Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2hp5ee36OS.exe

Overview

General Information

Sample name:2hp5ee36OS.exe
renamed because original name is a hash value
Original sample name:1a0fcfdf65df1a067df718ddf594b8e27e17a744.exe
Analysis ID:1546798
MD5:26ae69324cec59aec90936fa0c18882e
SHA1:1a0fcfdf65df1a067df718ddf594b8e27e17a744
SHA256:d014b70080dc2525f222f7eb5aa8c97b35ac366f2c1ad0e0b656f7879d4cb4a1
Tags:exeReversingLabsuser-NDA0E
Infos:

Detection

FloodFix
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected FloodFix
AI detected suspicious sample
Machine Learning detection for dropped file
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 2hp5ee36OS.exe (PID: 7772 cmdline: "C:\Users\user\Desktop\2hp5ee36OS.exe" MD5: 26AE69324CEC59AEC90936FA0C18882E)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
2hp5ee36OS.exeMalware_Floxif_mpsvc_dllMalware - FloxifFlorian Roth
  • 0x5954:$op1: 04 80 7A 03 01 75 04 8D 42 04 C3 8D 42 04 53 8B
  • 0x5974:$op2: 88 19 74 03 41 EB EA C6 42 03 01 5B C3 8B 4C 24
  • 0x70d8:$op3: FF 03 8D 00 F9 FF FF 88 01 EB A1
  • 0x7140:$op3: FF 03 8D 00 F9 FF FF 88 01 EB A1
SourceRuleDescriptionAuthorStrings
C:\Program Files\Common Files\System\symsrv.dllJoeSecurity_FloodFixYara detected FloodFixJoe Security
    C:\Program Files\Common Files\System\symsrv.dllMAL_Floxif_GenericDetects Floxif MalwareFlorian Roth
      C:\Program Files\Common Files\System\symsrv.dllMALWARE_Win_FloodFixDetects FloodFixditekSHen
        SourceRuleDescriptionAuthorStrings
        0.2.2hp5ee36OS.exe.21f88ec.1.raw.unpackJoeSecurity_FloodFixYara detected FloodFixJoe Security
          0.2.2hp5ee36OS.exe.21f88ec.1.raw.unpackMAL_Floxif_GenericDetects Floxif MalwareFlorian Roth
            0.2.2hp5ee36OS.exe.21f88ec.1.raw.unpackMALWARE_Win_FloodFixDetects FloodFixditekSHen
              0.2.2hp5ee36OS.exe.10000000.2.unpackJoeSecurity_FloodFixYara detected FloodFixJoe Security
                0.2.2hp5ee36OS.exe.10000000.2.unpackMAL_Floxif_GenericDetects Floxif MalwareFlorian Roth
                  Click to see the 2 entries
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 2hp5ee36OS.exeAvira: detected
                  Source: C:\Program Files\Common Files\System\symsrv.dllAvira: detection malicious, Label: TR/Floxif.BB
                  Source: C:\Program Files\Common Files\System\symsrv.dllReversingLabs: Detection: 100%
                  Source: 2hp5ee36OS.exeReversingLabs: Detection: 94%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                  Source: C:\Program Files\Common Files\System\symsrv.dllJoe Sandbox ML: detected
                  Source: 2hp5ee36OS.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeDirectory created: C:\Program Files\Common Files\System\symsrv.dllJump to behavior

                  Spreading

                  barindex
                  Source: Yara matchFile source: 0.2.2hp5ee36OS.exe.21f88ec.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.2hp5ee36OS.exe.10000000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: C:\Program Files\Common Files\System\symsrv.dll, type: DROPPED
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00408F58 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,0_2_00408F58
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_1000AFBB GetFileAttributesA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,0_2_1000AFBB
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_100060BA FindFirstFileA,FindNextFileA,FindClose,GetTickCount,0_2_100060BA
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_100083FF GetDriveTypeA,FindFirstFileA,FindClose,0_2_100083FF
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_100066AC FindFirstFileA,FindNextFileA,FindClose,GetTickCount,0_2_100066AC
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_10007752 GetDriveTypeA,FindFirstFileA,FindClose,SetErrorMode,_rand,0_2_10007752
                  Source: 2hp5ee36OS.exe, 00000000.00000003.1399399640.0000000000684000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5isohu.com/
                  Source: 2hp5ee36OS.exe, 00000000.00000003.1399399640.0000000000684000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5isohu.com/Z
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0J
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://ocsp.digicert.com0C
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://ocsp.digicert.com0H
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://ocsp.digicert.com0I
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://ocsp.digicert.com0O
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://www.digicert.com/CPS0
                  Source: 2hp5ee36OS.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                  Source: 2hp5ee36OS.exeString found in binary or memory: https://www.digicert.com/CPS0
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00407462 OpenClipboard,0_2_00407462
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00407522 SetClipboardData,0_2_00407522
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_0040720A GetClipboardData,0_2_0040720A
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_0040727A GetKeyboardState,0_2_0040727A

                  System Summary

                  barindex
                  Source: 2hp5ee36OS.exe, type: SAMPLEMatched rule: Malware - Floxif Author: Florian Roth
                  Source: 0.2.2hp5ee36OS.exe.21f88ec.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Floxif Malware Author: Florian Roth
                  Source: 0.2.2hp5ee36OS.exe.21f88ec.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects FloodFix Author: ditekSHen
                  Source: 0.2.2hp5ee36OS.exe.10000000.2.unpack, type: UNPACKEDPEMatched rule: Detects Floxif Malware Author: Florian Roth
                  Source: 0.2.2hp5ee36OS.exe.10000000.2.unpack, type: UNPACKEDPEMatched rule: Detects FloodFix Author: ditekSHen
                  Source: 0.0.2hp5ee36OS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Malware - Floxif Author: Florian Roth
                  Source: C:\Program Files\Common Files\System\symsrv.dll, type: DROPPEDMatched rule: Detects Floxif Malware Author: Florian Roth
                  Source: C:\Program Files\Common Files\System\symsrv.dll, type: DROPPEDMatched rule: Detects FloodFix Author: ditekSHen
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_004070EA NtdllDefWindowProc_A,0_2_004070EA
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_1000C8550_2_1000C855
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_1001A9090_2_1001A909
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_100129F00_2_100129F0
