104425->104428 104427 fb0db6 Mailbox 59 API calls 104426->104427 104427->104428 104428->104336 104430 fef192 __NMSG_WRITE 104429->104430 104431 fef1d1 104430->104431 104433 fef1c7 104430->104433 104435 fef278 104430->104435 104431->104345 104436 f97667 104431->104436 104433->104431 104459 f978c4 61 API calls 104433->104459 104435->104431 104460 f978c4 61 API calls 104435->104460 104437 fb0db6 Mailbox 59 API calls 104436->104437 104438 f97688 104437->104438 104439 fb0db6 Mailbox 59 API calls 104438->104439 104440 f97696 104439->104440 104441 f9784b 104440->104441 104442 f9785a 104441->104442 104443 f978b7 104441->104443 104442->104443 104445 f97865 104442->104445 104444 f97d2c 59 API calls 104443->104444 104451 f97888 _memmove 104444->104451 104446 fceb09 104445->104446 104447 f97880 104445->104447 104462 f98029 104446->104462 104461 f97f27 59 API calls Mailbox 104447->104461 104450 fceb13 104452 fb0db6 Mailbox 59 API calls 104450->104452 104451->104343 104453 fceb33 104452->104453 104455 f97d43 _memmove 104454->104455 104456 f97d3a 104454->104456 104455->104345 104456->104455 104457 f97e4f 59 API calls 104456->104457 104457->104455 104458->104346 104459->104433 104460->104435 104461->104451 104463 fb0db6 Mailbox 59 API calls 104462->104463 104464 f98033 104463->104464 104464->104450 104465->104360 104466->104373 104468 f99169 Mailbox 104467->104468 104469 fcf19f 104468->104469 104474 f99173 104468->104474 104470 fb0db6 Mailbox 59 API calls 104469->104470 104472 fcf1ab 104470->104472 104471 f9917a 104471->104377 104473 f99c90 Mailbox 59 API calls 104473->104474 104474->104471 104474->104473 104475->104234 104476->104234 104477->104227 104478->104233 104479->104238 104480->104233 104481->104243 104482->104255 104483->104255 104484->104269 104485 fd416f 104489 fe5fe6 104485->104489 104487 fd417a 104488 fe5fe6 85 API calls 104487->104488 104488->104487 104490 fe5ff3 104489->104490 104499 fe6020 104489->104499 104491 fe6022 104490->104491 104493 fe6027 104490->104493 104497 fe601a 104490->104497 104490->104499 104510 f99328 84 API calls Mailbox 104491->104510 104494 f99837 84 API calls 104493->104494 104495 fe602e 104494->104495 104500 f97b2e 104495->104500 104509 f995a0 59 API calls _wcsstr 104497->104509 104499->104487 104501 fcec6b 104500->104501 104502 f97b40 104500->104502 104517 fe7bdb 59 API calls _memmove 104501->104517 104511 f97a51 104502->104511 104505 fcec75 104507 f98047 59 API calls 104505->104507 104506 f97b4c 104506->104499 104508 fcec7d Mailbox 104507->104508 104509->104499 104510->104493 104512 f97a5f 104511->104512 104516 f97a85 _memmove 104511->104516 104513 fb0db6 Mailbox 59 API calls 104512->104513 104512->104516 104514 f97ad4 104513->104514 104515 fb0db6 Mailbox 59 API calls 104514->104515 104515->104516 104516->104506 104517->104505 104518 f9107d 104523 f9708b 104518->104523 104520 f9108c 104554 fb2d40 104520->104554 104524 f9709b __write_nolock 104523->104524 104525 f97667 59 API calls 104524->104525 104526 f97151 104525->104526 104557 f94706 104526->104557 104528 f9715a 104564 fb050b 104528->104564 104535 f97667 59 API calls 104536 f9718b 104535->104536 104583 f97d8c 104536->104583 104538 f97194 RegOpenKeyExW 104539 fce8b1 RegQueryValueExW 104538->104539 104543 f971b6 Mailbox 104538->104543 104540 fce8ce 104539->104540 104541 fce943 RegCloseKey 104539->104541 104542 fb0db6 Mailbox 59 API calls 104540->104542 104541->104543 104553 fce955 _wcscat Mailbox __NMSG_WRITE 104541->104553 104544 fce8e7 104542->104544 104543->104520 104587 f9522e 104544->104587 104547 fce90f 104590 f97bcc 104547->104590 104549 f979f2 59 API calls 104549->104553 104550 fce929 104550->104541 104551 f97de1 59 API calls 104551->104553 104552 f93f74 59 API calls 104552->104553 104553->104543 104553->104549 104553->104551 104553->104552 104621 fb2c44 104554->104621 104556 f91096 104599 fc1940 104557->104599 104560 f97de1 59 API calls 104561 f94739 104560->104561 104601 f94750 104561->104601 104563 f94743 Mailbox 104563->104528 104565 fc1940 __write_nolock 104564->104565 104566 fb0518 GetFullPathNameW 104565->104566 104567 fb053a 104566->104567 104568 f97bcc 59 API calls 104567->104568 104569 f97165 104568->104569 104570 f97cab 104569->104570 104571 fced4a 104570->104571 104572 f97cbf 104570->104572 104574 f98029 59 API calls 104571->104574 104615 f97c50 104572->104615 104576 fced55 __NMSG_WRITE _memmove 104574->104576 104575 f97173 104577 f93f74 104575->104577 104578 f93f82 104577->104578 104582 f93fa4 _memmove 104577->104582 104580 fb0db6 Mailbox 59 API calls 104578->104580 104579 fb0db6 Mailbox 59 API calls 104581 f93fb8 104579->104581 104580->104582 104581->104535 104582->104579 104584 f97da6 104583->104584 104586 f97d99 104583->104586 104585 fb0db6 Mailbox 59 API calls 104584->104585 104585->104586 104586->104538 104588 fb0db6 Mailbox 59 API calls 104587->104588 104589 f95240 RegQueryValueExW 104588->104589 104589->104547 104589->104550 104591 f97bd8 __NMSG_WRITE 104590->104591 104592 f97c45 104590->104592 104594 f97bee 104591->104594 104595 f97c13 104591->104595 104593 f97d2c 59 API calls 104592->104593 104598 f97bf6 _memmove 104593->104598 104620 f97f27 59 API calls Mailbox 104594->104620 104597 f98029 59 API calls 104595->104597 104597->104598 104598->104550 104600 f94713 GetModuleFileNameW 104599->104600 104600->104560 104602 fc1940 __write_nolock 104601->104602 104603 f9475d GetFullPathNameW 104602->104603 104604 f94799 104603->104604 104605 f9477c 104603->104605 104607 f97d8c 59 API calls 104604->104607 104606 f97bcc 59 API calls 104605->104606 104608 f94788 104606->104608 104607->104608 104611 f97726 104608->104611 104612 f97734 104611->104612 104613 f97d2c 59 API calls 104612->104613 104614 f94794 104613->104614 104614->104563 104616 f97c5f __NMSG_WRITE 104615->104616 104617 f98029 59 API calls 104616->104617 104618 f97c70 _memmove 104616->104618 104619 fced07 _memmove 104617->104619 104618->104575 104620->104598 104622 fb2c50 type_info::_Type_info_dtor 104621->104622 104629 fb3217 104622->104629 104628 fb2c77 type_info::_Type_info_dtor 104628->104556 104646 fb9c0b 104629->104646 104631 fb2c59 104632 fb2c88 DecodePointer DecodePointer 104631->104632 104633 fb2c65 104632->104633 104634 fb2cb5 104632->104634 104643 fb2c82 104633->104643 104634->104633 104692 fb87a4 59 API calls __cftoe2_l 104634->104692 104636 fb2d18 EncodePointer EncodePointer 104636->104633 104637 fb2cec 104637->104633 104641 fb2d06 EncodePointer 104637->104641 104694 fb8864 61 API calls 2 library calls 104637->104694 104638 fb2cc7 104638->104636 104638->104637 104693 fb8864 61 API calls 2 library calls 104638->104693 104641->104636 104642 fb2d00 104642->104633 104642->104641 104695 fb3220 104643->104695 104647 fb9c2f EnterCriticalSection 104646->104647 104648 fb9c1c 104646->104648 104647->104631 104653 fb9c93 104648->104653 104650 fb9c22 104650->104647 104677 fb30b5 58 API calls 3 library calls 104650->104677 104654 fb9c9f type_info::_Type_info_dtor 104653->104654 104655 fb9ca8 104654->104655 104656 fb9cc0 104654->104656 104678 fba16b 58 API calls 2 library calls 104655->104678 104665 fb9ce1 type_info::_Type_info_dtor 104656->104665 104681 fb881d 58 API calls 2 library calls 104656->104681 104658 fb9cad 104679 fba1c8 58 API calls 7 library calls 104658->104679 104661 fb9cd5 104663 fb9ceb 104661->104663 104664 fb9cdc 104661->104664 104662 fb9cb4 104680 fb309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104662->104680 104668 fb9c0b __lock 58 API calls 104663->104668 104682 fb8b28 58 API calls __getptd_noexit 104664->104682 104665->104650 104669 fb9cf2 104668->104669 104671 fb9cff 104669->104671 104672 fb9d17 104669->104672 104683 fb9e2b InitializeCriticalSectionAndSpinCount 104671->104683 104684 fb2d55 104672->104684 104675 fb9d0b 104690 fb9d33 LeaveCriticalSection _doexit 104675->104690 104678->104658 104679->104662 104681->104661 104682->104665 104683->104675 104685 fb2d87 __dosmaperr 104684->104685 104686 fb2d5e RtlFreeHeap 104684->104686 104685->104675 104686->104685 104687 fb2d73 104686->104687 104691 fb8b28 58 API calls __getptd_noexit 104687->104691 104689 fb2d79 GetLastError 104689->104685 104690->104665 104691->104689 104692->104638 104693->104637 104694->104642 104698 fb9d75 LeaveCriticalSection 104695->104698 104697 fb2c87 104697->104628 104698->104697 104699 f93633 104700 f9366a 104699->104700 104701 f93688 104700->104701 104702 f936e7 104700->104702 104739 f936e5 104700->104739 104706 f9374b PostQuitMessage 104701->104706 104707 f93695 104701->104707 104704 fcd0cc 104702->104704 104705 f936ed 104702->104705 104703 f936ca DefWindowProcW 104741 f936d8 104703->104741 104754 fa1070 10 API calls Mailbox 104704->104754 104708 f936f2 104705->104708 104709 f93715 SetTimer RegisterWindowMessageW 104705->104709 104706->104741 104711 fcd154 104707->104711 104712 f936a0 104707->104712 104714 f936f9 KillTimer 104708->104714 104715 fcd06f 104708->104715 104717 f9373e CreatePopupMenu 104709->104717 104709->104741 104770 ff2527 71 API calls _memset 104711->104770 104718 f936a8 104712->104718 104719 f93755 104712->104719 104751 f9443a Shell_NotifyIconW _memset 104714->104751 104724 fcd0a8 MoveWindow 104715->104724 104725 fcd074 104715->104725 104716 fcd0f3 104755 fa1093 331 API calls Mailbox 104716->104755 104717->104741 104720 fcd139 104718->104720 104721 f936b3 104718->104721 104744 f944a0 104719->104744 104720->104703 104769 fe7c36 59 API calls Mailbox 104720->104769 104728 f936be 104721->104728 104729 fcd124 104721->104729 104722 fcd166 104722->104703 104722->104741 104724->104741 104730 fcd078 104725->104730 104731 fcd097 SetFocus 104725->104731 104728->104703 104756 f9443a Shell_NotifyIconW _memset 104728->104756 104768 ff2d36 81 API calls _memset 104729->104768 104730->104728 104733 fcd081 104730->104733 104731->104741 104732 f9370c 104752 f93114 DeleteObject DestroyWindow Mailbox 104732->104752 104753 fa1070 10 API calls Mailbox 104733->104753 104738 fcd134 104738->104741 104739->104703 104742 fcd118 104757 f9434a 104742->104757 104745 f94539 104744->104745 104746 f944b7 _memset 104744->104746 104745->104741 104771 f9407c 104746->104771 104748 f94522 KillTimer SetTimer 104748->104745 104749 fcd4ab Shell_NotifyIconW 104749->104748 104750 f944de 104750->104748 104750->104749 104751->104732 104752->104741 104753->104741 104754->104716 104755->104728 104756->104742 104758 f94375 _memset 104757->104758 104798 f94182 104758->104798 104761 f943fa 104763 f94430 Shell_NotifyIconW 104761->104763 104764 f94414 Shell_NotifyIconW 104761->104764 104765 f94422 104763->104765 104764->104765 104766 f9407c 61 API calls 104765->104766 104767 f94429 104766->104767 104767->104739 104768->104738 104769->104739 104770->104722 104772 f94098 104771->104772 104773 f9416f Mailbox 104771->104773 104793 f97a16 104772->104793 104773->104750 104776 fcd3c8 LoadStringW 104780 fcd3e2 104776->104780 104777 f940b3 104778 f97bcc 59 API calls 104777->104778 104779 f940c8 104778->104779 104779->104780 104781 f940d9 104779->104781 104782 f97b2e 59 API calls 104780->104782 104783 f940e3 104781->104783 104784 f94174 104781->104784 104787 fcd3ec 104782->104787 104786 f97b2e 59 API calls 104783->104786 104785 f98047 59 API calls 104784->104785 104790 f940ed _memset _wcscpy 104785->104790 104786->104790 104788 f97cab 59 API calls 104787->104788 104787->104790 104789 fcd40e 104788->104789 104792 f97cab 59 API calls 104789->104792 104791 f94155 Shell_NotifyIconW 104790->104791 104791->104773 104792->104790 104794 fb0db6 Mailbox 59 API calls 104793->104794 104795 f97a3b 104794->104795 104796 f98029 59 API calls 104795->104796 104797 f940a6 104796->104797 104797->104776 104797->104777 104799 fcd423 104798->104799 104800 f94196 104798->104800 104799->104800 104801 fcd42c DestroyIcon 104799->104801 104800->104761 104802 ff2f94 62 API calls _W_store_winword 104800->104802 104801->104800 104802->104761 104803 fcfe27 104816 faf944 104803->104816 104805 fcfe3d 104806 fcfebe 104805->104806 104807 fcfe53 104805->104807 104825 f9fce0 104806->104825 104905 f99e5d 60 API calls 104807->104905 104809 fcfe92 104810 fd089c 104809->104810 104813 fcfe9a 104809->104813 104907 ff9e4a 89 API calls 4 library calls 104810->104907 104906 ff834f 59 API calls Mailbox 104813->104906 104815 fcfeb2 Mailbox 104815->104815 104817 faf962 104816->104817 104818 faf950 104816->104818 104819 faf968 104817->104819 104820 faf991 104817->104820 104821 f99d3c 60 API calls 104818->104821 104822 fb0db6 Mailbox 59 API calls 104819->104822 104823 f99d3c 60 API calls 104820->104823 104824 faf95a 104821->104824 104822->104824 104823->104824 104824->104805 104908 f98180 104825->104908 104827 f9fd3d 104828 fd472d 104827->104828 104889 fa06f6 104827->104889 104913 f9f234 104827->104913 105015 ff9e4a 89 API calls 4 library calls 104828->105015 104832 f9fe3e 104833 fd488d 104832->104833 104836 f9fe4c 104832->104836 105019 fe66ec 59 API calls 2 library calls 104832->105019 104833->104836 104884 fd4742 104833->104884 105021 100a2d9 85 API calls Mailbox 104833->105021 104834 fd4b53 104834->104884 105040 ff9e4a 89 API calls 4 library calls 104834->105040 104835 fa0517 104843 fb0db6 Mailbox 59 API calls 104835->104843 104836->104834 104845 fd48f9 104836->104845 104917 f9837c 104836->104917 104837 fd47d7 104837->104884 105017 ff9e4a 89 API calls 4 library calls 104837->105017 104840 fb0db6 59 API calls Mailbox 104870 f9fdd3 104840->104870 104850 fa0545 _memmove 104843->104850 104844 fd4848 105020 fe60ef 59 API calls 2 library calls 104844->105020 104851 fd4917 104845->104851 105023 f985c0 104845->105023 104848 fd4755 104848->104837 105016 f9f6a3 331 API calls 104848->105016 104862 fb0db6 Mailbox 59 API calls 104850->104862 104858 fd4928 104851->104858 104859 f985c0 59 API calls 104851->104859 104852 f9fea4 104860 fd4ad6 104852->104860 104861 f9ff32 104852->104861 104868 fa0179 Mailbox _memmove 104852->104868 104853 fd486b 104856 f99ea0 331 API calls 104853->104856 104854 fd48b2 Mailbox 104854->104836 105022 fe66ec 59 API calls 2 library calls 104854->105022 104856->104833 104858->104868 105031 fe60ab 59 API calls Mailbox 104858->105031 104859->104858 105039 ff9ae7 60 API calls 104860->105039 104865 fb0db6 Mailbox 59 API calls 104861->104865 104869 fa0106 _memmove 104862->104869 104871 f9ff39 104865->104871 104866 f9ffe6 104888 f98047 59 API calls 104866->104888 104890 fa0007 104866->104890 104883 fd4ab2 104868->104883 104887 f99d3c 60 API calls 104868->104887 104868->104889 104891 fa0398 104868->104891 104892 fb0db6 59 API calls Mailbox 104868->104892 104898 fd4a1c 104868->104898 104903 fd4a4d 104868->104903 105012 f98740 68 API calls __cinit 104868->105012 105013 f98660 68 API calls 104868->105013 105032 ff5937 68 API calls 104868->105032 105033 f989b3 69 API calls Mailbox 104868->105033 104869->104868 104886 f99c90 Mailbox 59 API calls 104869->104886 104904 fa0162 104869->104904 104870->104832 104870->104835 104870->104840 104870->104848 104870->104850 104872 f99ea0 331 API calls 104870->104872 104878 fd480c 104870->104878 104870->104884 104871->104889 104924 fa09d0 104871->104924 104872->104870 104873 f99ea0 331 API calls 104877 fd4a87 104873->104877 104876 f9ffb2 104876->104850 104876->104866 104876->104889 104877->104884 105034 f984c0 104877->105034 105018 ff9e4a 89 API calls 4 library calls 104878->105018 105038 ff9e4a 89 API calls 4 library calls 104883->105038 104886->104869 104887->104868 104888->104890 105014 ff9e4a 89 API calls 4 library calls 104889->105014 104890->104889 104893 fd4b24 104890->104893 104895 fa004c 104890->104895 104891->104815 104892->104868 104894 f99d3c 60 API calls 104893->104894 104894->104834 104895->104834 104895->104889 104896 fa00d8 104895->104896 104897 f99d3c 60 API calls 104896->104897 104899 fa00eb 104897->104899 104901 fb0db6 Mailbox 59 API calls 104898->104901 104899->104889 105001 f982df 104899->105001 104901->104903 104903->104873 104904->104815 104905->104809 104906->104815 104907->104815 104909 f9818f 104908->104909 104912 f981aa 104908->104912 104910 f97e4f 59 API calls 104909->104910 104911 f98197 CharUpperBuffW 104910->104911 104911->104912 104912->104827 104915 f9f251 104913->104915 104914 f9f272 104914->104870 104915->104914 105041 ff9e4a 89 API calls 4 library calls 104915->105041 104918 fcedbd 104917->104918 104919 f9838d 104917->104919 104920 fb0db6 Mailbox 59 API calls 104919->104920 104921 f98394 104920->104921 104922 f983b5 104921->104922 105042 f98634 59 API calls Mailbox 104921->105042 104922->104845 104922->104852 104925 fd4cc3 104924->104925 104937 fa09f5 104924->104937 105102 ff9e4a 89 API calls 4 library calls 104925->105102 104927 fa0cfa 104927->104876 104930 fa0ee4 104930->104927 104932 fa0ef1 104930->104932 104931 fa0a4b PeekMessageW 104970 fa0a05 Mailbox 104931->104970 105100 fa1093 331 API calls Mailbox 104932->105100 104935 fa0ef8 LockWindowUpdate DestroyWindow GetMessageW 104935->104927 104939 fa0f2a 104935->104939 104936 fa0ce4 104936->104927 105099 fa1070 10 API calls Mailbox 104936->105099 104937->104970 105103 f99e5d 60 API calls 104937->105103 105104 fe6349 331 API calls 104937->105104 104938 fd4e81 Sleep 104938->104970 104940 fd5c58 TranslateMessage DispatchMessageW GetMessageW 104939->104940 104940->104940 104942 fd5c88 104940->104942 104942->104927 104943 fd4d50 TranslateAcceleratorW 104944 fa0e43 PeekMessageW 104943->104944 104943->104970 104944->104970 104945 fa0ea5 TranslateMessage DispatchMessageW 104945->104944 104946 fb0db6 59 API calls Mailbox 104946->104970 104947 fa0d13 timeGetTime 104947->104970 104948 fd581f WaitForSingleObject 104950 fd583c GetExitCodeProcess CloseHandle 104948->104950 104948->104970 104954 fa0f95 104950->104954 104951 fa0e5f Sleep 104973 fa0e70 Mailbox 104951->104973 104952 f98047 59 API calls 104952->104970 104953 f97667 59 API calls 104953->104973 104954->104876 104955 fd5af8 Sleep 104955->104973 104958 fb049f timeGetTime 104958->104973 104959 fa0f4e timeGetTime 105101 f99e5d 60 API calls 104959->105101 104962 fd5b8f GetExitCodeProcess 104967 fd5bbb CloseHandle 104962->104967 104968 fd5ba5 WaitForSingleObject 104962->104968 104963 f99837 84 API calls 104963->104970 104965 1015f25 110 API calls 104965->104973 104966 f9b7dd 109 API calls 104966->104973 104967->104973 104968->104967 104968->104970 104970->104931 104970->104936 104970->104938 104970->104943 104970->104944 104970->104945 104970->104946 104970->104947 104970->104948 104970->104951 104970->104952 104970->104954 104970->104955 104970->104959 104970->104963 104972 f99e5d 60 API calls 104970->104972 104970->104973 104982 f99ea0 304 API calls 104970->104982 104985 f9fce0 304 API calls 104970->104985 104986 f97de1 59 API calls 104970->104986 104989 ff9e4a 89 API calls 104970->104989 104990 f99c90 59 API calls Mailbox 104970->104990 104991 fe617e 59 API calls Mailbox 104970->104991 104992 f982df 59 API calls 104970->104992 104993 f984c0 69 API calls 104970->104993 104994 f989b3 69 API calls 104970->104994 104995 fd55d5 VariantClear 104970->104995 104996 fd566b VariantClear 104970->104996 104997 fd5419 VariantClear 104970->104997 104998 f98cd4 59 API calls Mailbox 104970->104998 104999 fe6e8f 59 API calls 104970->104999 105000 f9b73c 304 API calls 104970->105000 105043 f9e6a0 104970->105043 105074 f9f460 104970->105074 105093 f931ce 104970->105093 105098 f9e420 331 API calls 104970->105098 105105 1016018 59 API calls 104970->105105 105106 ff9a15 59 API calls Mailbox 104970->105106 105107 fed4f2 59 API calls 104970->105107 105108 fe60ef 59 API calls 2 library calls 104970->105108 105109 f98401 59 API calls 104970->105109 104971 fd5874 104971->104954 104972->104970 104973->104953 104973->104954 104973->104958 104973->104962 104973->104965 104973->104966 104973->104970 104973->104971 104974 fd5c17 Sleep 104973->104974 104975 fd5078 Sleep 104973->104975 104977 f97de1 59 API calls 104973->104977 105110 ff2408 60 API calls 104973->105110 105111 f99e5d 60 API calls 104973->105111 105112 f989b3 69 API calls Mailbox 104973->105112 105113 f9b73c 331 API calls 104973->105113 105114 fe64da 60 API calls 104973->105114 105115 ff5244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 104973->105115 105116 ff3c55 66 API calls Mailbox 104973->105116 104974->104970 104975->104970 104977->104973 104982->104970 104985->104970 104986->104970 104989->104970 104990->104970 104991->104970 104992->104970 104993->104970 104994->104970 104995->104970 104996->104970 104997->104970 104998->104970 104999->104970 105000->104970 105002 f982f2 105001->105002 105003 fceda1 105001->105003 105004 f98339 Mailbox 105002->105004 105007 f9831c 105002->105007 105008 f985c0 59 API calls 105002->105008 105005 fcedb1 105003->105005 106158 fe61a4 59 API calls 105003->106158 105004->104869 105009 f98322 105007->105009 105010 f985c0 59 API calls 105007->105010 105008->105007 105009->105004 105011 f99c90 Mailbox 59 API calls 105009->105011 105010->105009 105011->105004 105012->104868 105013->104868 105014->104828 105015->104884 105016->104837 105017->104884 105018->104884 105019->104844 105020->104853 105021->104854 105022->104854 105024 f985ce 105023->105024 105030 f985f6 105023->105030 105025 f985dc 105024->105025 105026 f985c0 59 API calls 105024->105026 105027 f985c0 59 API calls 105025->105027 105028 f985e2 105025->105028 105026->105025 105027->105028 105029 f99c90 Mailbox 59 API calls 105028->105029 105028->105030 105029->105030 105030->104851 105031->104868 105032->104868 105033->104868 105035 f984cb 105034->105035 105036 f984f2 105035->105036 106159 f989b3 69 API calls Mailbox 105035->106159 105036->104883 105038->104884 105039->104866 105040->104884 105041->104914 105042->104922 105044 f9e6d5 105043->105044 105045 fd3aa9 105044->105045 105047 f9e73f 105044->105047 105057 f9e799 105044->105057 105046 f99ea0 331 API calls 105045->105046 105048 fd3abe 105046->105048 105051 f97667 59 API calls 105047->105051 105047->105057 105061 f9e970 Mailbox 105048->105061 105118 ff9e4a 89 API calls 4 library calls 105048->105118 105049 f97667 59 API calls 105049->105057 105052 fd3b04 105051->105052 105054 fb2d40 __cinit 67 API calls 105052->105054 105053 fb2d40 __cinit 67 API calls 105053->105057 105054->105057 105055 fd3b26 105055->104970 105056 f984c0 69 API calls 105056->105061 105057->105049 105057->105053 105057->105055 105058 f9e95a 105057->105058 105057->105061 105058->105061 105119 ff9e4a 89 API calls 4 library calls 105058->105119 105059 f99ea0 331 API calls 105059->105061 105061->105056 105061->105059 105062 f99c90 Mailbox 59 API calls 105061->105062 105064 ff9e4a 89 API calls 105061->105064 105067 f98d40 59 API calls 105061->105067 105070 f9f195 105061->105070 105073 f9ea78 105061->105073 105117 f97f77 59 API calls 2 library calls 105061->105117 105120 fe6e8f 59 API calls 105061->105120 105121 100c5c3 331 API calls 105061->105121 105122 100b53c 331 API calls Mailbox 105061->105122 105124 10093c6 331 API calls Mailbox 105061->105124 105062->105061 105064->105061 105067->105061 105123 ff9e4a 89 API calls 4 library calls 105070->105123 105072 fd3e25 105072->104970 105073->104970 105075 f9f4ba 105074->105075 105076 f9f650 105074->105076 105077 fd441e 105075->105077 105080 f9f4c6 105075->105080 105078 f97de1 59 API calls 105076->105078 105224 100bc6b 331 API calls Mailbox 105077->105224 105085 f9f58c Mailbox 105078->105085 105223 f9f290 331 API calls 2 library calls 105080->105223 105082 fd442c 105086 f9f630 105082->105086 105225 ff9e4a 89 API calls 4 library calls 105082->105225 105084 f9f4fd 105084->105082 105084->105085 105084->105086 105125 f94e4a 105085->105125 105131 ff3c37 105085->105131 105134 100445a 105085->105134 105143 ffcb7a 105085->105143 105086->104970 105087 f99c90 Mailbox 59 API calls 105088 f9f5e3 105087->105088 105088->105086 105088->105087 105094 f93212 105093->105094 105095 f931e0 105093->105095 105094->104970 105095->105094 105096 f93205 IsDialogMessageW 105095->105096 105097 fccf32 GetClassLongW 105095->105097 105096->105094 105096->105095 105097->105095 105097->105096 105098->104970 105099->104930 105100->104935 105101->104970 105102->104937 105103->104937 105104->104937 105105->104970 105106->104970 105107->104970 105108->104970 105109->104970 105110->104973 105111->104973 105112->104973 105113->104973 105114->104973 105115->104973 105116->104973 105117->105061 105118->105061 105119->105061 105120->105061 105121->105061 105122->105061 105123->105072 105124->105061 105126 f94e5b 105125->105126 105127 f94e54 105125->105127 105129 f94e7b FreeLibrary 105126->105129 105130 f94e6a 105126->105130 105226 fb53a6 105127->105226 105129->105130 105130->105088 105496 ff445a GetFileAttributesW 105131->105496 105135 f99837 84 API calls 105134->105135 105136 1004494 105135->105136 105500 f96240 105136->105500 105138 10044a4 105139 10044c9 105138->105139 105140 f99ea0 331 API calls 105138->105140 105142 10044cd 105139->105142 105525 f99a98 59 API calls Mailbox 105139->105525 105140->105139 105142->105088 105144 f97667 59 API calls 105143->105144 105145 ffcbaf 105144->105145 105146 f97667 59 API calls 105145->105146 105147 ffcbb8 105146->105147 105148 ffcbcc 105147->105148 105721 f99b3c 59 API calls 105147->105721 105150 f99837 84 API calls 105148->105150 105151 ffcbe9 105150->105151 105152 ffcc0b 105151->105152 105153 ffccea 105151->105153 105222 ffcd1a Mailbox 105151->105222 105155 f99837 84 API calls 105152->105155 105534 f94ddd 105153->105534 105157 ffcc17 105155->105157 105158 f98047 59 API calls 105157->105158 105160 ffcc23 105158->105160 105159 ffcd16 105162 f97667 59 API calls 105159->105162 105159->105222 105165 ffcc69 105160->105165 105166 ffcc37 105160->105166 105161 f94ddd 136 API calls 105161->105159 105163 ffcd4b 105162->105163 105164 f97667 59 API calls 105163->105164 105167 ffcd54 105164->105167 105169 f99837 84 API calls 105165->105169 105168 f98047 59 API calls 105166->105168 105170 f97667 59 API calls 105167->105170 105172 ffcc47 105168->105172 105173 ffcc76 105169->105173 105171 ffcd5d 105170->105171 105174 f97667 59 API calls 105171->105174 105175 f97cab 59 API calls 105172->105175 105176 f98047 59 API calls 105173->105176 105178 ffcd66 105174->105178 105179 ffcc51 105175->105179 105177 ffcc82 105176->105177 105722 ff4a31 GetFileAttributesW 105177->105722 105181 f99837 84 API calls 105178->105181 105182 f99837 84 API calls 105179->105182 105184 ffcd73 105181->105184 105185 ffcc5d 105182->105185 105183 ffcc8b 105186 ffcc9e 105183->105186 105189 f979f2 59 API calls 105183->105189 105558 f9459b 105184->105558 105188 f97b2e 59 API calls 105185->105188 105191 f99837 84 API calls 105186->105191 105197 ffcca4 105186->105197 105188->105165 105189->105186 105190 ffcd8e 105609 f979f2 105190->105609 105193 ffcccb 105191->105193 105723 ff37ef 75 API calls Mailbox 105193->105723 105196 ffcdd1 105198 f98047 59 API calls 105196->105198 105197->105222 105200 ffcddf 105198->105200 105199 f979f2 59 API calls 105201 ffcdae 105199->105201 105202 f97b2e 59 API calls 105200->105202 105201->105196 105204 f97bcc 59 API calls 105201->105204 105203 ffcded 105202->105203 105205 f97b2e 59 API calls 105203->105205 105206 ffcdc3 105204->105206 105207 ffcdfb 105205->105207 105208 f97bcc 59 API calls 105206->105208 105209 f97b2e 59 API calls 105207->105209 105208->105196 105210 ffce09 105209->105210 105211 f99837 84 API calls 105210->105211 105212 ffce15 105211->105212 105612 ff4071 105212->105612 105214 ffce26 105215 ff3c37 3 API calls 105214->105215 105216 ffce30 105215->105216 105217 f99837 84 API calls 105216->105217 105221 ffce61 105216->105221 105218 ffce4e 105217->105218 105666 ff9155 105218->105666 105220 f94e4a 84 API calls 105220->105222 105221->105220 105222->105088 105223->105084 105224->105082 105225->105086 105227 fb53b2 type_info::_Type_info_dtor 105226->105227 105228 fb53de 105227->105228 105229 fb53c6 105227->105229 105236 fb53d6 type_info::_Type_info_dtor 105228->105236 105239 fb6c11 105228->105239 105261 fb8b28 58 API calls __getptd_noexit 105229->105261 105232 fb53cb 105262 fb8db6 9 API calls __cftoe2_l 105232->105262 105236->105126 105240 fb6c43 EnterCriticalSection 105239->105240 105241 fb6c21 105239->105241 105242 fb53f0 105240->105242 105241->105240 105243 fb6c29 105241->105243 105245 fb533a 105242->105245 105244 fb9c0b __lock 58 API calls 105243->105244 105244->105242 105246 fb5349 105245->105246 105247 fb535d 105245->105247 105307 fb8b28 58 API calls __getptd_noexit 105246->105307 105249 fb5359 105247->105249 105264 fb4a3d 105247->105264 105263 fb5415 LeaveCriticalSection LeaveCriticalSection __wfsopen 105249->105263 105250 fb534e 105308 fb8db6 9 API calls __cftoe2_l 105250->105308 105257 fb5377 105281 fc0a02 105257->105281 105259 fb537d 105259->105249 105260 fb2d55 _free 58 API calls 105259->105260 105260->105249 105261->105232 105262->105236 105263->105236 105265 fb4a50 105264->105265 105266 fb4a74 105264->105266 105265->105266 105267 fb46e6 __output_l 58 API calls 105265->105267 105270 fc0b77 105266->105270 105268 fb4a6d 105267->105268 105309 fbd886 105268->105309 105271 fc0b84 105270->105271 105273 fb5371 105270->105273 105272 fb2d55 _free 58 API calls 105271->105272 105271->105273 105272->105273 105274 fb46e6 105273->105274 105275 fb46f0 105274->105275 105276 fb4705 105274->105276 105451 fb8b28 58 API calls __getptd_noexit 105275->105451 105276->105257 105278 fb46f5 105452 fb8db6 9 API calls __cftoe2_l 105278->105452 105280 fb4700 105280->105257 105282 fc0a0e type_info::_Type_info_dtor 105281->105282 105283 fc0a1b 105282->105283 105284 fc0a32 105282->105284 105468 fb8af4 58 API calls __getptd_noexit 105283->105468 105286 fc0abd 105284->105286 105288 fc0a42 105284->105288 105473 fb8af4 58 API calls __getptd_noexit 105286->105473 105287 fc0a20 105469 fb8b28 58 API calls __getptd_noexit 105287->105469 105291 fc0a6a 105288->105291 105292 fc0a60 105288->105292 105295 fbd206 ___lock_fhandle 59 API calls 105291->105295 105470 fb8af4 58 API calls __getptd_noexit 105292->105470 105293 fc0a65 105474 fb8b28 58 API calls __getptd_noexit 105293->105474 105297 fc0a70 105295->105297 105298 fc0a8e 105297->105298 105299 fc0a83 105297->105299 105471 fb8b28 58 API calls __getptd_noexit 105298->105471 105453 fc0add 105299->105453 105300 fc0ac9 105475 fb8db6 9 API calls __cftoe2_l 105300->105475 105302 fc0a27 type_info::_Type_info_dtor 105302->105259 105305 fc0a89 105472 fc0ab5 LeaveCriticalSection __unlock_fhandle 105305->105472 105307->105250 105308->105249 105310 fbd892 type_info::_Type_info_dtor 105309->105310 105311 fbd89f 105310->105311 105312 fbd8b6 105310->105312 105410 fb8af4 58 API calls __getptd_noexit 105311->105410 105314 fbd955 105312->105314 105316 fbd8ca 105312->105316 105416 fb8af4 58 API calls __getptd_noexit 105314->105416 105315 fbd8a4 105411 fb8b28 58 API calls __getptd_noexit 105315->105411 105319 fbd8e8 105316->105319 105320 fbd8f2 105316->105320 105412 fb8af4 58 API calls __getptd_noexit 105319->105412 105337 fbd206 105320->105337 105321 fbd8ed 105417 fb8b28 58 API calls __getptd_noexit 105321->105417 105324 fbd8f8 105326 fbd90b 105324->105326 105327 fbd91e 105324->105327 105346 fbd975 105326->105346 105413 fb8b28 58 API calls __getptd_noexit 105327->105413 105328 fbd961 105418 fb8db6 9 API calls __cftoe2_l 105328->105418 105332 fbd8ab type_info::_Type_info_dtor 105332->105266 105333 fbd917 105415 fbd94d LeaveCriticalSection __unlock_fhandle 105333->105415 105334 fbd923 105414 fb8af4 58 API calls __getptd_noexit 105334->105414 105339 fbd212 type_info::_Type_info_dtor 105337->105339 105338 fbd261 EnterCriticalSection 105341 fbd287 type_info::_Type_info_dtor 105338->105341 105339->105338 105340 fb9c0b __lock 58 API calls 105339->105340 105342 fbd237 105340->105342 105341->105324 105343 fbd24f 105342->105343 105419 fb9e2b InitializeCriticalSectionAndSpinCount 105342->105419 105420 fbd28b LeaveCriticalSection _doexit 105343->105420 105347 fbd982 __write_nolock 105346->105347 105348 fbd9c1 105347->105348 105349 fbd9e0 105347->105349 105374 fbd9b6 105347->105374 105430 fb8af4 58 API calls __getptd_noexit 105348->105430 105352 fbda38 105349->105352 105353 fbda1c 105349->105353 105357 fbda51 105352->105357 105436 fc18c1 60 API calls 3 library calls 105352->105436 105433 fb8af4 58 API calls __getptd_noexit 105353->105433 105354 fbe1d6 105354->105333 105355 fbd9c6 105431 fb8b28 58 API calls __getptd_noexit 105355->105431 105421 fc5c6b 105357->105421 105360 fbda21 105434 fb8b28 58 API calls __getptd_noexit 105360->105434 105362 fbd9cd 105432 fb8db6 9 API calls __cftoe2_l 105362->105432 105364 fbda5f 105366 fbddb8 105364->105366 105437 fb99ac 58 API calls 2 library calls 105364->105437 105368 fbe14b WriteFile 105366->105368 105369 fbddd6 105366->105369 105367 fbda28 105435 fb8db6 9 API calls __cftoe2_l 105367->105435 105372 fbddab GetLastError 105368->105372 105379 fbdd78 105368->105379 105373 fbdefa 105369->105373 105382 fbddec 105369->105382 105372->105379 105385 fbdfef 105373->105385 105387 fbdf05 105373->105387 105444 fbc5f6 105374->105444 105375 fbda8b GetConsoleMode 105375->105366 105377 fbdaca 105375->105377 105376 fbe184 105376->105374 105442 fb8b28 58 API calls __getptd_noexit 105376->105442 105377->105366 105380 fbdada GetConsoleCP 105377->105380 105379->105374 105379->105376 105384 fbded8 105379->105384 105380->105376 105407 fbdb09 105380->105407 105381 fbde5b WriteFile 105381->105372 105386 fbde98 105381->105386 105382->105376 105382->105381 105383 fbe1b2 105443 fb8af4 58 API calls __getptd_noexit 105383->105443 105391 fbe17b 105384->105391 105392 fbdee3 105384->105392 105385->105376 105393 fbe064 WideCharToMultiByte 105385->105393 105386->105382 105388 fbdebc 105386->105388 105387->105376 105389 fbdf6a WriteFile 105387->105389 105388->105379 105389->105372 105394 fbdfb9 105389->105394 105441 fb8b07 58 API calls 3 library calls 105391->105441 105439 fb8b28 58 API calls __getptd_noexit 105392->105439 105393->105372 105402 fbe0ab 105393->105402 105394->105379 105394->105387 105394->105388 105397 fbe0b3 WriteFile 105400 fbe106 GetLastError 105397->105400 105397->105402 105398 fbdee8 105440 fb8af4 58 API calls __getptd_noexit 105398->105440 105400->105402 105402->105379 105402->105385 105402->105388 105402->105397 105403 fc7a5e WriteConsoleW CreateFileW __putwch_nolock 105408 fbdc5f 105403->105408 105404 fc62ba 60 API calls __write_nolock 105404->105407 105405 fbdbf2 WideCharToMultiByte 105405->105379 105406 fbdc2d WriteFile 105405->105406 105406->105372 105406->105408 105407->105379 105407->105404 105407->105405 105407->105408 105438 fb35f5 58 API calls __isleadbyte_l 105407->105438 105408->105372 105408->105379 105408->105403 105408->105407 105409 fbdc87 WriteFile 105408->105409 105409->105372 105409->105408 105410->105315 105411->105332 105412->105321 105413->105334 105414->105333 105415->105332 105416->105321 105417->105328 105418->105332 105419->105343 105420->105338 105422 fc5c76 105421->105422 105423 fc5c83 105421->105423 105424 fb8b28 __cftoe2_l 58 API calls 105422->105424 105426 fc5c8f 105423->105426 105427 fb8b28 __cftoe2_l 58 API calls 105423->105427 105425 fc5c7b 105424->105425 105425->105364 105426->105364 105428 fc5cb0 105427->105428 105429 fb8db6 __cftoe2_l 9 API calls 105428->105429 105429->105425 105430->105355 105431->105362 105432->105374 105433->105360 105434->105367 105435->105374 105436->105357 105437->105375 105438->105407 105439->105398 105440->105374 105441->105374 105442->105383 105443->105374 105445 fbc5fe 105444->105445 105446 fbc600 IsProcessorFeaturePresent 105444->105446 105445->105354 105448 fc590a 105446->105448 105449 fc58b9 ___raise_securityfailure 5 API calls 105448->105449 105450 fc59ed 105449->105450 105450->105354 105451->105278 105452->105280 105476 fbd4c3 105453->105476 105455 fc0b41 105489 fbd43d 59 API calls 2 library calls 105455->105489 105456 fc0aeb 105456->105455 105458 fbd4c3 __lseeki64_nolock 58 API calls 105456->105458 105467 fc0b1f 105456->105467 105461 fc0b16 105458->105461 105459 fbd4c3 __lseeki64_nolock 58 API calls 105462 fc0b2b CloseHandle 105459->105462 105460 fc0b49 105464 fc0b6b 105460->105464 105490 fb8b07 58 API calls 3 library calls 105460->105490 105465 fbd4c3 __lseeki64_nolock 58 API calls 105461->105465 105462->105455 105466 fc0b37 GetLastError 105462->105466 105464->105305 105465->105467 105466->105455 105467->105455 105467->105459 105468->105287 105469->105302 105470->105293 105471->105305 105472->105302 105473->105293 105474->105300 105475->105302 105477 fbd4ce 105476->105477 105479 fbd4e3 105476->105479 105491 fb8af4 58 API calls __getptd_noexit 105477->105491 105482 fbd508 105479->105482 105493 fb8af4 58 API calls __getptd_noexit 105479->105493 105481 fbd4d3 105492 fb8b28 58 API calls __getptd_noexit 105481->105492 105482->105456 105483 fbd512 105494 fb8b28 58 API calls __getptd_noexit 105483->105494 105486 fbd4db 105486->105456 105487 fbd51a 105495 fb8db6 9 API calls __cftoe2_l 105487->105495 105489->105460 105490->105464 105491->105481 105492->105486 105493->105483 105494->105487 105495->105486 105497 ff3c3e 105496->105497 105498 ff4475 FindFirstFileW 105496->105498 105497->105088 105498->105497 105499 ff448a FindClose 105498->105499 105499->105497 105501 f97a16 59 API calls 105500->105501 105519 f96265 105501->105519 105502 f9646a 105528 f9750f 59 API calls 2 library calls 105502->105528 105504 f96484 Mailbox 105504->105138 105507 fcdff6 105531 fef8aa 91 API calls 4 library calls 105507->105531 105508 f97d8c 59 API calls 105508->105519 105510 f96799 _memmove 105533 fef8aa 91 API calls 4 library calls 105510->105533 105512 f9750f 59 API calls 105512->105519 105514 fce004 105532 f9750f 59 API calls 2 library calls 105514->105532 105516 fce01a 105516->105504 105517 fcdf92 105518 f98029 59 API calls 105517->105518 105520 fcdf9d 105518->105520 105519->105502 105519->105507 105519->105508 105519->105510 105519->105512 105519->105517 105522 f97e4f 59 API calls 105519->105522 105526 f95f6c 60 API calls 105519->105526 105527 f95d41 59 API calls Mailbox 105519->105527 105529 f95e72 60 API calls 105519->105529 105530 f97924 59 API calls 2 library calls 105519->105530 105524 fb0db6 Mailbox 59 API calls 105520->105524 105523 f9643b CharUpperBuffW 105522->105523 105523->105519 105524->105510 105525->105142 105526->105519 105527->105519 105528->105504 105529->105519 105530->105519 105531->105514 105532->105516 105533->105504 105724 f94bb5 105534->105724 105539 f94e08 LoadLibraryExW 105734 f94b6a 105539->105734 105540 fcd8e6 105542 f94e4a 84 API calls 105540->105542 105544 fcd8ed 105542->105544 105545 f94b6a 3 API calls 105544->105545 105547 fcd8f5 105545->105547 105760 f94f0b 105547->105760 105548 f94e2f 105548->105547 105549 f94e3b 105548->105549 105551 f94e4a 84 API calls 105549->105551 105553 f94e40 105551->105553 105553->105159 105553->105161 105555 fcd91c 105768 f94ec7 105555->105768 105559 f97667 59 API calls 105558->105559 105560 f945b1 105559->105560 105561 f97667 59 API calls 105560->105561 105562 f945b9 105561->105562 105563 f97667 59 API calls 105562->105563 105564 f945c1 105563->105564 105565 f97667 59 API calls 105564->105565 105566 f945c9 105565->105566 105567 f945fd 105566->105567 105568 fcd4d2 105566->105568 105569 f9784b 59 API calls 105567->105569 105570 f98047 59 API calls 105568->105570 105571 f9460b 105569->105571 105572 fcd4db 105570->105572 105573 f97d2c 59 API calls 105571->105573 105574 f97d8c 59 API calls 105572->105574 105575 f94615 105573->105575 105577 f94640 105574->105577 105576 f9784b 59 API calls 105575->105576 105575->105577 105580 f94636 105576->105580 105578 f94680 105577->105578 105581 f9465f 105577->105581 105591 fcd4fb 105577->105591 105579 f9784b 59 API calls 105578->105579 105582 f94691 105579->105582 105583 f97d2c 59 API calls 105580->105583 105585 f979f2 59 API calls 105581->105585 105586 f946a3 105582->105586 105589 f98047 59 API calls 105582->105589 105583->105577 105584 fcd5cb 105587 f97bcc 59 API calls 105584->105587 105588 f94669 105585->105588 105590 f946b3 105586->105590 105592 f98047 59 API calls 105586->105592 105608 fcd588 105587->105608 105588->105578 105595 f9784b 59 API calls 105588->105595 105589->105586 105594 f946ba 105590->105594 105596 f98047 59 API calls 105590->105596 105591->105584 105593 fcd5b4 105591->105593 105603 fcd532 105591->105603 105592->105590 105593->105584 105599 fcd59f 105593->105599 105597 f98047 59 API calls 105594->105597 105605 f946c1 Mailbox 105594->105605 105595->105578 105596->105594 105597->105605 105598 f979f2 59 API calls 105598->105608 105602 f97bcc 59 API calls 105599->105602 105600 fcd590 105601 f97bcc 59 API calls 105600->105601 105601->105608 105602->105608 105603->105600 105606 fcd57b 105603->105606 105605->105190 105607 f97bcc 59 API calls 105606->105607 105607->105608 105608->105578 105608->105598 106039 f97924 59 API calls 2 library calls 105608->106039 105610 f97e4f 59 API calls 105609->105610 105611 f979fd 105610->105611 105611->105196 105611->105199 105613 ff408d 105612->105613 105614 ff4092 105613->105614 105615 ff40a0 105613->105615 105617 f98047 59 API calls 105614->105617 105616 f97667 59 API calls 105615->105616 105619 ff40a8 105616->105619 105618 ff409b Mailbox 105617->105618 105618->105214 105620 f97667 59 API calls 105619->105620 105621 ff40b0 105620->105621 105622 f97667 59 API calls 105621->105622 105623 ff40bb 105622->105623 105624 f97667 59 API calls 105623->105624 105625 ff40c3 105624->105625 105626 f97667 59 API calls 105625->105626 105627 ff40cb 105626->105627 105628 f97667 59 API calls 105627->105628 105629 ff40d3 105628->105629 105630 f97667 59 API calls 105629->105630 105631 ff40db 105630->105631 105632 f97667 59 API calls 105631->105632 105633 ff40e3 105632->105633 105634 f9459b 59 API calls 105633->105634 105635 ff40fa 105634->105635 105636 f9459b 59 API calls 105635->105636 105637 ff4113 105636->105637 105638 f979f2 59 API calls 105637->105638 105639 ff411f 105638->105639 105640 ff4132 105639->105640 105641 f97d2c 59 API calls 105639->105641 105642 f979f2 59 API calls 105640->105642 105641->105640 105643 ff413b 105642->105643 105644 ff414b 105643->105644 105646 f97d2c 59 API calls 105643->105646 105645 f98047 59 API calls 105644->105645 105647 ff4157 105645->105647 105646->105644 105648 f97b2e 59 API calls 105647->105648 105649 ff4163 105648->105649 106040 ff4223 59 API calls 105649->106040 105651 ff4172 106041 ff4223 59 API calls 105651->106041 105653 ff4185 105667 ff9162 __write_nolock 105666->105667 105668 fb0db6 Mailbox 59 API calls 105667->105668 105669 ff91bf 105668->105669 105670 f9522e 59 API calls 105669->105670 105671 ff91c9 105670->105671 105672 ff8f5f GetSystemTimeAsFileTime 105671->105672 105673 ff91d4 105672->105673 105674 f94ee5 85 API calls 105673->105674 105675 ff91e7 _wcscmp 105674->105675 105676 ff920b 105675->105676 105677 ff92b8 105675->105677 106059 ff9734 105676->106059 105679 ff9734 96 API calls 105677->105679 105694 ff9284 _wcscat 105679->105694 105682 f94f0b 74 API calls 105683 ff92dd 105682->105683 105685 f94f0b 74 API calls 105683->105685 105684 ff92c1 105684->105221 105687 ff92ed 105685->105687 105686 ff9239 _wcscat _wcscpy 106066 fb40fb 58 API calls __wsplitpath_helper 105686->106066 105688 f94f0b 74 API calls 105687->105688 105690 ff9308 105688->105690 105691 f94f0b 74 API calls 105690->105691 105692 ff9318 105691->105692 105693 f94f0b 74 API calls 105692->105693 105695 ff9333 105693->105695 105694->105682 105694->105684 105696 f94f0b 74 API calls 105695->105696 105697 ff9343 105696->105697 105698 f94f0b 74 API calls 105697->105698 105699 ff9353 105698->105699 105721->105148 105722->105183 105723->105197 105773 f94c03 105724->105773 105727 f94bdc 105728 f94bec FreeLibrary 105727->105728 105729 f94bf5 105727->105729 105728->105729 105731 fb525b 105729->105731 105730 f94c03 2 API calls 105730->105727 105777 fb5270 105731->105777 105733 f94dfc 105733->105539 105733->105540 105858 f94c36 105734->105858 105737 f94b8f 105739 f94baa 105737->105739 105740 f94ba1 FreeLibrary 105737->105740 105738 f94c36 2 API calls 105738->105737 105741 f94c70 105739->105741 105740->105739 105742 fb0db6 Mailbox 59 API calls 105741->105742 105743 f94c85 105742->105743 105744 f9522e 59 API calls 105743->105744 105745 f94c91 _memmove 105744->105745 105746 f94ccc 105745->105746 105747 f94d89 105745->105747 105748 f94dc1 105745->105748 105749 f94ec7 69 API calls 105746->105749 105862 f94e89 CreateStreamOnHGlobal 105747->105862 105873 ff991b 95 API calls 105748->105873 105752 f94cd5 105749->105752 105753 f94f0b 74 API calls 105752->105753 105754 f94d69 105752->105754 105756 fcd8a7 105752->105756 105868 f94ee5 105752->105868 105753->105752 105754->105548 105757 f94ee5 85 API calls 105756->105757 105758 fcd8bb 105757->105758 105759 f94f0b 74 API calls 105758->105759 105759->105754 105761 fcd9cd 105760->105761 105762 f94f1d 105760->105762 105891 fb55e2 105762->105891 105765 ff9109 106016 ff8f5f 105765->106016 105767 ff911f 105767->105555 105769 fcd990 105768->105769 105770 f94ed6 105768->105770 106021 fb5c60 105770->106021 105772 f94ede 105774 f94bd0 105773->105774 105775 f94c0c LoadLibraryA 105773->105775 105774->105727 105774->105730 105775->105774 105776 f94c1d GetProcAddress 105775->105776 105776->105774 105780 fb527c type_info::_Type_info_dtor 105777->105780 105778 fb528f 105826 fb8b28 58 API calls __getptd_noexit 105778->105826 105780->105778 105782 fb52c0 105780->105782 105781 fb5294 105827 fb8db6 9 API calls __cftoe2_l 105781->105827 105796 fc04e8 105782->105796 105785 fb52c5 105786 fb52db 105785->105786 105787 fb52ce 105785->105787 105788 fb5305 105786->105788 105789 fb52e5 105786->105789 105828 fb8b28 58 API calls __getptd_noexit 105787->105828 105811 fc0607 105788->105811 105829 fb8b28 58 API calls __getptd_noexit 105789->105829 105793 fb529f type_info::_Type_info_dtor @_EH4_CallFilterFunc@8 105793->105733 105797 fc04f4 type_info::_Type_info_dtor 105796->105797 105798 fb9c0b __lock 58 API calls 105797->105798 105805 fc0502 105798->105805 105799 fc0576 105831 fc05fe 105799->105831 105800 fc057d 105836 fb881d 58 API calls 2 library calls 105800->105836 105803 fc0584 105803->105799 105837 fb9e2b InitializeCriticalSectionAndSpinCount 105803->105837 105804 fc05f3 type_info::_Type_info_dtor 105804->105785 105805->105799 105805->105800 105807 fb9c93 __mtinitlocknum 58 API calls 105805->105807 105834 fb6c50 59 API calls __lock 105805->105834 105835 fb6cba LeaveCriticalSection LeaveCriticalSection _doexit 105805->105835 105807->105805 105809 fc05aa EnterCriticalSection 105809->105799 105812 fc0627 __wopenfile 105811->105812 105813 fc0641 105812->105813 105825 fc07fc 105812->105825 105844 fb37cb 60 API calls 2 library calls 105812->105844 105842 fb8b28 58 API calls __getptd_noexit 105813->105842 105815 fc0646 105843 fb8db6 9 API calls __cftoe2_l 105815->105843 105817 fc085f 105839 fc85a1 105817->105839 105819 fb5310 105830 fb5332 LeaveCriticalSection LeaveCriticalSection __wfsopen 105819->105830 105821 fc07f5 105821->105825 105845 fb37cb 60 API calls 2 library calls 105821->105845 105823 fc0814 105823->105825 105846 fb37cb 60 API calls 2 library calls 105823->105846 105825->105813 105825->105817 105826->105781 105827->105793 105828->105793 105829->105793 105830->105793 105838 fb9d75 LeaveCriticalSection 105831->105838 105833 fc0605 105833->105804 105834->105805 105835->105805 105836->105803 105837->105809 105838->105833 105847 fc7d85 105839->105847 105841 fc85ba 105841->105819 105842->105815 105843->105819 105844->105821 105845->105823 105846->105825 105849 fc7d91 type_info::_Type_info_dtor 105847->105849 105848 fc7da7 105850 fb8b28 __cftoe2_l 58 API calls 105848->105850 105849->105848 105851 fc7ddd 105849->105851 105852 fc7dac 105850->105852 105853 fc7e4e __wsopen_nolock 109 API calls 105851->105853 105854 fb8db6 __cftoe2_l 9 API calls 105852->105854 105855 fc7df9 105853->105855 105857 fc7db6 type_info::_Type_info_dtor 105854->105857 105856 fc7e22 __wsopen_helper LeaveCriticalSection 105855->105856 105856->105857 105857->105841 105859 f94b83 105858->105859 105860 f94c3f LoadLibraryA 105858->105860 105859->105737 105859->105738 105860->105859 105861 f94c50 GetProcAddress 105860->105861 105861->105859 105863 f94ea3 FindResourceExW 105862->105863 105864 f94ec0 105862->105864 105863->105864 105865 fcd933 LoadResource 105863->105865 105864->105746 105865->105864 105866 fcd948 SizeofResource 105865->105866 105866->105864 105867 fcd95c LockResource 105866->105867 105867->105864 105869 fcd9ab 105868->105869 105870 f94ef4 105868->105870 105874 fb584d 105870->105874 105872 f94f02 105872->105752 105873->105746 105875 fb5859 type_info::_Type_info_dtor 105874->105875 105876 fb586b 105875->105876 105878 fb5891 105875->105878 105887 fb8b28 58 API calls __getptd_noexit 105876->105887 105880 fb6c11 __lock_file 59 API calls 105878->105880 105879 fb5870 105888 fb8db6 9 API calls __cftoe2_l 105879->105888 105881 fb5897 105880->105881 105889 fb57be 83 API calls 5 library calls 105881->105889 105884 fb58a6 105890 fb58c8 LeaveCriticalSection LeaveCriticalSection __wfsopen 105884->105890 105886 fb587b type_info::_Type_info_dtor 105886->105872 105887->105879 105888->105886 105889->105884 105890->105886 105894 fb55fd 105891->105894 105893 f94f2e 105893->105765 105895 fb5609 type_info::_Type_info_dtor 105894->105895 105896 fb561f _memset 105895->105896 105897 fb564c 105895->105897 105898 fb5644 type_info::_Type_info_dtor 105895->105898 105921 fb8b28 58 API calls __getptd_noexit 105896->105921 105899 fb6c11 __lock_file 59 API calls 105897->105899 105898->105893 105901 fb5652 105899->105901 105907 fb541d 105901->105907 105902 fb5639 105922 fb8db6 9 API calls __cftoe2_l 105902->105922 105908 fb5453 105907->105908 105910 fb5438 _memset 105907->105910 105923 fb5686 LeaveCriticalSection LeaveCriticalSection __wfsopen 105908->105923 105909 fb5443 106012 fb8b28 58 API calls __getptd_noexit 105909->106012 105910->105908 105910->105909 105912 fb5493 105910->105912 105912->105908 105915 fb55a4 _memset 105912->105915 105917 fb46e6 __output_l 58 API calls 105912->105917 105924 fc0e5b 105912->105924 105992 fc0ba7 105912->105992 106014 fc0cc8 58 API calls 3 library calls 105912->106014 106015 fb8b28 58 API calls __getptd_noexit 105915->106015 105917->105912 105920 fb5448 106013 fb8db6 9 API calls __cftoe2_l 105920->106013 105921->105902 105922->105898 105923->105898 105925 fc0e7c 105924->105925 105926 fc0e93 105924->105926 105927 fb8af4 __write 58 API calls 105925->105927 105928 fc15cb 105926->105928 105932 fc0ecd 105926->105932 105929 fc0e81 105927->105929 105930 fb8af4 __write 58 API calls 105928->105930 105931 fb8b28 __cftoe2_l 58 API calls 105929->105931 105933 fc15d0 105930->105933 105937 fc0e88 105931->105937 105934 fc0ed5 105932->105934 105941 fc0eec 105932->105941 105935 fb8b28 __cftoe2_l 58 API calls 105933->105935 105938 fb8af4 __write 58 API calls 105934->105938 105936 fc0ee1 105935->105936 105940 fb8db6 __cftoe2_l 9 API calls 105936->105940 105937->105912 105939 fc0eda 105938->105939 105945 fb8b28 __cftoe2_l 58 API calls 105939->105945 105940->105937 105941->105937 105942 fc0f01 105941->105942 105944 fc0f1b 105941->105944 105946 fc0f39 105941->105946 105943 fb8af4 __write 58 API calls 105942->105943 105943->105939 105944->105942 105950 fc0f26 105944->105950 105945->105936 105947 fb881d __malloc_crt 58 API calls 105946->105947 105948 fc0f49 105947->105948 105951 fc0f6c 105948->105951 105952 fc0f51 105948->105952 105949 fc5c6b __flswbuf 58 API calls 105953 fc103a 105949->105953 105950->105949 105956 fc18c1 __lseeki64_nolock 60 API calls 105951->105956 105954 fb8b28 __cftoe2_l 58 API calls 105952->105954 105955 fc10b3 ReadFile 105953->105955 105960 fc1050 GetConsoleMode 105953->105960 105957 fc0f56 105954->105957 105958 fc10d5 105955->105958 105959 fc1593 GetLastError 105955->105959 105956->105950 105961 fb8af4 __write 58 API calls 105957->105961 105958->105959 105966 fc10a5 105958->105966 105962 fc1093 105959->105962 105963 fc15a0 105959->105963 105964 fc1064 105960->105964 105965 fc10b0 105960->105965 105961->105937 105971 fb8b07 __dosmaperr 58 API calls 105962->105971 105985 fc1099 105962->105985 105967 fb8b28 __cftoe2_l 58 API calls 105963->105967 105964->105965 105968 fc106a ReadConsoleW 105964->105968 105965->105955 105974 fc110a 105966->105974 105981 fc1377 105966->105981 105966->105985 105969 fc15a5 105967->105969 105968->105966 105970 fc108d GetLastError 105968->105970 105972 fb8af4 __write 58 API calls 105969->105972 105970->105962 105971->105985 105972->105985 105973 fb2d55 _free 58 API calls 105973->105937 105975 fc1176 ReadFile 105974->105975 105982 fc11f7 105974->105982 105977 fc1197 GetLastError 105975->105977 105990 fc11a1 105975->105990 105977->105990 105978 fc12b4 105986 fc1264 MultiByteToWideChar 105978->105986 105987 fc18c1 __lseeki64_nolock 60 API calls 105978->105987 105979 fc12a4 105983 fb8b28 __cftoe2_l 58 API calls 105979->105983 105980 fc147d ReadFile 105984 fc14a0 GetLastError 105980->105984 105991 fc14ae 105980->105991 105981->105980 105981->105985 105982->105978 105982->105979 105982->105985 105982->105986 105983->105985 105984->105991 105985->105937 105985->105973 105986->105970 105986->105985 105987->105986 105988 fc18c1 __lseeki64_nolock 60 API calls 105988->105990 105989 fc18c1 __lseeki64_nolock 60 API calls 105989->105991 105990->105974 105990->105988 105991->105981 105991->105989 105993 fc0bb2 105992->105993 105997 fc0bc7 105992->105997 105994 fb8b28 __cftoe2_l 58 API calls 105993->105994 105995 fc0bb7 105994->105995 105996 fb8db6 __cftoe2_l 9 API calls 105995->105996 106004 fc0bc2 105996->106004 105998 fc0bfc 105997->105998 105999 fc5fe4 __getbuf 58 API calls 105997->105999 105997->106004 106000 fb46e6 __output_l 58 API calls 105998->106000 105999->105998 106001 fc0c10 106000->106001 106002 fc0d47 __read 72 API calls 106001->106002 106003 fc0c17 106002->106003 106003->106004 106005 fb46e6 __output_l 58 API calls 106003->106005 106004->105912 106006 fc0c3a 106005->106006 106006->106004 106007 fb46e6 __output_l 58 API calls 106006->106007 106008 fc0c46 106007->106008 106008->106004 106009 fb46e6 __output_l 58 API calls 106008->106009 106010 fc0c53 106009->106010 106011 fb46e6 __output_l 58 API calls 106010->106011 106011->106004 106012->105920 106013->105908 106014->105912 106015->105920 106019 fb520a GetSystemTimeAsFileTime 106016->106019 106018 ff8f6e 106018->105767 106020 fb5238 __aulldiv 106019->106020 106020->106018 106022 fb5c6c type_info::_Type_info_dtor 106021->106022 106023 fb5c7e 106022->106023 106024 fb5c93 106022->106024 106035 fb8b28 58 API calls __getptd_noexit 106023->106035 106026 fb6c11 __lock_file 59 API calls 106024->106026 106028 fb5c99 106026->106028 106027 fb5c83 106036 fb8db6 9 API calls __cftoe2_l 106027->106036 106037 fb58d0 67 API calls 5 library calls 106028->106037 106031 fb5ca4 106038 fb5cc4 LeaveCriticalSection LeaveCriticalSection __wfsopen 106031->106038 106033 fb5cb6 106034 fb5c8e type_info::_Type_info_dtor 106033->106034 106034->105772 106035->106027 106036->106034 106037->106031 106038->106033 106039->105608 106040->105651 106041->105653 106061 ff9748 __tzset_nolock _wcscmp 106059->106061 106060 f94f0b 74 API calls 106060->106061 106061->106060 106062 ff9109 GetSystemTimeAsFileTime 106061->106062 106063 ff9210 106061->106063 106064 f94ee5 85 API calls 106061->106064 106062->106061 106063->105684 106065 fb40fb 58 API calls __wsplitpath_helper 106063->106065 106064->106061 106065->105686 106066->105694 106158->105005 106159->105036 106160 f91055 106165 f92649 106160->106165 106163 fb2d40 __cinit 67 API calls 106164 f91064 106163->106164 106166 f97667 59 API calls 106165->106166 106167 f926b7 106166->106167 106172 f93582 106167->106172 106170 f92754 106171 f9105a 106170->106171 106175 f93416 59 API calls 2 library calls 106170->106175 106171->106163 106176 f935b0 106172->106176 106175->106170 106177 f935bd 106176->106177 106178 f935a1 106176->106178 106177->106178 106179 f935c4 RegOpenKeyExW 106177->106179 106178->106170 106179->106178 106180 f935de RegQueryValueExW 106179->106180 106181 f935ff 106180->106181 106182 f93614 RegCloseKey 106180->106182 106181->106182 106182->106178 106183 cc8fc0 106197 cc6c00 106183->106197 106185 cc9057 106200 cc8eb0 106185->106200 106203 cca0a0 GetPEB 106197->106203 106199 cc728b 106199->106185 106201 cc8eb9 Sleep 106200->106201 106202 cc8ec7 106201->106202 106204 cca0ca 106203->106204 106204->106199 106205 fb7c56 106206 fb7c62 type_info::_Type_info_dtor 106205->106206 106242 fb9e08 GetStartupInfoW 106206->106242 106209 fb7cbf 106211 fb7cca 106209->106211 106327 fb7da6 58 API calls 3 library calls 106209->106327 106210 fb7c67 106244 fb8b7c GetProcessHeap 106210->106244 106245 fb9ae6 106211->106245 106214 fb7cd0 106215 fb7cdb __RTC_Initialize 106214->106215 106328 fb7da6 58 API calls 3 library calls 106214->106328 106266 fbd5d2 106215->106266 106218 fb7cea 106219 fb7cf6 GetCommandLineW 106218->106219 106329 fb7da6 58 API calls 3 library calls 106218->106329 106285 fc4f23 GetEnvironmentStringsW 106219->106285 106222 fb7cf5 106222->106219 106225 fb7d10 106226 fb7d1b 106225->106226 106330 fb30b5 58 API calls 3 library calls 106225->106330 106295 fc4d58 106226->106295 106229 fb7d2c 106309 fb30ef 106229->106309 106230 fb7d21 106230->106229 106331 fb30b5 58 API calls 3 library calls 106230->106331 106233 fb7d34 106234 fb7d3f __wwincmdln 106233->106234 106332 fb30b5 58 API calls 3 library calls 106233->106332 106315 f947d0 106234->106315 106237 fb7d53 106238 fb7d62 106237->106238 106333 fb3358 58 API calls _doexit 106237->106333 106334 fb30e0 58 API calls _doexit 106238->106334 106241 fb7d67 type_info::_Type_info_dtor 106243 fb9e1e 106242->106243 106243->106210 106244->106209 106335 fb3187 36 API calls 2 library calls 106245->106335 106247 fb9aeb 106336 fb9d3c InitializeCriticalSectionAndSpinCount __alloc_osfhnd 106247->106336 106249 fb9af0 106250 fb9af4 106249->106250 106338 fb9d8a TlsAlloc 106249->106338 106337 fb9b5c 61 API calls 2 library calls 106250->106337 106253 fb9af9 106253->106214 106254 fb9b06 106254->106250 106255 fb9b11 106254->106255 106339 fb87d5 106255->106339 106258 fb9b53 106347 fb9b5c 61 API calls 2 library calls 106258->106347 106261 fb9b58 106261->106214 106262 fb9b32 106262->106258 106263 fb9b38 106262->106263 106346 fb9a33 58 API calls 4 library calls 106263->106346 106265 fb9b40 GetCurrentThreadId 106265->106214 106267 fbd5de type_info::_Type_info_dtor 106266->106267 106268 fb9c0b __lock 58 API calls 106267->106268 106269 fbd5e5 106268->106269 106270 fb87d5 __calloc_crt 58 API calls 106269->106270 106272 fbd5f6 106270->106272 106271 fbd661 GetStartupInfoW 106273 fbd676 106271->106273 106274 fbd7a5 106271->106274 106272->106271 106275 fbd601 type_info::_Type_info_dtor @_EH4_CallFilterFunc@8 106272->106275 106273->106274 106278 fb87d5 __calloc_crt 58 API calls 106273->106278 106281 fbd6c4 106273->106281 106276 fbd86d 106274->106276 106279 fbd7f2 GetStdHandle 106274->106279 106280 fbd805 GetFileType 106274->106280 106360 fb9e2b InitializeCriticalSectionAndSpinCount 106274->106360 106275->106218 106361 fbd87d LeaveCriticalSection _doexit 106276->106361 106278->106273 106279->106274 106280->106274 106281->106274 106282 fbd6f8 GetFileType 106281->106282 106359 fb9e2b InitializeCriticalSectionAndSpinCount 106281->106359 106282->106281 106286 fb7d06 106285->106286 106287 fc4f34 106285->106287 106291 fc4b1b GetModuleFileNameW 106286->106291 106362 fb881d 58 API calls 2 library calls 106287->106362 106289 fc4f5a _memmove 106290 fc4f70 FreeEnvironmentStringsW 106289->106290 106290->106286 106292 fc4b4f _wparse_cmdline 106291->106292 106294 fc4b8f _wparse_cmdline 106292->106294 106363 fb881d 58 API calls 2 library calls 106292->106363 106294->106225 106296 fc4d71 __NMSG_WRITE 106295->106296 106300 fc4d69 106295->106300 106297 fb87d5 __calloc_crt 58 API calls 106296->106297 106305 fc4d9a __NMSG_WRITE 106297->106305 106298 fc4df1 106299 fb2d55 _free 58 API calls 106298->106299 106299->106300 106300->106230 106301 fb87d5 __calloc_crt 58 API calls 106301->106305 106302 fc4e16 106303 fb2d55 _free 58 API calls 106302->106303 106303->106300 106305->106298 106305->106300 106305->106301 106305->106302 106306 fc4e2d 106305->106306 106364 fc4607 58 API calls __cftoe2_l 106305->106364 106365 fb8dc6 IsProcessorFeaturePresent 106306->106365 106308 fc4e39 106308->106230 106311 fb30fb __IsNonwritableInCurrentImage 106309->106311 106380 fba4d1 106311->106380 106312 fb3119 __initterm_e 106313 fb2d40 __cinit 67 API calls 106312->106313 106314 fb3138 _doexit __IsNonwritableInCurrentImage 106312->106314 106313->106314 106314->106233 106316 f947ea 106315->106316 106326 f94889 106315->106326 106317 f94824 IsThemeActive 106316->106317 106383 fb336c 106317->106383 106321 f94850 106395 f948fd SystemParametersInfoW SystemParametersInfoW 106321->106395 106323 f9485c 106396 f93b3a 106323->106396 106325 f94864 SystemParametersInfoW 106325->106326 106326->106237 106327->106211 106328->106215 106329->106222 106333->106238 106334->106241 106335->106247 106336->106249 106337->106253 106338->106254 106341 fb87dc 106339->106341 106342 fb8817 106341->106342 106344 fb87fa 106341->106344 106348 fc51f6 106341->106348 106342->106258 106345 fb9de6 TlsSetValue 106342->106345 106344->106341 106344->106342 106356 fba132 Sleep 106344->106356 106345->106262 106346->106265 106347->106261 106349 fc5201 106348->106349 106353 fc521c 106348->106353 106350 fc520d 106349->106350 106349->106353 106357 fb8b28 58 API calls __getptd_noexit 106350->106357 106351 fc522c HeapAlloc 106351->106353 106354 fc5212 106351->106354 106353->106351 106353->106354 106358 fb33a1 DecodePointer 106353->106358 106354->106341 106356->106344 106357->106354 106358->106353 106359->106281 106360->106274 106361->106275 106362->106289 106363->106294 106364->106305 106366 fb8dd1 106365->106366 106371 fb8c59 106366->106371 106370 fb8dec 106370->106308 106372 fb8c73 _memset ___raise_securityfailure 106371->106372 106373 fb8c93 IsDebuggerPresent 106372->106373 106379 fba155 SetUnhandledExceptionFilter UnhandledExceptionFilter 106373->106379 106375 fb8d57 ___raise_securityfailure 106376 fbc5f6 __cftoe2_l 6 API calls 106375->106376 106377 fb8d7a 106376->106377 106378 fba140 GetCurrentProcess TerminateProcess 106377->106378 106378->106370 106379->106375 106381 fba4d4 EncodePointer 106380->106381 106381->106381 106382 fba4ee 106381->106382 106382->106312 106384 fb9c0b __lock 58 API calls 106383->106384 106385 fb3377 DecodePointer EncodePointer 106384->106385 106448 fb9d75 LeaveCriticalSection 106385->106448 106387 f94849 106388 fb33d4 106387->106388 106389 fb33f8 106388->106389 106390 fb33de 106388->106390 106389->106321 106390->106389 106449 fb8b28 58 API calls __getptd_noexit 106390->106449 106392 fb33e8 106450 fb8db6 9 API calls __cftoe2_l 106392->106450 106394 fb33f3 106394->106321 106395->106323 106397 f93b47 __write_nolock 106396->106397 106398 f97667 59 API calls 106397->106398 106399 f93b51 GetCurrentDirectoryW 106398->106399 106451 f93766 106399->106451 106401 f93b7a IsDebuggerPresent 106402 f93b88 106401->106402 106403 fcd272 MessageBoxA 106401->106403 106405 fcd28c 106402->106405 106406 f93ba5 106402->106406 106435 f93c61 106402->106435 106403->106405 106404 f93c68 SetCurrentDirectoryW 106407 f93c75 Mailbox 106404->106407 106573 f97213 59 API calls Mailbox 106405->106573 106532 f97285 106406->106532 106407->106325 106410 fcd29c 106415 fcd2b2 SetCurrentDirectoryW 106410->106415 106415->106407 106435->106404 106448->106387 106449->106392 106450->106394 106452 f97667 59 API calls 106451->106452 106453 f9377c 106452->106453 106575 f93d31 106453->106575 106455 f9379a 106456 f94706 61 API calls 106455->106456 106457 f937ae 106456->106457 106458 f97de1 59 API calls 106457->106458 106459 f937bb 106458->106459 106460 f94ddd 136 API calls 106459->106460 106461 f937d4 106460->106461 106462 f937dc Mailbox 106461->106462 106463 fcd173 106461->106463 106467 f98047 59 API calls 106462->106467 106617 ff955b 106463->106617 106466 fcd192 106469 fb2d55 _free 58 API calls 106466->106469 106470 f937ef 106467->106470 106468 f94e4a 84 API calls 106468->106466 106471 fcd19f 106469->106471 106589 f9928a 106470->106589 106473 f94e4a 84 API calls 106471->106473 106475 fcd1a8 106473->106475 106479 f93ed0 59 API calls 106475->106479 106476 f97de1 59 API calls 106477 f93808 106476->106477 106478 f984c0 69 API calls 106477->106478 106480 f9381a Mailbox 106478->106480 106481 fcd1c3 106479->106481 106482 f97de1 59 API calls 106480->106482 106483 f93ed0 59 API calls 106481->106483 106484 f93840 106482->106484 106485 fcd1df 106483->106485 106486 f984c0 69 API calls 106484->106486 106487 f94706 61 API calls 106485->106487 106489 f9384f Mailbox 106486->106489 106488 fcd204 106487->106488 106490 f93ed0 59 API calls 106488->106490 106492 f97667 59 API calls 106489->106492 106491 fcd210 106490->106491 106493 f98047 59 API calls 106491->106493 106494 f9386d 106492->106494 106495 fcd21e 106493->106495 106592 f93ed0 106494->106592 106497 f93ed0 59 API calls 106495->106497 106499 fcd22d 106497->106499 106505 f98047 59 API calls 106499->106505 106501 f93887 106501->106475 106502 f93891 106501->106502 106503 fb2efd _W_store_winword 60 API calls 106502->106503 106504 f9389c 106503->106504 106504->106481 106506 f938a6 106504->106506 106507 fcd24f 106505->106507 106508 fb2efd _W_store_winword 60 API calls 106506->106508 106509 f93ed0 59 API calls 106507->106509 106510 f938b1 106508->106510 106511 fcd25c 106509->106511 106510->106485 106512 f938bb 106510->106512 106511->106511 106513 fb2efd _W_store_winword 60 API calls 106512->106513 106514 f938c6 106513->106514 106514->106499 106515 f93907 106514->106515 106517 f93ed0 59 API calls 106514->106517 106515->106499 106516 f93914 106515->106516 106518 f992ce 59 API calls 106516->106518 106519 f938ea 106517->106519 106520 f93924 106518->106520 106521 f98047 59 API calls 106519->106521 106522 f99050 59 API calls 106520->106522 106523 f938f8 106521->106523 106524 f93932 106522->106524 106525 f93ed0 59 API calls 106523->106525 106608 f98ee0 106524->106608 106525->106515 106527 f9928a 59 API calls 106530 f9394f 106527->106530 106528 f93995 Mailbox 106528->106401 106529 f98ee0 60 API calls 106529->106530 106530->106527 106530->106528 106530->106529 106531 f93ed0 59 API calls 106530->106531 106531->106530 106533 f97292 __write_nolock 106532->106533 106534 f972ab 106533->106534 106535 fcea22 _memset 106533->106535 106536 f94750 60 API calls 106534->106536 106538 fcea3e GetOpenFileNameW 106535->106538 106537 f972b4 106536->106537 106656 fb0791 106537->106656 106540 fcea8d 106538->106540 106542 f97bcc 59 API calls 106540->106542 106543 fceaa2 106542->106543 106543->106543 106545 f972c9 106674 f9686a 106545->106674 106573->106410 106576 f93d3e __write_nolock 106575->106576 106577 f97bcc 59 API calls 106576->106577 106579 f93ea4 Mailbox 106576->106579 106580 f93d70 106577->106580 106578 f979f2 59 API calls 106578->106580 106579->106455 106580->106578 106588 f93da6 Mailbox 106580->106588 106581 f979f2 59 API calls 106581->106588 106582 f93e77 106582->106579 106583 f97de1 59 API calls 106582->106583 106585 f93e98 106583->106585 106584 f97de1 59 API calls 106584->106588 106586 f93f74 59 API calls 106585->106586 106586->106579 106587 f93f74 59 API calls 106587->106588 106588->106579 106588->106581 106588->106582 106588->106584 106588->106587 106590 fb0db6 Mailbox 59 API calls 106589->106590 106591 f937fb 106590->106591 106591->106476 106593 f93eda 106592->106593 106594 f93ef3 106592->106594 106595 f98047 59 API calls 106593->106595 106596 f97bcc 59 API calls 106594->106596 106597 f93879 106595->106597 106596->106597 106598 fb2efd 106597->106598 106599 fb2f7e 106598->106599 106600 fb2f09 106598->106600 106654 fb2f90 60 API calls 3 library calls 106599->106654 106607 fb2f2e 106600->106607 106652 fb8b28 58 API calls __getptd_noexit 106600->106652 106603 fb2f8b 106603->106501 106604 fb2f15 106653 fb8db6 9 API calls __cftoe2_l 106604->106653 106606 fb2f20 106606->106501 106607->106501 106609 fcf17c 106608->106609 106615 f98ef7 106608->106615 106609->106615 106655 f98bdb 59 API calls Mailbox 106609->106655 106611 f98ff8 106613 fb0db6 Mailbox 59 API calls 106611->106613 106612 f99040 106614 f99d3c 60 API calls 106612->106614 106616 f98fff 106613->106616 106614->106616 106615->106611 106615->106612 106615->106616 106616->106530 106618 f94ee5 85 API calls 106617->106618 106619 ff95ca 106618->106619 106620 ff9734 96 API calls 106619->106620 106621 ff95dc 106620->106621 106622 f94f0b 74 API calls 106621->106622 106650 fcd186 106621->106650 106623 ff95f7 106622->106623 106624 f94f0b 74 API calls 106623->106624 106625 ff9607 106624->106625 106626 f94f0b 74 API calls 106625->106626 106627 ff9622 106626->106627 106628 f94f0b 74 API calls 106627->106628 106629 ff963d 106628->106629 106630 f94ee5 85 API calls 106629->106630 106631 ff9654 106630->106631 106632 fb571c std::exception::_Copy_str 58 API calls 106631->106632 106633 ff965b 106632->106633 106634 fb571c std::exception::_Copy_str 58 API calls 106633->106634 106635 ff9665 106634->106635 106636 f94f0b 74 API calls 106635->106636 106637 ff9679 106636->106637 106638 ff9109 GetSystemTimeAsFileTime 106637->106638 106639 ff968c 106638->106639 106640 ff96b6 106639->106640 106641 ff96a1 106639->106641 106643 ff96bc 106640->106643 106644 ff971b 106640->106644 106642 fb2d55 _free 58 API calls 106641->106642 106645 ff96a7 106642->106645 106646 ff8b06 116 API calls 106643->106646 106647 fb2d55 _free 58 API calls 106644->106647 106648 fb2d55 _free 58 API calls 106645->106648 106649 ff9713 106646->106649 106647->106650 106648->106650 106651 fb2d55 _free 58 API calls 106649->106651 106650->106466 106650->106468 106651->106650 106652->106604 106653->106606 106654->106603 106655->106615 106657 fb079e __write_nolock 106656->106657 106658 fb079f GetLongPathNameW 106657->106658 106659 f97bcc 59 API calls 106658->106659 106660 f972bd 106659->106660 106661 f9700b 106660->106661 106662 f97667 59 API calls 106661->106662 106663 f9701d 106662->106663 106664 f94750 60 API calls 106663->106664 106665 f97028 106664->106665 106666 fce885 106665->106666 106667 f97033 106665->106667 106671 fce89f 106666->106671 106714 f97908 61 API calls 106666->106714 106668 f93f74 59 API calls 106667->106668 106670 f9703f 106668->106670 106708 f934c2 106670->106708 106673 f97052 Mailbox 106673->106545 106675 f94ddd 136 API calls 106674->106675 106676 f9688f 106675->106676 106677 fce031 106676->106677 106678 f94ddd 136 API calls 106676->106678 106679 ff955b 122 API calls 106677->106679 106680 f968a3 106678->106680 106681 fce046 106679->106681 106680->106677 106682 f968ab 106680->106682 106683 fce04a 106681->106683 106684 fce067 106681->106684 106686 fce052 106682->106686 106687 f968b7 106682->106687 106688 f94e4a 84 API calls 106683->106688 106685 fb0db6 Mailbox 59 API calls 106684->106685 106695 fce0ac Mailbox 106685->106695 106808 ff42f8 90 API calls _wprintf 106686->106808 106715 f96a8c 106687->106715 106688->106686 106691 fce060 106691->106684 106693 fce260 106694 fb2d55 _free 58 API calls 106693->106694 106696 fce268 106694->106696 106695->106693 106702 fce271 106695->106702 106705 f97de1 59 API calls 106695->106705 106809 fef73d 59 API calls 2 library calls 106695->106809 106810 fef65e 61 API calls 2 library calls 106695->106810 106811 ff737f 59 API calls Mailbox 106695->106811 106812 f9750f 59 API calls 2 library calls 106695->106812 106813 f9735d 59 API calls Mailbox 106695->106813 106701 fb2d55 _free 58 API calls 106701->106702 106702->106701 106704 f94e4a 84 API calls 106702->106704 106814 fef7a1 89 API calls 4 library calls 106702->106814 106704->106702 106705->106695 106709 f934d4 106708->106709 106713 f934f3 _memmove 106708->106713 106711 fb0db6 Mailbox 59 API calls 106709->106711 106710 fb0db6 Mailbox 59 API calls 106712 f9350a 106710->106712 106711->106713 106712->106673 106713->106710 106714->106666 106716 fce41e 106715->106716 106717 f96ab5 106715->106717 106836 fef7a1 89 API calls 4 library calls 106716->106836 106820 f957a6 60 API calls Mailbox 106717->106820 106720 f96ad7 106821 f957f6 67 API calls 106720->106821 106721 fce431 106837 fef7a1 89 API calls 4 library calls 106721->106837 106723 f96aec 106723->106721 106726 fce44d 106808->106691 106809->106695 106810->106695 106811->106695 106812->106695 106813->106695 106814->106702 106820->106720 106821->106723 106836->106721 106837->106726 106868 f91066 106873 f9f76f 106868->106873 106870 f9106c 106871 fb2d40 __cinit 67 API calls 106870->106871 106872 f91076 106871->106872 106874 f9f790 106873->106874 106906 faff03 106874->106906 106878 f9f7d7 106879 f97667 59 API calls 106878->106879 106880 f9f7e1 106879->106880 106881 f97667 59 API calls 106880->106881 106882 f9f7eb 106881->106882 106883 f97667 59 API calls 106882->106883 106884 f9f7f5 106883->106884 106885 f97667 59 API calls 106884->106885 106886 f9f833 106885->106886 106887 f97667 59 API calls 106886->106887 106888 f9f8fe 106887->106888 106916 fa5f87 106888->106916 106892 f9f930 106893 f97667 59 API calls 106892->106893 106894 f9f93a 106893->106894 106944 fafd9e 106894->106944 106896 f9f981 106897 f9f991 GetStdHandle 106896->106897 106898 f9f9dd 106897->106898 106899 fd45ab 106897->106899 106900 f9f9e5 OleInitialize 106898->106900 106899->106898 106901 fd45b4 106899->106901 106900->106870 106951 ff6b38 64 API calls Mailbox 106901->106951 106903 fd45bb 106952 ff7207 CreateThread 106903->106952 106905 fd45c7 CloseHandle 106905->106900 106953 faffdc 106906->106953 106909 faffdc 59 API calls 106910 faff45 106909->106910 106911 f97667 59 API calls 106910->106911 106912 faff51 106911->106912 106913 f97bcc 59 API calls 106912->106913 106914 f9f796 106913->106914 106915 fb0162 6 API calls 106914->106915 106915->106878 106917 f97667 59 API calls 106916->106917 106918 fa5f97 106917->106918 106919 f97667 59 API calls 106918->106919 106920 fa5f9f 106919->106920 106960 fa5a9d 106920->106960 106923 fa5a9d 59 API calls 106924 fa5faf 106923->106924 106925 f97667 59 API calls 106924->106925 106926 fa5fba 106925->106926 106927 fb0db6 Mailbox 59 API calls 106926->106927 106928 f9f908 106927->106928 106929 fa60f9 106928->106929 106930 fa6107 106929->106930 106931 f97667 59 API calls 106930->106931 106932 fa6112 106931->106932 106933 f97667 59 API calls 106932->106933 106934 fa611d 106933->106934 106935 f97667 59 API calls 106934->106935 106936 fa6128 106935->106936 106937 f97667 59 API calls 106936->106937 106938 fa6133 106937->106938 106939 fa5a9d 59 API calls 106938->106939 106940 fa613e 106939->106940 106941 fb0db6 Mailbox 59 API calls 106940->106941 106942 fa6145 RegisterWindowMessageW 106941->106942 106942->106892 106945 fe576f 106944->106945 106946 fafdae 106944->106946 106963 ff9ae7 60 API calls 106945->106963 106947 fb0db6 Mailbox 59 API calls 106946->106947 106950 fafdb6 106947->106950 106949 fe577a 106950->106896 106951->106903 106952->106905 106964 ff71ed 65 API calls 106952->106964 106954 f97667 59 API calls 106953->106954 106955 faffe7 106954->106955 106956 f97667 59 API calls 106955->106956 106957 faffef 106956->106957 106958 f97667 59 API calls 106957->106958 106959 faff3b 106958->106959 106959->106909 106961 f97667 59 API calls 106960->106961 106962 fa5aa5 106961->106962 106962->106923 106963->106949 106965 f91016 106970 f94974 106965->106970 106968 fb2d40 __cinit 67 API calls 106969 f91025 106968->106969 106971 fb0db6 Mailbox 59 API calls 106970->106971 106972 f9497c 106971->106972 106973 f9101b 106972->106973 106977 f94936 106972->106977 106973->106968 106978 f9493f 106977->106978 106979 f94951 106977->106979 106980 fb2d40 __cinit 67 API calls 106978->106980 106981 f949a0 106979->106981 106980->106979 106982 f97667 59 API calls 106981->106982 106983 f949b8 GetVersionExW 106982->106983 106984 f97bcc 59 API calls 106983->106984 106985 f949fb 106984->106985 106986 f97d2c 59 API calls 106985->106986 106989 f94a28 106985->106989 106987 f94a1c 106986->106987 106988 f97726 59 API calls 106987->106988 106988->106989 106990 fcd864 106989->106990 106991 f94a93 GetCurrentProcess IsWow64Process 106989->106991 106992 f94aac 106991->106992 106993 f94b2b GetSystemInfo 106992->106993 106994 f94ac2 106992->106994 106995 f94af8 106993->106995 107005 f94b37 106994->107005 106995->106973 106998 f94b1f GetSystemInfo 107000 f94ae9 106998->107000 106999 f94ad4 107001 f94b37 2 API calls 106999->107001 107000->106995 107003 f94aef FreeLibrary 107000->107003 107002 f94adc GetNativeSystemInfo 107001->107002 107002->107000 107003->106995 107006 f94ad0 107005->107006 107007 f94b40 LoadLibraryA 107005->107007 107006->106998 107006->106999 107007->107006 107008 f94b51 GetProcAddress 107007->107008 107008->107006