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_100174320_2_10017432
                  Source: Joe Sandbox ViewDropped File: C:\Program Files\Common Files\System\symsrv.dll DE055A89DE246E629A8694BDE18AF2B1605E4B9B493C7E4AEF669DD67ACF5085
                  Source: 2hp5ee36OS.exe, 00000000.00000002.1446438155.0000000002161000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameN vs 2hp5ee36OS.exe
                  Source: 2hp5ee36OS.exe, 00000000.00000002.1446438155.0000000002161000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLanguagePack vs 2hp5ee36OS.exe
                  Source: 2hp5ee36OS.exe, 00000000.00000003.1399399640.0000000000684000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename N vs 2hp5ee36OS.exe
                  Source: 2hp5ee36OS.exe, 00000000.00000003.1399399640.0000000000684000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: originalfilename n vs 2hp5ee36OS.exe
                  Source: 2hp5ee36OS.exe, 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameLanguagePack vs 2hp5ee36OS.exe
                  Source: 2hp5ee36OS.exe, 00000000.00000000.1394963824.000000000048D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameN vs 2hp5ee36OS.exe
                  Source: 2hp5ee36OS.exe, 00000000.00000003.1399379165.00000000027F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLanguagePack vs 2hp5ee36OS.exe
                  Source: 2hp5ee36OS.exeBinary or memory string: OriginalFilenameN vs 2hp5ee36OS.exe
                  Source: 2hp5ee36OS.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                  Source: 2hp5ee36OS.exe, type: SAMPLEMatched rule: Malware_Floxif_mpsvc_dll date = 2017-04-07, hash1 = 1e654ee1c4736f4ccb8b5b7aa604782cfb584068df4d9e006de8009e60ab5a14, author = Florian Roth, description = Malware - Floxif, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.2hp5ee36OS.exe.21f88ec.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Floxif_Generic date = 2018-05-11, author = Florian Roth, description = Detects Floxif Malware, score = de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.2hp5ee36OS.exe.21f88ec.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_FloodFix author = ditekSHen, description = Detects FloodFix
                  Source: 0.2.2hp5ee36OS.exe.10000000.2.unpack, type: UNPACKEDPEMatched rule: MAL_Floxif_Generic date = 2018-05-11, author = Florian Roth, description = Detects Floxif Malware, score = de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.2hp5ee36OS.exe.10000000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_FloodFix author = ditekSHen, description = Detects FloodFix
                  Source: 0.0.2hp5ee36OS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Malware_Floxif_mpsvc_dll date = 2017-04-07, hash1 = 1e654ee1c4736f4ccb8b5b7aa604782cfb584068df4d9e006de8009e60ab5a14, author = Florian Roth, description = Malware - Floxif, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: C:\Program Files\Common Files\System\symsrv.dll, type: DROPPEDMatched rule: MAL_Floxif_Generic date = 2018-05-11, author = Florian Roth, description = Detects Floxif Malware, score = de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: C:\Program Files\Common Files\System\symsrv.dll, type: DROPPEDMatched rule: MALWARE_Win_FloodFix author = ditekSHen, description = Detects FloodFix
                  Source: classification engineClassification label: mal96.troj.winEXE@1/1@0/0
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_1000469C LookupPrivilegeValueA,LoadLibraryA,GetProcAddress,AdjustTokenPrivileges,GetLastError,0_2_1000469C
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00406C12 GetDiskFreeSpaceA,0_2_00406C12
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_10007965 CreateToolhelp32Snapshot,Module32First,Module32Next,CloseHandle,0_2_10007965
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00406D62 SizeofResource,0_2_00406D62
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeFile created: C:\Program Files\Common Files\System\symsrv.dllJump to behavior
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeMutant created: \Sessions\1\BaseNamedObjects\FSFocus
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: 2hp5ee36OS.exeReversingLabs: Detection: 94%
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeFile read: C:\Users\user\Desktop\2hp5ee36OS.exeJump to behavior
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeSection loaded: ws2help.dllJump to behavior
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeDirectory created: C:\Program Files\Common Files\System\symsrv.dllJump to behavior
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_1000C855 GetModuleFileNameA,Sleep,GetCurrentThreadId,GetCurrentProcessId,KiUserExceptionDispatcher,GetSystemDirectoryA,GetWindowsDirectoryA,GetTempPathA,GetModuleHandleA,LoadLibraryA,GetProcAddress,WriteProcessMemory,RtlInitializeCriticalSection,RtlInitializeCriticalSection,GetModuleFileNameA,GetShortPathNameA,_rand,Sleep,Sleep,Sleep,Sleep,Sleep,_rand,_rand,0_2_1000C855
                  Source: symsrv.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x1f436
                  Source: 2hp5ee36OS.exeStatic PE information: real checksum: 0x9f638 should be: 0xb4b1f
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00406844 push 00406895h; ret 0_2_0040688D
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00406842 push 00406895h; ret 0_2_0040688D
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_0040785C push 00407888h; ret 0_2_00407880
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00483004 push 00483020h; ret 0_2_00483018
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_004830CC push 004830F2h; ret 0_2_004830EA
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_004078CD push 00407BF0h; ret 0_2_00407BE8
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00407894 push 004078C0h; ret 0_2_004078B8
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00406A28 push 00406A54h; ret 0_2_00406A4C
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00406AE4 push 00406B10h; ret 0_2_00406B08
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_004076FC push ecx; mov dword ptr [esp], eax0_2_004076FD
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00407BC4 push 00407BF0h; ret 0_2_00407BE8
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_100210F2 push eax; ret 0_2_10021139
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_10021188 push eax; ret 0_2_10021139
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_1002DB93 push es; ret 0_2_1002DB96
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_10013458 push eax; ret 0_2_10013476
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_10001678 push eax; retn 0008h0_2_10001681
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_100187B0 push eax; ret 0_2_100187DE
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeFile created: C:\Program Files\Common Files\System\symsrv.dllJump to dropped file
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_004073CA IsIconic,0_2_004073CA
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeDropped PE file which has not been started: C:\Program Files\Common Files\System\symsrv.dllJump to dropped file
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-13808
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-13530
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeAPI coverage: 8.8 %
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00408F58 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,0_2_00408F58
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_1000AFBB GetFileAttributesA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,0_2_1000AFBB
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_100060BA FindFirstFileA,FindNextFileA,FindClose,GetTickCount,0_2_100060BA
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_100083FF GetDriveTypeA,FindFirstFileA,FindClose,0_2_100083FF
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_100066AC FindFirstFileA,FindNextFileA,FindClose,GetTickCount,0_2_100066AC
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_10007752 GetDriveTypeA,FindFirstFileA,FindClose,SetErrorMode,_rand,0_2_10007752
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00406C7A GetSystemInfo,0_2_00406C7A
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeAPI call chain: ExitProcess graph end nodegraph_0-12959
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_1000C855 GetModuleFileNameA,Sleep,GetCurrentThreadId,GetCurrentProcessId,KiUserExceptionDispatcher,GetSystemDirectoryA,GetWindowsDirectoryA,GetTempPathA,GetModuleHandleA,LoadLibraryA,GetProcAddress,WriteProcessMemory,RtlInitializeCriticalSection,RtlInitializeCriticalSection,GetModuleFileNameA,GetShortPathNameA,_rand,Sleep,Sleep,Sleep,Sleep,Sleep,_rand,_rand,0_2_1000C855
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_1000D737 VirtualProtect,VirtualProtect,GetModuleHandleA,Sleep,GetProcessHeap,HeapFree,SetLastError,0_2_1000D737
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_10017E3B SetUnhandledExceptionFilter,0_2_10017E3B
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_10017E4D SetUnhandledExceptionFilter,0_2_10017E4D
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_1000E613 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateFileMappingA,MapViewOfFile,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,UnmapViewOfFile,CreateFileMappingA,MapViewOfFile,MapViewOfFile,0_2_1000E613
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: GetLocaleInfoA,LoadLibraryExA,LoadLibraryExA,0_2_00406050
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: GetLocaleInfoA,0_2_00406C2A
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00406C22 GetLocalTime,0_2_00406C22
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_1000C20F GetUserNameA,GetModuleHandleA,LoadLibraryA,0_2_1000C20F
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_10018956 GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_10018956
                  Source: C:\Users\user\Desktop\2hp5ee36OS.exeCode function: 0_2_00406C92 GetVersion,0_2_00406C92
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Access Token Manipulation
                  2
                  Masquerading
                  11
                  Input Capture
                  2
                  System Time Discovery
                  Remote Services11
                  Input Capture
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  1
                  Access Token Manipulation
                  LSASS Memory11
                  Security Software Discovery
                  Remote Desktop Protocol1
                  Archive Collected Data
                  Junk DataExfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                  Obfuscated Files or Information
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares3
                  Clipboard Data
                  SteganographyAutomated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Software Packing
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets1
                  Account Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
                  System Owner/User Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                  File and Directory Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem15
                  System Information Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  2hp5ee36OS.exe95%ReversingLabsWin32.Virus.Floxif
                  2hp5ee36OS.exe100%AviraW32/Floxif.iici
                  SourceDetectionScannerLabelLink
                  C:\Program Files\Common Files\System\symsrv.dll100%AviraTR/Floxif.BB
                  C:\Program Files\Common Files\System\symsrv.dll100%Joe Sandbox ML
                  C:\Program Files\Common Files\System\symsrv.dll100%ReversingLabsWin32.Trojan.Floxif
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No contacted domains info
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://5isohu.com/2hp5ee36OS.exe, 00000000.00000003.1399399640.0000000000684000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://5isohu.com/Z2hp5ee36OS.exe, 00000000.00000003.1399399640.0000000000684000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1546798
                      Start date and time:2024-11-01 15:55:14 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 2m 20s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:2
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:2hp5ee36OS.exe
                      renamed because original name is a hash value
                      Original Sample Name:1a0fcfdf65df1a067df718ddf594b8e27e17a744.exe
                      Detection:MAL
                      Classification:mal96.troj.winEXE@1/1@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 61%
                      • Number of executed functions: 30
                      • Number of non-executed functions: 69
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Stop behavior analysis, all processes terminated
                      • Exclude process from analysis (whitelisted): dllhost.exe
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtWriteVirtualMemory calls found.