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F93B68
                                            • IsDebuggerPresent.KERNEL32 ref: 00F93B7A
                                            • GetFullPathNameW.KERNEL32(00007FFF,?,?,010552F8,010552E0,?,?), ref: 00F93BEB
                                              • Part of subcall function 00F97BCC: _memmove.LIBCMT ref: 00F97C06
                                              • Part of subcall function 00FA092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00F93C14,010552F8,?,?,?), ref: 00FA096E
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00F93C6F
                                            • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,01047770,00000010), ref: 00FCD281
                                            • SetCurrentDirectoryW.KERNEL32(?,010552F8,?,?,?), ref: 00FCD2B9
                                            • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,01044260,010552F8,?,?,?), ref: 00FCD33F
                                            • ShellExecuteW.SHELL32(00000000,?,?), ref: 00FCD346
                                              • Part of subcall function 00F93A46: GetSysColorBrush.USER32(0000000F), ref: 00F93A50
                                              • Part of subcall function 00F93A46: LoadCursorW.USER32(00000000,00007F00), ref: 00F93A5F
                                              • Part of subcall function 00F93A46: LoadIconW.USER32(00000063), ref: 00F93A76
                                              • Part of subcall function 00F93A46: LoadIconW.USER32(000000A4), ref: 00F93A88
                                              • Part of subcall function 00F93A46: LoadIconW.USER32(000000A2), ref: 00F93A9A
                                              • Part of subcall function 00F93A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F93AC0
                                              • Part of subcall function 00F93A46: RegisterClassExW.USER32(?), ref: 00F93B16
                                              • Part of subcall function 00F939D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F93A03
                                              • Part of subcall function 00F939D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F93A24
                                              • Part of subcall function 00F939D5: ShowWindow.USER32(00000000,?,?), ref: 00F93A38
                                              • Part of subcall function 00F939D5: ShowWindow.USER32(00000000,?,?), ref: 00F93A41
                                              • Part of subcall function 00F9434A: _memset.LIBCMT ref: 00F94370
                                              • Part of subcall function 00F9434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F94415
                                            Strings
                                            • runas, xrefs: 00FCD33A
                                            • This is a third-party compiled AutoIt script., xrefs: 00FCD279
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                            • String ID: This is a third-party compiled AutoIt script.$runas
                                            • API String ID: 529118366-3287110873
                                            • Opcode ID: a0b27d7f183e07586f7f3e2b946d1ef3ae6019d3781f3dbd3ac3d5f2e498d063
                                            • Instruction ID: 2083c1b7871e689e38bc0fa021331ec401bd87f98b18a105d31c6e8160b2778f
                                            • Opcode Fuzzy Hash: a0b27d7f183e07586f7f3e2b946d1ef3ae6019d3781f3dbd3ac3d5f2e498d063
                                            • Instruction Fuzzy Hash: 8B511771D04309AEEF21EBB4DC06EFE7B78BF46750F004069F491A6142DA7D5645EB21

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 942 f949a0-f94a00 call f97667 GetVersionExW call f97bcc 947 f94b0b-f94b0d 942->947 948 f94a06 942->948 949 fcd767-fcd773 947->949 950 f94a09-f94a0e 948->950 951 fcd774-fcd778 949->951 952 f94b12-f94b13 950->952 953 f94a14 950->953 955 fcd77a 951->955 956 fcd77b-fcd787 951->956 954 f94a15-f94a4c call f97d2c call f97726 952->954 953->954 964 fcd864-fcd867 954->964 965 f94a52-f94a53 954->965 955->956 956->951 958 fcd789-fcd78e 956->958 958->950 960 fcd794-fcd79b 958->960 960->949 962 fcd79d 960->962 966 fcd7a2-fcd7a5 962->966 967 fcd869 964->967 968 fcd880-fcd884 964->968 965->966 969 f94a59-f94a64 965->969 970 fcd7ab-fcd7c9 966->970 971 f94a93-f94aaa GetCurrentProcess IsWow64Process 966->971 972 fcd86c 967->972 976 fcd86f-fcd878 968->976 977 fcd886-fcd88f 968->977 973 f94a6a-f94a6c 969->973 974 fcd7ea-fcd7f0 969->974 970->971 975 fcd7cf-fcd7d5 970->975 978 f94aac 971->978 979 f94aaf-f94ac0 971->979 972->976 980 fcd805-fcd811 973->980 981 f94a72-f94a75 973->981 984 fcd7fa-fcd800 974->984 985 fcd7f2-fcd7f5 974->985 982 fcd7df-fcd7e5 975->982 983 fcd7d7-fcd7da 975->983 976->968 977->972 986 fcd891-fcd894 977->986 978->979 987 f94b2b-f94b35 GetSystemInfo 979->987 988 f94ac2-f94ad2 call f94b37 979->988 992 fcd81b-fcd821 980->992 993 fcd813-fcd816 980->993 989 f94a7b-f94a8a 981->989 990 fcd831-fcd834 981->990 982->971 983->971 984->971 985->971 986->976 991 f94af8-f94b08 987->991 999 f94b1f-f94b29 GetSystemInfo 988->999 1000 f94ad4-f94ae1 call f94b37 988->1000 995 f94a90 989->995 996 fcd826-fcd82c 989->996 990->971 998 fcd83a-fcd84f 990->998 992->971 993->971 995->971 996->971 1001 fcd859-fcd85f 998->1001 1002 fcd851-fcd854 998->1002 1003 f94ae9-f94aed 999->1003 1007 f94b18-f94b1d 1000->1007 1008 f94ae3-f94ae7 GetNativeSystemInfo 1000->1008 1001->971 1002->971 1003->991 1006 f94aef-f94af2 FreeLibrary 1003->1006 1006->991 1007->1008 1008->1003
                                            APIs
                                            • GetVersionExW.KERNEL32(?), ref: 00F949CD
                                              • Part of subcall function 00F97BCC: _memmove.LIBCMT ref: 00F97C06
                                            • GetCurrentProcess.KERNEL32(?,0101FAEC,00000000,00000000,?), ref: 00F94A9A
                                            • IsWow64Process.KERNEL32(00000000), ref: 00F94AA1
                                            • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00F94AE7
                                            • FreeLibrary.KERNEL32(00000000), ref: 00F94AF2
                                            • GetSystemInfo.KERNEL32(00000000), ref: 00F94B23
                                            • GetSystemInfo.KERNEL32(00000000), ref: 00F94B2F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                            • String ID:
                                            • API String ID: 1986165174-0
                                            • Opcode ID: 55197ef672014b86ed5715ec13e8b66e22be7c87212998f5c737202c295c6be8
                                            • Instruction ID: 82b876950e848b70d56e5a8ab794061a015851148fbf645e8cb77cb039169abf
                                            • Opcode Fuzzy Hash: 55197ef672014b86ed5715ec13e8b66e22be7c87212998f5c737202c295c6be8
                                            • Instruction Fuzzy Hash: A59105319897C1DEDB31DF688551AAABFF4AF3A310B0449ADD0C683A41D238B509E759

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1039 f94e89-f94ea1 CreateStreamOnHGlobal 1040 f94ec1-f94ec6 1039->1040 1041 f94ea3-f94eba FindResourceExW 1039->1041 1042 f94ec0 1041->1042 1043 fcd933-fcd942 LoadResource 1041->1043 1042->1040 1043->1042 1044 fcd948-fcd956 SizeofResource 1043->1044 1044->1042 1045 fcd95c-fcd967 LockResource 1044->1045 1045->1042 1046 fcd96d-fcd98b 1045->1046 1046->1042
                                            APIs
                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00F94D8E,?,?,00000000,00000000), ref: 00F94E99
                                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00F94D8E,?,?,00000000,00000000), ref: 00F94EB0
                                            • LoadResource.KERNEL32(?,00000000,?,?,00F94D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F94E2F), ref: 00FCD937
                                            • SizeofResource.KERNEL32(?,00000000,?,?,00F94D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F94E2F), ref: 00FCD94C
                                            • LockResource.KERNEL32(00F94D8E,?,?,00F94D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F94E2F,00000000), ref: 00FCD95F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                            • String ID: SCRIPT
                                            • API String ID: 3051347437-3967369404
                                            • Opcode ID: eb4be0197fd52e5f145cef9b120b12f3653e26d33d06cdd8fcb5d28d26a6c102
                                            • Instruction ID: 43e568b8206734a584d5d1dd361f1187731e5b2ac63acf68764f5979f7c501ec
                                            • Opcode Fuzzy Hash: eb4be0197fd52e5f145cef9b120b12f3653e26d33d06cdd8fcb5d28d26a6c102
                                            • Instruction Fuzzy Hash: 24119E75640701BFEB209B65EC48F677BBAFBC5B11F10426CF44586250DB7AEC059660
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: BuffCharUpper
                                            • String ID:
                                            • API String ID: 3964851224-0
                                            • Opcode ID: b0ac73d1048ceac8823afcebeed2c16a3d53deaba8e602bb78178caf51f82f66
                                            • Instruction ID: f8ec69fbbef4e85e872e48906b3154bbbaf387447a79f3cbcd37ebd26f526035
                                            • Opcode Fuzzy Hash: b0ac73d1048ceac8823afcebeed2c16a3d53deaba8e602bb78178caf51f82f66
                                            • Instruction Fuzzy Hash: F6928EB1A083418FD720DF14C480B6BB7E1BF86314F18896DE89A8B351DB75EC45EB92
                                            APIs
                                            • GetFileAttributesW.KERNELBASE(?,00FCE398), ref: 00FF446A
                                            • FindFirstFileW.KERNELBASE(?,?), ref: 00FF447B
                                            • FindClose.KERNEL32(00000000), ref: 00FF448B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: FileFind$AttributesCloseFirst
                                            • String ID:
                                            • API String ID: 48322524-0
                                            • Opcode ID: 30e32ae44c8d0f351c01b31d1274d89e6eee5f8462341a1055cdbda46671e2c3
                                            • Instruction ID: a9a51fece654bf0f5cdd5984a1c41b7b2c729f8321dcd7cf15a76b0910ee6001
                                            • Opcode Fuzzy Hash: 30e32ae44c8d0f351c01b31d1274d89e6eee5f8462341a1055cdbda46671e2c3
                                            • Instruction Fuzzy Hash: 8AE0D833810905675220AA38EC0D4FA775C9E05335F104705FD75D10D0EB7C6904A695
                                            Strings
                                            • Variable must be of type 'Object'., xrefs: 00FD3E62
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Variable must be of type 'Object'.
                                            • API String ID: 0-109567571
                                            • Opcode ID: f333377fd7408dd7bb855459c31f14dec5c1567ab0d3abae4fb9f29d64682e5f
                                            • Instruction ID: e02d28c83b0d44bdf62df2eed8c04f8d7cdc3a1b553627c7a97c4bb1da82c7f7
                                            • Opcode Fuzzy Hash: f333377fd7408dd7bb855459c31f14dec5c1567ab0d3abae4fb9f29d64682e5f
                                            • Instruction Fuzzy Hash: B3A27B75E00209CFEF24CF58C480AAAB7B2FF58314F68805AE945AB351D735ED46EB91
                                            APIs
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FA0A5B
                                            • timeGetTime.WINMM ref: 00FA0D16
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FA0E53
                                            • Sleep.KERNEL32(0000000A), ref: 00FA0E61
                                            • LockWindowUpdate.USER32(00000000,?,?), ref: 00FA0EFA
                                            • DestroyWindow.USER32 ref: 00FA0F06
                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FA0F20
                                            • Sleep.KERNEL32(0000000A,?,?), ref: 00FD4E83
                                            • TranslateMessage.USER32(?), ref: 00FD5C60
                                            • DispatchMessageW.USER32(?), ref: 00FD5C6E
                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FD5C82
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                            • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                            • API String ID: 4212290369-3242690629
                                            • Opcode ID: 8196feaebdfd9f4348e0f735ff230f725208cfce1bb1d8ea9ae5e27110afc14c
                                            • Instruction ID: 667891ad234d4f8ea30097788928e94d3f4b0bafe0f7df926016a67e32a23c45
                                            • Opcode Fuzzy Hash: 8196feaebdfd9f4348e0f735ff230f725208cfce1bb1d8ea9ae5e27110afc14c
                                            • Instruction Fuzzy Hash: 0BB20470A08741DFDB24DF24C884BAAB7E2BF85714F18491EF48997391CB79E844EB42

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00FF8F5F: __time64.LIBCMT ref: 00FF8F69
                                              • Part of subcall function 00F94EE5: _fseek.LIBCMT ref: 00F94EFD
                                            • __wsplitpath.LIBCMT ref: 00FF9234
                                              • Part of subcall function 00FB40FB: __wsplitpath_helper.LIBCMT ref: 00FB413B
                                            • _wcscpy.LIBCMT ref: 00FF9247
                                            • _wcscat.LIBCMT ref: 00FF925A
                                            • __wsplitpath.LIBCMT ref: 00FF927F
                                            • _wcscat.LIBCMT ref: 00FF9295
                                            • _wcscat.LIBCMT ref: 00FF92A8
                                              • Part of subcall function 00FF8FA5: _memmove.LIBCMT ref: 00FF8FDE
                                              • Part of subcall function 00FF8FA5: _memmove.LIBCMT ref: 00FF8FED
                                            • _wcscmp.LIBCMT ref: 00FF91EF
                                              • Part of subcall function 00FF9734: _wcscmp.LIBCMT ref: 00FF9824
                                              • Part of subcall function 00FF9734: _wcscmp.LIBCMT ref: 00FF9837
                                            • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00FF9452
                                            • _wcsncpy.LIBCMT ref: 00FF94C5
                                            • DeleteFileW.KERNEL32(?,?), ref: 00FF94FB
                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00FF9511
                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FF9522
                                            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FF9534
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                            • String ID:
                                            • API String ID: 1500180987-0
                                            • Opcode ID: 52a29c3c8c8fb87bb975ea673bba4973c26538965fcdcab93ac545f02bd4088a
                                            • Instruction ID: b2a966eb1ebea23100fef80d1a422a77d00540de159fff24a52516e4bad91e93
                                            • Opcode Fuzzy Hash: 52a29c3c8c8fb87bb975ea673bba4973c26538965fcdcab93ac545f02bd4088a
                                            • Instruction Fuzzy Hash: 99C169B1D0421DAADF21DFA5CC81EEEB7BCAF54310F0040AAF608E7151EB749A459F61

                                            Control-flow Graph

                                            APIs
                                            • GetSysColorBrush.USER32(0000000F), ref: 00F93074
                                            • RegisterClassExW.USER32(00000030), ref: 00F9309E
                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F930AF
                                            • InitCommonControlsEx.COMCTL32(?), ref: 00F930CC
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F930DC
                                            • LoadIconW.USER32(000000A9), ref: 00F930F2
                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F93101
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                            • API String ID: 2914291525-1005189915
                                            • Opcode ID: ed605c83b456fc1e3b1208d25dca88508e935b2afe32f5325cb4b0e635f8290f
                                            • Instruction ID: 8e26f285a899e30f1e74886049e5ae91f2203dade0113102529e1084d060ab34
                                            • Opcode Fuzzy Hash: ed605c83b456fc1e3b1208d25dca88508e935b2afe32f5325cb4b0e635f8290f
                                            • Instruction Fuzzy Hash: 733107B184534AAFDB61CFA4E889A9ABBF0FB09310F14455EE5C0E6294D3BE0589CF51

                                            Control-flow Graph

                                            APIs
                                            • GetSysColorBrush.USER32(0000000F), ref: 00F93074
                                            • RegisterClassExW.USER32(00000030), ref: 00F9309E
                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F930AF
                                            • InitCommonControlsEx.COMCTL32(?), ref: 00F930CC
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F930DC
                                            • LoadIconW.USER32(000000A9), ref: 00F930F2
                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F93101
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                            • API String ID: 2914291525-1005189915
                                            • Opcode ID: 73efc179c385cddc7211066d80042f0e20abd5f892c59b9238a6cf0f24380943
                                            • Instruction ID: f38b47b9c5e0f35d7fb370fc7ddbfcded7f0d884c13e8588b4231ce357514a01
                                            • Opcode Fuzzy Hash: 73efc179c385cddc7211066d80042f0e20abd5f892c59b9238a6cf0f24380943
                                            • Instruction Fuzzy Hash: 2021C4B1D11319AFDB20DFA4E889B9EBBF4FB08710F00411AF990E6294D7BA45488F91