                      • VT rate limit hit for: 2hp5ee36OS.exe
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\Program Files\Common Files\System\symsrv.dll9dePCvDX8X.exeGet hashmaliciousFloodFixBrowse
                        ZYlsAQi8bj.exeGet hashmaliciousFloodFixBrowse
                          4g33Ui2SbU.exeGet hashmaliciousFloodFixBrowse
                            4afG8b79X5.exeGet hashmaliciousFloodFixBrowse
                              c9DQdpQLKz.exeGet hashmaliciousFloodFixBrowse
                                n64NG4zCN2.exeGet hashmaliciousFloodFixBrowse
                                  0vJrK0NCd1.exeGet hashmaliciousRemcos, DBatLoader, FloodFixBrowse
                                    jpeg_12.dllGet hashmaliciousFloodFixBrowse
                                      DHL_Shipping_Docs00945_pdf.exeGet hashmaliciousFloodFixBrowse
                                        echomiragePC.exeGet hashmaliciousFloodFix, RemcosBrowse
                                          Process:C:\Users\user\Desktop\2hp5ee36OS.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
                                          Category:dropped
                                          Size (bytes):69337
                                          Entropy (8bit):7.734269834755614
                                          Encrypted:false
                                          SSDEEP:1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZL:c8y93KQjy7G55riF1cMo03V
                                          MD5:7574CF2C64F35161AB1292E2F532AABF
                                          SHA1:14BA3FA927A06224DFE587014299E834DEF4644F
                                          SHA-256:DE055A89DE246E629A8694BDE18AF2B1605E4B9B493C7E4AEF669DD67ACF5085
                                          SHA-512:4DB19F2D8D5BC1C7BBB812D3FA9C43B80FA22140B346D2760F090B73AED8A5177EDB4BDDC647A6EBD5A2DB8565BE5A1A36A602B0D759E38540D9A584BA5896AB
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: JoeSecurity_FloodFix, Description: Yara detected FloodFix, Source: C:\Program Files\Common Files\System\symsrv.dll, Author: Joe Security
                                          • Rule: MAL_Floxif_Generic, Description: Detects Floxif Malware, Source: C:\Program Files\Common Files\System\symsrv.dll, Author: Florian Roth
                                          • Rule: MALWARE_Win_FloodFix, Description: Detects FloodFix, Source: C:\Program Files\Common Files\System\symsrv.dll, Author: ditekSHen
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 100%
                                          Joe Sandbox View:
                                          • Filename: 9dePCvDX8X.exe, Detection: malicious, Browse
                                          • Filename: ZYlsAQi8bj.exe, Detection: malicious, Browse
                                          • Filename: 4g33Ui2SbU.exe, Detection: malicious, Browse
                                          • Filename: 4afG8b79X5.exe, Detection: malicious, Browse
                                          • Filename: c9DQdpQLKz.exe, Detection: malicious, Browse
                                          • Filename: n64NG4zCN2.exe, Detection: malicious, Browse
                                          • Filename: 0vJrK0NCd1.exe, Detection: malicious, Browse
                                          • Filename: jpeg_12.dll, Detection: malicious, Browse
                                          • Filename: DHL_Shipping_Docs00945_pdf.exe, Detection: malicious, Browse
                                          • Filename: echomiragePC.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V.'...I...I...I.i.E...I.$.B...I..G...I.$.C.{.I.}.B...I.p.Z...I...H..I...B...I...O...I...M...I.Rich..I.................PE..L......P...........!................................................................................................(.......L...........L...........................................................................................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................................................2.03.UPX!....
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):6.868641274199096
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.66%
                                          • Win32 Executable Delphi generic (14689/80) 0.15%
                                          • Windows Screen Saver (13104/52) 0.13%
                                          • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          File name:2hp5ee36OS.exe
                                          File size:699'023 bytes
                                          MD5:26ae69324cec59aec90936fa0c18882e
                                          SHA1:1a0fcfdf65df1a067df718ddf594b8e27e17a744
                                          SHA256:d014b70080dc2525f222f7eb5aa8c97b35ac366f2c1ad0e0b656f7879d4cb4a1
                                          SHA512:3582b64bc8b607c5a125f9af432b28ae09993fd0c3ce735c045c8d4d1ae23f8a56340ef0aedfe6db2eecadd228c7920a3ddf4ca86676477b51925536333cd3c2
                                          SSDEEP:12288:i1ykbxmJKdxEMAvMfKfVhbR5P3vT7UOX+fsb/IhCKQqoHBjvrEH75:inm4wMDCtZ3vUsiCTqyrEH75
                                          TLSH:1AE48E22E29247B7C173163CBC4F23659C36BE152E28A9466BF41D8C5F3DA513D3A287
                                          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                          Icon Hash:80a280a2a280a200
                                          Entrypoint:0x483364
                                          Entrypoint Section:CODE
                                          Digitally signed:true
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                          DLL Characteristics:
                                          Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:0fddcacafee24b3f4545e7a57eaea1f7
                                          Signature Valid:
                                          Signature Issuer:
                                          Signature Validation Error:
                                          Error Number:
                                          Not Before, Not After
                                            Subject Chain
                                              Version:
                                              Thumbprint MD5:
                                              Thumbprint SHA-1:
                                              Thumbprint SHA-256:
                                              Serial:
                                              Instruction
                                              jmp 00007F3B0087C1E5h
                                              call 00007F3B33E6C4C8h
                                              ror byte ptr [ecx+4589EC45h], FFFFFFE8h
                                              mov eax, 004830F4h
                                              call 00007F3B0087A4DAh
                                              xor eax, eax
                                              push ebp
                                              push 004834CDh
                                              push dword ptr fs:[eax]
                                              mov dword ptr fs:[eax], esp
                                              mov eax, dword ptr [00485490h]
                                              mov eax, dword ptr [eax]
                                              mov edx, 004834E4h
                                              call 00007F3B008D2E0Bh
                                              mov eax, dword ptr [00485490h]
                                              mov eax, dword ptr [eax]
                                              call 00007F3B008D31FFh
                                              mov ebx, 00000093h
                                              imul eax, ebx, 000000ADh
                                              mov ebx, eax
                                              push 004834F4h
                                              push FFFFFFFFh
                                              push 00000000h
                                              call 00007F3B0087A61Ch
                                              call 00007F3B0087A6C7h
                                              cmp eax, 000000B7h
                                              jne 00007F3B008F6E86h
                                              mov eax, 00483500h
                                              call 00007F3B008F6ACAh
                                              call 00007F3B00877C21h
                                              jmp 00007F3B008F6F3Fh
                                              call 00007F3B008D727Fh
                                              cmp eax, 03h
                                              jl 00007F3B008F6ECEh
                                              call 00007F3B0087E53Dh
                                              add esp, FFFFFFF8h
                                              fstp qword ptr [esp]
                                              wait
                                              call 00007F3B008D4565h
                                              movzx edi, ax
                                              call 00007F3B0087E529h
                                              add esp, FFFFFFF8h
                                              fstp qword ptr [esp]
                                              wait
                                              call 00007F3B008D452Dh
                                              movzx eax, ax
                                              imul edi, eax
                                              imul edi, edi, 0Eh
                                              lea eax, dword ptr [ebx+ebx*2]
                                              lea eax, dword ptr [eax+eax*8]
                                              add edi, eax
                                              lea edx, dword ptr [ebp-18h]
                                              mov eax, 00000001h
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x880000x287c.idata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x970000x5a00.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x95c000x1cc8
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x8c0000x18.rdata
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              CODE0x10000x825140x82600618d7e071d1c83ead97f031759b165f9False0.5258550305608821data6.542532161146491IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              DATA0x840000x161c0x1800c21f21b38785e1e9e8943593d6eead7eFalse0.390625data3.7250553947156755IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              BSS0x860000x10310x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .idata0x880000x287c0x2a00b729254afb1036e3f92b8dc5df663553False0.34561011904761907data4.958081990754235IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .tls0x8b0000x240x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rdata0x8c0000x180x200a6cb9f1a4a8049af1c85f73a4b116345False0.048828125data0.2005819074398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                              .reloc0x8d0000x93c40x94002e31d36bb738ca1aa2eeb17050bd1745False0.5617873733108109data6.639997275023061IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                              .rsrc0x970000x5a000x5a0005f26ab7dd15de0bad967b32a58ddfc5False0.3099826388888889data4.343420113898351IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_CURSOR0x97adc0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
                                              RT_CURSOR0x97c100x134data0.4642857142857143
                                              RT_CURSOR0x97d440x134data0.4805194805194805
                                              RT_CURSOR0x97e780x134data0.38311688311688313
                                              RT_CURSOR0x97fac0x134data0.36038961038961037
                                              RT_CURSOR0x980e00x134data0.4090909090909091
                                              RT_CURSOR0x982140x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
                                              RT_BITMAP0x983480x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                              RT_BITMAP0x985180x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 3800.46487603305785125
                                              RT_BITMAP0x986fc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                              RT_BITMAP0x988cc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39870689655172414
                                              RT_BITMAP0x98a9c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.4245689655172414
                                              RT_BITMAP0x98c6c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5021551724137931
                                              RT_BITMAP0x98e3c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
                                              RT_BITMAP0x9900c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                              RT_BITMAP0x991dc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
                                              RT_BITMAP0x993ac0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                              RT_BITMAP0x9957c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4870689655172414
                                              RT_ICON0x996640x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.25
                                              RT_DIALOG0x9978c0x52data0.7682926829268293
                                              RT_STRING0x997e00x380data0.4408482142857143