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00F94706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,010552F8,?,00F937AE,?), ref: 00F94724
                                              • Part of subcall function 00FB050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00F97165), ref: 00FB052D
                                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00F971A8
                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00FCE8C8
                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00FCE909
                                            • RegCloseKey.ADVAPI32(?), ref: 00FCE947
                                            • _wcscat.LIBCMT ref: 00FCE9A0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                            • API String ID: 2673923337-2727554177
                                            • Opcode ID: 8a57c3cf4345f7ca81abbc2c856476e4a6c119be560d140f55245ba5c1644658
                                            • Instruction ID: a5b5f805bf7d3fd9be17a8108048a393e269eab75d3736724461ea8843e6b63d
                                            • Opcode Fuzzy Hash: 8a57c3cf4345f7ca81abbc2c856476e4a6c119be560d140f55245ba5c1644658
                                            • Instruction Fuzzy Hash: 53718F715087029ED714EF65E8429AFBBF8FF84390F80052EF485871A4DB7AD948DB52

                                            Control-flow Graph

                                            APIs
                                            • GetSysColorBrush.USER32(0000000F), ref: 00F93A50
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00F93A5F
                                            • LoadIconW.USER32(00000063), ref: 00F93A76
                                            • LoadIconW.USER32(000000A4), ref: 00F93A88
                                            • LoadIconW.USER32(000000A2), ref: 00F93A9A
                                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F93AC0
                                            • RegisterClassExW.USER32(?), ref: 00F93B16
                                              • Part of subcall function 00F93041: GetSysColorBrush.USER32(0000000F), ref: 00F93074
                                              • Part of subcall function 00F93041: RegisterClassExW.USER32(00000030), ref: 00F9309E
                                              • Part of subcall function 00F93041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F930AF
                                              • Part of subcall function 00F93041: InitCommonControlsEx.COMCTL32(?), ref: 00F930CC
                                              • Part of subcall function 00F93041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F930DC
                                              • Part of subcall function 00F93041: LoadIconW.USER32(000000A9), ref: 00F930F2
                                              • Part of subcall function 00F93041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F93101
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                            • String ID: #$0$AutoIt v3
                                            • API String ID: 423443420-4155596026
                                            • Opcode ID: e51b7560b27c6f48be57188d8178da3b73c194789b2e4ac2632c2cab6517ff03
                                            • Instruction ID: 39996e3e4c69c7bf8ba5c8b6cf17250215ce84c1fcb1a05007d7279c8b59956b
                                            • Opcode Fuzzy Hash: e51b7560b27c6f48be57188d8178da3b73c194789b2e4ac2632c2cab6517ff03
                                            • Instruction Fuzzy Hash: 9F214471D10309AFEF20DFA4EC09B9E7BB1FB09751F00011AF584AA295D3BE6A449F94

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 767 f93633-f93681 769 f936e1-f936e3 767->769 770 f93683-f93686 767->770 769->770 771 f936e5 769->771 772 f93688-f9368f 770->772 773 f936e7 770->773 774 f936ca-f936d2 DefWindowProcW 771->774 777 f9374b-f93753 PostQuitMessage 772->777 778 f93695-f9369a 772->778 775 fcd0cc-fcd0fa call fa1070 call fa1093 773->775 776 f936ed-f936f0 773->776 780 f936d8-f936de 774->780 810 fcd0ff-fcd106 775->810 781 f936f2-f936f3 776->781 782 f93715-f9373c SetTimer RegisterWindowMessageW 776->782 779 f93711-f93713 777->779 784 fcd154-fcd168 call ff2527 778->784 785 f936a0-f936a2 778->785 779->780 787 f936f9-f9370c KillTimer call f9443a call f93114 781->787 788 fcd06f-fcd072 781->788 782->779 790 f9373e-f93749 CreatePopupMenu 782->790 784->779 804 fcd16e 784->804 791 f936a8-f936ad 785->791 792 f93755-f9375f call f944a0 785->792 787->779 797 fcd0a8-fcd0c7 MoveWindow 788->797 798 fcd074-fcd076 788->798 790->779 793 fcd139-fcd140 791->793 794 f936b3-f936b8 791->794 805 f93764 792->805 793->774 809 fcd146-fcd14f call fe7c36 793->809 802 f936be-f936c4 794->802 803 fcd124-fcd134 call ff2d36 794->803 797->779 806 fcd078-fcd07b 798->806 807 fcd097-fcd0a3 SetFocus 798->807 802->774 802->810 803->779 804->774 805->779 806->802 811 fcd081-fcd092 call fa1070 806->811 807->779 809->774 810->774 815 fcd10c-fcd11f call f9443a call f9434a 810->815 811->779 815->774
                                            APIs
                                            • DefWindowProcW.USER32(?,?,?,?), ref: 00F936D2
                                            • KillTimer.USER32(?,00000001), ref: 00F936FC
                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F9371F
                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F9372A
                                            • CreatePopupMenu.USER32 ref: 00F9373E
                                            • PostQuitMessage.USER32(00000000), ref: 00F9374D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                            • String ID: TaskbarCreated
                                            • API String ID: 129472671-2362178303
                                            • Opcode ID: bdf0f18d0ca538591d69a7a77e4a7d0dfcaa6b26449775535e6a3e3bb7cdb350
                                            • Instruction ID: 71bfba9b51534359432ec80dc1cd930299fafbea60ac2ecec079166467d8fb2c
                                            • Opcode Fuzzy Hash: bdf0f18d0ca538591d69a7a77e4a7d0dfcaa6b26449775535e6a3e3bb7cdb350
                                            • Instruction Fuzzy Hash: C8414AB2604206BBFF345FA8DC09F7E3765FB01310F140129FA82D6295CA6EAD05B762

                                            Control-flow Graph

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                            • API String ID: 1825951767-3513169116
                                            • Opcode ID: 0ce93c7bed7bd1bd359b98591498a78c4ec22b5ca79d930c6714554ac37a71cf
                                            • Instruction ID: 248e886cbbd118de1d2c7bcc51c456e7b987f748e134dc61f321f6a56c18df9e
                                            • Opcode Fuzzy Hash: 0ce93c7bed7bd1bd359b98591498a78c4ec22b5ca79d930c6714554ac37a71cf
                                            • Instruction Fuzzy Hash: 9EA18F72D1021D9AEF04EBA4DC92EEEB779BF15310F440019F415A7151EF789A08EB60

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1009 cc7520-cc7572 call cc7420 CreateFileW 1012 cc757b-cc7588 1009->1012 1013 cc7574-cc7576 1009->1013 1016 cc758a-cc7596 1012->1016 1017 cc759b-cc75b2 VirtualAlloc 1012->1017 1014 cc76d4-cc76d8 1013->1014 1016->1014 1018 cc75bb-cc75e1 CreateFileW 1017->1018 1019 cc75b4-cc75b6 1017->1019 1021 cc7605-cc761f ReadFile 1018->1021 1022 cc75e3-cc7600 1018->1022 1019->1014 1023 cc7621-cc763e 1021->1023 1024 cc7643-cc7647 1021->1024 1022->1014 1023->1014 1025 cc7668-cc767f WriteFile 1024->1025 1026 cc7649-cc7666 1024->1026 1028 cc76aa-cc76cf CloseHandle VirtualFree 1025->1028 1029 cc7681-cc76a8 1025->1029 1026->1014 1028->1014 1029->1014
                                            APIs
                                            • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00CC7565
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1454627695.0000000000CC6000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CC6000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_cc6000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID:
                                            • API String ID: 823142352-0
                                            • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                            • Instruction ID: e8ebf32bc9cd23694cd2c405fdfcc68969f9711f19fa1d718890ffe2de29dba4
                                            • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                            • Instruction Fuzzy Hash: CE510B75A54208FBEF20DFA4CC49FDE7778EF48700F108658F619EA180DA749A459B64

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1049 f939d5-f93a45 CreateWindowExW * 2 ShowWindow * 2
                                            APIs
                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F93A03
                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F93A24
                                            • ShowWindow.USER32(00000000,?,?), ref: 00F93A38
                                            • ShowWindow.USER32(00000000,?,?), ref: 00F93A41
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$CreateShow
                                            • String ID: AutoIt v3$edit
                                            • API String ID: 1584632944-3779509399
                                            • Opcode ID: 3ac7860cf795edc8973a913d4b603836732f831857fb6f675f205de166be0730
                                            • Instruction ID: fcea4a2ef54d7b8928390c3c35ece643600ceeec6804029146a3ad20e52306f1
                                            • Opcode Fuzzy Hash: 3ac7860cf795edc8973a913d4b603836732f831857fb6f675f205de166be0730
                                            • Instruction Fuzzy Hash: 4EF03A715403907EEB315623AC08E2B2E7DE7CBF90B00001EB944E2158C2AE1800CBB0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1050 f9407c-f94092 1051 f94098-f940ad call f97a16 1050->1051 1052 f9416f-f94173 1050->1052 1055 fcd3c8-fcd3d7 LoadStringW 1051->1055 1056 f940b3-f940d3 call f97bcc 1051->1056 1059 fcd3e2-fcd3fa call f97b2e call f96fe3 1055->1059 1056->1059 1060 f940d9-f940dd 1056->1060 1069 f940ed-f9416a call fb2de0 call f9454e call fb2dbc Shell_NotifyIconW call f95904 1059->1069 1072 fcd400-fcd41e call f97cab call f96fe3 call f97cab 1059->1072 1062 f940e3-f940e8 call f97b2e 1060->1062 1063 f94174-f9417d call f98047 1060->1063 1062->1069 1063->1069 1069->1052 1072->1069
                                            APIs
                                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00FCD3D7
                                              • Part of subcall function 00F97BCC: _memmove.LIBCMT ref: 00F97C06
                                            • _memset.LIBCMT ref: 00F940FC
                                            • _wcscpy.LIBCMT ref: 00F94150
                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F94160
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                            • String ID: Line:
                                            • API String ID: 3942752672-1585850449
                                            • Opcode ID: e0fcf9649b8c679f80976899b09c55e547f00ef36bd200ed7159dc55729b5b6c
                                            • Instruction ID: e94945a4e4e8dec754885950e9b9b08e0a51cf328d8cc26254e1b8b31d7afe16
                                            • Opcode Fuzzy Hash: e0fcf9649b8c679f80976899b09c55e547f00ef36bd200ed7159dc55729b5b6c
                                            • Instruction Fuzzy Hash: 6A31F171408301AFEB72EB60DC46FDB77E8AF94314F10491EF5C592091EB78A649DB86

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1085 fb541d-fb5436 1086 fb5438-fb543d 1085->1086 1087 fb5453 1085->1087 1086->1087 1088 fb543f-fb5441 1086->1088 1089 fb5455-fb545b 1087->1089 1090 fb545c-fb5461 1088->1090 1091 fb5443-fb5448 call fb8b28 1088->1091 1092 fb546f-fb5473 1090->1092 1093 fb5463-fb546d 1090->1093 1103 fb544e call fb8db6 1091->1103 1096 fb5483-fb5485 1092->1096 1097 fb5475-fb5480 call fb2de0 1092->1097 1093->1092 1095 fb5493-fb54a2 1093->1095 1101 fb54a9 1095->1101 1102 fb54a4-fb54a7 1095->1102 1096->1091 1100 fb5487-fb5491 1096->1100 1097->1096 1100->1091 1100->1095 1105 fb54ae-fb54b3 1101->1105 1102->1105 1103->1087 1107 fb54b9-fb54c0 1105->1107 1108 fb559c-fb559f 1105->1108 1109 fb54c2-fb54ca 1107->1109 1110 fb5501-fb5503 1107->1110 1108->1089 1109->1110 1113 fb54cc 1109->1113 1111 fb556d-fb556e call fc0ba7 1110->1111 1112 fb5505-fb5507 1110->1112 1122 fb5573-fb5577 1111->1122 1115 fb552b-fb5536 1112->1115 1116 fb5509-fb5511 1112->1116 1117 fb55ca 1113->1117 1118 fb54d2-fb54d4 1113->1118 1125 fb553a-fb553d 1115->1125 1126 fb5538 1115->1126 1123 fb5513-fb551f 1116->1123 1124 fb5521-fb5525 1116->1124 1121 fb55ce-fb55d7 1117->1121 1119 fb54db-fb54e0 1118->1119 1120 fb54d6-fb54d8 1118->1120 1127 fb54e6-fb54ff call fc0cc8 1119->1127 1128 fb55a4-fb55a8 1119->1128 1120->1119 1121->1089 1122->1121 1129 fb5579-fb557e 1122->1129 1130 fb5527-fb5529 1123->1130 1124->1130 1125->1128 1131 fb553f-fb554b call fb46e6 call fc0e5b 1125->1131 1126->1125 1145 fb5562-fb556b 1127->1145 1134 fb55ba-fb55c5 call fb8b28 1128->1134 1135 fb55aa-fb55b7 call fb2de0 1128->1135 1129->1128 1133 fb5580-fb5591 1129->1133 1130->1125 1146 fb5550-fb5555 1131->1146 1140 fb5594-fb5596 1133->1140 1134->1103 1135->1134 1140->1107 1140->1108 1145->1140 1147 fb555b-fb555e 1146->1147 1148 fb55dc-fb55e0 1146->1148 1147->1117 1149 fb5560 1147->1149 1148->1121 1149->1145
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                            • String ID:
                                            • API String ID: 1559183368-0
                                            • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                            • Instruction ID: a8d1dcfacff91787810436db769749d68de6f413b12b8ebd2f461e0e8ab3d859
                                            • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                            • Instruction Fuzzy Hash: DB51D771E00B05DBCB24DEAADC407EE77A6AF40B35F288729F825962D0D7789D51AF40

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1150 f9686a-f96891 call f94ddd 1153 fce031-fce041 call ff955b 1150->1153 1154 f96897-f968a5 call f94ddd 1150->1154 1158 fce046-fce048 1153->1158 1154->1153 1159 f968ab-f968b1 1154->1159 1160 fce04a-fce04d call f94e4a 1158->1160 1161 fce067-fce0af call fb0db6 1158->1161 1163 fce052-fce061 call ff42f8 1159->1163 1164 f968b7-f968d9 call f96a8c 1159->1164 1160->1163 1170 fce0d4 1161->1170 1171 fce0b1-fce0bb 1161->1171 1163->1161 1174 fce0d6-fce0e9 1170->1174 1173 fce0cf-fce0d0 1171->1173 1175 fce0bd-fce0cc 1173->1175 1176 fce0d2 1173->1176 1177 fce0ef 1174->1177 1178 fce260-fce271 call fb2d55 call f94e4a 1174->1178 1175->1173 1176->1174 1180 fce0f6-fce0f9 call f97480 1177->1180 1188 fce273-fce283 call f97616 call f95d9b 1178->1188 1184 fce0fe-fce120 call f95db2 call ff73e9 1180->1184 1193 fce134-fce13e call ff73d3 1184->1193 1194 fce122-fce12f 1184->1194 1201 fce288-fce2b8 call fef7a1 call fb0e2c call fb2d55 call f94e4a 1188->1201 1203 fce158-fce162 call ff73bd 1193->1203 1204 fce140-fce153 1193->1204 1197 fce227-fce237 call f9750f 1194->1197 1197->1184 1206 fce23d-fce25a call f9735d 1197->1206 1201->1188 1213 fce164-fce171 1203->1213 1214 fce176-fce180 call f95e2a 1203->1214 1204->1197 1206->1178 1206->1180 1213->1197 1214->1197 1219 fce186-fce19e call fef73d 1214->1219 1225 fce1a0-fce1bf call f97de1 call f95904 1219->1225 1226 fce1c1-fce1c4 1219->1226 1250 fce1e2-fce1f0 call f95db2 1225->1250 1228 fce1c6-fce1e1 call f97de1 call f96839 call f95904 1226->1228 1229 fce1f2-fce1f5 1226->1229 1228->1250 1231 fce215-fce218 call ff737f 1229->1231 1232 fce1f7-fce200 call fef65e 1229->1232 1239 fce21d-fce226 call fb0e2c 1231->1239 1232->1201 1242 fce206-fce210 call fb0e2c 1232->1242 1239->1197 1242->1184 1250->1239
                                            APIs
                                              • Part of subcall function 00F94DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,010552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F94E0F
                                            • _free.LIBCMT ref: 00FCE263
                                            • _free.LIBCMT ref: 00FCE2AA
                                              • Part of subcall function 00F96A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F96BAD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _free$CurrentDirectoryLibraryLoad
                                            • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                            • API String ID: 2861923089-1757145024
                                            • Opcode ID: 47c51ec255e8053602603d24b587fc17ec464f1a26fca72b14edcb5e257d8193
                                            • Instruction ID: da3c6c3169a2bdfe0e24a4f0c2d719162983f19cef683765af0dbc6c57682fe4
                                            • Opcode Fuzzy Hash: 47c51ec255e8053602603d24b587fc17ec464f1a26fca72b14edcb5e257d8193
                                            • Instruction Fuzzy Hash: 9F917F71D1421AAFDF04EFA4CC82AEDB7B4FF14310B14442EF815AB2A1DB78A915EB50
                                            APIs
                                              • Part of subcall function 00CC8EB0: Sleep.KERNELBASE(000001F4), ref: 00CC8EC1
                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00CC90C3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1454627695.0000000000CC6000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CC6000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_cc6000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CreateFileSleep
                                            • String ID: 7KE9ZU9FD81Z5
                                            • API String ID: 2694422964-2996063603
                                            • Opcode ID: 07855ff5b6431ef8294a0ec90372ec276a17318cf92d224bfd382c2cf86e8aec
                                            • Instruction ID: 649c1c5af560fcc49c9a0a94187034bb40e515c31042176db4314aedf51fa10a
                                            • Opcode Fuzzy Hash: 07855ff5b6431ef8294a0ec90372ec276a17318cf92d224bfd382c2cf86e8aec
                                            • Instruction Fuzzy Hash: EB518031E04249DAEF11DBA4C809BEFBB79EF49300F104199E608BB2C0DB791B45DBA5
                                            APIs
                                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00F935A1,SwapMouseButtons,00000004,?), ref: 00F935D4
                                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00F935A1,SwapMouseButtons,00000004,?,?,?,?,00F92754), ref: 00F935F5
                                            • RegCloseKey.KERNELBASE(00000000,?,?,00F935A1,SwapMouseButtons,00000004,?,?,?,?,00F92754), ref: 00F93617
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID: Control Panel\Mouse
                                            • API String ID: 3677997916-824357125
                                            • Opcode ID: 948a8f1f7ed899bc5172cd81e95f5a3c35f8f8a9f57f8b7a57ff7ab292d7e5e4
                                            • Instruction ID: a616b7d14dea52aa66eb175a01fd702a99dae6a909f8b43c19398f6d2f2ad6d5
                                            • Opcode Fuzzy Hash: 948a8f1f7ed899bc5172cd81e95f5a3c35f8f8a9f57f8b7a57ff7ab292d7e5e4
                                            • Instruction Fuzzy Hash: 57115A71910208BFEF21CFA8D844EAFBBB8EF04750F004459F805D7200D2719F44A760
                                            APIs
                                              • Part of subcall function 00F94EE5: _fseek.LIBCMT ref: 00F94EFD
                                              • Part of subcall function 00FF9734: _wcscmp.LIBCMT ref: 00FF9824
                                              • Part of subcall function 00FF9734: _wcscmp.LIBCMT ref: 00FF9837
                                            • _free.LIBCMT ref: 00FF96A2
                                            • _free.LIBCMT ref: 00FF96A9
                                            • _free.LIBCMT ref: 00FF9714
                                              • Part of subcall function 00FB2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00FB9A24), ref: 00FB2D69
                                              • Part of subcall function 00FB2D55: GetLastError.KERNEL32(00000000,?,00FB9A24), ref: 00FB2D7B
                                            • _free.LIBCMT ref: 00FF971C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                            • String ID:
                                            • API String ID: 1552873950-0
                                            • Opcode ID: 4a2872fe10592e1d84cc1262fcb1ccf713934ef89923d88bffb920594bd4d040
                                            • Instruction ID: 04be443e3469fe980d2bb4e06cf99893a8860a54e3f092c4316823fa730f047b
                                            • Opcode Fuzzy Hash: 4a2872fe10592e1d84cc1262fcb1ccf713934ef89923d88bffb920594bd4d040
                                            • Instruction Fuzzy Hash: 0A516DB1D04218AFDF249F65CC81BAEBBB9EF48300F1004AEF609A3251DB755A81DF58
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                            • String ID:
                                            • API String ID: 2782032738-0
                                            • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                            • Instruction ID: 7a5180d1d07a99f8f3cd533284b0a497c19de56af684d83b400d185ebdcf0d48
                                            • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                            • Instruction Fuzzy Hash: 2C41E535E007469BDB18CE6BCA809EE77A5EF46360B20813DE815C7642DB34ED41EF40
                                            APIs
                                            • _memset.LIBCMT ref: 00F944CF
                                              • Part of subcall function 00F9407C: _memset.LIBCMT ref: 00F940FC
                                              • Part of subcall function 00F9407C: _wcscpy.LIBCMT ref: 00F94150
                                              • Part of subcall function 00F9407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F94160
                                            • KillTimer.USER32(?,00000001,?,?), ref: 00F94524
                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F94533
                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FCD4B9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                            • String ID:
                                            • API String ID: 1378193009-0
                                            • Opcode ID: bd9db73afdb499b1ed8dafd67c2560c47e702459b18535a9f98ad8d4a1fa884b
                                            • Instruction ID: 2511908842c85af534c88c81f58b522beae7aff185800d0e7c77b27feaf49e66
                                            • Opcode Fuzzy Hash: bd9db73afdb499b1ed8dafd67c2560c47e702459b18535a9f98ad8d4a1fa884b
                                            • Instruction Fuzzy Hash: DD21F5719047849FFB32CB648856FEABBECAB15314F04009DE7CE96141C3792985EB41
                                            APIs
                                            • _memset.LIBCMT ref: 00FCEA39
                                            • GetOpenFileNameW.COMDLG32(?), ref: 00FCEA83
                                              • Part of subcall function 00F94750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F94743,?,?,00F937AE,?), ref: 00F94770
                                              • Part of subcall function 00FB0791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FB07B0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Name$Path$FileFullLongOpen_memset
                                            • String ID: X
                                            • API String ID: 3777226403-3081909835
                                            • Opcode ID: 94aee356411d6474eedf32d4ba6344a76e517dce86cc5e5d5191e4ed8b6c7a63
                                            • Instruction ID: 5bd7c04296f2f3bdb81f15a90f45a44941d9252b0d2becd18e6a249b4593d015
                                            • Opcode Fuzzy Hash: 94aee356411d6474eedf32d4ba6344a76e517dce86cc5e5d5191e4ed8b6c7a63
                                            • Instruction Fuzzy Hash: 6B21A171A103489BDF51AFD4CC45BEE7BF8AF49314F00801AE448A7241DBB85989AFA1
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __fread_nolock_memmove
                                            • String ID: EA06
                                            • API String ID: 1988441806-3962188686
                                            • Opcode ID: c92183bc55c790f4d02fa6c5d57f95cf98a252f13850f1d6849c2e675c97f93c
                                            • Instruction ID: 6be54291a4d0af2057dea7f9d454df1e4957fd3aafbada753154ed27e0de8b00
                                            • Opcode Fuzzy Hash: c92183bc55c790f4d02fa6c5d57f95cf98a252f13850f1d6849c2e675c97f93c
                                            • Instruction Fuzzy Hash: 8501D672C042186EDB28CAA9CC56EFE7BF89F15711F00459EE552D2181E978E6049B60
                                            APIs
                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 00CC7C45
                                            • ExitProcess.KERNEL32(00000000), ref: 00CC7C64
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1454627695.0000000000CC6000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CC6000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_cc6000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Process$CreateExit
                                            • String ID: D
                                            • API String ID: 126409537-2746444292
                                            • Opcode ID: 145b7a1cfb31929a6d02ccf2d0a45045f2bdb13625618a76059d23da88a780f4
                                            • Instruction ID: f082d34e65c1a628222048b20bfe0863145359fda986857aefc6e46f85d8762f
                                            • Opcode Fuzzy Hash: 145b7a1cfb31929a6d02ccf2d0a45045f2bdb13625618a76059d23da88a780f4
                                            • Instruction Fuzzy Hash: 5AF0FFB154424DABDB60DFE0CC49FEE777CFF04701F148508FB1A9A184DA7496089B61
                                            APIs
                                            • GetTempPathW.KERNEL32(00000104,?), ref: 00FF98F8
                                            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00FF990F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Temp$FileNamePath
                                            • String ID: aut
                                            • API String ID: 3285503233-3010740371
                                            • Opcode ID: abc480bcfc0653734e4116c1073d376ec099269e2a12cca4bfc7e46e7f124f85
                                            • Instruction ID: 1159e0b9ac6e846b99e3780720623a401ecf6ed9b952a69c6c64a13d61af94e8
                                            • Opcode Fuzzy Hash: abc480bcfc0653734e4116c1073d376ec099269e2a12cca4bfc7e46e7f124f85
                                            • Instruction Fuzzy Hash: 8DD05E7954030EABDB609AA0EC4EFDA777CE704700F0046A1FA9496091EAB995988B91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0289b4ca4eacc4bfb579d56106e943fbca1c80a6849dff8d58e698bf7b133b05
                                            • Instruction ID: 4632962c36cadbf5977ce977757a591fedaf20f5a422c9613bc87550c91e93cb
                                            • Opcode Fuzzy Hash: 0289b4ca4eacc4bfb579d56106e943fbca1c80a6849dff8d58e698bf7b133b05
                                            • Instruction Fuzzy Hash: 83F16C706083059FEB15DF28C980A6ABBE5FF88314F14895EF8999B391D734E945CF82
                                            APIs
                                              • Part of subcall function 00FB0162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FB0193
                                              • Part of subcall function 00FB0162: MapVirtualKeyW.USER32(00000010,00000000), ref: 00FB019B
                                              • Part of subcall function 00FB0162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FB01A6
                                              • Part of subcall function 00FB0162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FB01B1
                                              • Part of subcall function 00FB0162: MapVirtualKeyW.USER32(00000011,00000000), ref: 00FB01B9
                                              • Part of subcall function 00FB0162: MapVirtualKeyW.USER32(00000012,00000000), ref: 00FB01C1
                                              • Part of subcall function 00FA60F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00F9F930), ref: 00FA6154
                                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00F9F9CD
                                            • OleInitialize.OLE32(00000000), ref: 00F9FA4A
                                            • CloseHandle.KERNEL32(00000000), ref: 00FD45C8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                            • String ID:
                                            • API String ID: 1986988660-0
                                            • Opcode ID: 08647eae140e444cf2946d872038eb3d5b4c249f0f4a0ec1edf429b6a99f4a7c
                                            • Instruction ID: 27ee375ee42b3468337c664538f76cab12629ff52d090167e41611c01c4bfd19
                                            • Opcode Fuzzy Hash: 08647eae140e444cf2946d872038eb3d5b4c249f0f4a0ec1edf429b6a99f4a7c
                                            • Instruction Fuzzy Hash: FF81CDB0A11744CFC7A4EF29EC4562B7FE5FB8830AB50812AD489CB25AEB7E5404CF11
                                            APIs
                                            • _memset.LIBCMT ref: 00F94370
                                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F94415
                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00F94432
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: IconNotifyShell_$_memset
                                            • String ID:
                                            • API String ID: 1505330794-0
                                            • Opcode ID: ebd0363ad18f6f6c01ea287a87e3b4975a96e5b4bde307d980fcf7f9f0993d44
                                            • Instruction ID: d891b20c10d2e8bef2a625a7b7d7ab96e66ef48df33cd5f59cd4b5443b9d2f70
                                            • Opcode Fuzzy Hash: ebd0363ad18f6f6c01ea287a87e3b4975a96e5b4bde307d980fcf7f9f0993d44
                                            • Instruction Fuzzy Hash: 073181709047019FEB31DF34D884A9BBBF8FB59318F00092EF6DA82241D775A945DB52
                                            APIs
                                            • __FF_MSGBANNER.LIBCMT ref: 00FB5733
                                              • Part of subcall function 00FBA16B: __NMSG_WRITE.LIBCMT ref: 00FBA192
                                              • Part of subcall function 00FBA16B: __NMSG_WRITE.LIBCMT ref: 00FBA19C
                                            • __NMSG_WRITE.LIBCMT ref: 00FB573A
                                              • Part of subcall function 00FBA1C8: GetModuleFileNameW.KERNEL32(00000000,010533BA,00000104,?,00000001,00000000), ref: 00FBA25A
                                              • Part of subcall function 00FBA1C8: ___crtMessageBoxW.LIBCMT ref: 00FBA308
                                              • Part of subcall function 00FB309F: ___crtCorExitProcess.LIBCMT ref: 00FB30A5
                                              • Part of subcall function 00FB309F: ExitProcess.KERNEL32 ref: 00FB30AE
                                              • Part of subcall function 00FB8B28: __getptd_noexit.LIBCMT ref: 00FB8B28
                                            • RtlAllocateHeap.NTDLL(00A90000,00000000,00000001,00000000,?,?,?,00FB0DD3,?), ref: 00FB575F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                            • String ID:
                                            • API String ID: 1372826849-0
                                            • Opcode ID: bb4a472b2dbc180b5e038051683934c6dbd8bb9d767e100a294467e864b51d48
                                            • Instruction ID: ecbf28fb3e25fd922761901568be7866bf2201ab5298ed16cd124a30ac710ebf
                                            • Opcode Fuzzy Hash: bb4a472b2dbc180b5e038051683934c6dbd8bb9d767e100a294467e864b51d48
                                            • Instruction Fuzzy Hash: 5F01D635740B0ADAD7103A7BEC42BEE77889B82BB1F200525F5059A181DE7D8801BF60
                                            APIs
                                            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00FF9548,?,?,?,?,?,00000004), ref: 00FF98BB
                                            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00FF9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00FF98D1
                                            • CloseHandle.KERNEL32(00000000,?,00FF9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00FF98D8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: File$CloseCreateHandleTime
                                            • String ID:
                                            • API String ID: 3397143404-0
                                            • Opcode ID: 50ef976ee2de616d5d275d31c65966be25bb40a3f01be302bade492d73ebc48e
                                            • Instruction ID: 31b9c9463c66e37a6cb373946c0159d2ebda18a67984cf9f009c8d3992661684
                                            • Opcode Fuzzy Hash: 50ef976ee2de616d5d275d31c65966be25bb40a3f01be302bade492d73ebc48e
                                            • Instruction Fuzzy Hash: 2EE08632180619B7D7311A94EC09FDA7B19AB06770F108210FB54690E0C7BA15159798
                                            APIs
                                            • _free.LIBCMT ref: 00FF8D1B
                                              • Part of subcall function 00FB2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00FB9A24), ref: 00FB2D69
                                              • Part of subcall function 00FB2D55: GetLastError.KERNEL32(00000000,?,00FB9A24), ref: 00FB2D7B
                                            • _free.LIBCMT ref: 00FF8D2C
                                            • _free.LIBCMT ref: 00FF8D3E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: e572bb3280820806cd63a499e0b551fb9ad7511d2bd2374f1c7be07920dd6c79
                                            • Instruction ID: afe4f02ecc32b845c377da47348d9996064709689d2a9572e4ffe6a1bf5cd3bc
                                            • Opcode Fuzzy Hash: e572bb3280820806cd63a499e0b551fb9ad7511d2bd2374f1c7be07920dd6c79
                                            • Instruction Fuzzy Hash: A8E012A1A1160546CB64A579AD40AEB63DC4F5C3A2714091DB90DD7196CE68F843A524
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: CALL
                                            • API String ID: 0-4196123274
                                            • Opcode ID: f6c4bb3b980a92b6f8fa010f888ee50655d3cc35c11a7ce8a7ee6d850e2f1b70
                                            • Instruction ID: c3680b3f8c4e683385e6975458650e9d61ae176208d44f4a02ec4daefea16cfe
                                            • Opcode Fuzzy Hash: f6c4bb3b980a92b6f8fa010f888ee50655d3cc35c11a7ce8a7ee6d850e2f1b70
                                            • Instruction Fuzzy Hash: 6D226871908301CFEB24DF14C490B6ABBE1BF85314F19895DE89A8B361DB35EC45EB82
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: EA06
                                            • API String ID: 4104443479-3962188686
                                            • Opcode ID: 56e4cff5fa353deb3c026ff7f332b3bc348bd30d1c1cff35742bc9f86f0be1e4
                                            • Instruction ID: 9dfc3d122bfdfc876b7b2c0be161e84b31b2c3ecdb3bd0e47f7f83dac428105f
                                            • Opcode Fuzzy Hash: 56e4cff5fa353deb3c026ff7f332b3bc348bd30d1c1cff35742bc9f86f0be1e4
                                            • Instruction Fuzzy Hash: E8419C36E041585BFF269B548C51FBF7BA29F25310F284476EC82DB282D624BD46B3A1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: 8787708196ce45b0a8645caae1a99237cce191730ca2271c137f8889e79cc621
                                            • Instruction ID: 019ff90dde9ffecada3605983855855f0aa6d6924971203d5c455676c2172c26
                                            • Opcode Fuzzy Hash: 8787708196ce45b0a8645caae1a99237cce191730ca2271c137f8889e79cc621
                                            • Instruction Fuzzy Hash: 8031A4B2714706AFDB04EF68C8D1E69B3A9FF483207158629E519CB291EB34E910DB90
                                            APIs
                                            • IsThemeActive.UXTHEME ref: 00F94834
                                              • Part of subcall function 00FB336C: __lock.LIBCMT ref: 00FB3372
                                              • Part of subcall function 00FB336C: DecodePointer.KERNEL32(00000001,?,00F94849,00FE7C74), ref: 00FB337E
                                              • Part of subcall function 00FB336C: EncodePointer.KERNEL32(?,?,00F94849,00FE7C74), ref: 00FB3389
                                              • Part of subcall function 00F948FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00F94915
                                              • Part of subcall function 00F948FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F9492A
                                              • Part of subcall function 00F93B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F93B68
                                              • Part of subcall function 00F93B3A: IsDebuggerPresent.KERNEL32 ref: 00F93B7A
                                              • Part of subcall function 00F93B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,010552F8,010552E0,?,?), ref: 00F93BEB
                                              • Part of subcall function 00F93B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00F93C6F
                                            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F94874
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                            • String ID:
                                            • API String ID: 1438897964-0
                                            • Opcode ID: 94edcc0d5a5ee3e84c50ce412e861928382455acefde49d197355449d1a9a565
                                            • Instruction ID: e65478de1e39bc15bbe45d8bf0e75928e507973df03c9b2143eaf2c95b7902d2
                                            • Opcode Fuzzy Hash: 94edcc0d5a5ee3e84c50ce412e861928382455acefde49d197355449d1a9a565
                                            • Instruction Fuzzy Hash: E8119D719183419BDB20EF29DC0590BBFE8FF99750F50451EF084832A1DBBA9549DB92
                                            APIs
                                              • Part of subcall function 00FB571C: __FF_MSGBANNER.LIBCMT ref: 00FB5733
                                              • Part of subcall function 00FB571C: __NMSG_WRITE.LIBCMT ref: 00FB573A
                                              • Part of subcall function 00FB571C: RtlAllocateHeap.NTDLL(00A90000,00000000,00000001,00000000,?,?,?,00FB0DD3,?), ref: 00FB575F
                                            • std::exception::exception.LIBCMT ref: 00FB0DEC
                                            • __CxxThrowException@8.LIBCMT ref: 00FB0E01
                                              • Part of subcall function 00FB859B: RaiseException.KERNEL32(?,?,?,01049E78,00000000,?,?,?,?,00FB0E06,?,01049E78,?,00000001), ref: 00FB85F0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                            • String ID:
                                            • API String ID: 3902256705-0
                                            • Opcode ID: b04e1948d6128ba2ae9b90c3fef4bbefb6d4b4cf125ddab4d1579bfc3ab37a86
                                            • Instruction ID: 9f71618f16fb4bb60447a1611e29bae4e790e1d06409fbaee8a92c9fa14cfc0d
                                            • Opcode Fuzzy Hash: b04e1948d6128ba2ae9b90c3fef4bbefb6d4b4cf125ddab4d1579bfc3ab37a86
                                            • Instruction Fuzzy Hash: 8FF0C83190031EA6CB24FAD7EC05ADF77AC9F05361F500469FD4496581DF74DA81EAD1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __lock_file_memset
                                            • String ID:
                                            • API String ID: 26237723-0
                                            • Opcode ID: dc3e7d03e054663b00b4f0becfab1b1d7646c0d7230214d973e895edd065bf25
                                            • Instruction ID: ae80c95752e1f248c29056f36f070a8929092c0d35304788f640fc5c0435959c
                                            • Opcode Fuzzy Hash: dc3e7d03e054663b00b4f0becfab1b1d7646c0d7230214d973e895edd065bf25
                                            • Instruction Fuzzy Hash: 1E018471C00608EBCF22BF6B9C026DE7B62AF91B61F544115B8145B151DB3D8A52FF91
                                            APIs
                                              • Part of subcall function 00FB8B28: __getptd_noexit.LIBCMT ref: 00FB8B28
                                            • __lock_file.LIBCMT ref: 00FB53EB
                                              • Part of subcall function 00FB6C11: __lock.LIBCMT ref: 00FB6C34
                                            • __fclose_nolock.LIBCMT ref: 00FB53F6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                            • String ID:
                                            • API String ID: 2800547568-0
                                            • Opcode ID: e54cd29fb37ac70eea732d51374d90da582ce3cddee2e9ecf68c6d057c22c313
                                            • Instruction ID: b3a78f55f07fd84e5286c734c5fbccba74cf03fa985fedb69bedc16999c8a700
                                            • Opcode Fuzzy Hash: e54cd29fb37ac70eea732d51374d90da582ce3cddee2e9ecf68c6d057c22c313
                                            • Instruction Fuzzy Hash: E5F09671900A04DADB20AF779C017ED7AE56F81BB5F288109A464AB2C1CBBC8942BF51
                                            APIs
                                              • Part of subcall function 00CC74E0: GetFileAttributesW.KERNELBASE(?), ref: 00CC74EB
                                            • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00CC7DBA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1454627695.0000000000CC6000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CC6000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_cc6000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AttributesCreateDirectoryFile
                                            • String ID:
                                            • API String ID: 3401506121-0
                                            • Opcode ID: 26aa2882343acbdd13f4ce047db1bb3cf9ed750fa7c2be8ed5ce14674562866c
                                            • Instruction ID: 5aa190da1d7bbeb997211aa40b6bf7fe9f6ab6bc6b59961d3de475b7383c7dbd
                                            • Opcode Fuzzy Hash: 26aa2882343acbdd13f4ce047db1bb3cf9ed750fa7c2be8ed5ce14674562866c
                                            • Instruction Fuzzy Hash: 99518531A1420996DF14EFA0C844FEE733AEF58700F00466CF509EB290EB799B45CBA5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                            • Instruction ID: 0c70f8a1212a049b1ef5c652a719371ae5c3c9185729f6d582c92634c9239685
                                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                            • Instruction Fuzzy Hash: 5331D9B5A001059FC718DF5AC484AAAFBA5FB59310B648795E40ACB351DB31EDC1EFC0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ClearVariant
                                            • String ID:
                                            • API String ID: 1473721057-0
                                            • Opcode ID: d449f72c57d1c48ee6e46a304de900083c30bddf3be901796233b1970524be40
                                            • Instruction ID: 4f20e816a9d34e7c4fd8eccba37b70a5053e88e7d9ad682d85383f7f5349c426
                                            • Opcode Fuzzy Hash: d449f72c57d1c48ee6e46a304de900083c30bddf3be901796233b1970524be40
                                            • Instruction Fuzzy Hash: 18410874904341CFEB14DF18C484B1ABBE1BF45314F09889CE8998B362C735E845DF92
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: eb3470f4d275a3dd121c03c889a9296ecadafece5111e3b4333d9393b5004e34
                                            • Instruction ID: b507b567f6f8d33a5df2ad6fdaa0062d2b1417e98d4f667e1156e544d9c119e7
                                            • Opcode Fuzzy Hash: eb3470f4d275a3dd121c03c889a9296ecadafece5111e3b4333d9393b5004e34
                                            • Instruction Fuzzy Hash: 1E213872A1470AEBDF249F16ED82BAE7BB4FB54350F20846DE485C5094EB31D190E705
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 25aca5201f14aa7f9276b2b245522c22aef7c229ef520d6bc427b361eae3eb74
                                            • Instruction ID: ae5facff06426e86ed270f1981f69a41640c7890534f2957ec7330a50ed8a89d
                                            • Opcode Fuzzy Hash: 25aca5201f14aa7f9276b2b245522c22aef7c229ef520d6bc427b361eae3eb74
                                            • Instruction Fuzzy Hash: 2E21C636009282AFE313973498829E7BF95DF83224B1884EEECC657866CA705847CB91
                                            APIs
                                              • Part of subcall function 00F94BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00F94BEF
                                              • Part of subcall function 00FB525B: __wfsopen.LIBCMT ref: 00FB5266
                                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,010552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F94E0F
                                              • Part of subcall function 00F94B6A: FreeLibrary.KERNEL32(00000000), ref: 00F94BA4
                                              • Part of subcall function 00F94C70: _memmove.LIBCMT ref: 00F94CBA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Library$Free$Load__wfsopen_memmove
                                            • String ID:
                                            • API String ID: 1396898556-0
                                            • Opcode ID: 3eb0f4322b3e0cc5308f0b16061e219acbf1fd0e69f922957ecc8cfe3bdda17e
                                            • Instruction ID: be18b1a874224796c23530eccb068f1ea1c7073a45c9c016d4f791d788ba2f32
                                            • Opcode Fuzzy Hash: 3eb0f4322b3e0cc5308f0b16061e219acbf1fd0e69f922957ecc8cfe3bdda17e
                                            • Instruction Fuzzy Hash: F2110632A00206ABEF14FF70CC52FAD77A8AF94710F10882DF541A7181DB79AE06BB50
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ClearVariant
                                            • String ID:
                                            • API String ID: 1473721057-0
                                            • Opcode ID: acbbdfb32fd45d51d810f651cf9d54f00b17b561cbac762acacedfbe37bb8dc6
                                            • Instruction ID: 5616f7f908b6b13761bf3429ab5e3a293c61a594c601d324346dc924978974dd
                                            • Opcode Fuzzy Hash: acbbdfb32fd45d51d810f651cf9d54f00b17b561cbac762acacedfbe37bb8dc6
                                            • Instruction Fuzzy Hash: A52113B4908302DFDB14DF64C844B1ABBE1BF88314F05896CE98A57722D735E809EB92
                                            APIs
                                            • __lock_file.LIBCMT ref: 00FB48A6
                                              • Part of subcall function 00FB8B28: __getptd_noexit.LIBCMT ref: 00FB8B28
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __getptd_noexit__lock_file
                                            • String ID:
                                            • API String ID: 2597487223-0
                                            • Opcode ID: 67a3c6f3b8b16baf55024c7e27c7795bf6e6b1ad4d6f82f6cdbe97aaa5bf4b1b
                                            • Instruction ID: 45b9327290abb3244f620505614ed6b3ced9b9f94d05eeaa666acb0e86c7a2f6
                                            • Opcode Fuzzy Hash: 67a3c6f3b8b16baf55024c7e27c7795bf6e6b1ad4d6f82f6cdbe97aaa5bf4b1b
                                            • Instruction Fuzzy Hash: 66F0FF31900208ABDF11AFB2CD063EE36A5AF40326F148418B4209A182CB7CC952FF51
                                            APIs
                                            • FreeLibrary.KERNEL32(?,?,010552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F94E7E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: FreeLibrary
                                            • String ID:
                                            • API String ID: 3664257935-0
                                            • Opcode ID: d8a3761fa9aa3ce08b22aba1a5f45ccfdec4287c63588ea277ce04a027c20a83
                                            • Instruction ID: 74fc6f1a295f07ab6686748f318033e3f3cdd23beeca3dff1cc2b887100b6b0a
                                            • Opcode Fuzzy Hash: d8a3761fa9aa3ce08b22aba1a5f45ccfdec4287c63588ea277ce04a027c20a83
                                            • Instruction Fuzzy Hash: B4F03971901712CFEF34AF64E494C16BBE1BF243393248A3EE1D682610C776A885EF40
                                            APIs
                                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FB07B0
                                              • Part of subcall function 00F97BCC: _memmove.LIBCMT ref: 00F97C06
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: LongNamePath_memmove
                                            • String ID:
                                            • API String ID: 2514874351-0
                                            • Opcode ID: 1a22dcff03a3ea6c6fec8934afdf26990aa43042ee9c33e8848fdcfb4f974d44
                                            • Instruction ID: b3b8bbcdbb2c84bc0a5ac3ef98f36c36eb6ec9b4db85424f563d63c6213a0f65
                                            • Opcode Fuzzy Hash: 1a22dcff03a3ea6c6fec8934afdf26990aa43042ee9c33e8848fdcfb4f974d44
                                            • Instruction Fuzzy Hash: 45E0863690422957C720A5589C06FEA779DDB896A0F0441B5FC08D7209D9699C908690
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __fread_nolock
                                            • String ID:
                                            • API String ID: 2638373210-0
                                            • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                            • Instruction ID: e451eaa41649b7f0a7a75ecef5d69487577859b11a62d1f25b9dd4fa05131d90
                                            • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                            • Instruction Fuzzy Hash: 0DE092B1504B045BDB388A24DC00BE373E1AF09315F04081DF2AA83252EB6278429B59
                                            APIs
                                            • GetFileAttributesW.KERNELBASE(?), ref: 00CC74EB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1454627695.0000000000CC6000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CC6000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_cc6000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                            • Instruction ID: e9fb22333d24f22bdd4caddc71c81bf31cf004f974e0390126886b3b72c3bc72
                                            • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                            • Instruction Fuzzy Hash: 22E08C30A09208EBCB25CAB8CC08FE977A8E706320F104B59E816C3280D5308E41AF14
                                            APIs
                                            • GetFileAttributesW.KERNELBASE(?), ref: 00CC74BB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1454627695.0000000000CC6000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CC6000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_cc6000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                            • Instruction ID: faaca91ae90bbeb98c5d57173d81663206a130b7df944343fe3aed4de66ba4c0
                                            • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                            • Instruction Fuzzy Hash: B8D0A73190920CEBCB10CFB4DD04EDA77A8D714321F104798FD15C3280D6319E409F50
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __wfsopen
                                            • String ID:
                                            • API String ID: 197181222-0
                                            • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                            • Instruction ID: 5a9bf8b470b75ed488a3fb52de82c8f8663c4c4ea96519a19f4525d6f0398088
                                            • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                            • Instruction Fuzzy Hash: C4B0927644020C77CE022A82EC02B893B199B42B64F408020FB0C18162A67BAA64AA89
                                            APIs
                                            • Sleep.KERNELBASE(000001F4), ref: 00CC8EC1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1454627695.0000000000CC6000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CC6000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_cc6000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Sleep
                                            • String ID:
                                            • API String ID: 3472027048-0
                                            • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                            • Instruction ID: 86eca9e0d0d3abea0b9d4fe6eba5345801a442044c5c678fda24de03b6ed288d
                                            • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                            • Instruction Fuzzy Hash: 99E0BF7494010DEFDB00EFA4D5496DE7BB4EF04301F1005A5FD05D7680DB309E548A62
                                            APIs
                                            • Sleep.KERNELBASE(000001F4), ref: 00CC8EC1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1454627695.0000000000CC6000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CC6000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_cc6000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Sleep
                                            • String ID:
                                            • API String ID: 3472027048-0
                                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                            • Instruction ID: 1f16737d52a25f5e7a3e51d1f5d0118a0f087ce044a81b883dc485e93d122886
                                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                            • Instruction Fuzzy Hash: 1EE0E67494010DDFDB00EFB4D54969F7FB4EF04301F1001A5FD01D2280DA309D548A62
                                            APIs
                                              • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0101CB37
                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0101CB95
                                            • GetWindowLongW.USER32(?,000000F0), ref: 0101CBD6
                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0101CC00
                                            • SendMessageW.USER32 ref: 0101CC29
                                            • _wcsncpy.LIBCMT ref: 0101CC95
                                            • GetKeyState.USER32(00000011), ref: 0101CCB6
                                            • GetKeyState.USER32(00000009), ref: 0101CCC3
                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0101CCD9
                                            • GetKeyState.USER32(00000010), ref: 0101CCE3
                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0101CD0C
                                            • SendMessageW.USER32 ref: 0101CD33
                                            • SendMessageW.USER32(?,00001030,?,0101B348), ref: 0101CE37
                                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0101CE4D
                                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0101CE60
                                            • SetCapture.USER32(?), ref: 0101CE69
                                            • ClientToScreen.USER32(?,?), ref: 0101CECE
                                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0101CEDB
                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0101CEF5
                                            • ReleaseCapture.USER32 ref: 0101CF00
                                            • GetCursorPos.USER32(?), ref: 0101CF3A
                                            • ScreenToClient.USER32(?,?), ref: 0101CF47
                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0101CFA3
                                            • SendMessageW.USER32 ref: 0101CFD1
                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0101D00E
                                            • SendMessageW.USER32 ref: 0101D03D
                                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0101D05E
                                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0101D06D
                                            • GetCursorPos.USER32(?), ref: 0101D08D
                                            • ScreenToClient.USER32(?,?), ref: 0101D09A
                                            • GetParent.USER32(?), ref: 0101D0BA
                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0101D123
                                            • SendMessageW.USER32 ref: 0101D154
                                            • ClientToScreen.USER32(?,?), ref: 0101D1B2
                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0101D1E2
                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0101D20C
                                            • SendMessageW.USER32 ref: 0101D22F
                                            • ClientToScreen.USER32(?,?), ref: 0101D281
                                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0101D2B5
                                              • Part of subcall function 00F925DB: GetWindowLongW.USER32(?,000000EB), ref: 00F925EC
                                            • GetWindowLongW.USER32(?,000000F0), ref: 0101D351
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                            • String ID: @GUI_DRAGID$F
                                            • API String ID: 3977979337-4164748364
                                            • Opcode ID: 012f77758d58a808364537e6da6bc87374d070f73fdbdf91c70c5c0e775e33fb
                                            • Instruction ID: aaacc1bd164890f22f864d93e9fbdf4ff2821c9183d77f3801f9781315457f25
                                            • Opcode Fuzzy Hash: 012f77758d58a808364537e6da6bc87374d070f73fdbdf91c70c5c0e775e33fb
                                            • Instruction Fuzzy Hash: C942BF34104341AFEB21CF28C988AAABFE5FF48350F040959F6D5D72A9C73AE854EB51
                                            APIs
                                            • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 010184D0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: %d/%02d/%02d
                                            • API String ID: 3850602802-328681919
                                            • Opcode ID: 1ce63ce3515f46b08ca3fd3bff0b1a30375881e4f198968cd6faeab0afff4f18
                                            • Instruction ID: b6f70ef650c83a21dac6aa1d700c35609126bbcf5bc3dc9e4ee109e29fd775e2
                                            • Opcode Fuzzy Hash: 1ce63ce3515f46b08ca3fd3bff0b1a30375881e4f198968cd6faeab0afff4f18
                                            • Instruction Fuzzy Hash: E112D271500205ABEB258F68CC49FAF7BE4EF49310F10865EF995EA2D9DF789A41CB10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memmove$_memset
                                            • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                            • API String ID: 1357608183-1798697756
                                            • Opcode ID: edbaabd6eb7288ffacba7420e27496a73e94aa15257d5412e971dd4e362ea666
                                            • Instruction ID: 81888f4c74955fbaa649f8554ecaf5222b70a0b2428751d9e57fd2ce1d051581
                                            • Opcode Fuzzy Hash: edbaabd6eb7288ffacba7420e27496a73e94aa15257d5412e971dd4e362ea666
                                            • Instruction Fuzzy Hash: 8993B371E00259DFDB24CF59C885BADB7B1FF48320F25816AE945EB281E7749E81EB40
                                            APIs
                                            • GetForegroundWindow.USER32(00000000,?), ref: 00F948DF
                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FCD665
                                            • IsIconic.USER32(?), ref: 00FCD66E
                                            • ShowWindow.USER32(?,00000009), ref: 00FCD67B
                                            • SetForegroundWindow.USER32(?), ref: 00FCD685
                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00FCD69B
                                            • GetCurrentThreadId.KERNEL32 ref: 00FCD6A2
                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FCD6AE
                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 00FCD6BF
                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 00FCD6C7
                                            • AttachThreadInput.USER32(00000000,?,00000001), ref: 00FCD6CF
                                            • SetForegroundWindow.USER32(?), ref: 00FCD6D2
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FCD6E7
                                            • keybd_event.USER32(00000012,00000000), ref: 00FCD6F2
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FCD6FC
                                            • keybd_event.USER32(00000012,00000000), ref: 00FCD701
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FCD70A
                                            • keybd_event.USER32(00000012,00000000), ref: 00FCD70F
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FCD719
                                            • keybd_event.USER32(00000012,00000000), ref: 00FCD71E
                                            • SetForegroundWindow.USER32(?), ref: 00FCD721
                                            • AttachThreadInput.USER32(?,?,00000000), ref: 00FCD748
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                            • String ID: Shell_TrayWnd
                                            • API String ID: 4125248594-2988720461
                                            • Opcode ID: 98c9f30c7416a17e0424772f3c8678e533db5f1ccec60bf7332cc5baae0ed2c6
                                            • Instruction ID: 013d39b3d26b53419a4b5c9e2f700c07c6a53c2c8553715856af6562e7057f36
                                            • Opcode Fuzzy Hash: 98c9f30c7416a17e0424772f3c8678e533db5f1ccec60bf7332cc5baae0ed2c6
                                            • Instruction Fuzzy Hash: 6C315571A403197BEB305FA19C4AF7F7E6CEB44B60F104029FA04EA1C1D6B95901ABA1
                                            APIs
                                              • Part of subcall function 00FE87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FE882B
                                              • Part of subcall function 00FE87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FE8858
                                              • Part of subcall function 00FE87E1: GetLastError.KERNEL32 ref: 00FE8865
                                            • _memset.LIBCMT ref: 00FE8353
                                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00FE83A5
                                            • CloseHandle.KERNEL32(?), ref: 00FE83B6
                                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00FE83CD
                                            • GetProcessWindowStation.USER32 ref: 00FE83E6
                                            • SetProcessWindowStation.USER32(00000000), ref: 00FE83F0
                                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00FE840A
                                              • Part of subcall function 00FE81CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FE8309), ref: 00FE81E0
                                              • Part of subcall function 00FE81CB: CloseHandle.KERNEL32(?,?,00FE8309), ref: 00FE81F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                            • String ID: $default$winsta0
                                            • API String ID: 2063423040-1027155976
                                            • Opcode ID: 2f66bd5b55a638163c3d8e7d9da5243a8d5a66dd0495556a33fe762df671e8d7
                                            • Instruction ID: 2e809cb817feea119f0c2279013470da71103af8f31ba71a5d1530c3e6f75a4f
                                            • Opcode Fuzzy Hash: 2f66bd5b55a638163c3d8e7d9da5243a8d5a66dd0495556a33fe762df671e8d7
                                            • Instruction Fuzzy Hash: 87818C71D00289AFDF11EFA5CC45AEE7B78FF08364F184159F919A6160DB398E16EB20
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?), ref: 00FFC78D
                                            • FindClose.KERNEL32(00000000), ref: 00FFC7E1
                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FFC806
                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FFC81D
                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00FFC844
                                            • __swprintf.LIBCMT ref: 00FFC890
                                            • __swprintf.LIBCMT ref: 00FFC8D3
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                            • __swprintf.LIBCMT ref: 00FFC927
                                              • Part of subcall function 00FB3698: __woutput_l.LIBCMT ref: 00FB36F1
                                            • __swprintf.LIBCMT ref: 00FFC975
                                              • Part of subcall function 00FB3698: __flsbuf.LIBCMT ref: 00FB3713
                                              • Part of subcall function 00FB3698: __flsbuf.LIBCMT ref: 00FB372B
                                            • __swprintf.LIBCMT ref: 00FFC9C4
                                            • __swprintf.LIBCMT ref: 00FFCA13
                                            • __swprintf.LIBCMT ref: 00FFCA62
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                            • API String ID: 3953360268-2428617273
                                            • Opcode ID: 3c88469a2cf5bd450aa21bd392fe85a2233c29cd19a2048a991d9736907ec9da
                                            • Instruction ID: 8223dd46aa106020ba9e84b9b1883878ab8d28598a18018e342faf20d255a5e3
                                            • Opcode Fuzzy Hash: 3c88469a2cf5bd450aa21bd392fe85a2233c29cd19a2048a991d9736907ec9da
                                            • Instruction Fuzzy Hash: D1A13CB1408305ABDB11EFA5CC86DAFB7ECEF99700F40091DF585C6151EA79EA08DB62
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 00FFEFB6
                                            • _wcscmp.LIBCMT ref: 00FFEFCB
                                            • _wcscmp.LIBCMT ref: 00FFEFE2
                                            • GetFileAttributesW.KERNEL32(?), ref: 00FFEFF4
                                            • SetFileAttributesW.KERNEL32(?,?), ref: 00FFF00E
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00FFF026
                                            • FindClose.KERNEL32(00000000), ref: 00FFF031
                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00FFF04D
                                            • _wcscmp.LIBCMT ref: 00FFF074
                                            • _wcscmp.LIBCMT ref: 00FFF08B
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFF09D
                                            • SetCurrentDirectoryW.KERNEL32(01048920), ref: 00FFF0BB
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FFF0C5
                                            • FindClose.KERNEL32(00000000), ref: 00FFF0D2
                                            • FindClose.KERNEL32(00000000), ref: 00FFF0E4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                            • String ID: *.*
                                            • API String ID: 1803514871-438819550
                                            • Opcode ID: d907ce548a2ce0abc9ef08934ab64649be325129ccb755b2309b30fb52a819ed
                                            • Instruction ID: 8cca3ee95f068e459582005087b59ab1186a65d66bf11143a057649c44dc703e
                                            • Opcode Fuzzy Hash: d907ce548a2ce0abc9ef08934ab64649be325129ccb755b2309b30fb52a819ed
                                            • Instruction Fuzzy Hash: 5131E53290020E7BDB24DAA5DC48AEE77AC9F44360F144166E944E20A1EF79DE48EB51
                                            APIs
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01010953
                                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,0101F910,00000000,?,00000000,?,?), ref: 010109C1
                                            • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 01010A09
                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 01010A92
                                            • RegCloseKey.ADVAPI32(?), ref: 01010DB2
                                            • RegCloseKey.ADVAPI32(00000000), ref: 01010DBF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Close$ConnectCreateRegistryValue
                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                            • API String ID: 536824911-966354055
                                            • Opcode ID: 386347e90ff3e09859566fdd288d340d3d5a6cf9f795993415f7bee2f794ca9b
                                            • Instruction ID: 3917bf50e1a60d20b2a876cec665e791be298a2d434f9151a2b55497ba74f2e4
                                            • Opcode Fuzzy Hash: 386347e90ff3e09859566fdd288d340d3d5a6cf9f795993415f7bee2f794ca9b
                                            • Instruction Fuzzy Hash: D202AB756046019FDB54EF28C881E2AB7E5FF89324F05845CF88A9B366DB38ED45CB81
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 00FFF113
                                            • _wcscmp.LIBCMT ref: 00FFF128
                                            • _wcscmp.LIBCMT ref: 00FFF13F
                                              • Part of subcall function 00FF4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00FF43A0
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00FFF16E
                                            • FindClose.KERNEL32(00000000), ref: 00FFF179
                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00FFF195
                                            • _wcscmp.LIBCMT ref: 00FFF1BC
                                            • _wcscmp.LIBCMT ref: 00FFF1D3
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFF1E5
                                            • SetCurrentDirectoryW.KERNEL32(01048920), ref: 00FFF203
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FFF20D
                                            • FindClose.KERNEL32(00000000), ref: 00FFF21A
                                            • FindClose.KERNEL32(00000000), ref: 00FFF22C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                            • String ID: *.*
                                            • API String ID: 1824444939-438819550
                                            • Opcode ID: 78f1bdaaaa945c7b4dc7b8e3ee5a86a8a9ca67445e2e311b804340095342507e
                                            • Instruction ID: 765be931eed324b033c92c2574c17948f95ab3d50e6a3a84a1c6ea000817d092
                                            • Opcode Fuzzy Hash: 78f1bdaaaa945c7b4dc7b8e3ee5a86a8a9ca67445e2e311b804340095342507e
                                            • Instruction Fuzzy Hash: 7C31053690061E7ADB20EEA0EC48AEE77AC9F45370F1441A5E940E21A0DB79DE49EF54
                                            APIs
                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00FFA20F
                                            • __swprintf.LIBCMT ref: 00FFA231
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FFA26E
                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00FFA293
                                            • _memset.LIBCMT ref: 00FFA2B2
                                            • _wcsncpy.LIBCMT ref: 00FFA2EE
                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00FFA323
                                            • CloseHandle.KERNEL32(00000000), ref: 00FFA32E
                                            • RemoveDirectoryW.KERNEL32(?), ref: 00FFA337
                                            • CloseHandle.KERNEL32(00000000), ref: 00FFA341
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                            • String ID: :$\$\??\%s
                                            • API String ID: 2733774712-3457252023
                                            • Opcode ID: 48364dbd0a3ab87ad01885fedfdf31824c6a7978d128e2bfe093266f2e1f26ff
                                            • Instruction ID: a0f6793156c2cd13863ede1169085f8fbf2121ef0574592e42743099d906c3bf
                                            • Opcode Fuzzy Hash: 48364dbd0a3ab87ad01885fedfdf31824c6a7978d128e2bfe093266f2e1f26ff
                                            • Instruction Fuzzy Hash: BC31D4B190010AABDB20DFA0DC49FFB37BCEF89750F1041B6FA08D2160E77996449B25
                                            APIs
                                              • Part of subcall function 00FE8202: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FE821E
                                              • Part of subcall function 00FE8202: GetLastError.KERNEL32(?,00FE7CE2,?,?,?), ref: 00FE8228
                                              • Part of subcall function 00FE8202: GetProcessHeap.KERNEL32(00000008,?,?,00FE7CE2,?,?,?), ref: 00FE8237
                                              • Part of subcall function 00FE8202: HeapAlloc.KERNEL32(00000000,?,00FE7CE2,?,?,?), ref: 00FE823E
                                              • Part of subcall function 00FE8202: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FE8255
                                              • Part of subcall function 00FE829F: GetProcessHeap.KERNEL32(00000008,00FE7CF8,00000000,00000000,?,00FE7CF8,?), ref: 00FE82AB
                                              • Part of subcall function 00FE829F: HeapAlloc.KERNEL32(00000000,?,00FE7CF8,?), ref: 00FE82B2
                                              • Part of subcall function 00FE829F: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00FE7CF8,?), ref: 00FE82C3
                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00FE7D13
                                            • _memset.LIBCMT ref: 00FE7D28
                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00FE7D47
                                            • GetLengthSid.ADVAPI32(?), ref: 00FE7D58
                                            • GetAce.ADVAPI32(?,00000000,?), ref: 00FE7D95
                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00FE7DB1
                                            • GetLengthSid.ADVAPI32(?), ref: 00FE7DCE
                                            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00FE7DDD
                                            • HeapAlloc.KERNEL32(00000000), ref: 00FE7DE4
                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00FE7E05
                                            • CopySid.ADVAPI32(00000000), ref: 00FE7E0C
                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00FE7E3D
                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00FE7E63
                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00FE7E77
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                            • String ID:
                                            • API String ID: 3996160137-0
                                            • Opcode ID: edb737e2ed0da32b0bc0797554059b38d4ee1e292fbeb538035bd8ee71b5d69d
                                            • Instruction ID: b9648694b66a064a839d42e6e2a3b262dfcb9c872a8a0cf78589efb05ff8a1df
                                            • Opcode Fuzzy Hash: edb737e2ed0da32b0bc0797554059b38d4ee1e292fbeb538035bd8ee71b5d69d
                                            • Instruction Fuzzy Hash: B2616D7190024AAFDF11EFA1DC44AEEBBB9FF04310F048259F955A7280DB399E05DB60
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                            • API String ID: 0-4052911093
                                            • Opcode ID: 2a582847b337ed47a2ca195330526bc0436862c58f35ac6132fa6b5e6422a1bd
                                            • Instruction ID: 1a3a1d109daf15b2a78c88fbd96d83a894a94cbd330e0bfc4d228674cea05c68
                                            • Opcode Fuzzy Hash: 2a582847b337ed47a2ca195330526bc0436862c58f35ac6132fa6b5e6422a1bd
                                            • Instruction Fuzzy Hash: 967293B5E00259CBDF24CF5AC8807AEB7B5FF49320F14816AE845EB290DB349D41EB90
                                            APIs
                                            • GetKeyboardState.USER32(?), ref: 00FF0097
                                            • SetKeyboardState.USER32(?), ref: 00FF0102
                                            • GetAsyncKeyState.USER32(000000A0), ref: 00FF0122
                                            • GetKeyState.USER32(000000A0), ref: 00FF0139
                                            • GetAsyncKeyState.USER32(000000A1), ref: 00FF0168
                                            • GetKeyState.USER32(000000A1), ref: 00FF0179
                                            • GetAsyncKeyState.USER32(00000011), ref: 00FF01A5
                                            • GetKeyState.USER32(00000011), ref: 00FF01B3
                                            • GetAsyncKeyState.USER32(00000012), ref: 00FF01DC
                                            • GetKeyState.USER32(00000012), ref: 00FF01EA
                                            • GetAsyncKeyState.USER32(0000005B), ref: 00FF0213
                                            • GetKeyState.USER32(0000005B), ref: 00FF0221
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: State$Async$Keyboard
                                            • String ID:
                                            • API String ID: 541375521-0
                                            • Opcode ID: 4787bbd232433c33e3c2f0353a27ba10bd313d8dc4233f1ba8680c90875dcf39
                                            • Instruction ID: 2cbc60ae9f1b1e5b49e0d045b2bb8196d766b412e2ff7deeb06d82a0fd336a96
                                            • Opcode Fuzzy Hash: 4787bbd232433c33e3c2f0353a27ba10bd313d8dc4233f1ba8680c90875dcf39
                                            • Instruction Fuzzy Hash: EC51E730D0478C29FB35DBA089547BABFB49F01390F08459A97C2561D3DEA89B8CE761
                                            APIs
                                              • Part of subcall function 01010E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0100FDAD,?,?), ref: 01010E31
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 010104AC
                                              • Part of subcall function 00F99837: __itow.LIBCMT ref: 00F99862
                                              • Part of subcall function 00F99837: __swprintf.LIBCMT ref: 00F998AC
                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0101054B
                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 010105E3
                                            • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 01010822
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0101082F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                            • String ID:
                                            • API String ID: 1240663315-0
                                            • Opcode ID: 59b999b60a6ed9094cad2d3fdfcdffb7291470ef8507d98ee0c5baa164ec7d88
                                            • Instruction ID: 8579c2221e9a46423867f29d41432fc3e61953112b521fa5598bce7418199eb0
                                            • Opcode Fuzzy Hash: 59b999b60a6ed9094cad2d3fdfcdffb7291470ef8507d98ee0c5baa164ec7d88
                                            • Instruction Fuzzy Hash: E2E17070604204AFDB15DF28C885E2BBBE4FF89314F04896DF889DB265DB39E945CB91
                                            APIs
                                              • Part of subcall function 00F99837: __itow.LIBCMT ref: 00F99862
                                              • Part of subcall function 00F99837: __swprintf.LIBCMT ref: 00F998AC
                                            • CoInitialize.OLE32 ref: 01008403
                                            • CoUninitialize.OLE32 ref: 0100840E
                                            • CoCreateInstance.OLE32(?,00000000,00000017,01022BEC,?), ref: 0100846E
                                            • IIDFromString.OLE32(?,?), ref: 010084E1
                                            • VariantInit.OLEAUT32(?), ref: 0100857B
                                            • VariantClear.OLEAUT32(?), ref: 010085DC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                            • API String ID: 834269672-1287834457
                                            • Opcode ID: 867d67ac239ebc92e4265d84b6f8abb8932ea3f1bba1d33965e736f99eba90d5
                                            • Instruction ID: c5955d10366c56a642df55483b5b4473af570e6d2d3ddacb12c83da6bf555730
                                            • Opcode Fuzzy Hash: 867d67ac239ebc92e4265d84b6f8abb8932ea3f1bba1d33965e736f99eba90d5
                                            • Instruction Fuzzy Hash: 4361CF70A083119FE712DF18C848B5EBBE8BF45714F04845EF9C19B291CB75E948CB92
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                            • String ID:
                                            • API String ID: 1737998785-0
                                            • Opcode ID: c67d9b1bc7819fc8187fcc46b5a6a41611c5d5dc66af3fc7cf66d3b77a934227
                                            • Instruction ID: 1f767bab4ed993789f946a4d55c7b059018fcf80de2e3cde8ff6090667a38904
                                            • Opcode Fuzzy Hash: c67d9b1bc7819fc8187fcc46b5a6a41611c5d5dc66af3fc7cf66d3b77a934227
                                            • Instruction Fuzzy Hash: B521B5353002119FEB21AF64DC09B6E7BA8FF49750F048019F9C5DB2A6DB7DA800CB54
                                            APIs
                                              • Part of subcall function 00F94750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F94743,?,?,00F937AE,?), ref: 00F94770
                                              • Part of subcall function 00FF4A31: GetFileAttributesW.KERNEL32(?,00FF370B), ref: 00FF4A32
                                            • FindFirstFileW.KERNEL32(?,?), ref: 00FF38A3
                                            • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00FF394B
                                            • MoveFileW.KERNEL32(?,?), ref: 00FF395E
                                            • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00FF397B
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FF399D
                                            • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00FF39B9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                            • String ID: \*.*
                                            • API String ID: 4002782344-1173974218
                                            • Opcode ID: 1bfd76763ecf03d00f5da0d336183459158d7ceed1739a71ceeeb51ff2693561
                                            • Instruction ID: a3c5cb83cfdf78a58a8cd8225d64c5fcf761fe3c34977bd74854daca7b88ea5d
                                            • Opcode Fuzzy Hash: 1bfd76763ecf03d00f5da0d336183459158d7ceed1739a71ceeeb51ff2693561
                                            • Instruction Fuzzy Hash: BF51AC31C0524DAADF11FBA0CD929FEB779AF10310F600069E402B71A1EB696F0DEB61
                                            APIs
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                            • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00FFF440
                                            • Sleep.KERNEL32(0000000A), ref: 00FFF470
                                            • _wcscmp.LIBCMT ref: 00FFF484
                                            • _wcscmp.LIBCMT ref: 00FFF49F
                                            • FindNextFileW.KERNEL32(?,?), ref: 00FFF53D
                                            • FindClose.KERNEL32(00000000), ref: 00FFF553
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                            • String ID: *.*
                                            • API String ID: 713712311-438819550
                                            • Opcode ID: d6f2b6f36d3d489e64e2a9b79431cae2a0be4cf2b8fc1c5cdd899399f650ff63
                                            • Instruction ID: 75f13333284c7198772be2786c58ba5145ec30405e39d3dbb200a75777eb3eed
                                            • Opcode Fuzzy Hash: d6f2b6f36d3d489e64e2a9b79431cae2a0be4cf2b8fc1c5cdd899399f650ff63
                                            • Instruction Fuzzy Hash: 54417D71C0020E9BDF14EF64DC45AFEBBB4FF05320F184466E919A61A0EB349A48EF50
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: e2e3f10cb16f40e5a15c0fdfba2feb7780816a3c0ad4f0de00345e60f5023e8e
                                            • Instruction ID: 2376763a8d21c3f4cafb2418d3ff770ac472f95c6d6366d8818025e2d4d3080c
                                            • Opcode Fuzzy Hash: e2e3f10cb16f40e5a15c0fdfba2feb7780816a3c0ad4f0de00345e60f5023e8e
                                            • Instruction Fuzzy Hash: 2D129CB0A00609DFDF14DFA6D981AEEB7F5FF48310F104529E846E7290EB39A951EB50
                                            APIs
                                              • Part of subcall function 00F94750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F94743,?,?,00F937AE,?), ref: 00F94770
                                              • Part of subcall function 00FF4A31: GetFileAttributesW.KERNEL32(?,00FF370B), ref: 00FF4A32
                                            • FindFirstFileW.KERNEL32(?,?), ref: 00FF3B89
                                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 00FF3BD9
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FF3BEA
                                            • FindClose.KERNEL32(00000000), ref: 00FF3C01
                                            • FindClose.KERNEL32(00000000), ref: 00FF3C0A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                            • String ID: \*.*
                                            • API String ID: 2649000838-1173974218
                                            • Opcode ID: bca4dae1a9cebd7048eb5a898bef853834ab7f7c821d51fdcbfa284a5f652dea
                                            • Instruction ID: 26454fc1718366e7535593dee88b0c8efe953525e4c3ac3a64f77f84bd8285ba
                                            • Opcode Fuzzy Hash: bca4dae1a9cebd7048eb5a898bef853834ab7f7c821d51fdcbfa284a5f652dea
                                            • Instruction Fuzzy Hash: D9319A314083899BD701FF64D8918BFB7E8AE91314F404E1DF5D5921A1EB29DA0DEBA3
                                            APIs
                                              • Part of subcall function 00FE87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FE882B
                                              • Part of subcall function 00FE87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FE8858
                                              • Part of subcall function 00FE87E1: GetLastError.KERNEL32 ref: 00FE8865
                                            • ExitWindowsEx.USER32(?,00000000), ref: 00FF51F9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                            • String ID: $@$SeShutdownPrivilege
                                            • API String ID: 2234035333-194228
                                            • Opcode ID: 3481a99ff43ccfc438000b5133ba27bbd33032e78863fdf1be084613be301293
                                            • Instruction ID: f40e70551fc355214bea56ae437f8dac7a35eb4e8b35bbb2c685759a5a6f2690
                                            • Opcode Fuzzy Hash: 3481a99ff43ccfc438000b5133ba27bbd33032e78863fdf1be084613be301293
                                            • Instruction Fuzzy Hash: 0B017031B9161A5BF73861649C8AFB77258EF05B50F240664FB47E20E1DA551C056190
                                            APIs
                                            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 010062DC
                                            • WSAGetLastError.WSOCK32(00000000), ref: 010062EB
                                            • bind.WSOCK32(00000000,?,00000010), ref: 01006307
                                            • listen.WSOCK32(00000000,00000005), ref: 01006316
                                            • WSAGetLastError.WSOCK32(00000000), ref: 01006330
                                            • closesocket.WSOCK32(00000000,00000000), ref: 01006344
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ErrorLast$bindclosesocketlistensocket
                                            • String ID:
                                            • API String ID: 1279440585-0
                                            • Opcode ID: 006fc466b4caa74e73cae7775cb3a66c25ba4638a58214139f9a9b6cf3240556
                                            • Instruction ID: c4793b1080a0f8563cb9b58d5c1cb8822296763d25ad93391c584513587c753c
                                            • Opcode Fuzzy Hash: 006fc466b4caa74e73cae7775cb3a66c25ba4638a58214139f9a9b6cf3240556
                                            • Instruction Fuzzy Hash: 2321DB302002059FEB10EF68C845A6EB7EAEF48320F14815DE896A72C1CB79AD05CB91
                                            APIs
                                              • Part of subcall function 00FB0DB6: std::exception::exception.LIBCMT ref: 00FB0DEC
                                              • Part of subcall function 00FB0DB6: __CxxThrowException@8.LIBCMT ref: 00FB0E01
                                            • _memmove.LIBCMT ref: 00FE0258
                                            • _memmove.LIBCMT ref: 00FE036D
                                            • _memmove.LIBCMT ref: 00FE0414
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memmove$Exception@8Throwstd::exception::exception
                                            • String ID:
                                            • API String ID: 1300846289-0
                                            • Opcode ID: 9e7a158142fa82b807e005b30e88135e26878e7cc95b482d8195f4c376a0e571
                                            • Instruction ID: 5e56edb5ecf65cd8fe0c0eb9650229262d809b804b60103de0baa9aec80a9190
                                            • Opcode Fuzzy Hash: 9e7a158142fa82b807e005b30e88135e26878e7cc95b482d8195f4c376a0e571
                                            • Instruction Fuzzy Hash: 6102DFB0E00209DFDF04DF65D981AAEBBB5EF44310F148069E80ADB295EF79D950EB90
                                            APIs
                                              • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 00F919FA
                                            • GetSysColor.USER32(0000000F), ref: 00F91A4E
                                            • SetBkColor.GDI32(?,00000000), ref: 00F91A61
                                              • Part of subcall function 00F91290: DefDlgProcW.USER32(?,00000020,?), ref: 00F912D8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ColorProc$LongWindow
                                            • String ID:
                                            • API String ID: 3744519093-0
                                            • Opcode ID: 55e7008be0786ff7b076e034aeba10801ed15d1d69c71e495696b191dc8834d3
                                            • Instruction ID: c4149c8c27a18a75178ca9f8418c26dcec5b685ebb8121d87c8729dd65ca4faf
                                            • Opcode Fuzzy Hash: 55e7008be0786ff7b076e034aeba10801ed15d1d69c71e495696b191dc8834d3
                                            • Instruction Fuzzy Hash: A2A15472502547BAFF38AA298D4AFBB355DFB42361F10012EF582D2185CA2D9D01F7B2