                                              RT_STRING0x99b600x260data0.4753289473684211
                                              RT_STRING0x99dc00xe8data0.5905172413793104
                                              RT_STRING0x99ea80x128data0.5574324324324325
                                              RT_STRING0x99fd00x2c8data0.45786516853932585
                                              RT_STRING0x9a2980x408data0.37887596899224807
                                              RT_STRING0x9a6a00x390data0.35855263157894735
                                              RT_STRING0x9aa300x400data0.359375
                                              RT_STRING0x9ae300x114data0.5
                                              RT_STRING0x9af440xe4data0.5482456140350878
                                              RT_STRING0x9b0280x24cdata0.477891156462585
                                              RT_STRING0x9b2740x384data0.3233333333333333
                                              RT_STRING0x9b5f80x3acdata0.3819148936170213
                                              RT_STRING0x9b9a40x2e8data0.3911290322580645
                                              RT_RCDATA0x9bc8c0x10data1.5
                                              RT_RCDATA0x9bc9c0x364data0.6474654377880185
                                              RT_RCDATA0x9c0000x1a1Delphi compiled form 'TMainForm'0.7146282973621103
                                              RT_GROUP_CURSOR0x9c1a40x14Lotus unknown worksheet or configuration, revision 0x11.25
                                              RT_GROUP_CURSOR0x9c1b80x14Lotus unknown worksheet or configuration, revision 0x11.25
                                              RT_GROUP_CURSOR0x9c1cc0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x9c1e00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x9c1f40x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x9c2080x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x9c21c0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_ICON0x9c2300x14dataEnglishUnited States1.15
                                              RT_VERSION0x9c2440x340dataEnglishUnited States0.42908653846153844
                                              RT_MANIFEST0x9c5840x3fbXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4308145240431796
                                              DLLImport
                                              kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle
                                              user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                                              advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                              oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                              kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                              advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                              kernel32.dlllstrcpyA, lstrcmpA, WriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExW, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameW, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetDiskFreeSpaceA, GetCurrentThreadId, GetCurrentProcessId, GetCommandLineW, GetCPInfo, GetACP, FreeResource, FreeLibrary, FormatMessageA, FindResourceA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateMutexA, CreateFileA, CreateEventA, CompareStringW, CompareStringA, CloseHandle
                                              version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                              gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32W, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExtTextOutA, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CombineRgn, BitBlt
                                              user32.dllWindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterHotKey, UnregisterClassW, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExW, SetWindowsHookExA, SetWindowTextW, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetMenuItemInfoW, SetMenuItemInfoA, SetMenuInfo, SetMenu, SetLayeredWindowAttributes, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterHotKey, RegisterClipboardFormatA, RegisterClassW, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageW, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextLengthW, GetWindowTextW, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringW, GetMenuStringA, GetMenuState, GetMenuItemInfoW, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameW, GetClassNameA, GetClassInfoW, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextW, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcW, DefWindowProcA, DefMDIChildProcW, DefMDIChildProcA, DefFrameProcW, DefFrameProcA, CreateWindowExW, CreateWindowExA, CreatePopupMenu, CreateMenu, CreateMDIWindowW, CreateIcon, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CharUpperBuffW, CharUpperW, CallWindowProcW, CallWindowProcA, CallNextHookEx, BringWindowToTop, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharUpperA, AdjustWindowRectEx, ActivateKeyboardLayout
                                              kernel32.dllSleep
                                              oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayRedim, SafeArrayCreate, VarBstrFromBool, VarBstrFromDate, VarBstrFromCy, VarBoolFromStr, VarCyFromStr, VarDateFromStr, VarR8FromStr, VarI4FromStr, VarNot, VarNeg, VariantChangeTypeEx, VariantCopyInd, VariantCopy, VariantClear, VariantInit
                                              ole32.dllCoUninitialize, CoInitialize
                                              oleaut32.dllGetErrorInfo, SysFreeString
                                              comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                                              shell32.dllShellExecuteA
                                              comdlg32.dllFindTextA, GetOpenFileNameA
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              No network behavior found

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Target ID:0
                                              Start time:10:56:20
                                              Start date:01/11/2024
                                              Path:C:\Users\user\Desktop\2hp5ee36OS.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\2hp5ee36OS.exe"
                                              Imagebase:0x400000
                                              File size:699'023 bytes
                                              MD5 hash:26AE69324CEC59AEC90936FA0C18882E
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Reputation:low
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:6.3%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:20.6%