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?), ref: 00FFBCE6
                                            • _wcscmp.LIBCMT ref: 00FFBD16
                                            • _wcscmp.LIBCMT ref: 00FFBD2B
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00FFBD3C
                                            • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00FFBD6C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Find$File_wcscmp$CloseFirstNext
                                            • String ID:
                                            • API String ID: 2387731787-0
                                            • Opcode ID: 1e621ca4600da816a109d89e0b507bf86e5dcff347da0f3e5d94be5292e36aa2
                                            • Instruction ID: 2a3dba66cb84c59af37eec3d5b7d379fa1f87a62cd93ec0411a069535d17a08f
                                            • Opcode Fuzzy Hash: 1e621ca4600da816a109d89e0b507bf86e5dcff347da0f3e5d94be5292e36aa2
                                            • Instruction Fuzzy Hash: 91518D35A047069FDB14DF68C890EAAB3E4EF49320F14461DEA56873A1DB34ED04DB92
                                            APIs
                                              • Part of subcall function 01007D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 01007DB6
                                            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0100679E
                                            • WSAGetLastError.WSOCK32(00000000), ref: 010067C7
                                            • bind.WSOCK32(00000000,?,00000010), ref: 01006800
                                            • WSAGetLastError.WSOCK32(00000000), ref: 0100680D
                                            • closesocket.WSOCK32(00000000,00000000), ref: 01006821
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                            • String ID:
                                            • API String ID: 99427753-0
                                            • Opcode ID: 5d06675792205bf988324d106f08d7ec025c7e86b46c1050682f122e72a3467d
                                            • Instruction ID: 3ebe2102b202ec0317c54c344d18399a131e493d6d34186788a88e5e8cca51bb
                                            • Opcode Fuzzy Hash: 5d06675792205bf988324d106f08d7ec025c7e86b46c1050682f122e72a3467d
                                            • Instruction Fuzzy Hash: D441F071A00210AFEF11AF288C82F3E77E8EB45750F45805CF959AB3C2DAB99D019791
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                            • String ID:
                                            • API String ID: 292994002-0
                                            • Opcode ID: c168989f8f93e6b406fa77b1433891295ea94d3201d771f665dafdf9dde59875
                                            • Instruction ID: 10465b05e6f030634ea236345a19f61b5f45dcdbb0e1df4e37afda64013e8918
                                            • Opcode Fuzzy Hash: c168989f8f93e6b406fa77b1433891295ea94d3201d771f665dafdf9dde59875
                                            • Instruction Fuzzy Hash: 591101313005116FEB216F2ADC44A6EBBD8FFC6360F408428F9C6DB245CBBCD8018AA0
                                            APIs
                                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FE80C0
                                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FE80CA
                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FE80D9
                                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FE80E0
                                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FE80F6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                            • String ID:
                                            • API String ID: 44706859-0
                                            • Opcode ID: f42dd4e3b036155c685e18bd34b62933ad07a71041aa6c3692d55d61af03d583
                                            • Instruction ID: 1bc7b0546a1b7f148c52e27b4ee79c91e659ddca96a8583d015acf98daefd846
                                            • Opcode Fuzzy Hash: f42dd4e3b036155c685e18bd34b62933ad07a71041aa6c3692d55d61af03d583
                                            • Instruction Fuzzy Hash: 5EF0C870240205AFD7215F65DC8CE673BADEF457A4B000015F549C2150CB699D06DB60
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00F94AD0), ref: 00F94B45
                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00F94B57
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: GetNativeSystemInfo$kernel32.dll
                                            • API String ID: 2574300362-192647395
                                            • Opcode ID: f4e066b656d3da854198417feacfaa6098e5119c40a993578af889967054cd65
                                            • Instruction ID: 62ca0c003cec8d2423346201cb0228d6ce4277cb7d9b88c2619abe660d2a01fe
                                            • Opcode Fuzzy Hash: f4e066b656d3da854198417feacfaa6098e5119c40a993578af889967054cd65
                                            • Instruction Fuzzy Hash: 41D01234E10713CFDB209F32E868B0676E4BF55265B11882D94C5D6108D67CE884C754
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __itow__swprintf
                                            • String ID:
                                            • API String ID: 674341424-0
                                            • Opcode ID: 9a78e25e214b98d839b64f361f0a8c6747abdd63693d6eff8692ae870ee0551a
                                            • Instruction ID: dbbfd7505421dab3f8107087baf64ceea5cd85b5c66fe164fc8f188195ddcd99
                                            • Opcode Fuzzy Hash: 9a78e25e214b98d839b64f361f0a8c6747abdd63693d6eff8692ae870ee0551a
                                            • Instruction Fuzzy Hash: B422BDB1A083009FDB24DF24C881B6FB7E5AF89710F14491DF89A97391DB75E904EB92
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 0100EE3D
                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0100EE4B
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                            • Process32NextW.KERNEL32(00000000,?), ref: 0100EF0B
                                            • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0100EF1A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                            • String ID:
                                            • API String ID: 2576544623-0
                                            • Opcode ID: 76192b876220b3c459a2789629d9c57964226cb4e2af8995ec194aa40dafcdea
                                            • Instruction ID: cf5e203b69f4fe74b12e1da49506dc55553837a079548f379aad21a3c60069a5
                                            • Opcode Fuzzy Hash: 76192b876220b3c459a2789629d9c57964226cb4e2af8995ec194aa40dafcdea
                                            • Instruction Fuzzy Hash: 4B51A171508701AFE721EF24CC81E6BB7E8EF95710F40482DF595972A1EB74E908CB92
                                            APIs
                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00FEE628
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: lstrlen
                                            • String ID: ($|
                                            • API String ID: 1659193697-1631851259
                                            • Opcode ID: 6aaee0f39dfa30d8ff7e276bbbfcac377b0f7a67567ca910ad48bb71f2bbb81f
                                            • Instruction ID: 2267c395687eef19863bd0d3ac08dc033c91b014f9a1df54836a2b579bca5f12
                                            • Opcode Fuzzy Hash: 6aaee0f39dfa30d8ff7e276bbbfcac377b0f7a67567ca910ad48bb71f2bbb81f
                                            • Instruction Fuzzy Hash: 55323775A007059FD728CF1AD481AAAB7F1FF48320B15C46EE89ADB3A1D770E941CB40
                                            APIs
                                            • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0100180A,00000000), ref: 010023E1
                                            • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 01002418
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Internet$AvailableDataFileQueryRead
                                            • String ID:
                                            • API String ID: 599397726-0
                                            • Opcode ID: 4ea9630474a74755ea0d459306f2e01911ea56928924d22b1d8f0ccd0d694cc1
                                            • Instruction ID: 3a5db5ac8a07e5167f043d065de7de2dbd3b2a86564ec9f0be6c5f965cd5c0d6
                                            • Opcode Fuzzy Hash: 4ea9630474a74755ea0d459306f2e01911ea56928924d22b1d8f0ccd0d694cc1
                                            • Instruction Fuzzy Hash: AF41E871904209BFFB22DE99DC89FBF77FCEB40714F0080AAF685A6181DB759E419A50
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 00FFB40B
                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00FFB465
                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00FFB4B2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ErrorMode$DiskFreeSpace
                                            • String ID:
                                            • API String ID: 1682464887-0
                                            • Opcode ID: 32379d9e542fdcce39772673ae4bdeb0ae2283d18933fcc316d69283254c24cb
                                            • Instruction ID: 5d602fa5ea7f1040739545889cb9ba32086a1374d47c280c33766f0313faf415
                                            • Opcode Fuzzy Hash: 32379d9e542fdcce39772673ae4bdeb0ae2283d18933fcc316d69283254c24cb
                                            • Instruction Fuzzy Hash: 99216D35A00108EFDB00EFA5DC80AEEBBB8FF49314F1480A9E945EB355DB359919DB50
                                            APIs
                                              • Part of subcall function 00FB0DB6: std::exception::exception.LIBCMT ref: 00FB0DEC
                                              • Part of subcall function 00FB0DB6: __CxxThrowException@8.LIBCMT ref: 00FB0E01
                                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FE882B
                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FE8858
                                            • GetLastError.KERNEL32 ref: 00FE8865
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                            • String ID:
                                            • API String ID: 1922334811-0
                                            • Opcode ID: 522c9777ccfd3add0cc026a39d0dd7ada4c208077c8906b010f46a5f5858f7ce
                                            • Instruction ID: 926f61b4b6b541ee4231a49f9b2c56ec1a35d0a32a05d0eb7ed590a2bacf4a14
                                            • Opcode Fuzzy Hash: 522c9777ccfd3add0cc026a39d0dd7ada4c208077c8906b010f46a5f5858f7ce
                                            • Instruction Fuzzy Hash: C411B2B2804205AFD728EF55DC85D6BB7F8FB04350B10852EF49983241DF34BC018B60
                                            APIs
                                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00FE8774
                                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00FE878B
                                            • FreeSid.ADVAPI32(?), ref: 00FE879B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AllocateCheckFreeInitializeMembershipToken
                                            • String ID:
                                            • API String ID: 3429775523-0
                                            • Opcode ID: 8365464a8d7a7fd15046fc547af38ff733adb4d19bb012596f78d40a73cc6997
                                            • Instruction ID: 70d1929a04987c32fd916d39e51135b4e7111df8e38fc4940f6c7475f0af4a3c
                                            • Opcode Fuzzy Hash: 8365464a8d7a7fd15046fc547af38ff733adb4d19bb012596f78d40a73cc6997
                                            • Instruction Fuzzy Hash: D1F04975A1130DBFDF00DFF4DD89AAEBBBCEF08211F1044A9A901E2180E6796A488B50
                                            APIs
                                            • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00FF4CB3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: mouse_event
                                            • String ID: DOWN
                                            • API String ID: 2434400541-711622031
                                            • Opcode ID: 4e22d78ad886f5eb69ebefbbdfdc17390226b2ff17a72037bc713c0b66c49489
                                            • Instruction ID: 8ed5365b76f0acdd556de5723766a5b9396c07d9a2e33f1c7bf0b43de7157730
                                            • Opcode Fuzzy Hash: 4e22d78ad886f5eb69ebefbbdfdc17390226b2ff17a72037bc713c0b66c49489
                                            • Instruction Fuzzy Hash: FEE08C7219D7223DB948291ABC03FF7278C8F12735B10125AFA50E94D1ED896C8239B8
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?), ref: 00FFC6FB
                                            • FindClose.KERNEL32(00000000), ref: 00FFC72B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Find$CloseFileFirst
                                            • String ID:
                                            • API String ID: 2295610775-0
                                            • Opcode ID: 7c72034f8b32127f9936e56b4053ec585b7f615c198392af52a5d67178c46124
                                            • Instruction ID: 47323432674954ff2392a27b6678b803331b813befc46e8af93220f42da1b675
                                            • Opcode Fuzzy Hash: 7c72034f8b32127f9936e56b4053ec585b7f615c198392af52a5d67178c46124
                                            • Instruction Fuzzy Hash: 1A118E726046049FDB10EF29C845A6AF7E8EF85324F05851DF9A9C7291DB74A805DF81
                                            APIs
                                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,01009468,?,0101FB84,?), ref: 00FFA097
                                            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,01009468,?,0101FB84,?), ref: 00FFA0A9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ErrorFormatLastMessage
                                            • String ID:
                                            • API String ID: 3479602957-0
                                            • Opcode ID: e208835b697b1c6bfe2f4cc074dc52e46516fc09f7b9d0b37a68e579f4ee9bc0
                                            • Instruction ID: d8c7a82c780d56292506e801a1276d9a9c26d2ab4f229d8921c3bc3a4714bc2e
                                            • Opcode Fuzzy Hash: e208835b697b1c6bfe2f4cc074dc52e46516fc09f7b9d0b37a68e579f4ee9bc0
                                            • Instruction Fuzzy Hash: 7FF0E23610422EABDB21AFA4DC48FEA736CBF08361F008156F908D3181DA349904DBA1
                                            APIs
                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FE8309), ref: 00FE81E0
                                            • CloseHandle.KERNEL32(?,?,00FE8309), ref: 00FE81F2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AdjustCloseHandlePrivilegesToken
                                            • String ID:
                                            • API String ID: 81990902-0
                                            • Opcode ID: 7551864630eb986a0f52261f0a8d77d87f521c02d804b40382c43e9fed402cc5
                                            • Instruction ID: 4e5fa0cc37fc6cdf383c9ba0ffd05343a5797b5b0697a06f6447d82c74641269
                                            • Opcode Fuzzy Hash: 7551864630eb986a0f52261f0a8d77d87f521c02d804b40382c43e9fed402cc5
                                            • Instruction Fuzzy Hash: 17E0E671010511AFE7253B61EC05D7777E9EF04350714891DF49584474DB6A9C91EB10
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00FB8D57,?,?,?,00000001), ref: 00FBA15A
                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00FBA163
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: cdacae2c5618557d1393d2f88768d501b482cd304f78aa070c0cc4cfa65fee63
                                            • Instruction ID: e0f05faf073ad3a3923c5e5fa775d51f840c21a8a3cee4904f5e6a61fdcae2c1
                                            • Opcode Fuzzy Hash: cdacae2c5618557d1393d2f88768d501b482cd304f78aa070c0cc4cfa65fee63
                                            • Instruction Fuzzy Hash: 71B0923105420AEBCA102B91E809B883F68FB44BAAF408010F64D84054CBEB54548B91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1b0babee5e4072b4fd2a1c4b026fe22e7e3e261562fc52b9663738700668724c
                                            • Instruction ID: 53bd9592f7ff4432dca94b3937199ae9bbe8d4e7fb57e07b62787f8ba2465e7e
                                            • Opcode Fuzzy Hash: 1b0babee5e4072b4fd2a1c4b026fe22e7e3e261562fc52b9663738700668724c
                                            • Instruction Fuzzy Hash: AA32F032D29F014DD7339939CC32325A248AFB73D4F25D737E85AB59AAEB29C4875600
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 63d1a90634b24f20aa23999167c806d474d8e57c4cfc750f350ffe12c6186785
                                            • Instruction ID: e3d5df0a2bd2faccc562e70228cdb5381b483cb34452ddef89f061f040c74ed7
                                            • Opcode Fuzzy Hash: 63d1a90634b24f20aa23999167c806d474d8e57c4cfc750f350ffe12c6186785
                                            • Instruction Fuzzy Hash: 41B1FF30E2AF418DD2339A398931336B65CAFBB2D5F61D71BFC6671D16EB2685834240
                                            APIs
                                            • __time64.LIBCMT ref: 00FF889B
                                              • Part of subcall function 00FB520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00FF8F6E,00000000,?,?,?,?,00FF911F,00000000,?), ref: 00FB5213
                                              • Part of subcall function 00FB520A: __aulldiv.LIBCMT ref: 00FB5233
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Time$FileSystem__aulldiv__time64
                                            • String ID:
                                            • API String ID: 2893107130-0
                                            • Opcode ID: 8e37dc06dd7939942c8f4ac0e9e1c9254aab2c6b0e82706b151e3ec0be17a233
                                            • Instruction ID: 8b39a9c94abf9e99442442b493ccf9c80505edb02ecf91d1297c98654fb42a2e
                                            • Opcode Fuzzy Hash: 8e37dc06dd7939942c8f4ac0e9e1c9254aab2c6b0e82706b151e3ec0be17a233
                                            • Instruction Fuzzy Hash: ED21A232A256108BC729CF25D441A62B3E1EFA5361F688E6CD1F5CB2D0CA39A905DB54
                                            APIs
                                            • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00FE8389), ref: 00FE87D1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: LogonUser
                                            • String ID:
                                            • API String ID: 1244722697-0
                                            • Opcode ID: 84ebcd8fb24b9595508431e855afdfcd50c115fcc2541c820480c2dcfbb79701
                                            • Instruction ID: 122744b433ebcb08f95c47114d23e6face2e78a2f6a847968da9b02631f7128f
                                            • Opcode Fuzzy Hash: 84ebcd8fb24b9595508431e855afdfcd50c115fcc2541c820480c2dcfbb79701
                                            • Instruction Fuzzy Hash: F6D05E3226050EABEF018EA4DC01EAE3B69EB04B01F408111FE15C50A0C77AD835AF60
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00FBA12A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: a4a9e3b56d92bbaa17f589da26803c894000140f5d4cb01504f2205dbd686e55
                                            • Instruction ID: 6f706cf793e105f839add71619735bbf3e003852f542974d1f45facf7aef3522
                                            • Opcode Fuzzy Hash: a4a9e3b56d92bbaa17f589da26803c894000140f5d4cb01504f2205dbd686e55
                                            • Instruction Fuzzy Hash: F4A0113000020EAB8A002A82E808888BFACEA002A8B008020F80C80022CBBBA8208A80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ee8d2c6dc37aa8e3c0db2c9c531f9d887630c404937dd660a04a37d1fbbcadb8
                                            • Instruction ID: 0ed82a3c1e8e352958e499665093274829ec5ef4f72635814a05378c4615452a
                                            • Opcode Fuzzy Hash: ee8d2c6dc37aa8e3c0db2c9c531f9d887630c404937dd660a04a37d1fbbcadb8
                                            • Instruction Fuzzy Hash: 862255B5D041869BDF388A15C49437D77A1FF067A8F28802BD982CB592DBB89C93F741
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                            • Instruction ID: 2f5ed822d17f0e103269afd1918115b1a49a90c134168297aec8e531699cf1d7
                                            • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                            • Instruction Fuzzy Hash: D8C1A7326050930ADF6D463BC4741BEFBA16EA27B135E075DD4B3CB1D5EE10C925EA20
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                            • Instruction ID: 0e77ea0d153a3893ba1cdcb30323aef248dbf4242fbc6a409bdde64ef8a06f4a
                                            • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                            • Instruction Fuzzy Hash: AEC1973361519309DF6D463BC4341BEBBA16EA27B136A076DD4B3DB1D4EE20C925FA20
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                            • Instruction ID: ba2fc4192f818ec6f2168880ad6d3f8d6be27ce53320feb63413de33eb0f2f8a
                                            • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                            • Instruction Fuzzy Hash: 8EC1823271519309DF2D463BC4741BEBBA17EA27B139A076DD4B3CB1D4EE20D925EA20
                                            APIs
                                            • DeleteObject.GDI32(00000000), ref: 0100785B
                                            • DeleteObject.GDI32(00000000), ref: 0100786D
                                            • DestroyWindow.USER32 ref: 0100787B
                                            • GetDesktopWindow.USER32 ref: 01007895
                                            • GetWindowRect.USER32(00000000), ref: 0100789C
                                            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 010079DD
                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 010079ED
                                            • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007A35
                                            • GetClientRect.USER32(00000000,?), ref: 01007A41
                                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 01007A7B
                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007A9D
                                            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007AB0
                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007ABB
                                            • GlobalLock.KERNEL32(00000000), ref: 01007AC4
                                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007AD3
                                            • GlobalUnlock.KERNEL32(00000000), ref: 01007ADC
                                            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007AE3
                                            • GlobalFree.KERNEL32(00000000), ref: 01007AEE
                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007B00
                                            • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,01022CAC,00000000), ref: 01007B16
                                            • GlobalFree.KERNEL32(00000000), ref: 01007B26
                                            • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 01007B4C
                                            • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 01007B6B
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007B8D
                                            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007D7A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                            • String ID: $AutoIt v3$DISPLAY$static
                                            • API String ID: 2211948467-2373415609
                                            • Opcode ID: 0e82ec6037f0b9fb39d0134fd8485d3df47cced9ed7f8669c3aa0d0e027480c0
                                            • Instruction ID: 8ecc286d2b67f97b35c98d0b466042bc91571d0550ccc7a4b819b3a8e0a46fc6
                                            • Opcode Fuzzy Hash: 0e82ec6037f0b9fb39d0134fd8485d3df47cced9ed7f8669c3aa0d0e027480c0
                                            • Instruction Fuzzy Hash: 2F028171900105EFEB15DFA8DC89EAE7BB9FF49310F048158F985AB291CB79AD01CB60
                                            APIs
                                            • CharUpperBuffW.USER32(?,?,0101F910), ref: 01013627
                                            • IsWindowVisible.USER32(?), ref: 0101364B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: BuffCharUpperVisibleWindow
                                            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                            • API String ID: 4105515805-45149045
                                            • Opcode ID: 9dcf076c99b851697aadfd75a96401dd2733db31a9bed6cec5a8c528010ee984
                                            • Instruction ID: 0c126c61f394969ddf33040d4000a091dc0026c5ff7252707033ed3915ec793d
                                            • Opcode Fuzzy Hash: 9dcf076c99b851697aadfd75a96401dd2733db31a9bed6cec5a8c528010ee984
                                            • Instruction Fuzzy Hash: 5AD190702083019BDA04FF14C852A6E7BE5BF983A4F54486CF8C65F2A6DB2DD90ADB41
                                            APIs
                                            • SetTextColor.GDI32(?,00000000), ref: 0101A630
                                            • GetSysColorBrush.USER32(0000000F), ref: 0101A661
                                            • GetSysColor.USER32(0000000F), ref: 0101A66D
                                            • SetBkColor.GDI32(?,000000FF), ref: 0101A687
                                            • SelectObject.GDI32(?,00000000), ref: 0101A696
                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 0101A6C1
                                            • GetSysColor.USER32(00000010), ref: 0101A6C9
                                            • CreateSolidBrush.GDI32(00000000), ref: 0101A6D0
                                            • FrameRect.USER32(?,?,00000000), ref: 0101A6DF
                                            • DeleteObject.GDI32(00000000), ref: 0101A6E6
                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 0101A731
                                            • FillRect.USER32(?,?,00000000), ref: 0101A763
                                            • GetWindowLongW.USER32(?,000000F0), ref: 0101A78E
                                              • Part of subcall function 0101A8CA: GetSysColor.USER32(00000012), ref: 0101A903
                                              • Part of subcall function 0101A8CA: SetTextColor.GDI32(?,?), ref: 0101A907
                                              • Part of subcall function 0101A8CA: GetSysColorBrush.USER32(0000000F), ref: 0101A91D
                                              • Part of subcall function 0101A8CA: GetSysColor.USER32(0000000F), ref: 0101A928
                                              • Part of subcall function 0101A8CA: GetSysColor.USER32(00000011), ref: 0101A945
                                              • Part of subcall function 0101A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0101A953
                                              • Part of subcall function 0101A8CA: SelectObject.GDI32(?,00000000), ref: 0101A964
                                              • Part of subcall function 0101A8CA: SetBkColor.GDI32(?,00000000), ref: 0101A96D
                                              • Part of subcall function 0101A8CA: SelectObject.GDI32(?,?), ref: 0101A97A
                                              • Part of subcall function 0101A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0101A999
                                              • Part of subcall function 0101A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0101A9B0
                                              • Part of subcall function 0101A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0101A9C5
                                              • Part of subcall function 0101A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0101A9ED
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                            • String ID:
                                            • API String ID: 3521893082-0
                                            • Opcode ID: 9ae2af321a1cc95d2f9e2e6efab4bbfb2897497a4c05917d9af78084222c5808
                                            • Instruction ID: cdc5d679ed548cbdcf212027fdafcf728c526614a504c9eee9fff396aabfac3b
                                            • Opcode Fuzzy Hash: 9ae2af321a1cc95d2f9e2e6efab4bbfb2897497a4c05917d9af78084222c5808
                                            • Instruction Fuzzy Hash: EE918C72109302EFD7219F64DC08A5B7BE9FF89321F100B19FAA696194D73ED948CB51
                                            APIs
                                            • DestroyWindow.USER32(?,?,?), ref: 00F92CA2
                                            • DeleteObject.GDI32(00000000), ref: 00F92CE8
                                            • DeleteObject.GDI32(00000000), ref: 00F92CF3
                                            • DestroyIcon.USER32(00000000,?,?,?), ref: 00F92CFE
                                            • DestroyWindow.USER32(00000000,?,?,?), ref: 00F92D09
                                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 00FCC43B
                                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00FCC474
                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00FCC89D
                                              • Part of subcall function 00F91B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F92036,?,00000000,?,?,?,?,00F916CB,00000000,?), ref: 00F91B9A
                                            • SendMessageW.USER32(?,00001053), ref: 00FCC8DA
                                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00FCC8F1
                                            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00FCC907
                                            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00FCC912
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                            • String ID: 0
                                            • API String ID: 464785882-4108050209
                                            • Opcode ID: 70143a2ca209f9a7752c94ccc8cf9f150aac3cb851d640116e8933e02df6dd85
                                            • Instruction ID: f0d915990dd624f66472ea70cd9a97a98adc2d1e01e808ffacd674f6e4cede2a
                                            • Opcode Fuzzy Hash: 70143a2ca209f9a7752c94ccc8cf9f150aac3cb851d640116e8933e02df6dd85
                                            • Instruction Fuzzy Hash: FE129C30A00202EFDB65CF24CA85FA9BBA5FF04320F58456DE599DB252C735E846EB91
                                            APIs
                                            • DestroyWindow.USER32(00000000), ref: 010074DE
                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0100759D
                                            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 010075DB
                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 010075ED
                                            • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 01007633
                                            • GetClientRect.USER32(00000000,?), ref: 0100763F
                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 01007683
                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 01007692
                                            • GetStockObject.GDI32(00000011), ref: 010076A2
                                            • SelectObject.GDI32(00000000,00000000), ref: 010076A6
                                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 010076B6
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 010076BF
                                            • DeleteDC.GDI32(00000000), ref: 010076C8
                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 010076F4
                                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 0100770B
                                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 01007746
                                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0100775A
                                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 0100776B
                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0100779B
                                            • GetStockObject.GDI32(00000011), ref: 010077A6
                                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 010077B1
                                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 010077BB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                            • API String ID: 2910397461-517079104
                                            • Opcode ID: c63c2c390f149a5b9d5cb09db77e92f9d5b0b497bd8c4833b1dc3c55fdcdcaf9
                                            • Instruction ID: 9bb52c7b30192ab9951c55b4a4d1dbd051e5dfa22d4051a880c2259a2bbf3dff
                                            • Opcode Fuzzy Hash: c63c2c390f149a5b9d5cb09db77e92f9d5b0b497bd8c4833b1dc3c55fdcdcaf9
                                            • Instruction Fuzzy Hash: 57A16071A40205BFEB24DBA8DC4AFAF7BB9EB05750F004118FA55A72D0D7B9AD04CB64
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 00FFAD1E
                                            • GetDriveTypeW.KERNEL32(?,0101FAC0,?,\\.\,0101F910), ref: 00FFADFB
                                            • SetErrorMode.KERNEL32(00000000,0101FAC0,?,\\.\,0101F910), ref: 00FFAF59
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ErrorMode$DriveType
                                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                            • API String ID: 2907320926-4222207086
                                            • Opcode ID: 0ede5394a8c093f95e116ca08d02bf72105fee0c174ac99c7a408c23f9633c19
                                            • Instruction ID: 796d674ed6302ce3cc6c01dad293492c00f61e1d0806ab65be84d60955599017
                                            • Opcode Fuzzy Hash: 0ede5394a8c093f95e116ca08d02bf72105fee0c174ac99c7a408c23f9633c19
                                            • Instruction Fuzzy Hash: 2F51D7F1A4820D9B9B00EB51CDC2DBD73A0EF08710720846AE64BAF2B5D6B59D01FB53
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __wcsnicmp
                                            • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                            • API String ID: 1038674560-86951937
                                            • Opcode ID: 8420d451d965ce3331da8d36c7daccdadf14629279e38c9d3cfd32eaa3ec14ca
                                            • Instruction ID: 13331e8f5197817b54a59951bc0d5555ef92b54ed12c7c8060aec1ccd588d22d
                                            • Opcode Fuzzy Hash: 8420d451d965ce3331da8d36c7daccdadf14629279e38c9d3cfd32eaa3ec14ca
                                            • Instruction Fuzzy Hash: 178128B1A402066AEF21AB61DD83FBF3768AF05710F044029F845AB196EF78DE45FA51
                                            APIs
                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 01019AD2
                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 01019B8B
                                            • SendMessageW.USER32(?,00001102,00000002,?), ref: 01019BA7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window
                                            • String ID: 0
                                            • API String ID: 2326795674-4108050209
                                            • Opcode ID: 02f8d103dad7b29964f91cc6a248dbf8437859a9801f2ddea1ba3d3b152a298b
                                            • Instruction ID: 02eed2c62772a8fa947227d895d97c25e83a841148a8289dff59aa2578d4b6ef
                                            • Opcode Fuzzy Hash: 02f8d103dad7b29964f91cc6a248dbf8437859a9801f2ddea1ba3d3b152a298b
                                            • Instruction Fuzzy Hash: DE02CE30104301AFEB658F28C868BAABFE5FF49318F04495CFAD5962A9C77DD944CB52
                                            APIs
                                            • GetSysColor.USER32(00000012), ref: 0101A903
                                            • SetTextColor.GDI32(?,?), ref: 0101A907
                                            • GetSysColorBrush.USER32(0000000F), ref: 0101A91D
                                            • GetSysColor.USER32(0000000F), ref: 0101A928
                                            • CreateSolidBrush.GDI32(?), ref: 0101A92D
                                            • GetSysColor.USER32(00000011), ref: 0101A945
                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0101A953
                                            • SelectObject.GDI32(?,00000000), ref: 0101A964
                                            • SetBkColor.GDI32(?,00000000), ref: 0101A96D
                                            • SelectObject.GDI32(?,?), ref: 0101A97A
                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 0101A999
                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0101A9B0
                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0101A9C5
                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0101A9ED
                                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0101AA14
                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 0101AA32
                                            • DrawFocusRect.USER32(?,?), ref: 0101AA3D
                                            • GetSysColor.USER32(00000011), ref: 0101AA4B
                                            • SetTextColor.GDI32(?,00000000), ref: 0101AA53
                                            • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0101AA67
                                            • SelectObject.GDI32(?,0101A5FA), ref: 0101AA7E
                                            • DeleteObject.GDI32(?), ref: 0101AA89
                                            • SelectObject.GDI32(?,?), ref: 0101AA8F
                                            • DeleteObject.GDI32(?), ref: 0101AA94
                                            • SetTextColor.GDI32(?,?), ref: 0101AA9A
                                            • SetBkColor.GDI32(?,?), ref: 0101AAA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                            • String ID:
                                            • API String ID: 1996641542-0
                                            • Opcode ID: 50c3db8566d55ad3af359ce44346357e7cc1be2643147ab791809159de019cb2
                                            • Instruction ID: f01eab5c368de87271fa0fcd9cbf6a18038ea50c12d5e79d3015b707cd4d90bb
                                            • Opcode Fuzzy Hash: 50c3db8566d55ad3af359ce44346357e7cc1be2643147ab791809159de019cb2
                                            • Instruction Fuzzy Hash: 67518C71901209FFDB219FA8DC48EAE7BB9FF08320F114215FA55AB295D77A9940CF90
                                            APIs
                                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 01018AC1
                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01018AD2
                                            • CharNextW.USER32(0000014E), ref: 01018B01
                                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 01018B42
                                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 01018B58
                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01018B69
                                            • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 01018B86
                                            • SetWindowTextW.USER32(?,0000014E), ref: 01018BD8
                                            • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 01018BEE
                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 01018C1F
                                            • _memset.LIBCMT ref: 01018C44
                                            • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 01018C8D
                                            • _memset.LIBCMT ref: 01018CEC
                                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 01018D16
                                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 01018D6E
                                            • SendMessageW.USER32(?,0000133D,?,?), ref: 01018E1B
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 01018E3D
                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 01018E87
                                            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 01018EB4
                                            • DrawMenuBar.USER32(?), ref: 01018EC3
                                            • SetWindowTextW.USER32(?,0000014E), ref: 01018EEB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                            • String ID: 0
                                            • API String ID: 1073566785-4108050209
                                            • Opcode ID: 337a8d35a4fdc207c053f3ecabce94e13878bf0182f9362344e424cf3f490920
                                            • Instruction ID: a17d441bae4a8479892395a6df09385f46b97ca2ca52d0c9263065eaa3278e79
                                            • Opcode Fuzzy Hash: 337a8d35a4fdc207c053f3ecabce94e13878bf0182f9362344e424cf3f490920
                                            • Instruction Fuzzy Hash: C4E18571900209AFDF60DF65CC84EEE7BB9FF09710F00819AFA95AA195D7798684CF50
                                            APIs
                                            • GetCursorPos.USER32(?), ref: 010149CA
                                            • GetDesktopWindow.USER32 ref: 010149DF
                                            • GetWindowRect.USER32(00000000), ref: 010149E6
                                            • GetWindowLongW.USER32(?,000000F0), ref: 01014A48
                                            • DestroyWindow.USER32(?), ref: 01014A74
                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 01014A9D
                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 01014ABB
                                            • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 01014AE1
                                            • SendMessageW.USER32(?,00000421,?,?), ref: 01014AF6
                                            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 01014B09
                                            • IsWindowVisible.USER32(?), ref: 01014B29
                                            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 01014B44
                                            • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 01014B58
                                            • GetWindowRect.USER32(?,?), ref: 01014B70
                                            • MonitorFromPoint.USER32(?,?,00000002), ref: 01014B96
                                            • GetMonitorInfoW.USER32(00000000,?), ref: 01014BB0
                                            • CopyRect.USER32(?,?), ref: 01014BC7
                                            • SendMessageW.USER32(?,00000412,00000000), ref: 01014C32
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                            • String ID: ($0$tooltips_class32
                                            • API String ID: 698492251-4156429822
                                            • Opcode ID: 866082fb5119af64a3f8aa38335c1e9ca70e92ea8da20f19bbce22d8a5225d4f
                                            • Instruction ID: f2fec4cf5145c9c611ba290f2a13bdc9afa6ed124335136a0fdbde704f6e59f7
                                            • Opcode Fuzzy Hash: 866082fb5119af64a3f8aa38335c1e9ca70e92ea8da20f19bbce22d8a5225d4f
                                            • Instruction Fuzzy Hash: 98B1AB71608341AFDB44DF68C885B6ABBE4BF88314F00891CF9D99B2A1D779E805CB95
                                            APIs
                                            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00FF44AC
                                            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00FF44D2
                                            • _wcscpy.LIBCMT ref: 00FF4500
                                            • _wcscmp.LIBCMT ref: 00FF450B
                                            • _wcscat.LIBCMT ref: 00FF4521
                                            • _wcsstr.LIBCMT ref: 00FF452C
                                            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00FF4548
                                            • _wcscat.LIBCMT ref: 00FF4591
                                            • _wcscat.LIBCMT ref: 00FF4598
                                            • _wcsncpy.LIBCMT ref: 00FF45C3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                            • API String ID: 699586101-1459072770
                                            • Opcode ID: bddb41ff84182a31bec892e4f3f33ca8ae11e3731c2e5eb21f5b635245a7a66d
                                            • Instruction ID: cb63ff652bc76634805c878af90633e9b16607f0ff01f22580ecb10bd133f983
                                            • Opcode Fuzzy Hash: bddb41ff84182a31bec892e4f3f33ca8ae11e3731c2e5eb21f5b635245a7a66d
                                            • Instruction Fuzzy Hash: D84138729402057BDB10BA72CC47EFF776CDF46710F04055AFA04EA192EA3CAA01AAB5
                                            APIs
                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F928BC
                                            • GetSystemMetrics.USER32(00000007), ref: 00F928C4
                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F928EF
                                            • GetSystemMetrics.USER32(00000008), ref: 00F928F7
                                            • GetSystemMetrics.USER32(00000004), ref: 00F9291C
                                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00F92939
                                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00F92949
                                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00F9297C
                                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00F92990
                                            • GetClientRect.USER32(00000000,000000FF), ref: 00F929AE
                                            • GetStockObject.GDI32(00000011), ref: 00F929CA
                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F929D5
                                              • Part of subcall function 00F92344: GetCursorPos.USER32(?), ref: 00F92357
                                              • Part of subcall function 00F92344: ScreenToClient.USER32(010557B0,?), ref: 00F92374
                                              • Part of subcall function 00F92344: GetAsyncKeyState.USER32(00000001), ref: 00F92399
                                              • Part of subcall function 00F92344: GetAsyncKeyState.USER32(00000002), ref: 00F923A7
                                            • SetTimer.USER32(00000000,00000000,00000028,00F91256), ref: 00F929FC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                            • String ID: AutoIt v3 GUI
                                            • API String ID: 1458621304-248962490
                                            • Opcode ID: 661e14555eda95be4e61417da49fc3cba5bd52302f39d4bde79302a55e627cc6
                                            • Instruction ID: 465e7416a99e1279b736efe122b21a77873b4263dd35a71b560c9113d1616d24
                                            • Opcode Fuzzy Hash: 661e14555eda95be4e61417da49fc3cba5bd52302f39d4bde79302a55e627cc6
                                            • Instruction Fuzzy Hash: E1B16F71A0020AEFEF24DFA8DD45BAE7BB4FB08310F104129FA55E7294DB79A841DB50
                                            APIs
                                            • CharUpperBuffW.USER32(?,?), ref: 01013E6F
                                            • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 01013F2F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: BuffCharMessageSendUpper
                                            • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                            • API String ID: 3974292440-719923060
                                            • Opcode ID: 9363c2e3abe24dd49239408d3bb0506cc140a9bfbf51a6ca53f539fd932d5541
                                            • Instruction ID: f745929ceba84ec78f0a0e6900eed76b4c3341a084263a50000b069ea6fac635
                                            • Opcode Fuzzy Hash: 9363c2e3abe24dd49239408d3bb0506cc140a9bfbf51a6ca53f539fd932d5541
                                            • Instruction Fuzzy Hash: 12A18C302183019BDB14FF29CC52A6AB7E9BF84324F15486CB8D69B2D6DB79EC05CB51
                                            APIs
                                            • GetClassNameW.USER32(?,?,00000100), ref: 00FEA47A
                                            • __swprintf.LIBCMT ref: 00FEA51B
                                            • _wcscmp.LIBCMT ref: 00FEA52E
                                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00FEA583
                                            • _wcscmp.LIBCMT ref: 00FEA5BF
                                            • GetClassNameW.USER32(?,?,00000400), ref: 00FEA5F6
                                            • GetDlgCtrlID.USER32(?), ref: 00FEA648
                                            • GetWindowRect.USER32(?,?), ref: 00FEA67E
                                            • GetParent.USER32(?), ref: 00FEA69C
                                            • ScreenToClient.USER32(00000000), ref: 00FEA6A3
                                            • GetClassNameW.USER32(?,?,00000100), ref: 00FEA71D
                                            • _wcscmp.LIBCMT ref: 00FEA731
                                            • GetWindowTextW.USER32(?,?,00000400), ref: 00FEA757
                                            • _wcscmp.LIBCMT ref: 00FEA76B
                                              • Part of subcall function 00FB362C: _iswctype.LIBCMT ref: 00FB3634
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                            • String ID: %s%u
                                            • API String ID: 3744389584-679674701
                                            • Opcode ID: fc00612b7f331bb8002862e5f5a16c749a1a1767aeaa41aadec8ae5cfea279c7
                                            • Instruction ID: 8e132dcc4e64766b30ce99746a1f7c7f98349949f10dc46495cf9427aa73b52e
                                            • Opcode Fuzzy Hash: fc00612b7f331bb8002862e5f5a16c749a1a1767aeaa41aadec8ae5cfea279c7
                                            • Instruction Fuzzy Hash: FAA1E131604746AFD714DF62C884FAAB7E8FF44324F048629F999C2190EB34F959DB92
                                            APIs
                                            • GetClassNameW.USER32(00000008,?,00000400), ref: 00FEAF18
                                            • _wcscmp.LIBCMT ref: 00FEAF29
                                            • GetWindowTextW.USER32(00000001,?,00000400), ref: 00FEAF51
                                            • CharUpperBuffW.USER32(?,00000000), ref: 00FEAF6E
                                            • _wcscmp.LIBCMT ref: 00FEAF8C
                                            • _wcsstr.LIBCMT ref: 00FEAF9D
                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 00FEAFD5
                                            • _wcscmp.LIBCMT ref: 00FEAFE5
                                            • GetWindowTextW.USER32(00000002,?,00000400), ref: 00FEB00C
                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 00FEB055
                                            • _wcscmp.LIBCMT ref: 00FEB065
                                            • GetClassNameW.USER32(00000010,?,00000400), ref: 00FEB08D
                                            • GetWindowRect.USER32(00000004,?), ref: 00FEB0F6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                            • String ID: @$ThumbnailClass
                                            • API String ID: 1788623398-1539354611
                                            • Opcode ID: 59964402bdbcf5396efe697d64dd9a1f6d127b997a4336abacdec1220c625f9a
                                            • Instruction ID: 6a30f98acd3d7cce7fbd22db97960ab4b3df9cf1b559017a0a1b00b9dc42385f
                                            • Opcode Fuzzy Hash: 59964402bdbcf5396efe697d64dd9a1f6d127b997a4336abacdec1220c625f9a
                                            • Instruction Fuzzy Hash: 9181B2715083869FDB11DF12C885BAB77D8EF44324F04846AFD858A095DB38ED49DBA2
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __wcsnicmp
                                            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                            • API String ID: 1038674560-1810252412
                                            • Opcode ID: 54e925ff118648d462c0ae90683d8aa3a84b7a88178d3cce791735ce3bebb6e3
                                            • Instruction ID: 74b53f3e82ffb34ee0e874b5785eb3dd5cb781631d29b3be91727654f7b6a060
                                            • Opcode Fuzzy Hash: 54e925ff118648d462c0ae90683d8aa3a84b7a88178d3cce791735ce3bebb6e3
                                            • Instruction Fuzzy Hash: 7C31E371944349ABEB10FAA6DD83EFE7764AF50720F700428F442750D1EF55AF14EA52
                                            APIs
                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 01005013
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 0100501E
                                            • LoadCursorW.USER32(00000000,00007F03), ref: 01005029
                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 01005034
                                            • LoadCursorW.USER32(00000000,00007F01), ref: 0100503F
                                            • LoadCursorW.USER32(00000000,00007F81), ref: 0100504A
                                            • LoadCursorW.USER32(00000000,00007F88), ref: 01005055
                                            • LoadCursorW.USER32(00000000,00007F80), ref: 01005060
                                            • LoadCursorW.USER32(00000000,00007F86), ref: 0100506B
                                            • LoadCursorW.USER32(00000000,00007F83), ref: 01005076
                                            • LoadCursorW.USER32(00000000,00007F85), ref: 01005081
                                            • LoadCursorW.USER32(00000000,00007F82), ref: 0100508C
                                            • LoadCursorW.USER32(00000000,00007F84), ref: 01005097
                                            • LoadCursorW.USER32(00000000,00007F04), ref: 010050A2
                                            • LoadCursorW.USER32(00000000,00007F02), ref: 010050AD
                                            • LoadCursorW.USER32(00000000,00007F89), ref: 010050B8
                                            • GetCursorInfo.USER32(?), ref: 010050C8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Cursor$Load$Info
                                            • String ID:
                                            • API String ID: 2577412497-0
                                            • Opcode ID: 5d79493e5cb86076edf87a27550d86d9ca2ee6b47fe98daea1f314f9ef0b22e3
                                            • Instruction ID: 37912ea06b63cd42eb38e66964c429ec41f02521a3b0e48d1f822cd8d60a8b95
                                            • Opcode Fuzzy Hash: 5d79493e5cb86076edf87a27550d86d9ca2ee6b47fe98daea1f314f9ef0b22e3
                                            • Instruction Fuzzy Hash: 863117B1D483196AEF509FBA8C8989EBFE8FF04750F50452AA54CE7280DA7865008F91
                                            APIs
                                            • _memset.LIBCMT ref: 0101A259
                                            • DestroyWindow.USER32(?,?), ref: 0101A2D3
                                              • Part of subcall function 00F97BCC: _memmove.LIBCMT ref: 00F97C06
                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0101A34D
                                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0101A36F
                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0101A382
                                            • DestroyWindow.USER32(00000000), ref: 0101A3A4
                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00F90000,00000000), ref: 0101A3DB
                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0101A3F4
                                            • GetDesktopWindow.USER32 ref: 0101A40D
                                            • GetWindowRect.USER32(00000000), ref: 0101A414
                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0101A42C
                                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0101A444
                                              • Part of subcall function 00F925DB: GetWindowLongW.USER32(?,000000EB), ref: 00F925EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                            • String ID: 0$tooltips_class32
                                            • API String ID: 1297703922-3619404913
                                            • Opcode ID: 7a7f0a3691c0f29a9a1cecaf97286ab77b28525df087654316549bbf57ef7d5f
                                            • Instruction ID: 084d468fbc09508c46b519a0298891009bf4f2d0f39d40ace53a6581454bbf6f
                                            • Opcode Fuzzy Hash: 7a7f0a3691c0f29a9a1cecaf97286ab77b28525df087654316549bbf57ef7d5f
                                            • Instruction Fuzzy Hash: C3718A70240345AFEB21CF28CC49F6A7BE5FB88304F04495CF9C59B2A4DB79A906CB52
                                            APIs
                                              • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                                            • DragQueryPoint.SHELL32(?,?), ref: 0101C627
                                              • Part of subcall function 0101AB37: ClientToScreen.USER32(?,?), ref: 0101AB60
                                              • Part of subcall function 0101AB37: GetWindowRect.USER32(?,?), ref: 0101ABD6
                                              • Part of subcall function 0101AB37: PtInRect.USER32(?,?,0101C014), ref: 0101ABE6
                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0101C690
                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0101C69B
                                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0101C6BE
                                            • _wcscat.LIBCMT ref: 0101C6EE
                                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0101C705
                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0101C71E
                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 0101C735
                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 0101C757
                                            • DragFinish.SHELL32(?), ref: 0101C75E
                                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0101C851
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                            • API String ID: 169749273-3440237614
                                            • Opcode ID: 41d80680c92bcdc078e14e7e34a67a6b66f2d7bf1d6b99c8a8d51617274e1f58
                                            • Instruction ID: dac99248f85a282a6bb8bb23612236cac6a52e1b7e0d1b71f688a1a5ad2003b7
                                            • Opcode Fuzzy Hash: 41d80680c92bcdc078e14e7e34a67a6b66f2d7bf1d6b99c8a8d51617274e1f58
                                            • Instruction Fuzzy Hash: 39617A71108301AFDB11EF64DC85DAFBBE8FF89750F00091EF691961A1DB79AA09CB52
                                            APIs
                                            • CharUpperBuffW.USER32(?,?), ref: 01014424
                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0101446F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: BuffCharMessageSendUpper
                                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                            • API String ID: 3974292440-4258414348
                                            • Opcode ID: 60924e45f84060fa03d14a35196c0e0b3ccd5a46eb14fa0a6fb06b191d27180b
                                            • Instruction ID: 179259aeea1bb0752ac25d442e4b7fa3f369453bb5a31bfbab701641a6fc5baa
                                            • Opcode Fuzzy Hash: 60924e45f84060fa03d14a35196c0e0b3ccd5a46eb14fa0a6fb06b191d27180b
                                            • Instruction Fuzzy Hash: 4E918C702043018BDB04EF24C851A6EB7E5BF98354F45486CE8D69B3A2DB78ED09DB91
                                            APIs
                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0101B8B4
                                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,010191C2), ref: 0101B910
                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0101B949
                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0101B98C
                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0101B9C3
                                            • FreeLibrary.KERNEL32(?), ref: 0101B9CF
                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0101B9DF
                                            • DestroyIcon.USER32(?,?,?,?,?,010191C2), ref: 0101B9EE
                                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0101BA0B
                                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0101BA17
                                              • Part of subcall function 00FB2EFD: __wcsicmp_l.LIBCMT ref: 00FB2F86
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                            • String ID: .dll$.exe$.icl
                                            • API String ID: 1212759294-1154884017
                                            • Opcode ID: 98d9550bcf6875f10550191997bc234dd4cc30af5f0ad4fa2968cd6120ecdf7b
                                            • Instruction ID: f61bf348c9626e38e260d19d8060df0469d0dc74472e0f7ccbaae22de5c915dc
                                            • Opcode Fuzzy Hash: 98d9550bcf6875f10550191997bc234dd4cc30af5f0ad4fa2968cd6120ecdf7b
                                            • Instruction Fuzzy Hash: F561CC71900219BAEB24DF69CC41BBE7BB8FB08B10F104259FD55D61C1DB7D9A81DBA0
                                            APIs
                                            • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 00FF9C7F
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                            • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00FF9CA0
                                            • __swprintf.LIBCMT ref: 00FF9CF9
                                            • __swprintf.LIBCMT ref: 00FF9D12
                                            • _wprintf.LIBCMT ref: 00FF9DB9
                                            • _wprintf.LIBCMT ref: 00FF9DD7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: LoadString__swprintf_wprintf$_memmove
                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                            • API String ID: 311963372-3080491070
                                            • Opcode ID: abcd2871da597a847e61ee9738987892a257963ce74c6a05671807ac3242c061
                                            • Instruction ID: f94d4a2efd8cfe50dd12d3ccbff547acddc46d3d53c8ac204766e2431fbc2f64
                                            • Opcode Fuzzy Hash: abcd2871da597a847e61ee9738987892a257963ce74c6a05671807ac3242c061
                                            • Instruction Fuzzy Hash: 97517E7190030AAAEF15FBE0DD86EEEB778AF18300F600165B50576061EB796E58EB60
                                            APIs
                                              • Part of subcall function 00F99837: __itow.LIBCMT ref: 00F99862
                                              • Part of subcall function 00F99837: __swprintf.LIBCMT ref: 00F998AC
                                            • CharLowerBuffW.USER32(?,?), ref: 00FFA3CB
                                            • GetDriveTypeW.KERNEL32 ref: 00FFA418
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FFA460
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FFA497
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FFA4C5
                                              • Part of subcall function 00F97BCC: _memmove.LIBCMT ref: 00F97C06
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                            • API String ID: 2698844021-4113822522
                                            • Opcode ID: 571e007c6ee144a6dcba55d209f6b101e6dbcc9944aef798e7794ea9f9a8f871
                                            • Instruction ID: 91115ab4c283e53778358fc9a9b397c573232e2e2a0c6c3e8edc6b87d49f509c
                                            • Opcode Fuzzy Hash: 571e007c6ee144a6dcba55d209f6b101e6dbcc9944aef798e7794ea9f9a8f871
                                            • Instruction Fuzzy Hash: 57518DB15183059FDB00EF25CC8196AB3E8FF88718F14886DF88A97261DB75ED09DB42
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,00FCE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 00FEF8DF
                                            • LoadStringW.USER32(00000000,?,00FCE029,00000001), ref: 00FEF8E8
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                            • GetModuleHandleW.KERNEL32(00000000,01055310,?,00000FFF,?,?,00FCE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 00FEF90A
                                            • LoadStringW.USER32(00000000,?,00FCE029,00000001), ref: 00FEF90D
                                            • __swprintf.LIBCMT ref: 00FEF95D
                                            • __swprintf.LIBCMT ref: 00FEF96E
                                            • _wprintf.LIBCMT ref: 00FEFA17
                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FEFA2E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                            • API String ID: 984253442-2268648507
                                            • Opcode ID: 5c003b86c407189719b0ad3f703cc20850421d21108b3a959f89f640605ef5cb
                                            • Instruction ID: 4af22e6ec98618dcf0b881c7540b10a93bc25b0b5f8b16f8ea4a8fbe2d8f43a9
                                            • Opcode Fuzzy Hash: 5c003b86c407189719b0ad3f703cc20850421d21108b3a959f89f640605ef5cb
                                            • Instruction Fuzzy Hash: 3A416A72800309ABDF15FBE1DD86EEEB778AF18700F500465F505B6092EA396F09EB61
                                            APIs
                                            • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,01019207,?,?), ref: 0101BA56
                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,01019207,?,?,00000000,?), ref: 0101BA6D
                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,01019207,?,?,00000000,?), ref: 0101BA78
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,01019207,?,?,00000000,?), ref: 0101BA85
                                            • GlobalLock.KERNEL32(00000000), ref: 0101BA8E
                                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,01019207,?,?,00000000,?), ref: 0101BA9D
                                            • GlobalUnlock.KERNEL32(00000000), ref: 0101BAA6
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,01019207,?,?,00000000,?), ref: 0101BAAD
                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,01019207,?,?,00000000,?), ref: 0101BABE
                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,01022CAC,?), ref: 0101BAD7
                                            • GlobalFree.KERNEL32(00000000), ref: 0101BAE7
                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 0101BB0B
                                            • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0101BB36
                                            • DeleteObject.GDI32(00000000), ref: 0101BB5E
                                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0101BB74
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                            • String ID:
                                            • API String ID: 3840717409-0
                                            • Opcode ID: 9e2398bea5a4f862a95a53bddb5f081e6f77ad8f3b9a3ca39a0c5edd5dc49401
                                            • Instruction ID: 99d12d59721000ea69df6c85de21bbc530479d7250c40ad8a9325ce0d5e25fcb
                                            • Opcode Fuzzy Hash: 9e2398bea5a4f862a95a53bddb5f081e6f77ad8f3b9a3ca39a0c5edd5dc49401
                                            • Instruction Fuzzy Hash: AB416B75600209EFDB21DFA9DC88EAA7BF8FF89711F104058F989D7254C7799905CB20
                                            APIs
                                            • __wsplitpath.LIBCMT ref: 00FFDA10
                                            • _wcscat.LIBCMT ref: 00FFDA28
                                            • _wcscat.LIBCMT ref: 00FFDA3A
                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FFDA4F
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFDA63
                                            • GetFileAttributesW.KERNEL32(?), ref: 00FFDA7B
                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00FFDA95
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFDAA7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                            • String ID: *.*
                                            • API String ID: 34673085-438819550
                                            • Opcode ID: 448f6272ad08acdc9c4c2949be370514391083ebfa429bc39d77e758db4ba384
                                            • Instruction ID: 10bc44d46c9649c85d3a4100ad118423b996490ba267a4c79cd44173eda4d165
                                            • Opcode Fuzzy Hash: 448f6272ad08acdc9c4c2949be370514391083ebfa429bc39d77e758db4ba384
                                            • Instruction Fuzzy Hash: 5181C4729043099FCB34DFA4C844ABAB7E9BF89354F14482EF589C7221E774D944EB52
                                            APIs
                                              • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0101C1FC
                                            • GetFocus.USER32 ref: 0101C20C
                                            • GetDlgCtrlID.USER32(00000000), ref: 0101C217
                                            • _memset.LIBCMT ref: 0101C342
                                            • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0101C36D
                                            • GetMenuItemCount.USER32(?), ref: 0101C38D
                                            • GetMenuItemID.USER32(?,00000000), ref: 0101C3A0
                                            • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0101C3D4
                                            • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0101C41C
                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0101C454
                                            • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0101C489
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                            • String ID: 0
                                            • API String ID: 1296962147-4108050209
                                            • Opcode ID: f7b5b76869a56d9cdfbd36b7134d34ae0ad270f8327c26461650667c555d944d
                                            • Instruction ID: 411cafafd5e1b09d6dd3d81f0726d347441a6d86a9842da30c557c5731161642
                                            • Opcode Fuzzy Hash: f7b5b76869a56d9cdfbd36b7134d34ae0ad270f8327c26461650667c555d944d
                                            • Instruction Fuzzy Hash: 4E81AF702883119FE761CF28C984AABBBE8FB88714F00495DFAD597295DB39D904CB52
                                            APIs
                                            • GetDC.USER32(00000000), ref: 0100738F
                                            • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0100739B
                                            • CreateCompatibleDC.GDI32(?), ref: 010073A7
                                            • SelectObject.GDI32(00000000,?), ref: 010073B4
                                            • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 01007408
                                            • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 01007444
                                            • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 01007468
                                            • SelectObject.GDI32(00000006,?), ref: 01007470
                                            • DeleteObject.GDI32(?), ref: 01007479
                                            • DeleteDC.GDI32(00000006), ref: 01007480
                                            • ReleaseDC.USER32(00000000,?), ref: 0100748B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                            • String ID: (
                                            • API String ID: 2598888154-3887548279
                                            • Opcode ID: dfbe4dc1aecdc16211444dee22bb9efefd325a1cb82e37399ee72468bc9dc9a6
                                            • Instruction ID: 9f4c38844264c3d0713c5517dda53c1449d9654ba448ab437a3c609e0c0a301f
                                            • Opcode Fuzzy Hash: dfbe4dc1aecdc16211444dee22bb9efefd325a1cb82e37399ee72468bc9dc9a6
                                            • Instruction Fuzzy Hash: 45515B75900309EFEB25CFA8D885EAEBBB9EF48310F14841DF99997250C739A944CB50
                                            APIs
                                              • Part of subcall function 00FB0957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00F96B0C,?,00008000), ref: 00FB0973
                                              • Part of subcall function 00F94750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F94743,?,?,00F937AE,?), ref: 00F94770
                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F96BAD
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00F96CFA
                                              • Part of subcall function 00F9586D: _wcscpy.LIBCMT ref: 00F958A5
                                              • Part of subcall function 00FB363D: _iswctype.LIBCMT ref: 00FB3645
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                            • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                            • API String ID: 537147316-1018226102
                                            • Opcode ID: 480fc8138ebc22468474783df3e25525a725b68719c14502d93c8a0740d0295f
                                            • Instruction ID: f6a705282f775f42f262aba9a5028a6c358bbe74aff702e9880ab5675ee43a38
                                            • Opcode Fuzzy Hash: 480fc8138ebc22468474783df3e25525a725b68719c14502d93c8a0740d0295f
                                            • Instruction Fuzzy Hash: 5D02BB315083419FDB25EF20C881EAFBBE5AF98314F14491EF499972A1DB38D949EB42
                                            APIs
                                            • _memset.LIBCMT ref: 00FF2D50
                                            • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00FF2DDD
                                            • GetMenuItemCount.USER32(01055890), ref: 00FF2E66
                                            • DeleteMenu.USER32(01055890,00000005,00000000,000000F5,?,?), ref: 00FF2EF6
                                            • DeleteMenu.USER32(01055890,00000004,00000000), ref: 00FF2EFE
                                            • DeleteMenu.USER32(01055890,00000006,00000000), ref: 00FF2F06
                                            • DeleteMenu.USER32(01055890,00000003,00000000), ref: 00FF2F0E
                                            • GetMenuItemCount.USER32(01055890), ref: 00FF2F16
                                            • SetMenuItemInfoW.USER32(01055890,00000004,00000000,00000030), ref: 00FF2F4C
                                            • GetCursorPos.USER32(?), ref: 00FF2F56
                                            • SetForegroundWindow.USER32(00000000), ref: 00FF2F5F
                                            • TrackPopupMenuEx.USER32(01055890,00000000,?,00000000,00000000,00000000), ref: 00FF2F72
                                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00FF2F7E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                            • String ID:
                                            • API String ID: 3993528054-0
                                            • Opcode ID: aa169f8c4265dd56f995a1fbea194c257a95f3c9c980464e7102452418f4b365
                                            • Instruction ID: b6c0f8ae3632c559f7944cf05dd8be1be9885dad902dfedc091a7dceba585865
                                            • Opcode Fuzzy Hash: aa169f8c4265dd56f995a1fbea194c257a95f3c9c980464e7102452418f4b365
                                            • Instruction Fuzzy Hash: 6371C271A0020ABAEB619F54DC85FBABF64FF04764F200216F715AA1F1C7B55820EB94
                                            APIs
                                              • Part of subcall function 00F97BCC: _memmove.LIBCMT ref: 00F97C06
                                            • _memset.LIBCMT ref: 00FE786B
                                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00FE78A0
                                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00FE78BC
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00FE78D8
                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00FE7902
                                            • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00FE792A
                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FE7935
                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FE793A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                            • API String ID: 1411258926-22481851
                                            • Opcode ID: d8a273737c9c62f4ca46f897c62f5bc61af251ff36e8c9589dcd38064415b51f
                                            • Instruction ID: 3ffa99455d977f0421089f98c7a1d2184f84a05871d08048303f91642efac43e
                                            • Opcode Fuzzy Hash: d8a273737c9c62f4ca46f897c62f5bc61af251ff36e8c9589dcd38064415b51f
                                            • Instruction Fuzzy Hash: 2E411572C14229ABDF21EFA5DC85DEEB7B8BF14710F404029F805A7161EB399E08DB90
                                            APIs
                                            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0100FDAD,?,?), ref: 01010E31
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: BuffCharUpper
                                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                            • API String ID: 3964851224-909552448
                                            • Opcode ID: db2648d18f2f878924010c0362b8565e73e677d2f9f3ab7b9dd9b371e29b007d
                                            • Instruction ID: 3a3aac79fe4544109fd0e699eb1f94e60827706f1293036b850ae8265c1e178a
                                            • Opcode Fuzzy Hash: db2648d18f2f878924010c0362b8565e73e677d2f9f3ab7b9dd9b371e29b007d
                                            • Instruction Fuzzy Hash: A741467110024A8BDF01FE14DC96AEF37A4BF45308F144869FCD51B69ADB3D9999CBA0
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00FCE2A0,00000010,?,Bad directive syntax error,0101F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00FEF7C2
                                            • LoadStringW.USER32(00000000,?,00FCE2A0,00000010), ref: 00FEF7C9
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                            • _wprintf.LIBCMT ref: 00FEF7FC
                                            • __swprintf.LIBCMT ref: 00FEF81E
                                            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00FEF88D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                            • API String ID: 1506413516-4153970271
                                            • Opcode ID: a43ce12d8265246e633359c360529dd722b25839dc9e888f1629906646d6a552
                                            • Instruction ID: 6e7e5345ed3ea11f203f3471e99b86e30207bc34c3bb22f0979623dfd68a020c
                                            • Opcode Fuzzy Hash: a43ce12d8265246e633359c360529dd722b25839dc9e888f1629906646d6a552
                                            • Instruction Fuzzy Hash: D421717295031AABDF12FFA1CC4AEED7779BF18300F04486AF50566061EA39A618EB50
                                            APIs
                                              • Part of subcall function 00F97BCC: _memmove.LIBCMT ref: 00F97C06
                                              • Part of subcall function 00F97924: _memmove.LIBCMT ref: 00F979AD
                                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00FF5330
                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00FF5346
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FF5357
                                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00FF5369
                                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00FF537A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: SendString$_memmove
                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                            • API String ID: 2279737902-1007645807
                                            • Opcode ID: 19e8b00d2a895190e97740cf81cc16469bfce274870592f473886113582cf94e
                                            • Instruction ID: 80ffc8c3c87fe2591d5d204e741cc67bb2503ac1e5fd6a1c226688ccacba3a48
                                            • Opcode Fuzzy Hash: 19e8b00d2a895190e97740cf81cc16469bfce274870592f473886113582cf94e
                                            • Instruction Fuzzy Hash: 4711E670E5031D7AEB60F6A6DC89DFF7B7CFF95F50F00082A7501A60A1E9A04C04D560
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                            • String ID: 0.0.0.0
                                            • API String ID: 208665112-3771769585
                                            • Opcode ID: f20821567562add1c0d440a272f15b0eb4fcc32c941017918d8ebf203af81b7c
                                            • Instruction ID: 1fd8f5fa7c201dc0366508e618c3873c67248c1aacabca7ac3ed316cf8fe4019
                                            • Opcode Fuzzy Hash: f20821567562add1c0d440a272f15b0eb4fcc32c941017918d8ebf203af81b7c
                                            • Instruction Fuzzy Hash: DB112B329041196FCB20BB319C4AEEF77BCEF05721F0401A6F985D6061EF79D985AB50
                                            APIs
                                            • timeGetTime.WINMM ref: 00FF4F7A
                                              • Part of subcall function 00FB049F: timeGetTime.WINMM(?,76C1B400,00FA0E7B), ref: 00FB04A3
                                            • Sleep.KERNEL32(0000000A), ref: 00FF4FA6
                                            • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00FF4FCA
                                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00FF4FEC
                                            • SetActiveWindow.USER32 ref: 00FF500B
                                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00FF5019
                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 00FF5038
                                            • Sleep.KERNEL32(000000FA), ref: 00FF5043
                                            • IsWindow.USER32 ref: 00FF504F
                                            • EndDialog.USER32(00000000), ref: 00FF5060
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                            • String ID: BUTTON
                                            • API String ID: 1194449130-3405671355
                                            • Opcode ID: be1c97697109baa17d630038d56131eef59cd7516c731acb2c008cae32da54ed
                                            • Instruction ID: 91e2de4800590dc39e218a396c5fb49d1cbe3a7eef2a8b95bbd09f98b6ae5e39
                                            • Opcode Fuzzy Hash: be1c97697109baa17d630038d56131eef59cd7516c731acb2c008cae32da54ed
                                            • Instruction Fuzzy Hash: 93217F7064470AAFE7315F60EC88B373B69EF4A799F041114F285821A9CB7F9D44EB61
                                            APIs
                                              • Part of subcall function 00F99837: __itow.LIBCMT ref: 00F99862
                                              • Part of subcall function 00F99837: __swprintf.LIBCMT ref: 00F998AC
                                            • CoInitialize.OLE32(00000000), ref: 00FFD5EA
                                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00FFD67D
                                            • SHGetDesktopFolder.SHELL32(?), ref: 00FFD691
                                            • CoCreateInstance.OLE32(01022D7C,00000000,00000001,01048C1C,?), ref: 00FFD6DD
                                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00FFD74C
                                            • CoTaskMemFree.OLE32(?,?), ref: 00FFD7A4
                                            • _memset.LIBCMT ref: 00FFD7E1
                                            • SHBrowseForFolderW.SHELL32(?), ref: 00FFD81D
                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00FFD840
                                            • CoTaskMemFree.OLE32(00000000), ref: 00FFD847
                                            • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00FFD87E
                                            • CoUninitialize.OLE32(00000001,00000000), ref: 00FFD880
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                            • String ID:
                                            • API String ID: 1246142700-0
                                            • Opcode ID: d8baf185d39e82e0c26f17d6eee79ee83d0f69c3a088fc8502d4e1594ba0125f
                                            • Instruction ID: 169a478ee169cd7a630e371d467de876688cc15c7caf9698b6a78dbf81d38f36
                                            • Opcode Fuzzy Hash: d8baf185d39e82e0c26f17d6eee79ee83d0f69c3a088fc8502d4e1594ba0125f
                                            • Instruction Fuzzy Hash: 25B11A75A00209AFDB04DFA8C888DAEBBB9FF48314F048459F909EB261DB34ED45DB50
                                            APIs
                                            • GetDlgItem.USER32(?,00000001), ref: 00FEC283
                                            • GetWindowRect.USER32(00000000,?), ref: 00FEC295
                                            • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00FEC2F3
                                            • GetDlgItem.USER32(?,00000002), ref: 00FEC2FE
                                            • GetWindowRect.USER32(00000000,?), ref: 00FEC310
                                            • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00FEC364
                                            • GetDlgItem.USER32(?,000003E9), ref: 00FEC372
                                            • GetWindowRect.USER32(00000000,?), ref: 00FEC383
                                            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00FEC3C6
                                            • GetDlgItem.USER32(?,000003EA), ref: 00FEC3D4
                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00FEC3F1
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00FEC3FE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$ItemMoveRect$Invalidate
                                            • String ID:
                                            • API String ID: 3096461208-0
                                            • Opcode ID: 7d61141c51695465c4f07af38fea566dc85e0cf1e6ef7cf6287c8bf3f3375314
                                            • Instruction ID: f963b246a58c9e0ab35c3fec6fa366df5112e6305ff6628daa747d6aa2d595a6
                                            • Opcode Fuzzy Hash: 7d61141c51695465c4f07af38fea566dc85e0cf1e6ef7cf6287c8bf3f3375314
                                            • Instruction Fuzzy Hash: 27519071B00205AFDB18CFB9DD89AAEBBBAFB88310F14852DF605D7294DB749D048B50
                                            APIs
                                              • Part of subcall function 00F91B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F92036,?,00000000,?,?,?,?,00F916CB,00000000,?), ref: 00F91B9A
                                            • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00F920D3
                                            • KillTimer.USER32(-00000001,?,?,?,?,00F916CB,00000000,?,?,00F91AE2,?,?), ref: 00F9216E
                                            • DestroyAcceleratorTable.USER32(00000000), ref: 00FCBCA6
                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F916CB,00000000,?,?,00F91AE2,?,?), ref: 00FCBCD7
                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F916CB,00000000,?,?,00F91AE2,?,?), ref: 00FCBCEE
                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F916CB,00000000,?,?,00F91AE2,?,?), ref: 00FCBD0A
                                            • DeleteObject.GDI32(00000000), ref: 00FCBD1C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                            • String ID:
                                            • API String ID: 641708696-0
                                            • Opcode ID: e7abfd2500aeaa7a6b233c616c20af8c5357fef46cf771a534648c9484e85a06
                                            • Instruction ID: b4343a7f9e41412d3af20f8a96818a5f77a0e0abaf6e12860ddfaa44d0421186
                                            • Opcode Fuzzy Hash: e7abfd2500aeaa7a6b233c616c20af8c5357fef46cf771a534648c9484e85a06
                                            • Instruction Fuzzy Hash: C061AE35900B02EFEB75DF14D94AB2AB7F1FF40322F50441CE5829A664C77AA895EF80
                                            APIs
                                              • Part of subcall function 00F925DB: GetWindowLongW.USER32(?,000000EB), ref: 00F925EC
                                            • GetSysColor.USER32(0000000F), ref: 00F921D3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ColorLongWindow
                                            • String ID:
                                            • API String ID: 259745315-0
                                            • Opcode ID: e73d97dea9455899b0148eb0119945145454d176405f048b693ea24b15b78a39
                                            • Instruction ID: b3d031e0765c9dff10ee2ca7631f970a3b2994d85553901c2cccc06a40750688
                                            • Opcode Fuzzy Hash: e73d97dea9455899b0148eb0119945145454d176405f048b693ea24b15b78a39
                                            • Instruction Fuzzy Hash: 8F41E431404141AFFF659F28EC89BB93B65EB06331F184255FEA58A1E5C7368C82EB21
                                            APIs
                                            • CharLowerBuffW.USER32(?,?,0101F910), ref: 00FFA90B
                                            • GetDriveTypeW.KERNEL32(00000061,010489A0,00000061), ref: 00FFA9D5
                                            • _wcscpy.LIBCMT ref: 00FFA9FF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: BuffCharDriveLowerType_wcscpy
                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                            • API String ID: 2820617543-1000479233
                                            • Opcode ID: e69bbee563eb66317faa7bc9c0e6587da02cf2a6c6331869812e8da84602963a
                                            • Instruction ID: e318b01ec1ae4b7260020f1e931177a23e1be4f74868b58cf9edab9c8c578be6
                                            • Opcode Fuzzy Hash: e69bbee563eb66317faa7bc9c0e6587da02cf2a6c6331869812e8da84602963a
                                            • Instruction Fuzzy Hash: 2D51DEB1518305ABC710EF14CC92AAFB7A5FF84310F14482DF699572A2DB78DD09EA43
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __i64tow__itow__swprintf
                                            • String ID: %.15g$0x%p$False$True
                                            • API String ID: 421087845-2263619337
                                            • Opcode ID: e10053e8456454c3d0b1026a0a7694e0bae1a7cc4cca99cfae7098ee4ef6ac3b
                                            • Instruction ID: 06a4d527e0c766f9ed9330da1ce83a03927cbba0d297a9d54b4d865dd0c38d56
                                            • Opcode Fuzzy Hash: e10053e8456454c3d0b1026a0a7694e0bae1a7cc4cca99cfae7098ee4ef6ac3b
                                            • Instruction Fuzzy Hash: C9412972904206AFEF24DF39DD42FBAB3E9EF09310F24487EE549C7241EA759905AB10
                                            APIs
                                            • _memset.LIBCMT ref: 0101716A
                                            • CreateMenu.USER32 ref: 01017185
                                            • SetMenu.USER32(?,00000000), ref: 01017194
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01017221
                                            • IsMenu.USER32(?), ref: 01017237
                                            • CreatePopupMenu.USER32 ref: 01017241
                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0101726E
                                            • DrawMenuBar.USER32 ref: 01017276
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                            • String ID: 0$F
                                            • API String ID: 176399719-3044882817
                                            • Opcode ID: 845fb95c03aeeecce417a9b7236f93a2f7c686e9214093b848f9878690631ac3
                                            • Instruction ID: b1f5e2206ebe35f75a91fd4eb975ad950bbc9f1ec66cac95ab2096961c95dff5
                                            • Opcode Fuzzy Hash: 845fb95c03aeeecce417a9b7236f93a2f7c686e9214093b848f9878690631ac3
                                            • Instruction Fuzzy Hash: 97413574A01209EFEB20DFA8D884EDA7BF5FF48310F140068FA85A7355D73AA914CB90
                                            APIs
                                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0101755E
                                            • CreateCompatibleDC.GDI32(00000000), ref: 01017565
                                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 01017578
                                            • SelectObject.GDI32(00000000,00000000), ref: 01017580
                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0101758B
                                            • DeleteDC.GDI32(00000000), ref: 01017594
                                            • GetWindowLongW.USER32(?,000000EC), ref: 0101759E
                                            • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 010175B2
                                            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 010175BE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                            • String ID: static
                                            • API String ID: 2559357485-2160076837
                                            • Opcode ID: f2c929cfb3245c4616e08a7dcba1af85848327c9c62994091a488048d76d410a
                                            • Instruction ID: d8ffa57273da394989be400d68e632ca4ec7daa9a304dde6ba1815ad0ab85e07
                                            • Opcode Fuzzy Hash: f2c929cfb3245c4616e08a7dcba1af85848327c9c62994091a488048d76d410a
                                            • Instruction Fuzzy Hash: 9F316D32100216BBDF229F68DC08FDB3FA9FF09360F110214FA9596194CB7AD815DBA4
                                            APIs
                                            • _memset.LIBCMT ref: 00FB6E3E
                                              • Part of subcall function 00FB8B28: __getptd_noexit.LIBCMT ref: 00FB8B28
                                            • __gmtime64_s.LIBCMT ref: 00FB6ED7
                                            • __gmtime64_s.LIBCMT ref: 00FB6F0D
                                            • __gmtime64_s.LIBCMT ref: 00FB6F2A
                                            • __allrem.LIBCMT ref: 00FB6F80
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FB6F9C
                                            • __allrem.LIBCMT ref: 00FB6FB3
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FB6FD1
                                            • __allrem.LIBCMT ref: 00FB6FE8
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FB7006
                                            • __invoke_watson.LIBCMT ref: 00FB7077
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                            • String ID:
                                            • API String ID: 384356119-0
                                            • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                            • Instruction ID: 40bffd88fb0f5c69b0cb46fbda0575584e771e784daa6486d87b85b52067aed2
                                            • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                            • Instruction Fuzzy Hash: 8771F876E00717ABD714FE6ADC42BEAB7B8AF44364F14812EF514D6281E778D900AF90
                                            APIs
                                            • _memset.LIBCMT ref: 00FF2542
                                            • GetMenuItemInfoW.USER32(01055890,000000FF,00000000,00000030), ref: 00FF25A3
                                            • SetMenuItemInfoW.USER32(01055890,00000004,00000000,00000030), ref: 00FF25D9
                                            • Sleep.KERNEL32(000001F4), ref: 00FF25EB
                                            • GetMenuItemCount.USER32(?), ref: 00FF262F
                                            • GetMenuItemID.USER32(?,00000000), ref: 00FF264B
                                            • GetMenuItemID.USER32(?,-00000001), ref: 00FF2675
                                            • GetMenuItemID.USER32(?,?), ref: 00FF26BA
                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00FF2700
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FF2714
                                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FF2735
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                            • String ID:
                                            • API String ID: 4176008265-0
                                            • Opcode ID: 5d6d6721063944ee80ecdad8b762983995c9660ce69b376b1d346078ea1cde9e
                                            • Instruction ID: 1b343f9a436486fd8b14265180de62d188f7f64d556ecd83f020f78a0a4009d5
                                            • Opcode Fuzzy Hash: 5d6d6721063944ee80ecdad8b762983995c9660ce69b376b1d346078ea1cde9e
                                            • Instruction Fuzzy Hash: 4A618F7190024DAFDB61DFA4DC88EBEBBB8EF05354F140059EA41A7261D73AAD05EB21
                                            APIs
                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 01016FA5
                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 01016FA8
                                            • GetWindowLongW.USER32(?,000000F0), ref: 01016FCC
                                            • _memset.LIBCMT ref: 01016FDD
                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 01016FEF
                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 01017067
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$LongWindow_memset
                                            • String ID:
                                            • API String ID: 830647256-0
                                            • Opcode ID: 45dac03c0cd201c2710ddb9ea5be92e44ec380354efbd2d2b7bf9190bb2bb211
                                            • Instruction ID: d9276d6acd52baed47d1eb9b394f52f9854db7e41944ffdd2fe0b593ffa70684
                                            • Opcode Fuzzy Hash: 45dac03c0cd201c2710ddb9ea5be92e44ec380354efbd2d2b7bf9190bb2bb211
                                            • Instruction Fuzzy Hash: C0617C75900208AFDB21DFA8CC81EEE77F9EF09710F100199FA55EB291C779A945CB90
                                            APIs
                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00FE6BBF
                                            • SafeArrayAllocData.OLEAUT32(?), ref: 00FE6C18
                                            • VariantInit.OLEAUT32(?), ref: 00FE6C2A
                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00FE6C4A
                                            • VariantCopy.OLEAUT32(?,?), ref: 00FE6C9D
                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00FE6CB1
                                            • VariantClear.OLEAUT32(?), ref: 00FE6CC6
                                            • SafeArrayDestroyData.OLEAUT32(?), ref: 00FE6CD3
                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FE6CDC
                                            • VariantClear.OLEAUT32(?), ref: 00FE6CEE
                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FE6CF9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                            • String ID:
                                            • API String ID: 2706829360-0
                                            • Opcode ID: 8c7bec63d8fae1299752bba1dacd31d6e0f3ec40b229fad86d4e9b2c82b37ea9
                                            • Instruction ID: 21eb4976947994490c40dea9cf06a37dbc7446e396155aeb32285b4203b8d3c7
                                            • Opcode Fuzzy Hash: 8c7bec63d8fae1299752bba1dacd31d6e0f3ec40b229fad86d4e9b2c82b37ea9
                                            • Instruction Fuzzy Hash: FA419131A0021E9FDF10DFA9D8449ADBBB9FF58350F008069F995E7251CB39A949DF90
                                            APIs
                                            • WSAStartup.WSOCK32(00000101,?), ref: 01005793
                                            • inet_addr.WSOCK32(?,?,?), ref: 010057D8
                                            • gethostbyname.WSOCK32(?), ref: 010057E4
                                            • IcmpCreateFile.IPHLPAPI ref: 010057F2
                                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 01005862
                                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 01005878
                                            • IcmpCloseHandle.IPHLPAPI(00000000), ref: 010058ED
                                            • WSACleanup.WSOCK32 ref: 010058F3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                            • String ID: Ping
                                            • API String ID: 1028309954-2246546115
                                            • Opcode ID: 75bb173bf027c1619f778ab195f343458b16ed896ed2f613834870e734f7dd6d
                                            • Instruction ID: 1b3c8f9a36243699176c7d7044f3f0a4095162c2b22adfd83776bb1713e98c1e
                                            • Opcode Fuzzy Hash: 75bb173bf027c1619f778ab195f343458b16ed896ed2f613834870e734f7dd6d
                                            • Instruction Fuzzy Hash: 9B514D316042019FEB22DF29DC45B2A7BE4EF49720F044969F996EB2D1DB78E904DF42
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 00FFB4D0
                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00FFB546
                                            • GetLastError.KERNEL32 ref: 00FFB550
                                            • SetErrorMode.KERNEL32(00000000,READY), ref: 00FFB5BD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Error$Mode$DiskFreeLastSpace
                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                            • API String ID: 4194297153-14809454
                                            • Opcode ID: abbd5c124e7bddb1532634c898b600ab9b65326438e4670f49dfe9795c6b98c4
                                            • Instruction ID: b32f539d730669359ed0cfa57f76840a2204d8dc895cd70c9e2a2c59291842fa
                                            • Opcode Fuzzy Hash: abbd5c124e7bddb1532634c898b600ab9b65326438e4670f49dfe9795c6b98c4
                                            • Instruction Fuzzy Hash: 2C31A075A002099FDB10EFA8C885ABD77B4EF05714F18802AE605DB2A5DB799A01EB80
                                            APIs
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                              • Part of subcall function 00FEAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FEAABC
                                            • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00FE9014
                                            • GetDlgCtrlID.USER32 ref: 00FE901F
                                            • GetParent.USER32 ref: 00FE903B
                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FE903E
                                            • GetDlgCtrlID.USER32(?), ref: 00FE9047
                                            • GetParent.USER32(?), ref: 00FE9063
                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FE9066
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 1536045017-1403004172
                                            • Opcode ID: b3f7b814ae29dbffd2ded54699056dacc408d1e4613ccf80308f6178596b66d4
                                            • Instruction ID: 35a8ae2a5377c679ed6e109ed3a7e6f3a7b2c200482bbe95f2fbbb54a8119644
                                            • Opcode Fuzzy Hash: b3f7b814ae29dbffd2ded54699056dacc408d1e4613ccf80308f6178596b66d4
                                            • Instruction Fuzzy Hash: 3F21D670A00249BBEF15ABB1CC85EFEBB75EF49320F100119F961972A1DB7D5819EB20
                                            APIs
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                              • Part of subcall function 00FEAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FEAABC
                                            • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00FE90FD
                                            • GetDlgCtrlID.USER32 ref: 00FE9108
                                            • GetParent.USER32 ref: 00FE9124
                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FE9127
                                            • GetDlgCtrlID.USER32(?), ref: 00FE9130
                                            • GetParent.USER32(?), ref: 00FE914C
                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FE914F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 1536045017-1403004172
                                            • Opcode ID: 78ffcd13ec4f5b480f0b0c096bda63554e50e1ac84b985baee0520b7863c243a
                                            • Instruction ID: 26b3d98e236b1ea682a1c1338351373c0b4712d7b7b8e9414ecd0491b2a4f669
                                            • Opcode Fuzzy Hash: 78ffcd13ec4f5b480f0b0c096bda63554e50e1ac84b985baee0520b7863c243a
                                            • Instruction Fuzzy Hash: 3321C575A00249BBEF11ABB5CC85EFEBB74EF48310F10401AF951972A5DB7D9819EB20
                                            APIs
                                            • GetParent.USER32 ref: 00FE916F
                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00FE9184
                                            • _wcscmp.LIBCMT ref: 00FE9196
                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00FE9211
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameParentSend_wcscmp
                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                            • API String ID: 1704125052-3381328864
                                            • Opcode ID: 23dde4f7b6bcdef3b7f9b15404952a2abf49b1473f7af0a607e4abcb9443539b
                                            • Instruction ID: ca9b8b35c7cbdcdfb4a131ff1baef725e98acdc623e09509a977603870a25b6f
                                            • Opcode Fuzzy Hash: 23dde4f7b6bcdef3b7f9b15404952a2abf49b1473f7af0a607e4abcb9443539b
                                            • Instruction Fuzzy Hash: A5110A7B64C387BAFE212527DC06DE7379C9B15730B200426FA00E4095FFAA9D517A64
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 010088D7
                                            • CoInitialize.OLE32(00000000), ref: 01008904
                                            • CoUninitialize.OLE32 ref: 0100890E
                                            • GetRunningObjectTable.OLE32(00000000,?), ref: 01008A0E
                                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 01008B3B
                                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,01022C0C), ref: 01008B6F
                                            • CoGetObject.OLE32(?,00000000,01022C0C,?), ref: 01008B92
                                            • SetErrorMode.KERNEL32(00000000), ref: 01008BA5
                                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 01008C25
                                            • VariantClear.OLEAUT32(?), ref: 01008C35
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                            • String ID:
                                            • API String ID: 2395222682-0
                                            • Opcode ID: 1b9257ffddbe9a671e866a616662a674c5624c1f28dc26d61679a6492bdece1b
                                            • Instruction ID: 1eb0bcdebec701b4bd18a4d792d37115b02f0c81e9d00088a5dbda56ee35519a
                                            • Opcode Fuzzy Hash: 1b9257ffddbe9a671e866a616662a674c5624c1f28dc26d61679a6492bdece1b
                                            • Instruction Fuzzy Hash: BAC148B16083059FE701EF68C88492BB7E9FF89348F00495DF9899B291DB75ED05CB52
                                            APIs
                                            • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00FF7A6C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ArraySafeVartype
                                            • String ID:
                                            • API String ID: 1725837607-0
                                            • Opcode ID: 15541723ca64c22e4f49548638bf722482b6304024b05f975ace10b7286fa5d1
                                            • Instruction ID: 0763365a82c64bfea936a21a1fcb3c93b24d8e04bc3608ffe20d0a7ae0921a97
                                            • Opcode Fuzzy Hash: 15541723ca64c22e4f49548638bf722482b6304024b05f975ace10b7286fa5d1
                                            • Instruction Fuzzy Hash: 0CB19F7190830E9FDB10EF94D884BBEF7B4EF49321F144029E651E72A1D778A941EB90
                                            APIs
                                            • GetCurrentThreadId.KERNEL32 ref: 00FF11F0
                                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00FF0268,?,00000001), ref: 00FF1204
                                            • GetWindowThreadProcessId.USER32(00000000), ref: 00FF120B
                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FF0268,?,00000001), ref: 00FF121A
                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FF122C
                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FF0268,?,00000001), ref: 00FF1245
                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FF0268,?,00000001), ref: 00FF1257
                                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00FF0268,?,00000001), ref: 00FF129C
                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00FF0268,?,00000001), ref: 00FF12B1
                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00FF0268,?,00000001), ref: 00FF12BC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                            • String ID:
                                            • API String ID: 2156557900-0
                                            • Opcode ID: 2ec54cc4af344b4b5d2d5eb813e796a4bf6ebdca25b5ac32cacb473c3c153190
                                            • Instruction ID: 8d441fb9567248d51bca217339d2fec8617616d9e959fbc1a49a659b8edaab68
                                            • Opcode Fuzzy Hash: 2ec54cc4af344b4b5d2d5eb813e796a4bf6ebdca25b5ac32cacb473c3c153190
                                            • Instruction Fuzzy Hash: D131AC75A00308EBDB30DFA4E888B7A37A9BF58331F504215FA45C61A5D77A9D44AB60
                                            APIs
                                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00F9FAA6
                                            • OleUninitialize.OLE32(?,00000000), ref: 00F9FB45
                                            • UnregisterHotKey.USER32(?), ref: 00F9FC9C
                                            • DestroyWindow.USER32(?), ref: 00FD45D6
                                            • FreeLibrary.KERNEL32(?), ref: 00FD463B
                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00FD4668
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                            • String ID: close all
                                            • API String ID: 469580280-3243417748
                                            • Opcode ID: 9dda68605da67cff568523bdddd94cc9cb0293f60d52df6c6574f906226567c9
                                            • Instruction ID: 72e14bb778486a20eff08f226b6b6f634ecaf4a16eb3db3f59d088f6fc0c69f3
                                            • Opcode Fuzzy Hash: 9dda68605da67cff568523bdddd94cc9cb0293f60d52df6c6574f906226567c9
                                            • Instruction Fuzzy Hash: 63A16C31B01212CFDB29EF14C995B69F365BF05710F5442ADE80AAB251DB34ED1AEF50
                                            APIs
                                            • EnumChildWindows.USER32(?,00FEA439), ref: 00FEA377
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ChildEnumWindows
                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                            • API String ID: 3555792229-1603158881
                                            • Opcode ID: 6d466a1256f63c982fe0557be9c10433a0bb9119154755b6f98b1de136ae57ef
                                            • Instruction ID: aeb950982b39f0b20f42b55e14420cb03763fd3a8c63a408c5af5b2f3ac43bb2
                                            • Opcode Fuzzy Hash: 6d466a1256f63c982fe0557be9c10433a0bb9119154755b6f98b1de136ae57ef
                                            • Instruction Fuzzy Hash: 2791F631A00646AFDB18EFA1C881BEEFB74FF04310F548119E959A3141DF357999EBA1
                                            APIs
                                            • SetWindowLongW.USER32(?,000000EB), ref: 00F92EAE
                                              • Part of subcall function 00F91DB3: GetClientRect.USER32(?,?), ref: 00F91DDC
                                              • Part of subcall function 00F91DB3: GetWindowRect.USER32(?,?), ref: 00F91E1D
                                              • Part of subcall function 00F91DB3: ScreenToClient.USER32(?,?), ref: 00F91E45
                                            • GetDC.USER32 ref: 00FCCD32
                                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00FCCD45
                                            • SelectObject.GDI32(00000000,00000000), ref: 00FCCD53
                                            • SelectObject.GDI32(00000000,00000000), ref: 00FCCD68
                                            • ReleaseDC.USER32(?,00000000), ref: 00FCCD70
                                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00FCCDFB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                            • String ID: U
                                            • API String ID: 4009187628-3372436214
                                            • Opcode ID: 291b5a1decd251c84fadcb8e27bcaca8681cf55fa2ad682ba2e4daddd563eb22
                                            • Instruction ID: 89e04ed438552d6979e47e83fdee9790643d27e1085a98ae6a7a86135a9c8bf3
                                            • Opcode Fuzzy Hash: 291b5a1decd251c84fadcb8e27bcaca8681cf55fa2ad682ba2e4daddd563eb22
                                            • Instruction Fuzzy Hash: 4A71E431900206EFDF21DF64C981FAA7BB5FF49320F14426EED9A5A255D7358C41EBA0
                                            APIs
                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 01001A50
                                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 01001A7C
                                            • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 01001ABE
                                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 01001AD3
                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 01001AE0
                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 01001B10
                                            • InternetCloseHandle.WININET(00000000), ref: 01001B57
                                              • Part of subcall function 01002483: GetLastError.KERNEL32(?,?,01001817,00000000,00000000,00000001), ref: 01002498
                                              • Part of subcall function 01002483: SetEvent.KERNEL32(?,?,01001817,00000000,00000000,00000001), ref: 010024AD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                            • String ID:
                                            • API String ID: 2603140658-3916222277
                                            • Opcode ID: c5ffe565d4e478f97824eada3153ad0202d20ec5691f9f9976e648c1f4a8c154
                                            • Instruction ID: 4eef0267939989f042fda04ba3a159d518bd4f58c301ae9fe2c9e3c42381dfb7
                                            • Opcode Fuzzy Hash: c5ffe565d4e478f97824eada3153ad0202d20ec5691f9f9976e648c1f4a8c154
                                            • Instruction Fuzzy Hash: DA416DB1500619BFFB129F54CC89FFA7BACFF08354F004156FA859A181EBB5DA448BA0
                                            APIs
                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0101F910), ref: 01008D28
                                            • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0101F910), ref: 01008D5C
                                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 01008ED6
                                            • SysFreeString.OLEAUT32(?), ref: 01008F00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                            • String ID:
                                            • API String ID: 560350794-0
                                            • Opcode ID: 2dfe0cc510389d4bab262fdaf53a0ec8da1d4d3fd23b7c390a76230ee749fc29
                                            • Instruction ID: 79c1dfda496a844a400352f512c5e9ba662e5b357b63b85e37cfd64967d0aa7d
                                            • Opcode Fuzzy Hash: 2dfe0cc510389d4bab262fdaf53a0ec8da1d4d3fd23b7c390a76230ee749fc29
                                            • Instruction Fuzzy Hash: 6BF17F71A00209EFEF15DF98C884EAEB7B9FF45314F108499F945AB291DB31AE45CB50
                                            APIs
                                            • _memset.LIBCMT ref: 0100F6B5
                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0100F848
                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0100F86C
                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0100F8AC
                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0100F8CE
                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0100FA4A
                                            • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0100FA7C
                                            • CloseHandle.KERNEL32(?), ref: 0100FAAB
                                            • CloseHandle.KERNEL32(?), ref: 0100FB22
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                            • String ID:
                                            • API String ID: 4090791747-0
                                            • Opcode ID: f76ad5d95767f88b35d58f734cef7e9ecf72193b5826d8313407b2e73e7688d3
                                            • Instruction ID: c1de27cff8fc3f77f88a7370e156b4feb2e2404dc7d83b945adadb2718b19511
                                            • Opcode Fuzzy Hash: f76ad5d95767f88b35d58f734cef7e9ecf72193b5826d8313407b2e73e7688d3
                                            • Instruction Fuzzy Hash: 1DE1E4312043019FEB25EF29C881A6ABBE0FF85350F04855DF9C98B2A1CB35DD45EB52
                                            APIs
                                              • Part of subcall function 00FF466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FF3697,?), ref: 00FF468B
                                              • Part of subcall function 00FF466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FF3697,?), ref: 00FF46A4
                                              • Part of subcall function 00FF4A31: GetFileAttributesW.KERNEL32(?,00FF370B), ref: 00FF4A32
                                            • lstrcmpiW.KERNEL32(?,?), ref: 00FF4D40
                                            • _wcscmp.LIBCMT ref: 00FF4D5A
                                            • MoveFileW.KERNEL32(?,?), ref: 00FF4D75
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                            • String ID:
                                            • API String ID: 793581249-0
                                            • Opcode ID: 933a5c88060df45c138b440c36510fe1b8197e523363f524fe6e96659de2f13d
                                            • Instruction ID: 552ffba259fea6f9b382a7a4abf3087e71462a694e77ae9ce4c08ab8041d6c68
                                            • Opcode Fuzzy Hash: 933a5c88060df45c138b440c36510fe1b8197e523363f524fe6e96659de2f13d
                                            • Instruction Fuzzy Hash: 515155B24083499BD725DB64DC819EFB3ECAF84350F00091EB289D3151EE79B688DB66
                                            APIs
                                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 010186FF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: InvalidateRect
                                            • String ID:
                                            • API String ID: 634782764-0
                                            • Opcode ID: efc721d07ae5271be2e63c3b6443ca9c2e8219c59f3dbbb3cd52ef17068d2e98
                                            • Instruction ID: ad6ddd487a8113c9c082ff2270db7e466865288e517b6a270e7299fbdb99ed7b
                                            • Opcode Fuzzy Hash: efc721d07ae5271be2e63c3b6443ca9c2e8219c59f3dbbb3cd52ef17068d2e98
                                            • Instruction Fuzzy Hash: C151B430500205BEEF609B28DC84FAD3BA5BB09750F208553FAD0E61A9D77EE750CB50
                                            APIs
                                            • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00FCC2F7
                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00FCC319
                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00FCC331
                                            • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00FCC34F
                                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00FCC370
                                            • DestroyIcon.USER32(00000000), ref: 00FCC37F
                                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00FCC39C
                                            • DestroyIcon.USER32(?), ref: 00FCC3AB
                                              • Part of subcall function 0101A4AF: DeleteObject.GDI32(00000000), ref: 0101A4E8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                            • String ID:
                                            • API String ID: 2819616528-0
                                            • Opcode ID: 6676219c3902c528be86339a11e9bb244b47f34e5eb0b0a1f1107cf72901973e
                                            • Instruction ID: 3ec7c350d8542252ad99b8023298fa42911e7cb1404f7beb4ce7943b254bd2d9
                                            • Opcode Fuzzy Hash: 6676219c3902c528be86339a11e9bb244b47f34e5eb0b0a1f1107cf72901973e
                                            • Instruction Fuzzy Hash: 1B514971A0020AAFEF24DF64DC45FAA7BE5FB58320F104518F946E7290DB75AD50EB90
                                            APIs
                                              • Part of subcall function 00FEA82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00FEA84C
                                              • Part of subcall function 00FEA82C: GetCurrentThreadId.KERNEL32 ref: 00FEA853
                                              • Part of subcall function 00FEA82C: AttachThreadInput.USER32(00000000,?,00FE9683,?,00000001), ref: 00FEA85A
                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FE968E
                                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00FE96AB
                                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00FE96AE
                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FE96B7
                                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00FE96D5
                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00FE96D8
                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FE96E1
                                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00FE96F8
                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00FE96FB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                            • String ID:
                                            • API String ID: 2014098862-0
                                            • Opcode ID: 6436cec2bd255ae4df252e385b8f9867b52962ef66b840c015bf0c2343b4ccb8
                                            • Instruction ID: ef6b6f006b4c18986f6f9b919df1bbd9a3c7e20a5941a428d5db47d9f314d3ba
                                            • Opcode Fuzzy Hash: 6436cec2bd255ae4df252e385b8f9867b52962ef66b840c015bf0c2343b4ccb8
                                            • Instruction Fuzzy Hash: 2F11CEB1910619BEF6206B719C89F6A3E2DEB4C794F100415F284AB094C9FB6C109BB4
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00FE853C,00000B00,?,?), ref: 00FE892A
                                            • HeapAlloc.KERNEL32(00000000,?,00FE853C,00000B00,?,?), ref: 00FE8931
                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00FE853C,00000B00,?,?), ref: 00FE8946
                                            • GetCurrentProcess.KERNEL32(?,00000000,?,00FE853C,00000B00,?,?), ref: 00FE894E
                                            • DuplicateHandle.KERNEL32(00000000,?,00FE853C,00000B00,?,?), ref: 00FE8951
                                            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00FE853C,00000B00,?,?), ref: 00FE8961
                                            • GetCurrentProcess.KERNEL32(00FE853C,00000000,?,00FE853C,00000B00,?,?), ref: 00FE8969
                                            • DuplicateHandle.KERNEL32(00000000,?,00FE853C,00000B00,?,?), ref: 00FE896C
                                            • CreateThread.KERNEL32(00000000,00000000,00FE8992,00000000,00000000,00000000), ref: 00FE8986
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                            • String ID:
                                            • API String ID: 1957940570-0
                                            • Opcode ID: f907407e026a4828e20c81e0e371839576cf1d0ac11d3ff01cb81b92f66753d9
                                            • Instruction ID: 35d6019cf8931cd33af8e5ee0fe6ec9c8434b46f3ac705318cdc729b70c66ca8
                                            • Opcode Fuzzy Hash: f907407e026a4828e20c81e0e371839576cf1d0ac11d3ff01cb81b92f66753d9
                                            • Instruction Fuzzy Hash: 6201CDB5640349BFE720AFA5DC4DF6B3BACEB89711F408411FA49DB195CAB99C04CB21
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: NULL Pointer assignment$Not an Object type
                                            • API String ID: 0-572801152
                                            • Opcode ID: 97324547cf848d41f0a984846518a03bca5c4b546904d3463a1060d130632fa9
                                            • Instruction ID: a2ab2808657255ebd37995496ede836653ebdd1d66280b98972cbb9693111a09
                                            • Opcode Fuzzy Hash: 97324547cf848d41f0a984846518a03bca5c4b546904d3463a1060d130632fa9
                                            • Instruction Fuzzy Hash: A4C1C471A0024A9FEF11DF99C884EAEB7F5FF48318F148469E949AB2C2E7709D45CB50
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Variant$ClearInit$_memset
                                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                            • API String ID: 2862541840-625585964
                                            • Opcode ID: 2a2f891d0f809191f50e2f6e1e281658d85280fd881fb7085cf3e2fc5e4ee58f
                                            • Instruction ID: c099ea3b65f3d584a2180db3aaf52992452a9a26ae28162dfc8e020355b10c82
                                            • Opcode Fuzzy Hash: 2a2f891d0f809191f50e2f6e1e281658d85280fd881fb7085cf3e2fc5e4ee58f
                                            • Instruction Fuzzy Hash: 27918071A00209ABEF25DFA5CC48FAEBBB8EF45714F008559F559AB2C2D7749904CFA0
                                            APIs
                                              • Part of subcall function 00FE710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE7044,80070057,?,?,?,00FE7455), ref: 00FE7127
                                              • Part of subcall function 00FE710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE7044,80070057,?,?), ref: 00FE7142
                                              • Part of subcall function 00FE710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE7044,80070057,?,?), ref: 00FE7150
                                              • Part of subcall function 00FE710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE7044,80070057,?), ref: 00FE7160
                                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 01009806
                                            • _memset.LIBCMT ref: 01009813
                                            • _memset.LIBCMT ref: 01009956
                                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 01009982
                                            • CoTaskMemFree.OLE32(?), ref: 0100998D
                                            Strings
                                            • NULL Pointer assignment, xrefs: 010099DB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                            • String ID: NULL Pointer assignment
                                            • API String ID: 1300414916-2785691316
                                            • Opcode ID: 61ca4b6651e3311ac2abba26b85ccf55f16a6272d447135629a45051f7634faa
                                            • Instruction ID: d50fe49b6e3324d70a846fa1f2de499dbdc303eb1a274d251e129e9159944a64
                                            • Opcode Fuzzy Hash: 61ca4b6651e3311ac2abba26b85ccf55f16a6272d447135629a45051f7634faa
                                            • Instruction Fuzzy Hash: 20915871D00229EBEF11DFA5CC80EDEBBB9AF48714F10415AF519A7281DB359A44CFA0
                                            APIs
                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 01016E24
                                            • SendMessageW.USER32(?,00001036,00000000,?), ref: 01016E38
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 01016E52
                                            • _wcscat.LIBCMT ref: 01016EAD
                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 01016EC4
                                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 01016EF2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window_wcscat
                                            • String ID: SysListView32
                                            • API String ID: 307300125-78025650
                                            • Opcode ID: 75ff2b9ae5f5ddb5057b935213862d8ac4f38289330b75b6f7b63aa20105dd61
                                            • Instruction ID: 5756eb636efcea2668ecf81c436be09629cd6dc1eca52f1516aba450419561f0
                                            • Opcode Fuzzy Hash: 75ff2b9ae5f5ddb5057b935213862d8ac4f38289330b75b6f7b63aa20105dd61
                                            • Instruction Fuzzy Hash: FB419371900349EBEB21DFA8CC85BEE77E8EF08354F10456AF584E7191D6BA99848B60
                                            APIs
                                              • Part of subcall function 00FF3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00FF3C7A
                                              • Part of subcall function 00FF3C55: Process32FirstW.KERNEL32(00000000,?), ref: 00FF3C88
                                              • Part of subcall function 00FF3C55: CloseHandle.KERNEL32(00000000), ref: 00FF3D52
                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0100E9A4
                                            • GetLastError.KERNEL32 ref: 0100E9B7
                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0100E9E6
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 0100EA63
                                            • GetLastError.KERNEL32(00000000), ref: 0100EA6E
                                            • CloseHandle.KERNEL32(00000000), ref: 0100EAA3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                            • String ID: SeDebugPrivilege
                                            • API String ID: 2533919879-2896544425
                                            • Opcode ID: e011bc16592c836cf33c4158f5374363bce879e8de23f833eaa4c318b8af94f0
                                            • Instruction ID: ef5ddf3cbd17eeafee8c4c3e0f0ce56dc5ae6fd738f2a907d51bca5546e73a31
                                            • Opcode Fuzzy Hash: e011bc16592c836cf33c4158f5374363bce879e8de23f833eaa4c318b8af94f0
                                            • Instruction Fuzzy Hash: F941AE712042019FEB16EF18CC95F6DB7E5AF46314F08845CF9869B2C2DBB9A848DB91
                                            APIs
                                            • LoadIconW.USER32(00000000,00007F03), ref: 00FF3033
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: IconLoad
                                            • String ID: blank$info$question$stop$warning
                                            • API String ID: 2457776203-404129466
                                            • Opcode ID: 94ba52262acba7fe67e002c61a6634095f7043d9e502d317dbc3a039c0980627
                                            • Instruction ID: 11056c4606dd8723e5feb171da16502ef2861c18ba07515f1de63a8bae576e3e
                                            • Opcode Fuzzy Hash: 94ba52262acba7fe67e002c61a6634095f7043d9e502d317dbc3a039c0980627
                                            • Instruction Fuzzy Hash: CF112B3274838ABFE7149A56DC82DBB779C9F15734B20402BFB00A6181EF759F407AA0
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00FF4312
                                            • LoadStringW.USER32(00000000), ref: 00FF4319
                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00FF432F
                                            • LoadStringW.USER32(00000000), ref: 00FF4336
                                            • _wprintf.LIBCMT ref: 00FF435C
                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FF437A
                                            Strings
                                            • %s (%d) : ==> %s: %s %s, xrefs: 00FF4357
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: HandleLoadModuleString$Message_wprintf
                                            • String ID: %s (%d) : ==> %s: %s %s
                                            • API String ID: 3648134473-3128320259
                                            • Opcode ID: 273cdb50fc18a0803616099f66e336b52fd1684d5618d8d2cb53e78c28796361
                                            • Instruction ID: bd596955182e02619630194ee104f543981d65dce482e393a938caca843fbdb2
                                            • Opcode Fuzzy Hash: 273cdb50fc18a0803616099f66e336b52fd1684d5618d8d2cb53e78c28796361
                                            • Instruction Fuzzy Hash: 1B018FF2900209BFE721E6A0DD89EF7776CEB08300F000591BB89E2005EA395E884B70
                                            APIs
                                              • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                                            • GetSystemMetrics.USER32(0000000F), ref: 0101D47C
                                            • GetSystemMetrics.USER32(0000000F), ref: 0101D49C
                                            • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0101D6D7
                                            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0101D6F5
                                            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0101D716
                                            • ShowWindow.USER32(00000003,00000000), ref: 0101D735
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0101D75A
                                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 0101D77D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                            • String ID:
                                            • API String ID: 1211466189-0
                                            • Opcode ID: fdbdf9db48632923314304cce56b864c472161315845772d7642c7e03e0c7942
                                            • Instruction ID: 5c59fc2e31f9c424c90941e655d58d770fcf15af6480549b44bd648f8cc1239d
                                            • Opcode Fuzzy Hash: fdbdf9db48632923314304cce56b864c472161315845772d7642c7e03e0c7942
                                            • Instruction Fuzzy Hash: 62B18B71600215ABDF14CFACC9897AD7BF1BF08701F0481A9ED889F299E739A950CB50
                                            APIs
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                              • Part of subcall function 01010E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0100FDAD,?,?), ref: 01010E31
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0100FDEE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: BuffCharConnectRegistryUpper_memmove
                                            • String ID:
                                            • API String ID: 3479070676-0
                                            • Opcode ID: eec77fad1f3ea4281ad39756d7e4de719b986f185530365f8993e54b5e5dc97f
                                            • Instruction ID: 56024c15f186599a2a87067c45e74ea60ce2941957badd3f88e98def06720ebd
                                            • Opcode Fuzzy Hash: eec77fad1f3ea4281ad39756d7e4de719b986f185530365f8993e54b5e5dc97f
                                            • Instruction Fuzzy Hash: A3A180712043029FEB21EF18C885B6EBBE5BF85314F04841DF9958B292DB79E949DF42
                                            APIs
                                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00FCC1C7,00000004,00000000,00000000,00000000), ref: 00F92ACF
                                            • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00FCC1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00F92B17
                                            • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00FCC1C7,00000004,00000000,00000000,00000000), ref: 00FCC21A
                                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00FCC1C7,00000004,00000000,00000000,00000000), ref: 00FCC286
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ShowWindow
                                            • String ID:
                                            • API String ID: 1268545403-0
                                            • Opcode ID: 73fb638d7267bff63ce67d1a6423deeb450393ece44def85d210a3383934a2d2
                                            • Instruction ID: d2e28138dfa921bcaaa75e9fceefe965b710008777a41aff434e60aea7492281
                                            • Opcode Fuzzy Hash: 73fb638d7267bff63ce67d1a6423deeb450393ece44def85d210a3383934a2d2
                                            • Instruction Fuzzy Hash: 1B411D33A08781BAEFB69B39CD8CB7B7B91BB95320F14880DE08786551C67DA845F750
                                            APIs
                                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 00FF70DD
                                              • Part of subcall function 00FB0DB6: std::exception::exception.LIBCMT ref: 00FB0DEC
                                              • Part of subcall function 00FB0DB6: __CxxThrowException@8.LIBCMT ref: 00FB0E01
                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00FF7114
                                            • EnterCriticalSection.KERNEL32(?), ref: 00FF7130
                                            • _memmove.LIBCMT ref: 00FF717E
                                            • _memmove.LIBCMT ref: 00FF719B
                                            • LeaveCriticalSection.KERNEL32(?), ref: 00FF71AA
                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00FF71BF
                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FF71DE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                            • String ID:
                                            • API String ID: 256516436-0
                                            • Opcode ID: dea0babf5ab9c57f802d8f8c4ea63a7a17eb6b64e49650b54241ae111c88351a
                                            • Instruction ID: e00ccbf0142e8e3a9415e611391bbd8002879e9db31d5048c73617a951b7457c
                                            • Opcode Fuzzy Hash: dea0babf5ab9c57f802d8f8c4ea63a7a17eb6b64e49650b54241ae111c88351a
                                            • Instruction Fuzzy Hash: 1A319E75A00206EBCB10EFA5DC85AAFB778EF45310F1441A5ED04AB246DB38DE14DBA0
                                            APIs
                                            • DeleteObject.GDI32(00000000), ref: 010161EB
                                            • GetDC.USER32(00000000), ref: 010161F3
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 010161FE
                                            • ReleaseDC.USER32(00000000,00000000), ref: 0101620A
                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 01016246
                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 01016257
                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0101902A,?,?,000000FF,00000000,?,000000FF,?), ref: 01016291
                                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 010162B1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                            • String ID:
                                            • API String ID: 3864802216-0
                                            • Opcode ID: eb9751c2f4253fbbfad0d709f3b0e580727cad5e0ba4a1d9ce4816b0780bf327
                                            • Instruction ID: a8c9333400050936b92ca299d5e1ba9b93b6bc77fd80475157dd427bde463178
                                            • Opcode Fuzzy Hash: eb9751c2f4253fbbfad0d709f3b0e580727cad5e0ba4a1d9ce4816b0780bf327
                                            • Instruction Fuzzy Hash: FA319F721006107FEF218F64CC8AFEA3FA9EF4A765F040055FE889A185C6BA9845CB60
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memcmp
                                            • String ID:
                                            • API String ID: 2931989736-0
                                            • Opcode ID: d13c9616e8cd81f9ad7c00a3ca51960dace292df2784d1f3da8dcf75ace5f46a
                                            • Instruction ID: 2437a8281e21898e86f94a3130399be4cc56ce47be441895cb87ef9ba08b3a0d
                                            • Opcode Fuzzy Hash: d13c9616e8cd81f9ad7c00a3ca51960dace292df2784d1f3da8dcf75ace5f46a
                                            • Instruction Fuzzy Hash: A1215772B0425ABBE208B617DD52FFB735CAE51358F584424FD049B603EB28DE10F6A1
                                            APIs
                                              • Part of subcall function 00F99837: __itow.LIBCMT ref: 00F99862
                                              • Part of subcall function 00F99837: __swprintf.LIBCMT ref: 00F998AC
                                              • Part of subcall function 00FAFC86: _wcscpy.LIBCMT ref: 00FAFCA9
                                            • _wcstok.LIBCMT ref: 00FFEC94
                                            • _wcscpy.LIBCMT ref: 00FFED23
                                            • _memset.LIBCMT ref: 00FFED56
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                            • String ID: X
                                            • API String ID: 774024439-3081909835
                                            • Opcode ID: 93eea7fc07606b0617c18d50b03bc4ba5a80a5187d929a7f53fa74020f73d69b
                                            • Instruction ID: 22afac95ee921ae4ec2404caa8198fbbd68cfb2d9c86f7caeb8053e1f9ab6664
                                            • Opcode Fuzzy Hash: 93eea7fc07606b0617c18d50b03bc4ba5a80a5187d929a7f53fa74020f73d69b
                                            • Instruction Fuzzy Hash: 04C1A0716083459FDB54EF24C881A6AB7E4FF85320F00492DF9999B2B2DB74ED05EB42
                                            APIs
                                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 01006C00
                                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 01006C21
                                            • WSAGetLastError.WSOCK32(00000000), ref: 01006C34
                                            • htons.WSOCK32(?,?,?,00000000,?), ref: 01006CEA
                                            • inet_ntoa.WSOCK32(?), ref: 01006CA7
                                              • Part of subcall function 00FEA7E9: _strlen.LIBCMT ref: 00FEA7F3
                                              • Part of subcall function 00FEA7E9: _memmove.LIBCMT ref: 00FEA815
                                            • _strlen.LIBCMT ref: 01006D44
                                            • _memmove.LIBCMT ref: 01006DAD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                            • String ID:
                                            • API String ID: 3619996494-0
                                            • Opcode ID: 8eae838165388b278e9b8b26d64539548f3be0fba50b5149df617db246d32d2b
                                            • Instruction ID: dfed5f51ed2b166f3748f5bffada585db58e32c641a5d76a4d5d6b78d80b38ba
                                            • Opcode Fuzzy Hash: 8eae838165388b278e9b8b26d64539548f3be0fba50b5149df617db246d32d2b
                                            • Instruction Fuzzy Hash: 2781E371508300ABEB11EF28CC82E6EB7E9AF84714F00491DF5959B2D2DB79ED45CB92
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ea20c771ffebad88c78db6c4877f65438fc0764045e651224f4c6b72db1057a0
                                            • Instruction ID: 02ce14ba61096af200f97675edbc517cb65cf802905c660e484088ecca21ffca
                                            • Opcode Fuzzy Hash: ea20c771ffebad88c78db6c4877f65438fc0764045e651224f4c6b72db1057a0
                                            • Instruction Fuzzy Hash: 6F718D3590010AEFDF14DF98CC49EBEBB78FF8A320F248159F915AA251C734AA51DB60
                                            APIs
                                            • IsWindow.USER32(00AA67A8), ref: 0101B3EB
                                            • IsWindowEnabled.USER32(00AA67A8), ref: 0101B3F7
                                            • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0101B4DB
                                            • SendMessageW.USER32(00AA67A8,000000B0,?,?), ref: 0101B512
                                            • IsDlgButtonChecked.USER32(?,?), ref: 0101B54F
                                            • GetWindowLongW.USER32(00AA67A8,000000EC), ref: 0101B571
                                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0101B589
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                            • String ID:
                                            • API String ID: 4072528602-0
                                            • Opcode ID: 3c6ee94f9d5072e95659d084cf83b46344da6d309af21ce0d14666e547f19e74
                                            • Instruction ID: 8382f48ce073d63c19115b5d91a69e329d5b1d64d861945be6a163c6fde767f6
                                            • Opcode Fuzzy Hash: 3c6ee94f9d5072e95659d084cf83b46344da6d309af21ce0d14666e547f19e74
                                            • Instruction Fuzzy Hash: 3A718038640205AFEB619F69C894FBA7BF5FF09310F048499FAC597259CB3AA950CB50
                                            APIs
                                            • _memset.LIBCMT ref: 0100F448
                                            • _memset.LIBCMT ref: 0100F511
                                            • ShellExecuteExW.SHELL32(?), ref: 0100F556
                                              • Part of subcall function 00F99837: __itow.LIBCMT ref: 00F99862
                                              • Part of subcall function 00F99837: __swprintf.LIBCMT ref: 00F998AC
                                              • Part of subcall function 00FAFC86: _wcscpy.LIBCMT ref: 00FAFCA9
                                            • GetProcessId.KERNEL32(00000000), ref: 0100F5CD
                                            • CloseHandle.KERNEL32(00000000), ref: 0100F5FC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                            • String ID: @
                                            • API String ID: 3522835683-2766056989
                                            • Opcode ID: 45e278c640dda038ff77c8fc2225afb351645504722b1a53a9eb7e77b17d9116
                                            • Instruction ID: c1a226d49b1654fd44586e021e7f1d80ebc4f5a19e2d9b4d903f7ae094b05332
                                            • Opcode Fuzzy Hash: 45e278c640dda038ff77c8fc2225afb351645504722b1a53a9eb7e77b17d9116
                                            • Instruction Fuzzy Hash: B561AD70A0061A9FEF15EF68C8819AEBBF5FF48310F15805DE855AB391CB35AD41DB80
                                            APIs
                                            • GetParent.USER32(?), ref: 00FF0F8C
                                            • GetKeyboardState.USER32(?), ref: 00FF0FA1
                                            • SetKeyboardState.USER32(?), ref: 00FF1002
                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00FF1030
                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 00FF104F
                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00FF1095
                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00FF10B8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessagePost$KeyboardState$Parent
                                            • String ID:
                                            • API String ID: 87235514-0
                                            • Opcode ID: bc26d0540ade0397344de82f8a3f63548dd921ec503e34c12320858fb46a9ff4
                                            • Instruction ID: 71172d7cdec0971f026d4f902a8685ba7ad3fdeb188a3a04bbf1f7ed0399ce93
                                            • Opcode Fuzzy Hash: bc26d0540ade0397344de82f8a3f63548dd921ec503e34c12320858fb46a9ff4
                                            • Instruction Fuzzy Hash: B7510660A047D9BDFB3642348C05BB6BEA96F06324F08858DE3D5958E3C6D9DCC8E751
                                            APIs
                                            • GetParent.USER32(00000000), ref: 00FF0DA5
                                            • GetKeyboardState.USER32(?), ref: 00FF0DBA
                                            • SetKeyboardState.USER32(?), ref: 00FF0E1B
                                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00FF0E47
                                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00FF0E64
                                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00FF0EA8
                                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00FF0EC9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessagePost$KeyboardState$Parent
                                            • String ID:
                                            • API String ID: 87235514-0
                                            • Opcode ID: f6b01f71218f41de5cbbfdf04c530f3e299022719e1e012cdcb232cca6e8b654
                                            • Instruction ID: 793268c9f0eac49e3a3a847eff599d51e63fb55910c2ffa9bd67cf51099063fd
                                            • Opcode Fuzzy Hash: f6b01f71218f41de5cbbfdf04c530f3e299022719e1e012cdcb232cca6e8b654
                                            • Instruction Fuzzy Hash: 965108A0A047D97DFB3286748C45B7ABFA96F06310F088889F2D4564E3DB95AC98F750
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _wcsncpy$LocalTime
                                            • String ID:
                                            • API String ID: 2945705084-0
                                            • Opcode ID: ea0900d4e71d7e2179c9e9db9eedaa8d6cd521c2cd82ad756810e4cc94b8de16
                                            • Instruction ID: cf0d7f97079d7e1e24152893341178908fa42f0b4f02c22c0edd3f2ffdd1ab41
                                            • Opcode Fuzzy Hash: ea0900d4e71d7e2179c9e9db9eedaa8d6cd521c2cd82ad756810e4cc94b8de16
                                            • Instruction Fuzzy Hash: 1941D566C1021876CB11FBB58C469DFB3B89F04310F508956E619E3221FB38A345DBE6
                                            APIs
                                              • Part of subcall function 00FF466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FF3697,?), ref: 00FF468B
                                              • Part of subcall function 00FF466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FF3697,?), ref: 00FF46A4
                                            • lstrcmpiW.KERNEL32(?,?), ref: 00FF36B7
                                            • _wcscmp.LIBCMT ref: 00FF36D3
                                            • MoveFileW.KERNEL32(?,?), ref: 00FF36EB
                                            • _wcscat.LIBCMT ref: 00FF3733
                                            • SHFileOperationW.SHELL32(?), ref: 00FF379F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                            • String ID: \*.*
                                            • API String ID: 1377345388-1173974218
                                            • Opcode ID: 82e23961a66b37e4813fe4589e84114e37727d32afe0c2b56a2df8034355f640
                                            • Instruction ID: 74ab952208fbad4795bbc48dd0692df29bcc366f1d897aae1f2089c87d23d013
                                            • Opcode Fuzzy Hash: 82e23961a66b37e4813fe4589e84114e37727d32afe0c2b56a2df8034355f640
                                            • Instruction Fuzzy Hash: 5F41B672508349AEC752EF64C8419EF77E8AF88350F00092EF599C3161EB38D689DB52
                                            APIs
                                            • _memset.LIBCMT ref: 010172AA
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01017351
                                            • IsMenu.USER32(?), ref: 01017369
                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 010173B1
                                            • DrawMenuBar.USER32 ref: 010173C4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Menu$Item$DrawInfoInsert_memset
                                            • String ID: 0
                                            • API String ID: 3866635326-4108050209
                                            • Opcode ID: 6cb01649b0b8066d06490b6c8a862b6e435a5bb90389c8af516050ccffa2a0f9
                                            • Instruction ID: 57ffa86c843b123cadc5e2353b4337766b2fcf85c8b5780dda049142a0ddb01d
                                            • Opcode Fuzzy Hash: 6cb01649b0b8066d06490b6c8a862b6e435a5bb90389c8af516050ccffa2a0f9
                                            • Instruction Fuzzy Hash: 41417975A00209EFDB20DF54D885EAABBF8FF08310F14846AFE85A7254D739A900CF60