                                                Total number of Nodes:1292
                                                Total number of Limit Nodes:22
                                                execution_graph 12912 1002df80 12913 1002df8b 12912->12913 12920 1002e13b 12912->12920 12914 1002e09a LoadLibraryA 12913->12914 12919 1002e0d6 VirtualProtect VirtualProtect 12913->12919 12915 1002e0b1 12914->12915 12915->12913 12916 1002e0b8 GetProcAddress 12915->12916 12916->12915 12918 1002e0d0 12916->12918 12919->12920 12920->12920 12921 100098e5 GetCurrentProcess OpenProcessToken 12922 1000995a 12921->12922 12923 1000996a CloseHandle 12922->12923 12948 10001709 12923->12948 12925 10009a3f GetModuleHandleA 12926 10009a71 12925->12926 12927 10009a58 12925->12927 12928 10009aa6 12926->12928 12930 10009a86 GetProcAddress 12926->12930 12929 10009a61 LoadLibraryA 12927->12929 12931 10009b3d GetModuleHandleA 12928->12931 12929->12926 12930->12928 12932 10009b72 12931->12932 12933 10009b56 12931->12933 12934 10009b7f 12932->12934 12938 10009db7 12932->12938 12935 10009b62 LoadLibraryA 12933->12935 12936 10009c10 GetProcAddress 12934->12936 12935->12932 12937 10009c34 12936->12937 12936->12938 12937->12938 12941 10009ce8 WriteProcessMemory 12937->12941 12944 10009d3e 12937->12944 12939 10009e42 12938->12939 12950 1001276a 12938->12950 12942 10009eb7 GetProcAddress 12939->12942 12941->12938 12943 10009ee8 12942->12943 12947 10009f8e 12942->12947 12945 10009efc allocator 12943->12945 12943->12947 12944->12938 12946 10009f6c WriteProcessMemory 12945->12946 12946->12947 12949 10001715 12948->12949 12949->12925 12953 1001279b 12950->12953 12962 10012840 12953->12962 12956 100127ac GetCurrentProcess TerminateProcess 12957 100127bd 12956->12957 12958 10012827 12957->12958 12959 1001282e ExitProcess 12957->12959 12965 10012849 12958->12965 12968 1001470e 12962->12968 12964 100127a1 12964->12956 12964->12957 13120 1001476f RtlLeaveCriticalSection 12965->13120 12967 10012777 12967->12939 12969 10014764 RtlEnterCriticalSection 12968->12969 12970 10014726 12968->12970 12969->12964 12983 100138ce 12970->12983 12973 1001473c 12975 1001470e ctype 27 API calls 12973->12975 12976 10014744 12975->12976 12977 10014755 12976->12977 12978 1001474b RtlInitializeCriticalSection 12976->12978 12992 10013264 12977->12992 12980 1001475a 12978->12980 13009 1001476f RtlLeaveCriticalSection 12980->13009 12982 10014762 12982->12969 13010 100138e0 12983->13010 12986 10013231 12988 1001323b 12986->12988 12987 1001324d 13079 10016a8e 12987->13079 12988->12987 13073 10016a55 12988->13073 12993 10013292 12992->12993 12994 1001333e 12992->12994 12995 1001329c 12993->12995 12996 100132d7 12993->12996 12994->12980 12997 1001470e ctype 28 API calls 12995->12997 12999 1001470e ctype 28 API calls 12996->12999 13007 100132c8 12996->13007 13000 100132a3 ctype 12997->13000 12998 10013330 HeapFree 12998->12994 13004 100132e3 ctype 12999->13004 13001 100132bd 13000->13001 13093 10016c54 13000->13093 13099 100132ce 13001->13099 13005 1001330f 13004->13005 13102 100179db 13004->13102 13106 10013326 13005->13106 13007->12994 13007->12998 13009->12982 13011 100138dd 13010->13011 13013 100138e7 _rand 13010->13013 13011->12973 13011->12986 13013->13011 13014 1001390c 13013->13014 13015 10013939 13014->13015 13019 1001397c 13014->13019 13016 1001470e ctype 28 API calls 13015->13016 13020 10013967 13015->13020 13017 1001394f 13016->13017 13032 10016f7d 13017->13032 13018 100139eb RtlAllocateHeap 13029 1001396e 13018->13029 13019->13020 13021 1001399e 13019->13021 13020->13018 13020->13029 13023 1001470e ctype 28 API calls 13021->13023 13025 100139a5 13023->13025 13041 10017a20 13025->13041 13028 100139b8 13048 100139d2 13028->13048 13029->13013 13035 10016faf 13032->13035 13033 1001704e 13036 1001395a 13033->13036 13058 10017337 13033->13058 13035->13033 13035->13036 13051 10017286 13035->13051 13038 10013973 13036->13038 13062 1001476f RtlLeaveCriticalSection 13038->13062 13040 1001397a 13040->13020 13046 10017a2e _rand 13041->13046 13042 10017b1a VirtualAlloc 13047 10017aeb _rand 13042->13047 13043 10017bef 13063 10017728 13043->13063 13046->13042 13046->13043 13046->13047 13047->13028 13047->13047 13072 1001476f RtlLeaveCriticalSection 13048->13072 13050 100139c5 13050->13020 13050->13029 13052 100172c9 RtlAllocateHeap 13051->13052 13053 10017299 RtlReAllocateHeap 13051->13053 13055 100172ef VirtualAlloc 13052->13055 13057 10017319 13052->13057 13054 100172b8 13053->13054 13053->13057 13054->13052 13056 10017309 HeapFree 13055->13056 13055->13057 13056->13057 13057->13033 13059 10017349 VirtualAlloc 13058->13059 13061 10017392 13059->13061 13061->13036 13062->13040 13064 10017735 13063->13064 13065 1001773c RtlAllocateHeap 13063->13065 13066 10017759 VirtualAlloc 13064->13066 13065->13066 13071 10017791 _rand 13065->13071 13067 10017779 VirtualAlloc 13066->13067 13068 1001784e 13066->13068 13069 10017840 VirtualFree 13067->13069 13067->13071 13070 10017856 HeapFree 13068->13070 13068->13071 13069->13068 13070->13071 13071->13047 13072->13050 13074 10016a5f 13073->13074 13075 10016a8e _rand 7 API calls 13074->13075 13078 10016a8c 13074->13078 13076 10016a76 13075->13076 13077 10016a8e _rand 7 API calls 13076->13077 13077->13078 13078->12987 13081 10016aa1 13079->13081 13080 10013256 13080->12973 13081->13080 13082 10016bb8 _rand 13081->13082 13083 10016ae1 13081->13083 13084 10016bcb GetStdHandle WriteFile 13082->13084 13083->13080 13085 10016aed GetModuleFileNameA 13083->13085 13084->13080 13086 10016b05 _rand 13085->13086 13088 10019f40 13086->13088 13089 10019f4d LoadLibraryA 13088->13089 13090 10019f8f 13088->13090 13089->13090 13091 10019f5e GetProcAddress 13089->13091 13090->13080 13091->13090 13092 10019f75 GetProcAddress GetProcAddress 13091->13092 13092->13090 13094 10016c92 13093->13094 13098 10016f48 ctype 13093->13098 13095 10016e8e VirtualFree 13094->13095 13094->13098 13096 10016ef2 13095->13096 13097 10016f01 VirtualFree HeapFree 13096->13097 13096->13098 13097->13098 13098->13001 13109 1001476f RtlLeaveCriticalSection 13099->13109 13101 100132d5 13101->13007 13103 10017a08 13102->13103 13104 10017a1e 13102->13104 13103->13104 13110 100178c2 13103->13110 13104->13005 13119 1001476f RtlLeaveCriticalSection 13106->13119 13108 1001332d 13108->13007 13109->13101 13113 100178cf 13110->13113 13111 1001797f 13111->13104 13112 100178f0 VirtualFree 13112->13113 13113->13111 13113->13112 13115 1001786c VirtualFree 13113->13115 13116 10017889 13115->13116 13117 100178b9 13116->13117 13118 10017899 HeapFree 13116->13118 13117->13113 13118->13113 13119->13108 13120->12967 13121 10008349 13140 1000e770 13121->13140 13125 10008361 13146 1000e890 13125->13146 13127 1000839a allocator 13128 100083a2 GetFileAttributesA 13127->13128 13129 100083c0 13128->13129 13130 100083ae 13128->13130 13152 1000e7a0 13129->13152 13149 1000e810 13130->13149 13133 100083ce 