                                            APIs
                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 01010FD4
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 01010FFE
                                            • FreeLibrary.KERNEL32(00000000), ref: 010110B5
                                              • Part of subcall function 01010FA5: RegCloseKey.ADVAPI32(?), ref: 0101101B
                                              • Part of subcall function 01010FA5: FreeLibrary.KERNEL32(?), ref: 0101106D
                                              • Part of subcall function 01010FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 01011090
                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 01011058
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: EnumFreeLibrary$CloseDeleteOpen
                                            • String ID:
                                            • API String ID: 395352322-0
                                            • Opcode ID: b6e031976fcf49ff6adf87865e4eb2313553e112089c3c33fcfd88682a24a14e
                                            • Instruction ID: 5699ac092012bd72f9d392173d467dada02c5130a6c4aa637d1cd3d77f06cb87
                                            • Opcode Fuzzy Hash: b6e031976fcf49ff6adf87865e4eb2313553e112089c3c33fcfd88682a24a14e
                                            • Instruction Fuzzy Hash: CD310371E01109BFEB66DFA4D885EFFB7BCEF04300F000169F645A2144D7799A499B60
                                            APIs
                                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 010162EC
                                            • GetWindowLongW.USER32(00AA67A8,000000F0), ref: 0101631F
                                            • GetWindowLongW.USER32(00AA67A8,000000F0), ref: 01016354
                                            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 01016386
                                            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 010163B0
                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 010163C1
                                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 010163DB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: LongWindow$MessageSend
                                            • String ID:
                                            • API String ID: 2178440468-0
                                            • Opcode ID: d81fe87e0c965b9343b8ec552e4bd958dd89dcf0d21bf4598250783c99f52a04
                                            • Instruction ID: 03a21f7384a26b3ce0036a23b434db1b678fc1968246f60ee3c6e513245feebc
                                            • Opcode Fuzzy Hash: d81fe87e0c965b9343b8ec552e4bd958dd89dcf0d21bf4598250783c99f52a04
                                            • Instruction Fuzzy Hash: FF313934600241AFDB21CF29DC84F6537E1FB49714F1981A4F5809F2BACBBBA844CB50
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FEDB2E
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FEDB54
                                            • SysAllocString.OLEAUT32(00000000), ref: 00FEDB57
                                            • SysAllocString.OLEAUT32(?), ref: 00FEDB75
                                            • SysFreeString.OLEAUT32(?), ref: 00FEDB7E
                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 00FEDBA3
                                            • SysAllocString.OLEAUT32(?), ref: 00FEDBB1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                            • String ID:
                                            • API String ID: 3761583154-0
                                            • Opcode ID: ec1c35248e1e1c5a28bd6d0e8d1d929ad89b187b79124c83f07f22b96deed6af
                                            • Instruction ID: a5f9b2135c5749d3a54e876beca6c905d81a498c627ce3912ea6d6c991d4a334
                                            • Opcode Fuzzy Hash: ec1c35248e1e1c5a28bd6d0e8d1d929ad89b187b79124c83f07f22b96deed6af
                                            • Instruction Fuzzy Hash: 6121C43660121AAFDF10EEA9DC88CBB73ACFB49360B018125F954DB290EB78DC459760
                                            APIs
                                              • Part of subcall function 01007D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 01007DB6
                                            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 010061C6
                                            • WSAGetLastError.WSOCK32(00000000), ref: 010061D5
                                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0100620E
                                            • connect.WSOCK32(00000000,?,00000010), ref: 01006217
                                            • WSAGetLastError.WSOCK32 ref: 01006221
                                            • closesocket.WSOCK32(00000000), ref: 0100624A
                                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 01006263
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                            • String ID:
                                            • API String ID: 910771015-0
                                            • Opcode ID: e2d8f0f93e21fb5c7d427176dd42bb35d268c37bfd323d7ebaf1ef7cbc7a34a5
                                            • Instruction ID: a658cbd2796ce2b7944ce8cf4aff7deedacc05387fcab29107bcbe5e2bffd379
                                            • Opcode Fuzzy Hash: e2d8f0f93e21fb5c7d427176dd42bb35d268c37bfd323d7ebaf1ef7cbc7a34a5
                                            • Instruction Fuzzy Hash: 6D31C431600118ABEF11AF68CC85BBE7BADEF45750F044059FD85D72C1DB79A8188B61
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __wcsnicmp
                                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                            • API String ID: 1038674560-2734436370
                                            • Opcode ID: 73e8fcbd7d3367e58d0ad75ff13842b9f79d5e8823044689b193824793f96796
                                            • Instruction ID: d23d9d6eba2cc687756c0955b4f6b389fa6d573a8ad31ef417fb14e462f2c823
                                            • Opcode Fuzzy Hash: 73e8fcbd7d3367e58d0ad75ff13842b9f79d5e8823044689b193824793f96796
                                            • Instruction Fuzzy Hash: 3621797361419167D730A637AC02FB77399EF55360F104039F482CA051EF649D89F294
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FEDC09
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FEDC2F
                                            • SysAllocString.OLEAUT32(00000000), ref: 00FEDC32
                                            • SysAllocString.OLEAUT32 ref: 00FEDC53
                                            • SysFreeString.OLEAUT32 ref: 00FEDC5C
                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 00FEDC76
                                            • SysAllocString.OLEAUT32(?), ref: 00FEDC84
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                            • String ID:
                                            • API String ID: 3761583154-0
                                            • Opcode ID: 0ab4081fcde34bb2b33d31e7c5d8697880b7be0c07c1ce965176136ed82a83c9
                                            • Instruction ID: c0e18863f5d9ff63a054c7e47820f5af8866e4f704df4d6ee2db41eb4132d026
                                            • Opcode Fuzzy Hash: 0ab4081fcde34bb2b33d31e7c5d8697880b7be0c07c1ce965176136ed82a83c9
                                            • Instruction Fuzzy Hash: 3621B636604245AFDB10EFADDC88DAB77ECEB08360B108125F954CB254DB79EC45DB64
                                            APIs
                                              • Part of subcall function 00F91D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F91D73
                                              • Part of subcall function 00F91D35: GetStockObject.GDI32(00000011), ref: 00F91D87
                                              • Part of subcall function 00F91D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F91D91
                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 01017632
                                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0101763F
                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0101764A
                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 01017659
                                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 01017665
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$CreateObjectStockWindow
                                            • String ID: Msctls_Progress32
                                            • API String ID: 1025951953-3636473452
                                            • Opcode ID: 0f8d848335f1464cf5d49939533159050f6db75421a98c491cc475aa389d8616
                                            • Instruction ID: ac6a7b35d1f282783158ecaf5a89868a1798d870b4197a62883165da02f3ed1e
                                            • Opcode Fuzzy Hash: 0f8d848335f1464cf5d49939533159050f6db75421a98c491cc475aa389d8616
                                            • Instruction Fuzzy Hash: 9811B2B211021ABFEF158F64CC85EEB7F6DFF0C798F014115BA44A6054CA769C21DBA4
                                            APIs
                                            • __init_pointers.LIBCMT ref: 00FB9AE6
                                              • Part of subcall function 00FB3187: EncodePointer.KERNEL32(00000000), ref: 00FB318A
                                              • Part of subcall function 00FB3187: __initp_misc_winsig.LIBCMT ref: 00FB31A5
                                              • Part of subcall function 00FB3187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00FB9EA0
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00FB9EB4
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00FB9EC7
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00FB9EDA
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00FB9EED
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00FB9F00
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00FB9F13
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00FB9F26
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00FB9F39
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00FB9F4C
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00FB9F5F
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00FB9F72
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00FB9F85
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00FB9F98
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00FB9FAB
                                              • Part of subcall function 00FB3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00FB9FBE
                                            • __mtinitlocks.LIBCMT ref: 00FB9AEB
                                            • __mtterm.LIBCMT ref: 00FB9AF4
                                              • Part of subcall function 00FB9B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00FB9AF9,00FB7CD0,0104A0B8,00000014), ref: 00FB9C56
                                              • Part of subcall function 00FB9B5C: _free.LIBCMT ref: 00FB9C5D
                                              • Part of subcall function 00FB9B5C: DeleteCriticalSection.KERNEL32(0104EC00,?,?,00FB9AF9,00FB7CD0,0104A0B8,00000014), ref: 00FB9C7F
                                            • __calloc_crt.LIBCMT ref: 00FB9B19
                                            • __initptd.LIBCMT ref: 00FB9B3B
                                            • GetCurrentThreadId.KERNEL32 ref: 00FB9B42
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                            • String ID:
                                            • API String ID: 3567560977-0
                                            • Opcode ID: 37b95aadb4236535d168e358a4fe201c22c6416bf0e955c9dc3bac612d802ca4
                                            • Instruction ID: 99c4206f6657eb7083a2265306c66dd3b9590f40f3cf8f4c6634058476472f6e
                                            • Opcode Fuzzy Hash: 37b95aadb4236535d168e358a4fe201c22c6416bf0e955c9dc3bac612d802ca4
                                            • Instruction Fuzzy Hash: 5AF0963690D7112AE6347677BC036CA36989F42734F204619F694C51C6EFDD89416E60
                                            APIs
                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00FB3F85), ref: 00FB4085
                                            • GetProcAddress.KERNEL32(00000000), ref: 00FB408C
                                            • EncodePointer.KERNEL32(00000000), ref: 00FB4097
                                            • DecodePointer.KERNEL32(00FB3F85), ref: 00FB40B2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                            • String ID: RoUninitialize$combase.dll
                                            • API String ID: 3489934621-2819208100
                                            • Opcode ID: e6435454e11e39f192c40f95c3d4e7234dd756d0400f81c26567d2fa331cc07e
                                            • Instruction ID: eb05e3a2353431a283ae9d184b08ccbd9cd1020c2157e94c108c965311bd49ba
                                            • Opcode Fuzzy Hash: e6435454e11e39f192c40f95c3d4e7234dd756d0400f81c26567d2fa331cc07e
                                            • Instruction Fuzzy Hash: C1E09A70581301ABDB30AF72E909B463AB9B714792F104018F981D9048CB7F5504AB18
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memmove$__itow__swprintf
                                            • String ID:
                                            • API String ID: 3253778849-0
                                            • Opcode ID: 3fd6988472e4aa1aa35ce34ebe0d23a15edce03bbaf9a95066af34e064a33923
                                            • Instruction ID: dec662f8f33b801b22977ed16e574643be23925a3d131df737b25c24ecbd9b2d
                                            • Opcode Fuzzy Hash: 3fd6988472e4aa1aa35ce34ebe0d23a15edce03bbaf9a95066af34e064a33923
                                            • Instruction Fuzzy Hash: 5E61AD3190024E9BDF01EF64CC82AFE37A9AF04308F494518FA15AB1A2DF78EC05EB50
                                            APIs
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                              • Part of subcall function 01010E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0100FDAD,?,?), ref: 01010E31
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 010102BD
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 010102FD
                                            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 01010320
                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 01010349
                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0101038C
                                            • RegCloseKey.ADVAPI32(00000000), ref: 01010399
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                            • String ID:
                                            • API String ID: 4046560759-0
                                            • Opcode ID: 4d2cf083dc0df2aadc5088368777c636d31e6bdbd51aa5afbb22e37cac67240c
                                            • Instruction ID: 4737fd98714c480b12b249c8d3a4e94c27e837b5737af3e74678096eb7a23cbc
                                            • Opcode Fuzzy Hash: 4d2cf083dc0df2aadc5088368777c636d31e6bdbd51aa5afbb22e37cac67240c
                                            • Instruction Fuzzy Hash: 94516831208301AFDB15EF68C885EAFBBE8EF84314F04491DF585872A5DB39E948DB52
                                            APIs
                                            • GetMenu.USER32(?), ref: 010157FB
                                            • GetMenuItemCount.USER32(00000000), ref: 01015832
                                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0101585A
                                            • GetMenuItemID.USER32(?,?), ref: 010158C9
                                            • GetSubMenu.USER32(?,?), ref: 010158D7
                                            • PostMessageW.USER32(?,00000111,?,00000000), ref: 01015928
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Menu$Item$CountMessagePostString
                                            • String ID:
                                            • API String ID: 650687236-0
                                            • Opcode ID: 6213a8ee25d458d7148e65f320075a0cd117eabbaae737639970738c9dff2fc4
                                            • Instruction ID: a615528173cb7db797e2650d57c78bf07315140636d29ea6b6b1aad11f4a7ac9
                                            • Opcode Fuzzy Hash: 6213a8ee25d458d7148e65f320075a0cd117eabbaae737639970738c9dff2fc4
                                            • Instruction Fuzzy Hash: BF518C31E00615AFDF11DF68CC45AAEBBB5EF89320F004099ED81BB351CB79AE419B90
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 00FEEF06
                                            • VariantClear.OLEAUT32(00000013), ref: 00FEEF78
                                            • VariantClear.OLEAUT32(00000000), ref: 00FEEFD3
                                            • _memmove.LIBCMT ref: 00FEEFFD
                                            • VariantClear.OLEAUT32(?), ref: 00FEF04A
                                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00FEF078
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ChangeInitType_memmove
                                            • String ID:
                                            • API String ID: 1101466143-0
                                            • Opcode ID: 37008fc6dc523080f9b84586aa76f966ab01f8f3696c2f2752f6793cc13cbab2
                                            • Instruction ID: 841cc7f156438ecdd4870abc60c887791e3df5ad67e0905d8a36c122fd083326
                                            • Opcode Fuzzy Hash: 37008fc6dc523080f9b84586aa76f966ab01f8f3696c2f2752f6793cc13cbab2
                                            • Instruction Fuzzy Hash: 02517BB5A00249EFCB10CF58C880AAAB7B8FF4C310B158569EE49DB305E735E915CFA0
                                            APIs
                                            • _memset.LIBCMT ref: 00FF2258
                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FF22A3
                                            • IsMenu.USER32(00000000), ref: 00FF22C3
                                            • CreatePopupMenu.USER32 ref: 00FF22F7
                                            • GetMenuItemCount.USER32(000000FF), ref: 00FF2355
                                            • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00FF2386
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                            • String ID:
                                            • API String ID: 3311875123-0
                                            • Opcode ID: 8f7a16c3d73acf118566bbc5ff6b43ba2e3a5dc6cbd93349d97b68d862d87a1e
                                            • Instruction ID: ef6f058e66c0bc07fe96291e065d5b24b4d8e5542b8f236aa9df15a528472d6f
                                            • Opcode Fuzzy Hash: 8f7a16c3d73acf118566bbc5ff6b43ba2e3a5dc6cbd93349d97b68d862d87a1e
                                            • Instruction Fuzzy Hash: CC51CFB0A0020EDBDF61CF68C888BBDBBF5BF05324F104159EA55AB2A0D3798904DB51
                                            APIs
                                              • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                                            • BeginPaint.USER32(?,?,?,?,?,?), ref: 00F9179A
                                            • GetWindowRect.USER32(?,?), ref: 00F917FE
                                            • ScreenToClient.USER32(?,?), ref: 00F9181B
                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00F9182C
                                            • EndPaint.USER32(?,?), ref: 00F91876
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                            • String ID:
                                            • API String ID: 1827037458-0
                                            • Opcode ID: b895ac979b0d27a40ba1ee12be6495450222dca882178600d0916bca9719a930
                                            • Instruction ID: aa8692f857004e321151ad29a9f6a10228584fcc63dedbb78edb882c482ef8ef
                                            • Opcode Fuzzy Hash: b895ac979b0d27a40ba1ee12be6495450222dca882178600d0916bca9719a930
                                            • Instruction Fuzzy Hash: 2D41A231504302AFEB20DF24CC85FB67BE8FB59724F144668F594872A1C7359845EB61
                                            APIs
                                            • ShowWindow.USER32(010557B0,00000000,00AA67A8,?,?,010557B0,?,0101B5A8,?,?), ref: 0101B712
                                            • EnableWindow.USER32(00000000,00000000), ref: 0101B736
                                            • ShowWindow.USER32(010557B0,00000000,00AA67A8,?,?,010557B0,?,0101B5A8,?,?), ref: 0101B796
                                            • ShowWindow.USER32(00000000,00000004,?,0101B5A8,?,?), ref: 0101B7A8
                                            • EnableWindow.USER32(00000000,00000001), ref: 0101B7CC
                                            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0101B7EF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$Show$Enable$MessageSend
                                            • String ID:
                                            • API String ID: 642888154-0
                                            • Opcode ID: f2a0576f16cb84937c04593f98e227afc6fee7c2b5b11b82e31eca87bfe31124
                                            • Instruction ID: 3e94857899c6671a61ae0f11ffd1312df9fa6299f2d4dfc3eefe1e8b24cfb393
                                            • Opcode Fuzzy Hash: f2a0576f16cb84937c04593f98e227afc6fee7c2b5b11b82e31eca87bfe31124
                                            • Instruction Fuzzy Hash: F8417134600241AFDB62CF28C499B947FF1FF09310F1C41E9EA888F6A6C739A456DB50
                                            APIs
                                            • GetForegroundWindow.USER32(?,?,?,?,?,?,01004E41,?,?,00000000,00000001), ref: 010070AC
                                              • Part of subcall function 010039A0: GetWindowRect.USER32(?,?), ref: 010039B3
                                            • GetDesktopWindow.USER32 ref: 010070D6
                                            • GetWindowRect.USER32(00000000), ref: 010070DD
                                            • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0100710F
                                              • Part of subcall function 00FF5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF52BC
                                            • GetCursorPos.USER32(?), ref: 0100713B
                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 01007199
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                            • String ID:
                                            • API String ID: 4137160315-0
                                            • Opcode ID: a5671fc919bf8dc0bc9c0f0f9ce5fd4b17e94b873e9aa5e718fd98bfcf716756
                                            • Instruction ID: 0dcbff7d9bf948ec7b8850a445e41b7c3b3ab7954a83b6b74b028b00d522f0c8
                                            • Opcode Fuzzy Hash: a5671fc919bf8dc0bc9c0f0f9ce5fd4b17e94b873e9aa5e718fd98bfcf716756
                                            • Instruction Fuzzy Hash: AD31B272505306AFD721DF18C849B9BBBEAFF88314F000919F6D5971C1CA79EA09CB92
                                            APIs
                                              • Part of subcall function 00FE80A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FE80C0
                                              • Part of subcall function 00FE80A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FE80CA
                                              • Part of subcall function 00FE80A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FE80D9
                                              • Part of subcall function 00FE80A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FE80E0
                                              • Part of subcall function 00FE80A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FE80F6
                                            • GetLengthSid.ADVAPI32(?,00000000,00FE842F), ref: 00FE88CA
                                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00FE88D6
                                            • HeapAlloc.KERNEL32(00000000), ref: 00FE88DD
                                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 00FE88F6
                                            • GetProcessHeap.KERNEL32(00000000,00000000,00FE842F), ref: 00FE890A
                                            • HeapFree.KERNEL32(00000000), ref: 00FE8911
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                            • String ID:
                                            • API String ID: 3008561057-0
                                            • Opcode ID: f1795acbea8cce36c00283834b55a93487c2e08c6df55c6e0f4bd0a3d500b455
                                            • Instruction ID: 2ef467242e592683924335159e3439914824f029ba1a72d8f86f4100062a5fcd
                                            • Opcode Fuzzy Hash: f1795acbea8cce36c00283834b55a93487c2e08c6df55c6e0f4bd0a3d500b455
                                            • Instruction Fuzzy Hash: 9911B431901205FFDB21AF95DC09BBE7769EB45361F104119F88997101CB3A9D05EB61
                                            APIs
                                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00FE85E2
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00FE85E9
                                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00FE85F8
                                            • CloseHandle.KERNEL32(00000004), ref: 00FE8603
                                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00FE8632
                                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 00FE8646
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                            • String ID:
                                            • API String ID: 1413079979-0
                                            • Opcode ID: 0f187d1fc340a69cf41f7b970e1b05b95b5dfc7653e01265c98e7b0c9a5ed133
                                            • Instruction ID: 8469fe27b4a6f8dba6b4678ae47ec128c5ab3f648834be3c04f646f39792d8f9
                                            • Opcode Fuzzy Hash: 0f187d1fc340a69cf41f7b970e1b05b95b5dfc7653e01265c98e7b0c9a5ed133
                                            • Instruction Fuzzy Hash: 5B118C7250024AAFDF12DEA4DC48BDE7BA8FF08354F044014FE09A2160C77A8E65EB60
                                            APIs
                                            • GetDC.USER32(00000000), ref: 00FEB7B5
                                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 00FEB7C6
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FEB7CD
                                            • ReleaseDC.USER32(00000000,00000000), ref: 00FEB7D5
                                            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00FEB7EC
                                            • MulDiv.KERNEL32(000009EC,?,?), ref: 00FEB7FE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CapsDevice$Release
                                            • String ID:
                                            • API String ID: 1035833867-0
                                            • Opcode ID: f53e012edc1c35793b4c38f6cc9f6e21956291cba9d4a76e15d04a9dc1a9985d
                                            • Instruction ID: e5eaae03d10d4d60ef3c23251ee8f10cced00eb1ce637d18bd5ba14da5c5e9b1
                                            • Opcode Fuzzy Hash: f53e012edc1c35793b4c38f6cc9f6e21956291cba9d4a76e15d04a9dc1a9985d
                                            • Instruction Fuzzy Hash: AC018475E00309BBEF109BF69C45A5EBFB8EB48361F004065FA04A7281D6359C00CF90
                                            APIs
                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FB0193
                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00FB019B
                                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FB01A6
                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FB01B1
                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00FB01B9
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FB01C1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Virtual
                                            • String ID:
                                            • API String ID: 4278518827-0
                                            • Opcode ID: fdea3d509cca070ae2f794051c4ac75159c458f9c1795713a85e26296b373cf5
                                            • Instruction ID: 04d135753d54c82f1ce9a57e0e06ff83cc8c8f11549f5dd7a2a1cbc4ce11b84c
                                            • Opcode Fuzzy Hash: fdea3d509cca070ae2f794051c4ac75159c458f9c1795713a85e26296b373cf5
                                            • Instruction Fuzzy Hash: F0016CB0901B5A7DE3008F6A8C85B52FFA8FF19354F00411BA15C47941C7F5A868CBE5
                                            APIs
                                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00FF53F9
                                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00FF540F
                                            • GetWindowThreadProcessId.USER32(?,?), ref: 00FF541E
                                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FF542D
                                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FF5437
                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FF543E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                            • String ID:
                                            • API String ID: 839392675-0
                                            • Opcode ID: b19a1403ef4f31b4f978f2374e1dc0d6d41102cb8ff29ce668101dbe6356c04e
                                            • Instruction ID: e3cf021e1a671fc6cdddf00041b0ef6cbac25e59776dc7d49a6a854fdd1718f6
                                            • Opcode Fuzzy Hash: b19a1403ef4f31b4f978f2374e1dc0d6d41102cb8ff29ce668101dbe6356c04e
                                            • Instruction Fuzzy Hash: C0F06D32240559BBE3315AA29C0DEAB7A7CEFCAB11F000159FA44D1045D6AA1A0587B5
                                            APIs
                                            • InterlockedExchange.KERNEL32(?,?), ref: 00FF7243
                                            • EnterCriticalSection.KERNEL32(?,?,00FA0EE4,?,?), ref: 00FF7254
                                            • TerminateThread.KERNEL32(00000000,000001F6,?,00FA0EE4,?,?), ref: 00FF7261
                                            • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00FA0EE4,?,?), ref: 00FF726E
                                              • Part of subcall function 00FF6C35: CloseHandle.KERNEL32(00000000,?,00FF727B,?,00FA0EE4,?,?), ref: 00FF6C3F
                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FF7281
                                            • LeaveCriticalSection.KERNEL32(?,?,00FA0EE4,?,?), ref: 00FF7288
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                            • String ID:
                                            • API String ID: 3495660284-0
                                            • Opcode ID: f3c51060c22c3ba37f71007f7b5785cb73516826ea7abb2e9ede62c51deb0207
                                            • Instruction ID: 41811a70889f9b3267b1bf7a860ee2c807a16c0e5f69283d45146ccba6ba8024
                                            • Opcode Fuzzy Hash: f3c51060c22c3ba37f71007f7b5785cb73516826ea7abb2e9ede62c51deb0207
                                            • Instruction Fuzzy Hash: EBF05E36540613ABD7212B64ED4C9EAB72AEF55722B100622F683E10A8CBBF5805DB50
                                            APIs
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00FE899D
                                            • UnloadUserProfile.USERENV(?,?), ref: 00FE89A9
                                            • CloseHandle.KERNEL32(?), ref: 00FE89B2
                                            • CloseHandle.KERNEL32(?), ref: 00FE89BA
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00FE89C3
                                            • HeapFree.KERNEL32(00000000), ref: 00FE89CA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                            • String ID:
                                            • API String ID: 146765662-0
                                            • Opcode ID: 6e4d38604d2b62773bfd6a0b74f3f31e73e02f4e4739f91c632e0358e6d82261
                                            • Instruction ID: 77187c5b7678651b70aa12be71918144b8a54512a7ef459dbd315f2e6e20cb8b
                                            • Opcode Fuzzy Hash: 6e4d38604d2b62773bfd6a0b74f3f31e73e02f4e4739f91c632e0358e6d82261
                                            • Instruction Fuzzy Hash: 28E0E536104402BBDB112FE1EC0C90ABF79FF8A322B108220F259C1078CB3F9428DB50
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 01008613
                                            • CharUpperBuffW.USER32(?,?), ref: 01008722
                                            • VariantClear.OLEAUT32(?), ref: 0100889A
                                              • Part of subcall function 00FF7562: VariantInit.OLEAUT32(00000000), ref: 00FF75A2
                                              • Part of subcall function 00FF7562: VariantCopy.OLEAUT32(00000000,?), ref: 00FF75AB
                                              • Part of subcall function 00FF7562: VariantClear.OLEAUT32(00000000), ref: 00FF75B7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Variant$ClearInit$BuffCharCopyUpper
                                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                            • API String ID: 4237274167-1221869570
                                            • Opcode ID: 910bfb3f8ee198ceacb7552b0455836b014918c541d4c570d9f1551839c51228
                                            • Instruction ID: 7ed3773376f30313b5c8ffd4d3abd6fd9b443c45116cb809676e406601ed9263
                                            • Opcode Fuzzy Hash: 910bfb3f8ee198ceacb7552b0455836b014918c541d4c570d9f1551839c51228
                                            • Instruction Fuzzy Hash: F691A270A08301DFDB11DF29C88495ABBE4FF89714F04896EF98A8B391DB35E905CB51
                                            APIs
                                              • Part of subcall function 00FAFC86: _wcscpy.LIBCMT ref: 00FAFCA9
                                            • _memset.LIBCMT ref: 00FF2B87
                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FF2BB6
                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FF2C69
                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00FF2C97
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ItemMenu$Info$Default_memset_wcscpy
                                            • String ID: 0
                                            • API String ID: 4152858687-4108050209
                                            • Opcode ID: 9519e858c82a2e4c2d5b4336bf8d06f1de9e243314ad6cc671c640fad9485807
                                            • Instruction ID: e0351c641c03a65669dc94a72792e7a88833fee4f5aa778809063e6de170d055
                                            • Opcode Fuzzy Hash: 9519e858c82a2e4c2d5b4336bf8d06f1de9e243314ad6cc671c640fad9485807
                                            • Instruction Fuzzy Hash: 4A51F1719083059ED7A49E28D845A7F77E4EF85330F040A2DFA94D71E0DB78CD04AB52
                                            APIs
                                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00FED5D4
                                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00FED60A
                                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00FED61B
                                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00FED69D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ErrorMode$AddressCreateInstanceProc
                                            • String ID: DllGetClassObject
                                            • API String ID: 753597075-1075368562
                                            • Opcode ID: f9bbaf1e807beb6c0b5e88ae28600fa922d913d8034ca2c4953e1ca56c470264
                                            • Instruction ID: d17489382af43859957267a1d406f51755b80e9f3fa0fa16131d7d62fa3aba1f
                                            • Opcode Fuzzy Hash: f9bbaf1e807beb6c0b5e88ae28600fa922d913d8034ca2c4953e1ca56c470264
                                            • Instruction Fuzzy Hash: C541E1B1600204EFDB14CF66C884B9A7BB9EF44314F1581ADEC099F205D7B6DD44EBA0
                                            APIs
                                            • _memset.LIBCMT ref: 00FF27C0
                                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00FF27DC
                                            • DeleteMenu.USER32(?,00000007,00000000), ref: 00FF2822
                                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,01055890,00000000), ref: 00FF286B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Menu$Delete$InfoItem_memset
                                            • String ID: 0
                                            • API String ID: 1173514356-4108050209
                                            • Opcode ID: 3e55eef1e7b945dc729a01d38dac7dbaf8d91483bd6fac197360dfcee20ffe8e
                                            • Instruction ID: 3e45c7732908652db415a559a62e54f1c7d501d9ba60acbe210bde7566d255d0
                                            • Opcode Fuzzy Hash: 3e55eef1e7b945dc729a01d38dac7dbaf8d91483bd6fac197360dfcee20ffe8e
                                            • Instruction Fuzzy Hash: 3941F0706043059FDB60DF24CC84B6ABBE8EF85764F04492EFAA5972E1C734E804DB52
                                            APIs
                                            • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0100D7C5
                                              • Part of subcall function 00F9784B: _memmove.LIBCMT ref: 00F97899
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: BuffCharLower_memmove
                                            • String ID: cdecl$none$stdcall$winapi
                                            • API String ID: 3425801089-567219261
                                            • Opcode ID: 752bfbdd5ac7801fc7840f03cfe792b086325f2b1f1107390b3d69dea833f500
                                            • Instruction ID: 394a1f0d3fcfcab8be08bd3d7a95e211d211a23b164d22d2ac0e2474334b465c
                                            • Opcode Fuzzy Hash: 752bfbdd5ac7801fc7840f03cfe792b086325f2b1f1107390b3d69dea833f500
                                            • Instruction Fuzzy Hash: 3031D670900205ABEF01EF99CC519FEB3B4FF04320F108A69E8A9972C1DB35EA05CB90
                                            APIs
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                              • Part of subcall function 00FEAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FEAABC
                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00FE8F14
                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00FE8F27
                                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00FE8F57
                                              • Part of subcall function 00F97BCC: _memmove.LIBCMT ref: 00F97C06
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$_memmove$ClassName
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 365058703-1403004172
                                            • Opcode ID: 0dcd699e7a895fcf81a2187909b20c1225ba3c7785fa51dd30e73586a57726a9
                                            • Instruction ID: b1456aed877b63a0a3d4e6eaf3c8b33fe528bf3bc1c1e337cc1be872aa8c0261
                                            • Opcode Fuzzy Hash: 0dcd699e7a895fcf81a2187909b20c1225ba3c7785fa51dd30e73586a57726a9
                                            • Instruction Fuzzy Hash: 9521EE71A00244BAEF24BBB1DC859FFB769DF053A0F044529F429971E0DF3D480AAA10
                                            APIs
                                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0100184C
                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 01001872
                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 010018A2
                                            • InternetCloseHandle.WININET(00000000), ref: 010018E9
                                              • Part of subcall function 01002483: GetLastError.KERNEL32(?,?,01001817,00000000,00000000,00000001), ref: 01002498
                                              • Part of subcall function 01002483: SetEvent.KERNEL32(?,?,01001817,00000000,00000000,00000001), ref: 010024AD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                            • String ID:
                                            • API String ID: 3113390036-3916222277
                                            • Opcode ID: 53ead88fdda718209e2b421ce429754cc51a2739c7836c18faa683a42b13c41b
                                            • Instruction ID: 18c2b4f20f18ecb7640102d7dd0a03c991df60f8b5e0ca86c0c3302761f2f73d
                                            • Opcode Fuzzy Hash: 53ead88fdda718209e2b421ce429754cc51a2739c7836c18faa683a42b13c41b
                                            • Instruction Fuzzy Hash: 9121AFB1500209BFFB229A64DC84EBF77EDFB48754F00412AF585D2180DB75CE0457A1
                                            APIs
                                              • Part of subcall function 00F91D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F91D73
                                              • Part of subcall function 00F91D35: GetStockObject.GDI32(00000011), ref: 00F91D87
                                              • Part of subcall function 00F91D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F91D91
                                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 01016461
                                            • LoadLibraryW.KERNEL32(?), ref: 01016468
                                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0101647D
                                            • DestroyWindow.USER32(?), ref: 01016485
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                            • String ID: SysAnimate32
                                            • API String ID: 4146253029-1011021900
                                            • Opcode ID: bce0d349c4eb97249dd59ffc94ac0b008ba18583e0c25295032b7ba9d615197b
                                            • Instruction ID: a265100c1ba8ec8b686f700230d2fe4f4355a6fd5c19b1cbf62b5f6305230bdb
                                            • Opcode Fuzzy Hash: bce0d349c4eb97249dd59ffc94ac0b008ba18583e0c25295032b7ba9d615197b
                                            • Instruction Fuzzy Hash: 9921A471140205BFEF118EA8DC40EBB77EEEF49368F104669FA9093099DBBADC419760
                                            APIs
                                            • GetStdHandle.KERNEL32(0000000C), ref: 00FF6DBC
                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FF6DEF
                                            • GetStdHandle.KERNEL32(0000000C), ref: 00FF6E01
                                            • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00FF6E3B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CreateHandle$FilePipe
                                            • String ID: nul
                                            • API String ID: 4209266947-2873401336
                                            • Opcode ID: aa062eebfca94e259d6acdcef7c6365645722f6039646076b2a7d9bdda2c57fe
                                            • Instruction ID: b2b69d4f6d93f325ad225e8552e66e5dd747d282486f18ac951c0d97700573ae
                                            • Opcode Fuzzy Hash: aa062eebfca94e259d6acdcef7c6365645722f6039646076b2a7d9bdda2c57fe
                                            • Instruction Fuzzy Hash: 4B21A175A0020EABDB209F29D804AAE77B4EF44730F204A19FEE0D72E0DB719815AB54
                                            APIs
                                            • GetStdHandle.KERNEL32(000000F6), ref: 00FF6E89
                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FF6EBB
                                            • GetStdHandle.KERNEL32(000000F6), ref: 00FF6ECC
                                            • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00FF6F06
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CreateHandle$FilePipe
                                            • String ID: nul
                                            • API String ID: 4209266947-2873401336
                                            • Opcode ID: 3f958ea31eb3ee77a3ffc16708b682fd35f0e77602ef278e4ea0f81a67d58bd7
                                            • Instruction ID: 84d516003f8239a5bcff930e25a66f56ddf71e93a11c0800c350a15a72ff5665
                                            • Opcode Fuzzy Hash: 3f958ea31eb3ee77a3ffc16708b682fd35f0e77602ef278e4ea0f81a67d58bd7
                                            • Instruction Fuzzy Hash: 172195769003099BDB209F69D804ABA77A4AF55730F200A19FEE0D72E0DB759850DB54
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 00FFAC54
                                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00FFACA8
                                            • __swprintf.LIBCMT ref: 00FFACC1
                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000,0101F910), ref: 00FFACFF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ErrorMode$InformationVolume__swprintf
                                            • String ID: %lu
                                            • API String ID: 3164766367-685833217
                                            • Opcode ID: 1614cc9b81718b3439a29466c30722d2112f81134527eef409c8f82810c1114c
                                            • Instruction ID: d7a8ea822ac7457ae0cf6434571b3bd69f765e2a256b8b94062aa0ca8dcc9f34
                                            • Opcode Fuzzy Hash: 1614cc9b81718b3439a29466c30722d2112f81134527eef409c8f82810c1114c
                                            • Instruction Fuzzy Hash: 5821A170A00109AFDB10DF69CD45DEE7BB8EF49314B004069F909DB251DA79EA05DB21
                                            APIs
                                            • CharUpperBuffW.USER32(?,?), ref: 00FF1B19
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: BuffCharUpper
                                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                                            • API String ID: 3964851224-769500911
                                            • Opcode ID: a7e5170feb154c80acabebc0e927df7759137077980411b3c34c412326e8b29e
                                            • Instruction ID: a96eae2270c4e5068409c3a48e76016af705188ae03629e04b66ca28783ace13
                                            • Opcode Fuzzy Hash: a7e5170feb154c80acabebc0e927df7759137077980411b3c34c412326e8b29e
                                            • Instruction Fuzzy Hash: 9F118E70900209CF8F00FFA4D8A19FEB3B4FF65704B1088A5D954672A6EB365D06EF40
                                            APIs
                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0100EC07
                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0100EC37
                                            • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0100ED6A
                                            • CloseHandle.KERNEL32(?), ref: 0100EDEB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                            • String ID:
                                            • API String ID: 2364364464-0
                                            • Opcode ID: 52fe70af48da804fe7064ecb26992922094885e0ed567f817ea58b170faca15d
                                            • Instruction ID: f770c8d31f4f4544cc736257eb5c73a37f509ed6352a0a71c2ca50b8b227651c
                                            • Opcode Fuzzy Hash: 52fe70af48da804fe7064ecb26992922094885e0ed567f817ea58b170faca15d
                                            • Instruction Fuzzy Hash: F08171716047009FEB61EF28CC46F2AB7E5AF84710F44881DF999DB2D2DAB5AC41CB91
                                            APIs
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                              • Part of subcall function 01010E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0100FDAD,?,?), ref: 01010E31
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 010100FD
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0101013C
                                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 01010183
                                            • RegCloseKey.ADVAPI32(?,?), ref: 010101AF
                                            • RegCloseKey.ADVAPI32(00000000), ref: 010101BC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                            • String ID:
                                            • API String ID: 3440857362-0
                                            • Opcode ID: 678c911e91bd782a1cc9bfbc32e2280e117cf9403518af23e77ad31f0234c366
                                            • Instruction ID: 1ff9f3479479f57127de54f9fd2ee6d63d633945437acab46acb60701f9172b6
                                            • Opcode Fuzzy Hash: 678c911e91bd782a1cc9bfbc32e2280e117cf9403518af23e77ad31f0234c366
                                            • Instruction Fuzzy Hash: 10517731208305AFEB14EF68CC81E6AB7E8FF84314F00881DF58587295DB39E948CB52
                                            APIs
                                              • Part of subcall function 00F99837: __itow.LIBCMT ref: 00F99862
                                              • Part of subcall function 00F99837: __swprintf.LIBCMT ref: 00F998AC
                                            • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0100D927
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 0100D9AA
                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0100D9C6
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 0100DA07
                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0100DA21
                                              • Part of subcall function 00F95A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FF7896,?,?,00000000), ref: 00F95A2C
                                              • Part of subcall function 00F95A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FF7896,?,?,00000000,?,?), ref: 00F95A50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                            • String ID:
                                            • API String ID: 327935632-0
                                            • Opcode ID: 974c0d7346d29ec3ba777eae65862e7594a5d0c86d942486fddaf8dc4fdf0c0f
                                            • Instruction ID: c8acdbe5b39d73c72cfc0b37ddc76cbd94936b9e3b2cf19ccc819f3b1a647846
                                            • Opcode Fuzzy Hash: 974c0d7346d29ec3ba777eae65862e7594a5d0c86d942486fddaf8dc4fdf0c0f
                                            • Instruction Fuzzy Hash: FF511735A04209DFEB01EFA8C8849ADB7F5EF09320F058099E895AB352D739EA45CF50
                                            APIs
                                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00FFE61F
                                            • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00FFE648
                                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00FFE687
                                              • Part of subcall function 00F99837: __itow.LIBCMT ref: 00F99862
                                              • Part of subcall function 00F99837: __swprintf.LIBCMT ref: 00F998AC
                                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00FFE6AC
                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00FFE6B4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                            • String ID:
                                            • API String ID: 1389676194-0
                                            • Opcode ID: 2db3d8f3c1dc26d82ca6a2c7be10e96c8af71306e6ae2fdad34037319a401159
                                            • Instruction ID: 02de296d477331a4ee691235644e24e2d4a761ee1b64847ee3f2a86742ba13bd
                                            • Opcode Fuzzy Hash: 2db3d8f3c1dc26d82ca6a2c7be10e96c8af71306e6ae2fdad34037319a401159
                                            • Instruction Fuzzy Hash: 50511A35A00109DFDF01EF68C981AAEBBF5EF09314B1480A9E949AB361DB75ED11EF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8126a8ef6c524acc8c3b7741bd9213dcf156989540364d99f8d58251effd0200
                                            • Instruction ID: bd3edb7eea0179db5d3378a95da82349198f888c13287697ced140862cc5f13f
                                            • Opcode Fuzzy Hash: 8126a8ef6c524acc8c3b7741bd9213dcf156989540364d99f8d58251effd0200
                                            • Instruction Fuzzy Hash: 8E41D335A06284EFE761DE68CC48FA9BFE4EB09360F040195FA95A72D9C738A945CB50
                                            APIs
                                            • GetCursorPos.USER32(?), ref: 00F92357
                                            • ScreenToClient.USER32(010557B0,?), ref: 00F92374
                                            • GetAsyncKeyState.USER32(00000001), ref: 00F92399
                                            • GetAsyncKeyState.USER32(00000002), ref: 00F923A7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AsyncState$ClientCursorScreen
                                            • String ID:
                                            • API String ID: 4210589936-0
                                            • Opcode ID: d4be7eca68b66ea26a3cc49aeaafcc3ac8d144bae81993d39fd47a341c02b11a
                                            • Instruction ID: 0061ac51c61f6a971adda3ed23aef0c3152da61840d5a496bd37257519c1921f
                                            • Opcode Fuzzy Hash: d4be7eca68b66ea26a3cc49aeaafcc3ac8d144bae81993d39fd47a341c02b11a
                                            • Instruction Fuzzy Hash: EC418F35A04106FBDF299F68CC45FEDBB74FB05370F20431AE86892294CB799994EB90
                                            APIs
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FE63E7
                                            • TranslateAcceleratorW.USER32(?,?,?), ref: 00FE6433
                                            • TranslateMessage.USER32(?), ref: 00FE645C
                                            • DispatchMessageW.USER32(?), ref: 00FE6466
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FE6475
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Message$PeekTranslate$AcceleratorDispatch
                                            • String ID:
                                            • API String ID: 2108273632-0
                                            • Opcode ID: 6524a060be0a89ec6ef22166f1df947716c6833b219cc3ef25370f1bb12129e3
                                            • Instruction ID: 6e7cfadbda22c3414b8a861d13ca6c53599967c05e7982826e826f49dace0e49
                                            • Opcode Fuzzy Hash: 6524a060be0a89ec6ef22166f1df947716c6833b219cc3ef25370f1bb12129e3
                                            • Instruction Fuzzy Hash: 9531C531D0038AAFDB34CEB1DC44BB77BACAB253A0F140165E465C31D5E73A9489EB61
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 00FE8A30
                                            • PostMessageW.USER32(?,00000201,00000001), ref: 00FE8ADA
                                            • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00FE8AE2
                                            • PostMessageW.USER32(?,00000202,00000000), ref: 00FE8AF0
                                            • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00FE8AF8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessagePostSleep$RectWindow
                                            • String ID:
                                            • API String ID: 3382505437-0
                                            • Opcode ID: 068a0008970c0f692aa8f2bddd6fccbbdb219eb83b0e540964e4894d53d75fe6
                                            • Instruction ID: 0a665dfb0134b7464656b7273d76d420ab76fbf09ad2085469a291ea2dfad385
                                            • Opcode Fuzzy Hash: 068a0008970c0f692aa8f2bddd6fccbbdb219eb83b0e540964e4894d53d75fe6
                                            • Instruction Fuzzy Hash: 9F31FF71900259EFCB10DFA8D94CA9E3BB5FB04325F10822AF829E61C0C7B89915EB90
                                            APIs
                                            • IsWindowVisible.USER32(?), ref: 00FEB204
                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00FEB221
                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00FEB259
                                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00FEB27F
                                            • _wcsstr.LIBCMT ref: 00FEB289
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                            • String ID:
                                            • API String ID: 3902887630-0
                                            • Opcode ID: 21d1afadb9074dbe7aa739838cae28d22ad27982dff480e8570f2a321003398e
                                            • Instruction ID: e444d0f6316994438680ee7e1034805902375419712f8f92dba2eb3a6e392590
                                            • Opcode Fuzzy Hash: 21d1afadb9074dbe7aa739838cae28d22ad27982dff480e8570f2a321003398e
                                            • Instruction Fuzzy Hash: 6C2126326042417BEB269B7ADC49EBF7B9CDF49760F008129F904DA191EF69DC40B7A0
                                            APIs
                                              • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                                            • GetWindowLongW.USER32(?,000000F0), ref: 0101B192
                                            • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0101B1B7
                                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0101B1CF
                                            • GetSystemMetrics.USER32(00000004), ref: 0101B1F8
                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,01000E90,00000000), ref: 0101B216
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$Long$MetricsSystem
                                            • String ID:
                                            • API String ID: 2294984445-0
                                            • Opcode ID: 1e0bfafeaaa6e7812d569dd9d40133434da38d42b3cd0c3cbe79212880faa0e4
                                            • Instruction ID: 639542aa5470894aad71f0726ad7a4bb8e54622e2ab0dfddc51ff82783f7917a
                                            • Opcode Fuzzy Hash: 1e0bfafeaaa6e7812d569dd9d40133434da38d42b3cd0c3cbe79212880faa0e4
                                            • Instruction Fuzzy Hash: 8321D631A10211AFDB609E7CDC04A6A3BB4FB05321F114764FEB2D31E4D7399414CB80
                                            APIs
                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00FE9320
                                              • Part of subcall function 00F97BCC: _memmove.LIBCMT ref: 00F97C06
                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FE9352
                                            • __itow.LIBCMT ref: 00FE936A
                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FE9392
                                            • __itow.LIBCMT ref: 00FE93A3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$__itow$_memmove
                                            • String ID:
                                            • API String ID: 2983881199-0
                                            • Opcode ID: b9f2a7a35ce62cc722ba0aee8e5ce87f00057b992be25b117360b21ae10ff074
                                            • Instruction ID: db20dea7249a88b9e4ab54994750e71db2d3588c95f666346d6635ee5b5b6109
                                            • Opcode Fuzzy Hash: b9f2a7a35ce62cc722ba0aee8e5ce87f00057b992be25b117360b21ae10ff074
                                            • Instruction Fuzzy Hash: B221D731B04348AFDB20AEA69C85EEE7BADEB88720F044025FD45DB1C1D6F58D45A7A1
                                            APIs
                                            • IsWindow.USER32(00000000), ref: 01005A6E
                                            • GetForegroundWindow.USER32 ref: 01005A85
                                            • GetDC.USER32(00000000), ref: 01005AC1
                                            • GetPixel.GDI32(00000000,?,00000003), ref: 01005ACD
                                            • ReleaseDC.USER32(00000000,00000003), ref: 01005B08
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$ForegroundPixelRelease
                                            • String ID:
                                            • API String ID: 4156661090-0
                                            • Opcode ID: 73173c0790d06152a61243ad3bc1fa7f31e66aa353a7cc6d0a9d5c92dadff707
                                            • Instruction ID: a3975fc1ff55fbe0a1220c9628805c798a7d52e3d97a2615dd0a0d43a92c321c
                                            • Opcode Fuzzy Hash: 73173c0790d06152a61243ad3bc1fa7f31e66aa353a7cc6d0a9d5c92dadff707
                                            • Instruction Fuzzy Hash: 9921A135A00204AFEB10EF68DC84AAABBE5EF49350F04846DF949D7351CE79AD45DB90
                                            APIs
                                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F9134D
                                            • SelectObject.GDI32(?,00000000), ref: 00F9135C
                                            • BeginPath.GDI32(?), ref: 00F91373
                                            • SelectObject.GDI32(?,00000000), ref: 00F9139C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ObjectSelect$BeginCreatePath
                                            • String ID:
                                            • API String ID: 3225163088-0
                                            • Opcode ID: 068006e1d5c59880fa42ea8e74496f4634a2e8581f8db32adf253f193a437265
                                            • Instruction ID: 25456d98ecd9ac00caf2a13fe86a25e19ccce149c87f1dae243615860c530981
                                            • Opcode Fuzzy Hash: 068006e1d5c59880fa42ea8e74496f4634a2e8581f8db32adf253f193a437265
                                            • Instruction Fuzzy Hash: 2F216031C0030AEFEF218F25DD05B6A7BB8FB14321F244266F891A6194D77B9995EF90
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memcmp
                                            • String ID:
                                            • API String ID: 2931989736-0
                                            • Opcode ID: acb53ff2ad5796b65e1cadf3e869191277ef391e29bbf2716006f89bcb717855
                                            • Instruction ID: ef800d82dbbd0c6a67667a06d26b457fa83814b518f9784edefa555f1cf60f5a
                                            • Opcode Fuzzy Hash: acb53ff2ad5796b65e1cadf3e869191277ef391e29bbf2716006f89bcb717855
                                            • Instruction Fuzzy Hash: 38012872604159BBD210AB579D42FFBB35CEE51398F244424FD049B302FB10DE10FAA1
                                            APIs
                                            • GetCurrentThreadId.KERNEL32 ref: 00FF4ABA
                                            • __beginthreadex.LIBCMT ref: 00FF4AD8
                                            • MessageBoxW.USER32(?,?,?,?), ref: 00FF4AED
                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00FF4B03
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00FF4B0A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                            • String ID:
                                            • API String ID: 3824534824-0
                                            • Opcode ID: 64c3079b6c9531d923b0715d643f356e64b41d934c27ccbc99b805acf0ac0820
                                            • Instruction ID: accaa597ebecc1c93065f65c583e2f2c3499e6990ccde1a5dc0225bc42d05ba7
                                            • Opcode Fuzzy Hash: 64c3079b6c9531d923b0715d643f356e64b41d934c27ccbc99b805acf0ac0820
                                            • Instruction Fuzzy Hash: ED114876D04208BBC7208FA89C04AAB7FACEF86330F144255FA14D3251D67AD9048BA0
                                            APIs
                                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FE821E
                                            • GetLastError.KERNEL32(?,00FE7CE2,?,?,?), ref: 00FE8228
                                            • GetProcessHeap.KERNEL32(00000008,?,?,00FE7CE2,?,?,?), ref: 00FE8237
                                            • HeapAlloc.KERNEL32(00000000,?,00FE7CE2,?,?,?), ref: 00FE823E
                                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FE8255
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                            • String ID:
                                            • API String ID: 842720411-0
                                            • Opcode ID: 18214e0340398564694bbd83c348ea8381144bdb92b27fe042df913adb8898d5
                                            • Instruction ID: f8b9856bcac197fee2a1eacd91245bcbfdc337dd4a2fd3131961e256f54a02f4
                                            • Opcode Fuzzy Hash: 18214e0340398564694bbd83c348ea8381144bdb92b27fe042df913adb8898d5
                                            • Instruction Fuzzy Hash: 6C018171600245BFDB205FA6DC48D6B7FACEF8A7A4B500569F94DC3210DB368C05EB60
                                            APIs
                                            • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE7044,80070057,?,?,?,00FE7455), ref: 00FE7127
                                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE7044,80070057,?,?), ref: 00FE7142
                                            • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE7044,80070057,?,?), ref: 00FE7150
                                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE7044,80070057,?), ref: 00FE7160
                                            • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE7044,80070057,?,?), ref: 00FE716C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: From$Prog$FreeStringTasklstrcmpi
                                            • String ID:
                                            • API String ID: 3897988419-0
                                            • Opcode ID: cb639f592b854cc28e9594f71bcd429c6ab603183ab55d9604f6cfa5d935c860
                                            • Instruction ID: 00099f38ba5cb48390dcd224d3eed6a0c4e4692c40700abf97c5863ed74a1802
                                            • Opcode Fuzzy Hash: cb639f592b854cc28e9594f71bcd429c6ab603183ab55d9604f6cfa5d935c860
                                            • Instruction Fuzzy Hash: 8201DF72A01315BBCB209F65DC44BAA7BACEF447A1F100064FD48D2214E73ADD01ABA0
                                            APIs
                                            • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF5260
                                            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00FF526E
                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF5276
                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00FF5280
                                            • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF52BC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                            • String ID:
                                            • API String ID: 2833360925-0
                                            • Opcode ID: 7547c1871f25f73d9927d5cd85ccf70efb0a1d9885a90987517f89e1f6bcc0bd
                                            • Instruction ID: 935d4a1e758ca641deadc36db49cf4832cbcb3bca0611056bdd9a5101b33ebb6
                                            • Opcode Fuzzy Hash: 7547c1871f25f73d9927d5cd85ccf70efb0a1d9885a90987517f89e1f6bcc0bd
                                            • Instruction Fuzzy Hash: 0F015731D01A1EEBCF10EFE4E849AEDBB78BF09B11F400246EA81B2254CB39555497A1
                                            APIs
                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FE8121
                                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FE812B
                                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE813A
                                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8141
                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8157
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                            • String ID:
                                            • API String ID: 44706859-0
                                            • Opcode ID: 1b85f1af9162f92e75665757dc6e4bb2ebf31da140db40033c44d15e9fbdd087
                                            • Instruction ID: 30346b8d1808d6517b9ab045c0aa82bf8094c2d0f98fb59ec6fd7797e541052f
                                            • Opcode Fuzzy Hash: 1b85f1af9162f92e75665757dc6e4bb2ebf31da140db40033c44d15e9fbdd087
                                            • Instruction Fuzzy Hash: 07F06275640305AFEB212FA5EC88E673BACFF4A7A4B000115F989C6140CB6A9D46EB60
                                            APIs
                                            • GetDlgItem.USER32(?,000003E9), ref: 00FEC1F7
                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 00FEC20E
                                            • MessageBeep.USER32(00000000), ref: 00FEC226
                                            • KillTimer.USER32(?,0000040A), ref: 00FEC242
                                            • EndDialog.USER32(?,00000001), ref: 00FEC25C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                            • String ID:
                                            • API String ID: 3741023627-0
                                            • Opcode ID: db59edb9a23887861f21715e8b63c9a562bf7e467a113c23556ff968f28abd28
                                            • Instruction ID: b607f41fa8ff826ae115e78440605d8d5278b4b055bf1ced5aa83f7a30c5b84b
                                            • Opcode Fuzzy Hash: db59edb9a23887861f21715e8b63c9a562bf7e467a113c23556ff968f28abd28
                                            • Instruction Fuzzy Hash: 01012630804704ABEB305B60EC4EF9277B8FF04B02F000659F6C2A00E4CBF96848AB80
                                            APIs
                                            • EndPath.GDI32(?), ref: 00F913BF
                                            • StrokeAndFillPath.GDI32(?,?,00FCB888,00000000,?), ref: 00F913DB
                                            • SelectObject.GDI32(?,00000000), ref: 00F913EE
                                            • DeleteObject.GDI32 ref: 00F91401
                                            • StrokePath.GDI32(?), ref: 00F9141C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                            • String ID:
                                            • API String ID: 2625713937-0
                                            • Opcode ID: c7800124189484da339fd1838c6d81d2e3dcf2dfd492c18bb9615bc40a44bccc
                                            • Instruction ID: f279cb140a2c2e189289faeb24f1f61e3677be23d0386495713ece91af3fd0e7
                                            • Opcode Fuzzy Hash: c7800124189484da339fd1838c6d81d2e3dcf2dfd492c18bb9615bc40a44bccc
                                            • Instruction Fuzzy Hash: B6F0CD3000470A9BEF329F5AEC4C7693BA4B711326F188224F4AA591F8C73E4595DF50
                                            APIs
                                            • CoInitialize.OLE32(00000000), ref: 00FFC432
                                            • CoCreateInstance.OLE32(01022D6C,00000000,00000001,01022BDC,?), ref: 00FFC44A
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                            • CoUninitialize.OLE32 ref: 00FFC6B7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CreateInitializeInstanceUninitialize_memmove
                                            • String ID: .lnk
                                            • API String ID: 2683427295-24824748
                                            • Opcode ID: 7d56e2b6a194bd1a50952d85b4b8a375ff8455e9e051fedf79d7a0e7dd563276
                                            • Instruction ID: 7ac144d5a96edbc3f48f9b6235d17f15d34b00fdfb151bd9e4fefb9ebc6921fd
                                            • Opcode Fuzzy Hash: 7d56e2b6a194bd1a50952d85b4b8a375ff8455e9e051fedf79d7a0e7dd563276
                                            • Instruction Fuzzy Hash: 89A14A71108305AFE700EF64CC91EABB7E8EF95354F00491DF1959B1A2EBB5EA09CB52
                                            APIs
                                              • Part of subcall function 00FB0DB6: std::exception::exception.LIBCMT ref: 00FB0DEC
                                              • Part of subcall function 00FB0DB6: __CxxThrowException@8.LIBCMT ref: 00FB0E01
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                              • Part of subcall function 00F97A51: _memmove.LIBCMT ref: 00F97AAB
                                            • __swprintf.LIBCMT ref: 00FA2ECD
                                            Strings
                                            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00FA2D66
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                            • API String ID: 1943609520-557222456
                                            • Opcode ID: 9a4bc64b5066525eea92d3e7a2a4ab3e8975e317feced4169938163aa295ec51
                                            • Instruction ID: 26c5652563a646f70c79f71628ca54d7d68943a4b06d84e14a2e78bed596e2bb
                                            • Opcode Fuzzy Hash: 9a4bc64b5066525eea92d3e7a2a4ab3e8975e317feced4169938163aa295ec51
                                            • Instruction Fuzzy Hash: 0C915C716183019FDB14EF28CC85D6FB7A9EF86720F04491EF4459B2A1EA28ED44EB52
                                            APIs
                                              • Part of subcall function 00F94750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F94743,?,?,00F937AE,?), ref: 00F94770
                                            • CoInitialize.OLE32(00000000), ref: 00FFB9BB
                                            • CoCreateInstance.OLE32(01022D6C,00000000,00000001,01022BDC,?), ref: 00FFB9D4
                                            • CoUninitialize.OLE32 ref: 00FFB9F1
                                              • Part of subcall function 00F99837: __itow.LIBCMT ref: 00F99862
                                              • Part of subcall function 00F99837: __swprintf.LIBCMT ref: 00F998AC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                            • String ID: .lnk
                                            • API String ID: 2126378814-24824748
                                            • Opcode ID: 3769f265704a314e4343e6b5a5b5f43405be3b59376f15a4fb6c46aa3a8fbf0c
                                            • Instruction ID: 50144960c52d0bc0d9ca21530df43f71bbfedfca275065c7f3294b3b3c328a1b
                                            • Opcode Fuzzy Hash: 3769f265704a314e4343e6b5a5b5f43405be3b59376f15a4fb6c46aa3a8fbf0c
                                            • Instruction Fuzzy Hash: C0A143756043059FDB00EF14C884D2ABBE5BF89324F05898CF9999B3A2CB35EC45DB91
                                            APIs
                                            • __startOneArgErrorHandling.LIBCMT ref: 00FB50AD
                                              • Part of subcall function 00FC00F0: __87except.LIBCMT ref: 00FC012B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ErrorHandling__87except__start
                                            • String ID: pow
                                            • API String ID: 2905807303-2276729525
                                            • Opcode ID: 29651584e2382272a19fc9cb383e548793ff8c5f94573ec458a3bcc00aaee473
                                            • Instruction ID: f497d003c88b553b0978bfda70aec35d0c37b03be51d92908eb98e1af8a81413
                                            • Opcode Fuzzy Hash: 29651584e2382272a19fc9cb383e548793ff8c5f94573ec458a3bcc00aaee473
                                            • Instruction Fuzzy Hash: 98517C71D08603C7DB217A29CA06BEE7B949B40B60F348D5CE4D586299DE3D8DC5BF82
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memset$_memmove
                                            • String ID: ERCP
                                            • API String ID: 2532777613-1384759551
                                            • Opcode ID: 66e7ebaff52cb296f7bc4b87b921c96c3dae80a7a1fddf426ba5ee4502d2ee18
                                            • Instruction ID: 5cdc74c2bd5bf5e74f92d550f720b8a8b0462165ddc03bfed9be04d693155c3c
                                            • Opcode Fuzzy Hash: 66e7ebaff52cb296f7bc4b87b921c96c3dae80a7a1fddf426ba5ee4502d2ee18
                                            • Instruction Fuzzy Hash: AE518EB1900305DBDB24DF65C881BAAB7E4EF49324F24457EE48ACB241EB74AA45EB50
                                            APIs
                                              • Part of subcall function 00FF14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FE9296,?,?,00000034,00000800,?,00000034), ref: 00FF14E6
                                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00FE983F
                                              • Part of subcall function 00FF1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FE92C5,?,?,00000800,?,00001073,00000000,?,?), ref: 00FF14B1
                                              • Part of subcall function 00FF13DE: GetWindowThreadProcessId.USER32(?,?), ref: 00FF1409
                                              • Part of subcall function 00FF13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00FE925A,00000034,?,?,00001004,00000000,00000000), ref: 00FF1419
                                              • Part of subcall function 00FF13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00FE925A,00000034,?,?,00001004,00000000,00000000), ref: 00FF142F
                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FE98AC
                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FE98F9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                            • String ID: @
                                            • API String ID: 4150878124-2766056989
                                            • Opcode ID: 9182247d102a705fd69d4d03421416e765dda1037c817ca9b2cd67af2b189c37
                                            • Instruction ID: 5e1045f1ed42228030d2f1bad78b207e7dc980a239c70610d3e5353ed9a3f45d
                                            • Opcode Fuzzy Hash: 9182247d102a705fd69d4d03421416e765dda1037c817ca9b2cd67af2b189c37
                                            • Instruction Fuzzy Hash: CA41507690021CAFCB20DFA4CC41AEEBBB8EF49310F004059FA45B7151DA756E45DBA0
                                            APIs
                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0101F910,00000000,?,?,?,?), ref: 010179DF
                                            • GetWindowLongW.USER32 ref: 010179FC
                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 01017A0C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$Long
                                            • String ID: SysTreeView32
                                            • API String ID: 847901565-1698111956
                                            • Opcode ID: d46a4efe342c9bd6336e863fae408e5dcf203ea3241ff0f579c1969f461428f4
                                            • Instruction ID: 0f1bd3959649493f7ddc78733c1b38c573a8992b4e7398187f3cad85920b2bd2
                                            • Opcode Fuzzy Hash: d46a4efe342c9bd6336e863fae408e5dcf203ea3241ff0f579c1969f461428f4
                                            • Instruction Fuzzy Hash: 7C310132200206ABEF518E78CC41BEB7BA9FB48334F244725F9B5931E4D739E9548B50
                                            APIs
                                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 01017461
                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 01017475
                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 01017499
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window
                                            • String ID: SysMonthCal32
                                            • API String ID: 2326795674-1439706946
                                            • Opcode ID: 591e43544074f70f9ce3cfa18af8f54a854ceb1674cca0bca869b7cd1c3264f7
                                            • Instruction ID: d8240b7b61ea3d9b950a26ba9ce4046166d7e8db6f7816faef3b89655eefb098
                                            • Opcode Fuzzy Hash: 591e43544074f70f9ce3cfa18af8f54a854ceb1674cca0bca869b7cd1c3264f7
                                            • Instruction Fuzzy Hash: 8A21D332540219ABDF22CE64CC42FEA3BB9FF48724F110154FE956B194DB79A851DBE0
                                            APIs
                                            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 01017C4A
                                            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 01017C58
                                            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01017C5F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$DestroyWindow
                                            • String ID: msctls_updown32
                                            • API String ID: 4014797782-2298589950
                                            • Opcode ID: b96a159432d4ed506a5d7c7097214abf67198bad5d2311f279351a6b111d102a
                                            • Instruction ID: b3fa9e434498607cbf9e101507737e52c62504050ce2ef0e5bebc2da33e3d1c9
                                            • Opcode Fuzzy Hash: b96a159432d4ed506a5d7c7097214abf67198bad5d2311f279351a6b111d102a
                                            • Instruction Fuzzy Hash: 0B214CB5600209AFEB11DF28DCC1DB737ECEB49394B140459FA859B355CB3AEC118BA0
                                            APIs
                                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 01016D3B
                                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 01016D4B
                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 01016D70
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$MoveWindow
                                            • String ID: Listbox
                                            • API String ID: 3315199576-2633736733
                                            • Opcode ID: 49e744a99969598e3a7460a3f3df519e58c30317adaf3b2ea7a1ba4c0f851d50
                                            • Instruction ID: cc57626dc92f4b5024e523fe99183013a726a72081618a5f8096e44c98b843c5
                                            • Opcode Fuzzy Hash: 49e744a99969598e3a7460a3f3df519e58c30317adaf3b2ea7a1ba4c0f851d50
                                            • Instruction Fuzzy Hash: A6210732600118BFDF128F58DC40FBB3BBAFF89750F418128F9859B194C6BA9C5187A0
                                            APIs
                                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 01017772
                                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 01017787
                                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 01017794
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: msctls_trackbar32
                                            • API String ID: 3850602802-1010561917
                                            • Opcode ID: c84f46b4d70a27d38525529d17ee46b7476d98368be5803473148351643ea816
                                            • Instruction ID: ec49b166257afa527bcfa4e61417ec1237775483aaf7e7c41ff6e4466c44c7b2
                                            • Opcode Fuzzy Hash: c84f46b4d70a27d38525529d17ee46b7476d98368be5803473148351643ea816
                                            • Instruction Fuzzy Hash: 1411E372240209BBEF209F65CC45FEB7BA9FF88B64F014528FA81A6090D676E411CB20
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00F94B83,?), ref: 00F94C44
                                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00F94C56
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                            • API String ID: 2574300362-1355242751
                                            • Opcode ID: 925eefd4ad7f5c53398b630d742b8d7e4d4ff69f4d9c666424aef7589fb7c216
                                            • Instruction ID: d0f4e345907dcfffc4397ca30b1effc8902641feeded87fd63359c82193d3d63
                                            • Opcode Fuzzy Hash: 925eefd4ad7f5c53398b630d742b8d7e4d4ff69f4d9c666424aef7589fb7c216
                                            • Instruction Fuzzy Hash: D5D01270915713CFDB205F32D95861676D4AF16251B11883D94E5DA214E679D884C750
                                            APIs
                                            • LoadLibraryA.KERNEL32(advapi32.dll,?,01011039), ref: 01010DF5
                                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 01010E07
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                            • API String ID: 2574300362-4033151799
                                            • Opcode ID: a18971c225a8004385d67298e13e4c82289b2096af808fc7071abf6eb8bffe53
                                            • Instruction ID: abcb7c7d5ae3d183d9d0a0f2fe0cdfc4c168045c02d50535c467151e423fd992
                                            • Opcode Fuzzy Hash: a18971c225a8004385d67298e13e4c82289b2096af808fc7071abf6eb8bffe53
                                            • Instruction Fuzzy Hash: EDD017B0610723CFD7209F7AC8486877AE5AF09256F218C7EA5C6D6108E6B9E4D0CB90
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00F94BD0,?,00F94DEF,?,010552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F94C11
                                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00F94C23
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                            • API String ID: 2574300362-3689287502
                                            • Opcode ID: bcfb65b94e091c88c6b5c8aebaebd5ffe07a7ea28d62b73e620a8418c0dcd852
                                            • Instruction ID: 9ee634088a8be7701e2a311bde0cb41ac9b56403f08e4f554bbca7d66e4e35cd
                                            • Opcode Fuzzy Hash: bcfb65b94e091c88c6b5c8aebaebd5ffe07a7ea28d62b73e620a8418c0dcd852
                                            • Instruction Fuzzy Hash: 80D01270911713CFDB205F71D968606B6D5EF19252B118C3D94C5D6214E6B8D885CB50
                                            APIs
                                            • LoadLibraryA.KERNEL32(kernel32.dll,00000001,01008CF4,?,0101F910), ref: 010090EE
                                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 01009100
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: GetModuleHandleExW$kernel32.dll
                                            • API String ID: 2574300362-199464113
                                            • Opcode ID: 101376ce7403ce7d2dde2a22fb09534ce5fc4b2d05df32ab74de6c2242a01df5
                                            • Instruction ID: e6473c39a76f0fa1959e48761fc31cc664a5d88cbec43933def4d5869c8f9d4a
                                            • Opcode Fuzzy Hash: 101376ce7403ce7d2dde2a22fb09534ce5fc4b2d05df32ab74de6c2242a01df5
                                            • Instruction Fuzzy Hash: 60D0C730610713CFEB208F36D86824276E4AF02245F02CC3E94CACA181E6B8C4C0CB90
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: LocalTime__swprintf
                                            • String ID: %.3d$WIN_XPe
                                            • API String ID: 2070861257-2409531811
                                            • Opcode ID: ba503b821c0273546a28dbb624113aae31787eef43c5ad3433e6b55757c4936c
                                            • Instruction ID: fcf2277d62288e35964cced29e14f0cd71a82e1fe3847569d8d5454d96c169e7
                                            • Opcode Fuzzy Hash: ba503b821c0273546a28dbb624113aae31787eef43c5ad3433e6b55757c4936c
                                            • Instruction Fuzzy Hash: E1D01273844108FACB1496919888EF9777DB708301F180563F80692160E2259B98FA21
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5e68086f45a2faa405d0403bcdc0c9becb48f4f73fde35871ca8e750569b2e75
                                            • Instruction ID: c5f9a44c7c5d6d29ee6e8a3b461fcc49cda6a9d8d3d81ecab34549cd59a4da35
                                            • Opcode Fuzzy Hash: 5e68086f45a2faa405d0403bcdc0c9becb48f4f73fde35871ca8e750569b2e75
                                            • Instruction Fuzzy Hash: 49C1A075A04356EFDB14DFA5C884EAEBBB5FF48310B108598E805EB251D730ED81EB90
                                            APIs
                                            • CharLowerBuffW.USER32(?,?), ref: 0100E0BE
                                            • CharLowerBuffW.USER32(?,?), ref: 0100E101
                                              • Part of subcall function 0100D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0100D7C5
                                            • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0100E301
                                            • _memmove.LIBCMT ref: 0100E314
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: BuffCharLower$AllocVirtual_memmove
                                            • String ID:
                                            • API String ID: 3659485706-0
                                            • Opcode ID: ed421d3c5bdd2c0fcd7187fc3310d7ed6bd2b86cdeff323c81216073134c4411
                                            • Instruction ID: 52ce90bb1ad9c02a7d62e6fc9984e09efe9f5c81ef8a7b59a732875773372ef0
                                            • Opcode Fuzzy Hash: ed421d3c5bdd2c0fcd7187fc3310d7ed6bd2b86cdeff323c81216073134c4411
                                            • Instruction Fuzzy Hash: 8FC17A716083018FD755DF28C880A6ABBE4FF89714F04896EF9999B391D731E945CF82
                                            APIs
                                            • CoInitialize.OLE32(00000000), ref: 010080C3
                                            • CoUninitialize.OLE32 ref: 010080CE
                                              • Part of subcall function 00FED56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00FED5D4
                                            • VariantInit.OLEAUT32(?), ref: 010080D9
                                            • VariantClear.OLEAUT32(?), ref: 010083AA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                            • String ID:
                                            • API String ID: 780911581-0
                                            • Opcode ID: a9c05a7fa0a072998446e154a8865572e40c5363e6ec8bb6aa2b7913b59abb05
                                            • Instruction ID: f77c854f7e22df3fcfc603a2bfcfdb4d5fd23a12a67c90cc0697d43b155f687b
                                            • Opcode Fuzzy Hash: a9c05a7fa0a072998446e154a8865572e40c5363e6ec8bb6aa2b7913b59abb05
                                            • Instruction Fuzzy Hash: 9CA17B356087019FEB51DF18C881B2AB7E4BF89314F09845DFA999B3A1DB78ED04CB42
                                            APIs
                                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,01022C7C,?), ref: 00FE76EA
                                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,01022C7C,?), ref: 00FE7702
                                            • CLSIDFromProgID.OLE32(?,?,00000000,0101FB80,000000FF,?,00000000,00000800,00000000,?,01022C7C,?), ref: 00FE7727
                                            • _memcmp.LIBCMT ref: 00FE7748
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: FromProg$FreeTask_memcmp
                                            • String ID:
                                            • API String ID: 314563124-0
                                            • Opcode ID: 08a3268421fb1c7ce9db613b9deb0ae217bd9f915d1b9f699c3558d300de8f64
                                            • Instruction ID: 46efe5d679031249ff70dcf0eeae0a38dcdf2551822358149f0e172765758132
                                            • Opcode Fuzzy Hash: 08a3268421fb1c7ce9db613b9deb0ae217bd9f915d1b9f699c3558d300de8f64
                                            • Instruction Fuzzy Hash: 39810B75A00209EFCB04DFA5C984EEEB7B9FF89315F204558E505AB250DB71AE06DB60
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Variant$AllocClearCopyInitString
                                            • String ID:
                                            • API String ID: 2808897238-0
                                            • Opcode ID: 2acd5797a60b14ebaa6866e6949596eb5fb4c22966491a69e5a02047088545a9
                                            • Instruction ID: a139cd368cddf328e374fc9299130ae45d2f7fe274523c20459e7f6d809137b8
                                            • Opcode Fuzzy Hash: 2acd5797a60b14ebaa6866e6949596eb5fb4c22966491a69e5a02047088545a9
                                            • Instruction Fuzzy Hash: 2C51F835B003499ADF20AF66C89173EB7E59F64750F20C82FE586D7291EE7CD840A701
                                            APIs
                                            • GetWindowRect.USER32(00AAF448,?), ref: 01019863
                                            • ScreenToClient.USER32(00000002,00000002), ref: 01019896
                                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 01019903
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$ClientMoveRectScreen
                                            • String ID:
                                            • API String ID: 3880355969-0
                                            • Opcode ID: bd4c2ee165edfb5af7ddc238504a2a36a67b3b9ab3bc6a031f417bb285ee26db
                                            • Instruction ID: 43c17e7217c5927a0f54b60a377ffd53893a13aa3b5c620d915a898ea0fbaf50
                                            • Opcode Fuzzy Hash: bd4c2ee165edfb5af7ddc238504a2a36a67b3b9ab3bc6a031f417bb285ee26db
                                            • Instruction Fuzzy Hash: 98517034A00209EFDF25CF68C890AAE7BF6FF45364F108199F8959B295D739A941CB90
                                            APIs
                                            • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00FE9AD2
                                            • __itow.LIBCMT ref: 00FE9B03
                                              • Part of subcall function 00FE9D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00FE9DBE
                                            • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00FE9B6C
                                            • __itow.LIBCMT ref: 00FE9BC3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend$__itow
                                            • String ID:
                                            • API String ID: 3379773720-0
                                            • Opcode ID: 6d0f6e76c7f37e23fc79192174088690321aeeca82a77bef7307299892d5edc8
                                            • Instruction ID: 2386cf361196d3137e7df538783096a1a9eb56084cabc3abdfdf8d7cf32c0a02
                                            • Opcode Fuzzy Hash: 6d0f6e76c7f37e23fc79192174088690321aeeca82a77bef7307299892d5edc8
                                            • Instruction Fuzzy Hash: 3541A270A04348ABEF21EF55DC45BEE7BB9EF84720F000069F905A7291DBB89A44DB61
                                            APIs
                                            • socket.WSOCK32(00000002,00000002,00000011), ref: 010069D1
                                            • WSAGetLastError.WSOCK32(00000000), ref: 010069E1
                                              • Part of subcall function 00F99837: __itow.LIBCMT ref: 00F99862
                                              • Part of subcall function 00F99837: __swprintf.LIBCMT ref: 00F998AC
                                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 01006A45
                                            • WSAGetLastError.WSOCK32(00000000), ref: 01006A51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ErrorLast$__itow__swprintfsocket
                                            • String ID:
                                            • API String ID: 2214342067-0
                                            • Opcode ID: 0d3f14141f25c77a585bb1d917d55a44fc98e130d0f6de6ce0f3c9c939ff7896
                                            • Instruction ID: dbac715d777332982331e7324bc7b722e23cd1594c82963fb863d75706383ea6
                                            • Opcode Fuzzy Hash: 0d3f14141f25c77a585bb1d917d55a44fc98e130d0f6de6ce0f3c9c939ff7896
                                            • Instruction Fuzzy Hash: 6841AF347002006FFB61AF28CC86F3A77E99B45B54F44805CFA599B2C2DAB99D019B91
                                            APIs
                                            • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0101F910), ref: 010064A7
                                            • _strlen.LIBCMT ref: 010064D9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _strlen
                                            • String ID:
                                            • API String ID: 4218353326-0
                                            • Opcode ID: 9d1ed3aba7f9bb61c1b689ad6d43e9001d030c102e13ce746bca66feff747b84
                                            • Instruction ID: db09b5c8c142a3b09faf97f7bf05a968b57301583cc860869a168fca62b5ee5d
                                            • Opcode Fuzzy Hash: 9d1ed3aba7f9bb61c1b689ad6d43e9001d030c102e13ce746bca66feff747b84
                                            • Instruction Fuzzy Hash: 60411630600104ABEB11EBA8DC95FBEB7A9AF44310F008158F8559B2D2DB39ED04DB50
                                            APIs
                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00FFB89E
                                            • GetLastError.KERNEL32(?,00000000), ref: 00FFB8C4
                                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00FFB8E9
                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00FFB915
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CreateHardLink$DeleteErrorFileLast
                                            • String ID:
                                            • API String ID: 3321077145-0
                                            • Opcode ID: 28b88487df90d1970069346ff60d066f2c4f60808a84c7d754ae7bf78ef89f23
                                            • Instruction ID: 58a3323a69a569230fdbec9e5a7c76c62516fc834eebe649e71918ec66b588c8
                                            • Opcode Fuzzy Hash: 28b88487df90d1970069346ff60d066f2c4f60808a84c7d754ae7bf78ef89f23
                                            • Instruction Fuzzy Hash: 3D413C39A00515DFDF10DF18C485A59BBE5AF89320F49808CED4AAB362DB79FD01EB91
                                            APIs
                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 010188DE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: InvalidateRect
                                            • String ID:
                                            • API String ID: 634782764-0
                                            • Opcode ID: 9cdde2448a05f585ea7d732b2edb8ec336eeded2611df4158d51a2ec09244b78
                                            • Instruction ID: 03361dec2d1389b0837c4a460311ba198995f95a9c06208c5907cc1b46f7a993
                                            • Opcode Fuzzy Hash: 9cdde2448a05f585ea7d732b2edb8ec336eeded2611df4158d51a2ec09244b78
                                            • Instruction Fuzzy Hash: A2310634600109BFEF719A6CDC45BAD7BA6FB0A350F588143FAD1E61A9C63DE7408752
                                            APIs
                                            • ClientToScreen.USER32(?,?), ref: 0101AB60
                                            • GetWindowRect.USER32(?,?), ref: 0101ABD6
                                            • PtInRect.USER32(?,?,0101C014), ref: 0101ABE6
                                            • MessageBeep.USER32(00000000), ref: 0101AC57
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Rect$BeepClientMessageScreenWindow
                                            • String ID:
                                            • API String ID: 1352109105-0
                                            • Opcode ID: 90f6325ef1ccf8b6a98898f02282301580e8d04e15c077c631ab4c3050f11b32
                                            • Instruction ID: 2fb7d854b8765952acf0a2eb205f51b8cfcb3eba29ee2935638b9d6eea79c99b
                                            • Opcode Fuzzy Hash: 90f6325ef1ccf8b6a98898f02282301580e8d04e15c077c631ab4c3050f11b32
                                            • Instruction Fuzzy Hash: 5F418E30B01289DFDB22DF58C884BA97BF6FB49310F1484A9E9949B359D739A841CB90
                                            APIs
                                            • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00FF0B27
                                            • SetKeyboardState.USER32(00000080,?,00000001), ref: 00FF0B43
                                            • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00FF0BA9
                                            • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00FF0BFB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: KeyboardState$InputMessagePostSend
                                            • String ID:
                                            • API String ID: 432972143-0
                                            • Opcode ID: 57d62724473486b7a6c11a70b522e7488ad5dc9d79e1cac12ebfdf5e90176851
                                            • Instruction ID: 22f6439bbdcd8cb9cd22b6b2cf7875a0d2aa1aaf3abd759a55a7e9e9a053d4c8
                                            • Opcode Fuzzy Hash: 57d62724473486b7a6c11a70b522e7488ad5dc9d79e1cac12ebfdf5e90176851
                                            • Instruction Fuzzy Hash: FA310770D4025CAEFB308E258C05BFABBA5AF85328F14425AE791D21F3CB798944B755
                                            APIs
                                            • GetKeyboardState.USER32(?,76C1C0D0,?,00008000), ref: 00FF0C66
                                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 00FF0C82
                                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 00FF0CE1
                                            • SendInput.USER32(00000001,?,0000001C,76C1C0D0,?,00008000), ref: 00FF0D33
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: KeyboardState$InputMessagePostSend
                                            • String ID:
                                            • API String ID: 432972143-0
                                            • Opcode ID: 76e27c5f8fdcbd3a61e04b67ba433c4064e5fadb90680b7b8de22d40bcb06fed
                                            • Instruction ID: 25aea08041e2d9039f2d3e133aa9b497d404a41b268217ad4ab8f37d1ef673f0
                                            • Opcode Fuzzy Hash: 76e27c5f8fdcbd3a61e04b67ba433c4064e5fadb90680b7b8de22d40bcb06fed
                                            • Instruction Fuzzy Hash: 10315830E0025CAEFF308A658C14BFEBBA6AF45330F04431AE694621E3DB399949A751
                                            APIs
                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00FC61FB
                                            • __isleadbyte_l.LIBCMT ref: 00FC6229
                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00FC6257
                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00FC628D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                            • String ID:
                                            • API String ID: 3058430110-0
                                            • Opcode ID: a45383b0548f8bf392af1ca433680ffba2f579fe69179e8016613296a7186294
                                            • Instruction ID: 3d9620c4f7cbffe557785f632bad965cb1d611965b2db412d28ab2b506eee95a
                                            • Opcode Fuzzy Hash: a45383b0548f8bf392af1ca433680ffba2f579fe69179e8016613296a7186294
                                            • Instruction Fuzzy Hash: 9131CE31A08247AFDF218E65CE4AFAA7BA9BF42320F15402CE864C7191E731D950EB90
                                            APIs
                                            • GetForegroundWindow.USER32 ref: 01014F02
                                              • Part of subcall function 00FF3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00FF365B
                                              • Part of subcall function 00FF3641: GetCurrentThreadId.KERNEL32 ref: 00FF3662
                                              • Part of subcall function 00FF3641: AttachThreadInput.USER32(00000000,?,00FF5005), ref: 00FF3669
                                            • GetCaretPos.USER32(?), ref: 01014F13
                                            • ClientToScreen.USER32(00000000,?), ref: 01014F4E
                                            • GetForegroundWindow.USER32 ref: 01014F54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                            • String ID:
                                            • API String ID: 2759813231-0
                                            • Opcode ID: 8f869d3f8dd8bd75774e5248ab12009c40637c7bfea82ceaa20d34fcaa57af20
                                            • Instruction ID: ccb973aefa712af9997b567da2736e60bd676ae7e2080c5ad64d542674c494dc
                                            • Opcode Fuzzy Hash: 8f869d3f8dd8bd75774e5248ab12009c40637c7bfea82ceaa20d34fcaa57af20
                                            • Instruction Fuzzy Hash: D8312B71E00108AFDB10EFA9CC859EFB7F9EF99300F01406AE455E7241EA799E058BA1
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00FF3C7A
                                            • Process32FirstW.KERNEL32(00000000,?), ref: 00FF3C88
                                            • Process32NextW.KERNEL32(00000000,?), ref: 00FF3CA8
                                            • CloseHandle.KERNEL32(00000000), ref: 00FF3D52
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 420147892-0
                                            • Opcode ID: bca1305dea26f747aad3211115ae60c213b80ba43a1b341f81d096efd88f905a
                                            • Instruction ID: cbb002c1a1ab62677ad860e78f4ca95dc0267a920986de3ddd6d3998ad942d50
                                            • Opcode Fuzzy Hash: bca1305dea26f747aad3211115ae60c213b80ba43a1b341f81d096efd88f905a
                                            • Instruction Fuzzy Hash: 6B31B1311083099FE711EF60CC81ABFBBE8EF95354F50082DF581861A1EB75EA49DB92
                                            APIs
                                              • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                                            • GetCursorPos.USER32(?), ref: 0101C4D2
                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00FCB9AB,?,?,?,?,?), ref: 0101C4E7
                                            • GetCursorPos.USER32(?), ref: 0101C534
                                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00FCB9AB,?,?,?), ref: 0101C56E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                                            • String ID:
                                            • API String ID: 2864067406-0
                                            • Opcode ID: 38bfa3abdc7c0c6518e8cf2f3592c6cf3df03b7e5fb3e88d45d74d53eb22cf3e
                                            • Instruction ID: 09d38ca825532034a9573d4bd33cb58403bea775607fe7959311417d76d9e861
                                            • Opcode Fuzzy Hash: 38bfa3abdc7c0c6518e8cf2f3592c6cf3df03b7e5fb3e88d45d74d53eb22cf3e
                                            • Instruction Fuzzy Hash: 8431C135600018AFEB65CF58D858EBA7FF6EB09310F044099FA858B255CB399990DBA4
                                            APIs
                                              • Part of subcall function 00FE810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FE8121
                                              • Part of subcall function 00FE810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FE812B
                                              • Part of subcall function 00FE810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE813A
                                              • Part of subcall function 00FE810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8141
                                              • Part of subcall function 00FE810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8157
                                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00FE86A3
                                            • _memcmp.LIBCMT ref: 00FE86C6
                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00FE86FC
                                            • HeapFree.KERNEL32(00000000), ref: 00FE8703
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                            • String ID:
                                            • API String ID: 1592001646-0
                                            • Opcode ID: e5ac14ef87d35300de55fa5a224e8d65581f8a67de4b77ba6f550a22b285d660
                                            • Instruction ID: 21df9143b253df7a79aebab61d2879bf97df8b67bd1fb0e40f14883776b5ab4f
                                            • Opcode Fuzzy Hash: e5ac14ef87d35300de55fa5a224e8d65581f8a67de4b77ba6f550a22b285d660
                                            • Instruction Fuzzy Hash: EE21D331E40149EFDB10EFA5C948BEEB7B8FF41358F144059E448A7240DB35AE06DB50
                                            APIs
                                            • __setmode.LIBCMT ref: 00FB09AE
                                              • Part of subcall function 00F95A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FF7896,?,?,00000000), ref: 00F95A2C
                                              • Part of subcall function 00F95A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FF7896,?,?,00000000,?,?), ref: 00F95A50
                                            • _fprintf.LIBCMT ref: 00FB09E5
                                            • OutputDebugStringW.KERNEL32(?), ref: 00FE5DBB
                                              • Part of subcall function 00FB4AAA: _flsall.LIBCMT ref: 00FB4AC3
                                            • __setmode.LIBCMT ref: 00FB0A1A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                            • String ID:
                                            • API String ID: 521402451-0
                                            • Opcode ID: 4fd56dd001f293fcebbc66105ad9ef0fac0625f2e2b2c94722fd44a46d8d1f8a
                                            • Instruction ID: e415239d1cfc5b45c8120f28df937cb0077dbf79edeaca1dec3021340bec65d1
                                            • Opcode Fuzzy Hash: 4fd56dd001f293fcebbc66105ad9ef0fac0625f2e2b2c94722fd44a46d8d1f8a
                                            • Instruction Fuzzy Hash: 54113A329086046FDB14B6BADC479FEB76C9F41320F140159F10457183EE7C6846BBA4
                                            APIs
                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 010017A3
                                              • Part of subcall function 0100182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0100184C
                                              • Part of subcall function 0100182D: InternetCloseHandle.WININET(00000000), ref: 010018E9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Internet$CloseConnectHandleOpen
                                            • String ID:
                                            • API String ID: 1463438336-0
                                            • Opcode ID: ecde88faccdf6603e603151e33ec1a363c6389e7983834780d7a1bb99665c3bd
                                            • Instruction ID: 0c0b86ec2b0e3274a0e9e449a55707d25cc068a55a638816c821b4a2be279b0c
                                            • Opcode Fuzzy Hash: ecde88faccdf6603e603151e33ec1a363c6389e7983834780d7a1bb99665c3bd
                                            • Instruction Fuzzy Hash: E3219F31200606BFFB239F649C04FBABBE9FF48B10F14401AFA9596690DB75D61597A0
                                            APIs
                                            • GetFileAttributesW.KERNEL32(?,0101FAC0), ref: 00FF3A64
                                            • GetLastError.KERNEL32 ref: 00FF3A73
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FF3A82
                                            • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0101FAC0), ref: 00FF3ADF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CreateDirectory$AttributesErrorFileLast
                                            • String ID:
                                            • API String ID: 2267087916-0
                                            • Opcode ID: c8db5bae191a20e8adc293e1125c67b5eb1e98c78f6d524eb5f87a2ef58f1245
                                            • Instruction ID: 857066fdd47e5dfcc9be4de75351e3f24d56ad068a2923a1d9600f6c3a0f65ae
                                            • Opcode Fuzzy Hash: c8db5bae191a20e8adc293e1125c67b5eb1e98c78f6d524eb5f87a2ef58f1245
                                            • Instruction Fuzzy Hash: 5C21D3795083068F8710EF39C8818BAB7E4AF55364F104A1DF5D9C72A1DB39DE49DB42
                                            APIs
                                            • GetWindowLongW.USER32(?,000000EC), ref: 01015D80
                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 01015D9A
                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 01015DA8
                                            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 01015DB6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$Long$AttributesLayered
                                            • String ID:
                                            • API String ID: 2169480361-0
                                            • Opcode ID: dc1e2c0e0f21d889b69a88e720300bc4d36f562cc7e11c3619d845b7649fb2df
                                            • Instruction ID: de2b2b263c8c4b28072ef4cf58e8290374032d7ef52ea2228adc4613c36f5312
                                            • Opcode Fuzzy Hash: dc1e2c0e0f21d889b69a88e720300bc4d36f562cc7e11c3619d845b7649fb2df
                                            • Instruction Fuzzy Hash: 2B11B431305511AFEB14AF18DC09FAA77A9EFC6320F444218F956CB2E1C76DAD01C754
                                            APIs
                                              • Part of subcall function 00FEF0BC: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00FEDCD3,?,?,?,00FEEAC6,00000000,000000EF,00000119,?,?), ref: 00FEF0CB
                                              • Part of subcall function 00FEF0BC: lstrcpyW.KERNEL32(00000000,?,?,00FEDCD3,?,?,?,00FEEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FEF0F1
                                              • Part of subcall function 00FEF0BC: lstrcmpiW.KERNEL32(00000000,?,00FEDCD3,?,?,?,00FEEAC6,00000000,000000EF,00000119,?,?), ref: 00FEF122
                                            • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00FEEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FEDCEC
                                            • lstrcpyW.KERNEL32(00000000,?,?,00FEEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FEDD12
                                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,00FEEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FEDD46
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: lstrcmpilstrcpylstrlen
                                            • String ID: cdecl
                                            • API String ID: 4031866154-3896280584
                                            • Opcode ID: 1925e11d460b0aa95357760ac43266417aee729e743e1681f4fbaf6ed8835ab8
                                            • Instruction ID: daa66adabc60df4b1c13dd663c88f33a5ce5727e57190aa5bb7d29e084763f2f
                                            • Opcode Fuzzy Hash: 1925e11d460b0aa95357760ac43266417aee729e743e1681f4fbaf6ed8835ab8
                                            • Instruction Fuzzy Hash: 9611D03A200345EFCB35AF35CC45DBA77A8FF45360B40802AF906CB290EB759850E790
                                            APIs
                                            • _free.LIBCMT ref: 00FC5101
                                              • Part of subcall function 00FB571C: __FF_MSGBANNER.LIBCMT ref: 00FB5733
                                              • Part of subcall function 00FB571C: __NMSG_WRITE.LIBCMT ref: 00FB573A
                                              • Part of subcall function 00FB571C: RtlAllocateHeap.NTDLL(00A90000,00000000,00000001,00000000,?,?,?,00FB0DD3,?), ref: 00FB575F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: AllocateHeap_free
                                            • String ID:
                                            • API String ID: 614378929-0
                                            • Opcode ID: 8676ecfbd68118aea27a595f428b333a114390c4eb1728ee456ef76bb3fea1ec
                                            • Instruction ID: d90ca5875a07e4c11f48508b0aff854c458ff228c5f60b10684979953cdc6ef5
                                            • Opcode Fuzzy Hash: 8676ecfbd68118aea27a595f428b333a114390c4eb1728ee456ef76bb3fea1ec
                                            • Instruction Fuzzy Hash: EA11E772D00A17AECB313F71AD0AF9E3B985B847B1B14452DF9449A151DE3DD881BB90
                                            APIs
                                              • Part of subcall function 00F95A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FF7896,?,?,00000000), ref: 00F95A2C
                                              • Part of subcall function 00F95A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FF7896,?,?,00000000,?,?), ref: 00F95A50
                                            • gethostbyname.WSOCK32(?,?,?), ref: 01006399
                                            • WSAGetLastError.WSOCK32(00000000), ref: 010063A4
                                            • _memmove.LIBCMT ref: 010063D1
                                            • inet_ntoa.WSOCK32(?), ref: 010063DC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                            • String ID:
                                            • API String ID: 1504782959-0
                                            • Opcode ID: c3ae1c2117cca9170782562baf1de308e7f03e6d40d2ff32555085d784d1789d
                                            • Instruction ID: b9abd7f19f769fc0a73ab7549b53a965f7017a09eca8e27184c63bf913d7b3b4
                                            • Opcode Fuzzy Hash: c3ae1c2117cca9170782562baf1de308e7f03e6d40d2ff32555085d784d1789d
                                            • Instruction Fuzzy Hash: C3115E3150010AAFDF01FBA8DD46DEEB7B9AF04320B044069F545A71A1DB39EE18DB61
                                            APIs
                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00FE8B61
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FE8B73
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FE8B89
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FE8BA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 3f76093d3537c3872510d046ba54318bb091975ace9af1d189bda7c1da4e6f3f
                                            • Instruction ID: b3bfea0fc8cdeeba4e38bb657b688cf6c72687d60318c68279f29c3a848ef4b3
                                            • Opcode Fuzzy Hash: 3f76093d3537c3872510d046ba54318bb091975ace9af1d189bda7c1da4e6f3f
                                            • Instruction Fuzzy Hash: C7110A79901218BFDB11DFA5C885F9DBB74FB48750F204095E904B7250DA716E11EB94
                                            APIs
                                              • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                                            • DefDlgProcW.USER32(?,00000020,?), ref: 00F912D8
                                            • GetClientRect.USER32(?,?), ref: 00FCB5FB
                                            • GetCursorPos.USER32(?), ref: 00FCB605
                                            • ScreenToClient.USER32(?,?), ref: 00FCB610
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Client$CursorLongProcRectScreenWindow
                                            • String ID:
                                            • API String ID: 4127811313-0
                                            • Opcode ID: 72cf4370af7204a321203e32c7bc76ee36fcf4ebb6118b6f8cca816659a82d6e
                                            • Instruction ID: 6b11d9bcfba1e56e354e9c107bb0216d322958514b0deca8737c0fb3674efc12
                                            • Opcode Fuzzy Hash: 72cf4370af7204a321203e32c7bc76ee36fcf4ebb6118b6f8cca816659a82d6e
                                            • Instruction Fuzzy Hash: BE113A39A0001AEFDF10EFA8D9859FE77B8FB05301F4004A5FA41E7140C739BA55ABA5
                                            APIs
                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00FEFCED,?,00FF0D40,?,00008000), ref: 00FF115F
                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00FEFCED,?,00FF0D40,?,00008000), ref: 00FF1184
                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00FEFCED,?,00FF0D40,?,00008000), ref: 00FF118E
                                            • Sleep.KERNEL32(?,?,?,?,?,?,?,00FEFCED,?,00FF0D40,?,00008000), ref: 00FF11C1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CounterPerformanceQuerySleep
                                            • String ID:
                                            • API String ID: 2875609808-0
                                            • Opcode ID: 45e40e2caff4e6018d1fdb1d8e6a09d381e486d1c3d17aaddac804f3d0ddc67c
                                            • Instruction ID: c487adc6fda13b8a3858193f67e795b6abd8a2ab7727ec90612bd0eaf7785113
                                            • Opcode Fuzzy Hash: 45e40e2caff4e6018d1fdb1d8e6a09d381e486d1c3d17aaddac804f3d0ddc67c
                                            • Instruction Fuzzy Hash: 55115A32C0091DD7CF109FA5D888AFEBB78FF09711F104045EB80B2240CB359554DB95
                                            APIs
                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00FED84D
                                            • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00FED864
                                            • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00FED879
                                            • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00FED897
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Type$Register$FileLoadModuleNameUser
                                            • String ID:
                                            • API String ID: 1352324309-0
                                            • Opcode ID: 639289d42e19fbcc20e70b1060770e9b1a59f57d235002a3309df9004106d13d
                                            • Instruction ID: e60b86bef02ea8af00417c6b2ec7227d2b409b4708b6eb98207dde3a9823df32
                                            • Opcode Fuzzy Hash: 639289d42e19fbcc20e70b1060770e9b1a59f57d235002a3309df9004106d13d
                                            • Instruction Fuzzy Hash: B711A575601305DBE320CF51DC08F92BBBCEB00700F104559A555C6440D7B5E608ABA2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                            • String ID:
                                            • API String ID: 3016257755-0
                                            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                            • Instruction ID: 67debf9437bcb7d8252d7ee5fd7f149a6594911ba55689fe540b01d1564b2d8f
                                            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                            • Instruction Fuzzy Hash: BD014E7248824ABBCF166E85CD02DED3F62BB18390B588419FA1858031D736D9B1BF81
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 0101B2E4
                                            • ScreenToClient.USER32(?,?), ref: 0101B2FC
                                            • ScreenToClient.USER32(?,?), ref: 0101B320
                                            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0101B33B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ClientRectScreen$InvalidateWindow
                                            • String ID:
                                            • API String ID: 357397906-0
                                            • Opcode ID: bfa660d3b8a0a3b493c4b15300153fef7d09f9f9537207363a877adfcb876592
                                            • Instruction ID: fa8967875462edeae5b5bfdfa1f1581fc340fa8bd1446a68e1cb0fb98c7bbb59
                                            • Opcode Fuzzy Hash: bfa660d3b8a0a3b493c4b15300153fef7d09f9f9537207363a877adfcb876592
                                            • Instruction Fuzzy Hash: 4C1144B9D0020AEFDB51DFA9C4849EEBBF9FF08210F108156E954E3214D735AA658F50
                                            APIs
                                            • _memset.LIBCMT ref: 0101B644
                                            • _memset.LIBCMT ref: 0101B653
                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,01056F20,01056F64), ref: 0101B682
                                            • CloseHandle.KERNEL32 ref: 0101B694
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _memset$CloseCreateHandleProcess
                                            • String ID:
                                            • API String ID: 3277943733-0
                                            • Opcode ID: 41d1fc146e4567a88173a233285f07a0c7539f08bd543445f11f7a7e7e47bd44
                                            • Instruction ID: deca2bc4588d20c7f9c9425fcc0253ae2fedbff43ba9eeb6460b8af84bb26218
                                            • Opcode Fuzzy Hash: 41d1fc146e4567a88173a233285f07a0c7539f08bd543445f11f7a7e7e47bd44
                                            • Instruction Fuzzy Hash: 29F082B29403007FF7602765AC06FBB3A9CEB08395FC04420FA89E5186D77F4C008BA8
                                            APIs
                                            • EnterCriticalSection.KERNEL32(?), ref: 00FF6BE6
                                              • Part of subcall function 00FF76C4: _memset.LIBCMT ref: 00FF76F9
                                            • _memmove.LIBCMT ref: 00FF6C09
                                            • _memset.LIBCMT ref: 00FF6C16
                                            • LeaveCriticalSection.KERNEL32(?), ref: 00FF6C26
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CriticalSection_memset$EnterLeave_memmove
                                            • String ID:
                                            • API String ID: 48991266-0
                                            • Opcode ID: 787298e3948191bdf0c07f4e6944df9d3666a93624b770118f393a22cf37c537
                                            • Instruction ID: 256318b75c5c889c29d0e252984ecd5232d50e5b16c6423275f1d4f7fdc5cc4b
                                            • Opcode Fuzzy Hash: 787298e3948191bdf0c07f4e6944df9d3666a93624b770118f393a22cf37c537
                                            • Instruction Fuzzy Hash: 99F0547A100104ABCF016F55DC85A8ABF29EF45361F048051FE089E227C739E811DBB4
                                            APIs
                                              • Part of subcall function 00F912F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F9134D
                                              • Part of subcall function 00F912F3: SelectObject.GDI32(?,00000000), ref: 00F9135C
                                              • Part of subcall function 00F912F3: BeginPath.GDI32(?), ref: 00F91373
                                              • Part of subcall function 00F912F3: SelectObject.GDI32(?,00000000), ref: 00F9139C
                                            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0101BD40
                                            • LineTo.GDI32(00000000,?,?), ref: 0101BD4D
                                            • EndPath.GDI32(00000000), ref: 0101BD5D
                                            • StrokePath.GDI32(00000000), ref: 0101BD6B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                            • String ID:
                                            • API String ID: 1539411459-0
                                            • Opcode ID: 87bb95eeb93e6d79bec15da538d1a345ea71dbac2a9e44c658caecc18ff2f0cd
                                            • Instruction ID: d48cb67a2a02f36a411bca120791ece6657e8cc6f50b771e0d456c6816dbc9bc
                                            • Opcode Fuzzy Hash: 87bb95eeb93e6d79bec15da538d1a345ea71dbac2a9e44c658caecc18ff2f0cd
                                            • Instruction Fuzzy Hash: 2BF0E23100025ABBEB336F95AC09FCE3FA8AF06310F044040FA90210D5C77E0254CF96
                                            APIs
                                            • GetSysColor.USER32(00000008), ref: 00F92231
                                            • SetTextColor.GDI32(?,000000FF), ref: 00F9223B
                                            • SetBkMode.GDI32(?,00000001), ref: 00F92250
                                            • GetStockObject.GDI32(00000005), ref: 00F92258
                                            • GetWindowDC.USER32(?,00000000), ref: 00FCBE83
                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 00FCBE90
                                            • GetPixel.GDI32(00000000,?,00000000), ref: 00FCBEA9
                                            • GetPixel.GDI32(00000000,00000000,?), ref: 00FCBEC2
                                            • GetPixel.GDI32(00000000,?,?), ref: 00FCBEE2
                                            • ReleaseDC.USER32(?,00000000), ref: 00FCBEED
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                            • String ID:
                                            • API String ID: 1946975507-0
                                            • Opcode ID: 580736679ae5c544f9c576c6f842d9c9327dee166028c49f96bb2e43d8a5639b
                                            • Instruction ID: 08bfc4b904660104943d654bd821c98a75ef261fe71a2d5b0ae65a5a6d8dad7d
                                            • Opcode Fuzzy Hash: 580736679ae5c544f9c576c6f842d9c9327dee166028c49f96bb2e43d8a5639b
                                            • Instruction Fuzzy Hash: 3CE03031544146AAEF215FA4F80EBD83B11EB06332F10835AFAA9480D5C77A4984EB11
                                            APIs
                                            • GetCurrentThread.KERNEL32 ref: 00FE871B
                                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,00FE82E6), ref: 00FE8722
                                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00FE82E6), ref: 00FE872F
                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,00FE82E6), ref: 00FE8736
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CurrentOpenProcessThreadToken
                                            • String ID:
                                            • API String ID: 3974789173-0
                                            • Opcode ID: 42c09e1801b1492390f7e07d5d4b4a9f3aeca1a0392497c131d0b68d609f69e2
                                            • Instruction ID: 2392692eba3c779c155f447d6ee605ec172bda9c2ddb28eb0862ecccd242ca3b
                                            • Opcode Fuzzy Hash: 42c09e1801b1492390f7e07d5d4b4a9f3aeca1a0392497c131d0b68d609f69e2
                                            • Instruction Fuzzy Hash: 01E08636A112129FD7306FB15D0CB9A3BACEF507E1F158818F6C9CA044DA3D844AD750
                                            APIs
                                            • OleSetContainedObject.OLE32(?,00000001), ref: 00FEB4BE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ContainedObject
                                            • String ID: AutoIt3GUI$Container
                                            • API String ID: 3565006973-3941886329
                                            • Opcode ID: 42e50a10fc1cc2b545db0c4f55a36221ef9429f9308b1c9607dad15617616ff5
                                            • Instruction ID: e996e2de4b2d194e059fc8993fc9482403025f3afe14a24e3ee87f08a18836ab
                                            • Opcode Fuzzy Hash: 42e50a10fc1cc2b545db0c4f55a36221ef9429f9308b1c9607dad15617616ff5
                                            • Instruction Fuzzy Hash: BC915871600701AFDB14DF69C884B6BBBE5FF48710F24856DE94ACB291DB70E841DB50
                                            APIs
                                              • Part of subcall function 00FAFC86: _wcscpy.LIBCMT ref: 00FAFCA9
                                              • Part of subcall function 00F99837: __itow.LIBCMT ref: 00F99862
                                              • Part of subcall function 00F99837: __swprintf.LIBCMT ref: 00F998AC
                                            • __wcsnicmp.LIBCMT ref: 00FFB02D
                                            • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00FFB0F6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                            • String ID: LPT
                                            • API String ID: 3222508074-1350329615
                                            • Opcode ID: b3a7e4ca83c0039e075c689dbccdfd9ac02e433d7284cfe69bcc8402dc830e75
                                            • Instruction ID: 6aedb657acfb123f5f26f1ca23ce3b8bdb11f1b2800fa9c1e9aa06b96af6bf74
                                            • Opcode Fuzzy Hash: b3a7e4ca83c0039e075c689dbccdfd9ac02e433d7284cfe69bcc8402dc830e75
                                            • Instruction Fuzzy Hash: D561B472E00219AFCB14DF98C891EBEB7B5EF08310F15406DF916AB261DB74AE44EB50
                                            APIs
                                            • Sleep.KERNEL32(00000000), ref: 00FA2968
                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 00FA2981
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: GlobalMemorySleepStatus
                                            • String ID: @
                                            • API String ID: 2783356886-2766056989
                                            • Opcode ID: 86a9fe62b084a7095515bae5683ada38c400ab55b662000cbbcc7aa693c7e5b2
                                            • Instruction ID: 713b9f4d5ff80eba5dacb64a380d4a79850675aec531c7bdf8f30d52c449c515
                                            • Opcode Fuzzy Hash: 86a9fe62b084a7095515bae5683ada38c400ab55b662000cbbcc7aa693c7e5b2
                                            • Instruction Fuzzy Hash: 5A517A714187449BE720EF14DC86BAFBBE8FF85340F82484DF2D881095EB798929DB56
                                            APIs
                                              • Part of subcall function 00F94F0B: __fread_nolock.LIBCMT ref: 00F94F29
                                            • _wcscmp.LIBCMT ref: 00FF9824
                                            • _wcscmp.LIBCMT ref: 00FF9837
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: _wcscmp$__fread_nolock
                                            • String ID: FILE
                                            • API String ID: 4029003684-3121273764
                                            • Opcode ID: 251443b0e5c769d1ed77c2169b0b6dc73713bed1ea59dd35c602bc8a3dcfdf0f
                                            • Instruction ID: 06bbd8b805389b47fb3f6cd2cb58ec2ce43416d973857bfcb32d5fc1f3e8859c
                                            • Opcode Fuzzy Hash: 251443b0e5c769d1ed77c2169b0b6dc73713bed1ea59dd35c602bc8a3dcfdf0f
                                            • Instruction Fuzzy Hash: 6941E671A0420EBADF219EA0CC85FEFB7BDDF85714F000479FA04A7190D6B5A905DB60
                                            APIs
                                            • _memset.LIBCMT ref: 0100259E
                                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 010025D4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CrackInternet_memset
                                            • String ID: |
                                            • API String ID: 1413715105-2343686810
                                            • Opcode ID: 461eddc15362ab904af3f09d78b84fd390298d161985006b7c41286ab7f3a2c0
                                            • Instruction ID: 82aee7e9c1ea57efbf62c96b98b3a678e45f18eb1cbd13573986bb9cbec64bd9
                                            • Opcode Fuzzy Hash: 461eddc15362ab904af3f09d78b84fd390298d161985006b7c41286ab7f3a2c0
                                            • Instruction Fuzzy Hash: 98313A71800219EBEF01EFA5CC89EEEBFB9FF08350F000059F955A6162EB355A56DB60
                                            APIs
                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 01017B61
                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 01017B76
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: '
                                            • API String ID: 3850602802-1997036262
                                            • Opcode ID: 0ebb90d35fa30b53688b2657704c7b29a0938cf03eacede551ece1904e3dfecb
                                            • Instruction ID: 4ddb6f8461a24eb1d27617fc6d663063a5e1e283237fbf835dd40df82bfb62b3
                                            • Opcode Fuzzy Hash: 0ebb90d35fa30b53688b2657704c7b29a0938cf03eacede551ece1904e3dfecb
                                            • Instruction Fuzzy Hash: 81413C75A0030A9FDB54CFA8C880BEABBF5FF08300F50016AEA45AB345D735AA41CF90
                                            APIs
                                            • DestroyWindow.USER32(?,?,?,?), ref: 01016B17
                                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 01016B53
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$DestroyMove
                                            • String ID: static
                                            • API String ID: 2139405536-2160076837
                                            • Opcode ID: 8ea30b6ad66c5bee68a6e7169e456603023d292e6726e2e9d8c96e234fee94aa
                                            • Instruction ID: 749295d9ec1042e702542641f7110fddd38fbebf4e1169bdde4d53eb0d83b695
                                            • Opcode Fuzzy Hash: 8ea30b6ad66c5bee68a6e7169e456603023d292e6726e2e9d8c96e234fee94aa
                                            • Instruction Fuzzy Hash: 4C31B071100204AEEB119F69CC80BFB77F9FF48760F00851DF9E987194DA7AA881CB60
                                            APIs
                                            • _memset.LIBCMT ref: 00FF2911
                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00FF294C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: InfoItemMenu_memset
                                            • String ID: 0
                                            • API String ID: 2223754486-4108050209
                                            • Opcode ID: 9b6e578c1fee8ce327cc68026dc49da9b8bf10bd899f31695ea9b0bc538686ff
                                            • Instruction ID: b2da3c772a246f1f99cdb878fde20632579393e3a37d34c62f838833a506c6b1
                                            • Opcode Fuzzy Hash: 9b6e578c1fee8ce327cc68026dc49da9b8bf10bd899f31695ea9b0bc538686ff
                                            • Instruction Fuzzy Hash: 9531BF31A003099BEB74CE98CC85BFEBBB8EF45360F140059EA85A71B0DBB49944FB51
                                            APIs
                                            • __snwprintf.LIBCMT ref: 01003A66
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: __snwprintf_memmove
                                            • String ID: , $$AUTOITCALLVARIABLE%d
                                            • API String ID: 3506404897-2584243854
                                            • Opcode ID: 8ecc9f0b38afc371b1dadc51c15d5b5a724709ce7145d0bc6d4a6a478dcc4658
                                            • Instruction ID: 0cabcdc8dd5183e5da871fda3278a505127cd5f58838f0fe5db39a8bfbf7fc6d
                                            • Opcode Fuzzy Hash: 8ecc9f0b38afc371b1dadc51c15d5b5a724709ce7145d0bc6d4a6a478dcc4658
                                            • Instruction Fuzzy Hash: F021A270A00219AFDF16FFA5CC82EAE77B9BF45700F004469F545AB182DB38E945DB61
                                            APIs
                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 01016761
                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0101676C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: Combobox
                                            • API String ID: 3850602802-2096851135
                                            • Opcode ID: 5edb954ddf1d31206538fafc1853154a992706d8f9fbe27418b1214d8d5453e6
                                            • Instruction ID: a0997ca84c7ab2480c78f3e0d282b989e9d60c4e4ada3f778312acee3d6044b9
                                            • Opcode Fuzzy Hash: 5edb954ddf1d31206538fafc1853154a992706d8f9fbe27418b1214d8d5453e6
                                            • Instruction Fuzzy Hash: 2C11E6713002096FEF22CF18CC80EBB37AAFB483A4F100129F99497295E67A9C5187A0
                                            APIs
                                              • Part of subcall function 00F91D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F91D73
                                              • Part of subcall function 00F91D35: GetStockObject.GDI32(00000011), ref: 00F91D87
                                              • Part of subcall function 00F91D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F91D91
                                            • GetWindowRect.USER32(00000000,?), ref: 01016C71
                                            • GetSysColor.USER32(00000012), ref: 01016C8B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                                            • String ID: static
                                            • API String ID: 1983116058-2160076837
                                            • Opcode ID: fb588c7e9f5d83b1146f31243fcc7804c9d873660d2f5b29c34efbf7cc978294
                                            • Instruction ID: 59b8c337cfadabf4a2d7cb8dc950a12059de7ce24620ed73076cc562f422cdf4
                                            • Opcode Fuzzy Hash: fb588c7e9f5d83b1146f31243fcc7804c9d873660d2f5b29c34efbf7cc978294
                                            • Instruction Fuzzy Hash: 3721177291020AAFDF14DFA8CC45AFA7BA8FB08314F004619F995D3244E67AE8519B60
                                            APIs
                                            • GetWindowTextLengthW.USER32(00000000), ref: 010169A2
                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 010169B1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: LengthMessageSendTextWindow
                                            • String ID: edit
                                            • API String ID: 2978978980-2167791130
                                            • Opcode ID: dd8f2d57e9fd6ff9fdc4b7bd6b2029951823fcdbc0569efef3188570cbea91e0
                                            • Instruction ID: 9dfc3a764690080bd05295948ef37f55d929f9ea080fb2d91f6f520bdff539e8
                                            • Opcode Fuzzy Hash: dd8f2d57e9fd6ff9fdc4b7bd6b2029951823fcdbc0569efef3188570cbea91e0
                                            • Instruction Fuzzy Hash: 9F116A71100209ABEB518E78DC40AEB3AAEEB053B8F504718F9E5971D8C6BADC559B60
                                            APIs
                                            • _memset.LIBCMT ref: 00FF2A22
                                            • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00FF2A41
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: InfoItemMenu_memset
                                            • String ID: 0
                                            • API String ID: 2223754486-4108050209
                                            • Opcode ID: 452af4fee2f76457aa1a30f73af783aa452a03ddc7413d535e5c42efdc767df6
                                            • Instruction ID: 5b0ad130495e0d14e5af9c5ab91db6d27fdf93f1212acdd33c888f803a6aed7f
                                            • Opcode Fuzzy Hash: 452af4fee2f76457aa1a30f73af783aa452a03ddc7413d535e5c42efdc767df6
                                            • Instruction Fuzzy Hash: D511E632D1121CABCF70DA98DC45BBA77B8AF46720F044021EA55E72A0D77CAD0AE791
                                            APIs
                                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0100222C
                                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 01002255
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Internet$OpenOption
                                            • String ID: <local>
                                            • API String ID: 942729171-4266983199
                                            • Opcode ID: dd134ad5af5f7a655f37f96281c2f7f73353bffd5d710e57cfca3f88b8818062
                                            • Instruction ID: de849595f183878972ef2c8393f20cfb3c7cf021cb311f0b7d28e746fd352ea8
                                            • Opcode Fuzzy Hash: dd134ad5af5f7a655f37f96281c2f7f73353bffd5d710e57cfca3f88b8818062
                                            • Instruction Fuzzy Hash: 1811C270541625FAEB268F958C8CEFBFFACFF06655F00826AFA9586080D2705994C6F0
                                            APIs
                                              • Part of subcall function 01007FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,01007DB3,?,00000000,?,?), ref: 0100800D
                                            • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 01007DB6
                                            • htons.WSOCK32(00000000,?,00000000), ref: 01007DF3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWidehtonsinet_addr
                                            • String ID: 255.255.255.255
                                            • API String ID: 2496851823-2422070025
                                            • Opcode ID: 8f028b7440d0331e118a3d16621024b7fff00abb26ef8f0cdd4d794f2af58fa8
                                            • Instruction ID: 13e91110f6ad49eaf1d0b1fa0c919bbfd5da0f5a0264eb8a2b960dbbb135a927
                                            • Opcode Fuzzy Hash: 8f028b7440d0331e118a3d16621024b7fff00abb26ef8f0cdd4d794f2af58fa8
                                            • Instruction Fuzzy Hash: DE11A575500209ABEB22AFA4CC86FBEB774FF44320F10455BE9959B2C1DB7ABC148791
                                            APIs
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                              • Part of subcall function 00FEAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FEAABC
                                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00FE8E73
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameSend_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 372448540-1403004172
                                            • Opcode ID: 3c4abda596341517f09f831e1ce33bcd5e1da7b7b6671da01a6aa3d3d20c9b81
                                            • Instruction ID: e5aa22a40a72d481aa6674ca8f101dbc17c43d341dd4add8bc692ac896ed24b7
                                            • Opcode Fuzzy Hash: 3c4abda596341517f09f831e1ce33bcd5e1da7b7b6671da01a6aa3d3d20c9b81
                                            • Instruction Fuzzy Hash: C501F1B1A41319ABAF15FBE1CC419FE7368AF05360B040A19F865A72E1DE39580CE750
                                            APIs
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                              • Part of subcall function 00FEAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FEAABC
                                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 00FE8D6B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameSend_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 372448540-1403004172
                                            • Opcode ID: 8b82aec12a36f3c7274320d21a612fd8b1f283080da071639c38bf58b5638ee2
                                            • Instruction ID: 0cb9375289bdeab4be84ae3a7af5a6c73c1ee395011fa3ad4bd9b98ee58bfb88
                                            • Opcode Fuzzy Hash: 8b82aec12a36f3c7274320d21a612fd8b1f283080da071639c38bf58b5638ee2
                                            • Instruction Fuzzy Hash: 9901D4B1A41209ABEF25FBA1CD52AFE73A89F15750F100029B805672A1DE195E0CE671
                                            APIs
                                              • Part of subcall function 00F97DE1: _memmove.LIBCMT ref: 00F97E22
                                              • Part of subcall function 00FEAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FEAABC
                                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 00FE8DEE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ClassMessageNameSend_memmove
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 372448540-1403004172
                                            • Opcode ID: 773b834538d1263a6815b4213d6bf189afb7ee1aad218d735fb6ceaf303ffed0
                                            • Instruction ID: 45ef9ec7cdd10bc7a1366b49fa56252b25f1a5c5c6a7586422d45a75bead40fa
                                            • Opcode Fuzzy Hash: 773b834538d1263a6815b4213d6bf189afb7ee1aad218d735fb6ceaf303ffed0
                                            • Instruction Fuzzy Hash: E401F7B1A41209A7EF21FAA5CD42BFE73A88F15750F100029B845A3291DE195E0DF671
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: ClassName_wcscmp
                                            • String ID: #32770
                                            • API String ID: 2292705959-463685578
                                            • Opcode ID: 044e78bb59c175d4fb218399005f063a8b0ee1f1bf26f83e0443eff35d5ca2a6
                                            • Instruction ID: 3142c722a242fbb37c0397cf5b0fb61ea66c5388666ee42b7b772ddf95db3fb0
                                            • Opcode Fuzzy Hash: 044e78bb59c175d4fb218399005f063a8b0ee1f1bf26f83e0443eff35d5ca2a6
                                            • Instruction Fuzzy Hash: 6CE09232A002292BD7209A9AAC49BA7F7ACEB45B70F01016BFD44D7045D565AA45CBE0
                                            APIs
                                              • Part of subcall function 00FCB314: _memset.LIBCMT ref: 00FCB321
                                              • Part of subcall function 00FB0940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00FCB2F0,?,?,?,00F9100A), ref: 00FB0945
                                            • IsDebuggerPresent.KERNEL32(?,?,?,00F9100A), ref: 00FCB2F4
                                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00F9100A), ref: 00FCB303
                                            Strings
                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00FCB2FE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                            • API String ID: 3158253471-631824599
                                            • Opcode ID: 7c2299708b082d6764795736294ba9eec96be3b6a3db2f69e97e24077abf5f43
                                            • Instruction ID: 7af8118772f71ba3bce036a6f540517faaf587f2e1455203401bad482bf54b47
                                            • Opcode Fuzzy Hash: 7c2299708b082d6764795736294ba9eec96be3b6a3db2f69e97e24077abf5f43
                                            • Instruction Fuzzy Hash: 73E06D742003428FE730DF29E5067467AE8AF00314F00892CE486C7241EBBDE408DBA1
                                            APIs
                                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00FE7C82
                                              • Part of subcall function 00FB3358: _doexit.LIBCMT ref: 00FB3362
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Message_doexit
                                            • String ID: AutoIt$Error allocating memory.
                                            • API String ID: 1993061046-4017498283
                                            • Opcode ID: 3282cacc4b017811a2155c4b99ba48ee14849c934ec0f7f829dc3bcffd2778c6
                                            • Instruction ID: 7255f256761e50d11e0f86dfa1dbbcc30f630a97a1fa3305f500eb35df6d580c
                                            • Opcode Fuzzy Hash: 3282cacc4b017811a2155c4b99ba48ee14849c934ec0f7f829dc3bcffd2778c6
                                            • Instruction Fuzzy Hash: B9D0C2323C431836D12031AAAC06FCA35884B05B52F140425FB449909349DA948062E4
                                            APIs
                                            • GetSystemDirectoryW.KERNEL32(?), ref: 00FD1775
                                              • Part of subcall function 0100BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,00FD195E,?), ref: 0100BFFE
                                              • Part of subcall function 0100BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0100C010
                                            • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00FD196D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                            • String ID: WIN_XPe
                                            • API String ID: 582185067-3257408948
                                            • Opcode ID: 1672b48fd30865e13b62c866383ad0dcc2a2d6a406f18cc35280456dafc7b3f0
                                            • Instruction ID: e9d9d224036889fdc29cad34ef1cc82806cad79b521a6dff7e20fc3ccf03912d
                                            • Opcode Fuzzy Hash: 1672b48fd30865e13b62c866383ad0dcc2a2d6a406f18cc35280456dafc7b3f0
                                            • Instruction Fuzzy Hash: 62F06D7180410AEFDB25DB90C594BECBBF9BB08300F580086E042A31A0CB7A4F88EF60
                                            APIs
                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0101596E
                                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 01015981
                                              • Part of subcall function 00FF5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF52BC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: FindMessagePostSleepWindow
                                            • String ID: Shell_TrayWnd
                                            • API String ID: 529655941-2988720461
                                            • Opcode ID: 05baa41c2092d74f11b168dfa6cdc779c8f025aa8e1deacd7ec248b1e8aae541
                                            • Instruction ID: 78a4ae72ff84476fde895bd35578c044fec0cbdb6b77d6fbfc897f68edc42eaa
                                            • Opcode Fuzzy Hash: 05baa41c2092d74f11b168dfa6cdc779c8f025aa8e1deacd7ec248b1e8aae541
                                            • Instruction Fuzzy Hash: 7DD0C931784712BBE674AA709C4FFA67A14BF04B50F000829B389AA1D9C9E99804C794
                                            APIs
                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 010159AE
                                            • PostMessageW.USER32(00000000), ref: 010159B5
                                              • Part of subcall function 00FF5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF52BC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1455008692.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                                            • Associated: 00000000.00000002.1454980100.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455463245.0000000001044000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455524371.000000000104E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1455552855.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_f90000_7b4Iaf58Rp.jbxd
                                            Similarity
                                            • API ID: FindMessagePostSleepWindow
                                            • String ID: Shell_TrayWnd
                                            • API String ID: 529655941-2988720461
                                            • Opcode ID: 21f71740872772cdc66f095d0c8c0de996c8ab20affc624e766671280b166444
                                            • Instruction ID: afe8aa733cb05f2890243b4b337e400252e93fb39459261b709b332f5690bd9c
                                            • Opcode Fuzzy Hash: 21f71740872772cdc66f095d0c8c0de996c8ab20affc624e766671280b166444
                                            • Instruction Fuzzy Hash: E1D0C9317807127BE674AA709C4FF967614BB04B50F000829B389AA1D9C9E9A804C794