13137 1000e810 29 API calls 13133->13137 13135 1000e810 29 API calls 13136 100083be 13135->13136 13138 100083de 13137->13138 13139 1000e810 29 API calls 13138->13139 13139->13136 13157 1000f6a0 13140->13157 13142 10008355 13143 1000e830 13142->13143 13167 1000f1f0 13143->13167 13275 1000f120 13146->13275 13150 1000f6a0 ctype 29 API calls 13149->13150 13151 100083b6 13150->13151 13151->13135 13153 1000f6a0 ctype 29 API calls 13152->13153 13154 1000e7bb 13153->13154 13155 1000f220 allocator 30 API calls 13154->13155 13156 1000e7cf 13155->13156 13156->13133 13158 1000f6b5 ctype 13157->13158 13160 1000f6be ctype 13157->13160 13158->13160 13161 1000ff40 13158->13161 13160->13142 13164 10011354 13161->13164 13165 10013264 ctype 29 API calls 13164->13165 13166 1000ff50 13165->13166 13166->13160 13170 1000f220 13167->13170 13169 1000e843 13169->13125 13171 1000f231 allocator 13170->13171 13173 1000f23b allocator 13171->13173 13184 1001158b 13171->13184 13174 1000f25f 13173->13174 13180 1000f287 allocator ctype 13173->13180 13194 1000fcc0 13174->13194 13176 1000f32d 13202 1000fe00 13176->13202 13178 1000f274 13179 1000fcc0 allocator 30 API calls 13178->13179 13183 1000f282 allocator ctype 13179->13183 13180->13176 13181 1000f2d8 13180->13181 13182 1000f6a0 ctype 29 API calls 13181->13182 13182->13183 13183->13169 13185 10011595 __EH_prolog 13184->13185 13186 1000f6a0 ctype 29 API calls 13185->13186 13187 100115a9 _rand 13186->13187 13222 1000fc70 13187->13222 13189 100115bf 13225 100113b9 13189->13225 13193 100115e4 13195 1000fcd4 13194->13195 13196 1000fcd9 13194->13196 13197 1001158b allocator 30 API calls 13195->13197 13241 10010830 13196->13241 13197->13196 13199 1000fd47 allocator 13199->13178 13200 1000fce1 allocator 13200->13199 13201 1000fe00 allocator 30 API calls 13200->13201 13201->13199 13203 1000fe11 allocator 13202->13203 13207 1000fe1b ctype 13203->13207 13251 1001135f 13203->13251 13205 1000fe9f 13206 1000fea5 13205->13206 13208 1000fed5 13205->13208 13210 1000f6a0 ctype 29 API calls 13206->13210 13213 1000fe85 allocator 13206->13213 13207->13205 13217 1000fe56 13207->13217 13209 1000ff0e 13208->13209 13211 1000fef6 13208->13211 13209->13213 13215 100106f0 allocator 29 API calls 13209->13215 13210->13213 13212 1000f6a0 ctype 29 API calls 13211->13212 13214 1000ff00 13212->13214 13213->13183 13216 100106f0 allocator 29 API calls 13214->13216 13215->13213 13216->13213 13218 1000fe8c 13217->13218 13219 1000fe5c ctype 13217->13219 13261 100106f0 13218->13261 13221 1000f6a0 ctype 29 API calls 13219->13221 13221->13213 13223 1000fe00 allocator 30 API calls 13222->13223 13224 1000fc85 allocator 13223->13224 13224->13189 13226 100113c3 __EH_prolog 13225->13226 13234 10013369 13226->13234 13228 100113dd 13229 1000f6a0 ctype 29 API calls 13228->13229 13230 100113f4 13229->13230 13231 1000f220 allocator 30 API calls 13230->13231 13232 10011404 13231->13232 13233 10013477 RaiseException 13232->13233 13233->13193 13235 1001337e _rand 13234->13235 13238 1001255b 13235->13238 13237 10013385 _rand 13237->13228 13239 100138e0 ctype 29 API calls 13238->13239 13240 10012566 13239->13240 13240->13237 13242 10010893 13241->13242 13243 10010842 ctype 13241->13243 13242->13200 13243->13242 13244 1000f6a0 ctype 29 API calls 13243->13244 13245 10010887 13244->13245 13247 1000f3a0 13245->13247 13248 1000f3b0 allocator 13247->13248 13249 1000fc70 allocator 30 API calls 13248->13249 13250 1000f3c0 13249->13250 13250->13242 13252 10011369 __EH_prolog 13251->13252 13253 1000f6a0 ctype 29 API calls 13252->13253 13254 1001137d _rand 13253->13254 13255 1000fc70 allocator 30 API calls 13254->13255 13256 10011393 13255->13256 13257 100113b9 allocator 30 API calls 13256->13257 13258 100113a3 13257->13258 13267 10013477 RaiseException 13258->13267 13260 100113b8 13262 10010725 allocator 13261->13262 13268 10010a20 13262->13268 13264 10010748 allocator 13265 1000f6a0 ctype 29 API calls 13264->13265 13266 100107c6 allocator ctype 13265->13266 13266->13213 13267->13260 13271 10010f00 13268->13271 13272 10010f09 13271->13272 13273 1001255b allocator 29 API calls 13272->13273 13274 10010a32 13273->13274 13274->13264 13276 1000f130 allocator 13275->13276 13279 1000fbf0 13276->13279 13278 1000e8a3 13278->13127 13280 1000fc0a 13279->13280 13282 1000fc0f 13279->13282 13281 1001135f allocator 30 API calls 13280->13281 13281->13282 13283 1000fe00 allocator 30 API calls 13282->13283 13284 1000fc2f allocator 13282->13284 13283->13284 13284->13278 13285 483364 13294 4069e4 GetModuleHandleA 13285->13294 13287 48337f 13296 406b6c CreateMutexA 13287->13296 13289 4833c5 GetLastError 13290 4833d1 13289->13290 13293 4833e5 13289->13293 13297 483030 13290->13297 13295 406a17 13294->13295 13295->13287 13296->13289 13298 483042 FindWindowA 13297->13298 13299 48306e 13298->13299 13299->13293 13300 1000c20f 13301 1000c2dc 13300->13301 13312 1000e850 13301->13312 13303 1000c2ea 13304 1000e850 30 API calls 13303->13304 13305 1000c301 GetUserNameA 13304->13305 13306 1000e850 30 API calls 13305->13306 13307 1000c32a 13306->13307 13308 1000c3ad GetModuleHandleA 13307->13308 13309 1000c3e0 13308->13309 13310 1000c3c5 13308->13310 13311 1000c3d1 LoadLibraryA 13310->13311 13311->13309 13313 1000f3a0 allocator 30 API calls 13312->13313 13314 1000e863 13313->13314 13314->13303 13315 406050 13316 406065 GetLocaleInfoA 13315->13316 13318 40616a 13316->13318 13319 406087 13316->13319 13319->13318 13320 406122 LoadLibraryExA 13319->13320 13320->13318 13321 406138 LoadLibraryExA 13320->13321 13321->13318 13323 407730 CreateWindowExA 13324 10001cf1 VirtualProtect WriteProcessMemory 13325 100016b3 CreateFileA RtlLeaveCriticalSection 13326 10001953 13327 1000197d allocator 13326->13327 13328 1000198a allocator 13327->13328 13329 10001a13 WriteProcessMemory 13327->13329 13329->13328 13330 100085b4 13331 100085bc 13330->13331 13332 100085d6 13331->13332 13333 100085d8 EnumWindows Sleep 13331->13333 13333->13331 13334 10013194 13335 100131a7 13334->13335 13339 100131b0 13334->13339 13343 100131d8 13335->13343 13344 1000ddd2 13335->13344 13339->13335 13339->13343 13369 100130bb 13339->13369 13340 100131f8 13342 100130bb 105 API calls 13340->13342 13340->13343 13341 100130bb 105 API calls 13341->13340 13342->13343 13345 1000e3f2 13344->13345 13346 1000dde5 13344->13346 13345->13340 13345->13341 13345->13343 13347 1000de2e DisableThreadLibraryCalls GetSystemDirectoryA GetModuleFileNameA 13346->13347 13348 1000ddff IsBadReadPtr 13346->13348 13350 1000de78 _rand 13347->13350 13348->13347 13349 1000de12 13348->13349 13349->13347 13398 1001a2d0 13350->13398 13352 1000df58 _rand 13353 1001a2d0 44 API calls 13352->13353 13354 1000dff0 _rand 13353->13354 13355 1001a2d0 44 API calls 13354->13355 13356 1000e0ac _rand 13355->13356 13357 1001a2d0 44 API calls 13356->13357 13358 1000e168 _rand 13357->13358 13359 1001a2d0 44 API calls 13358->13359 13360 1000e21d _rand 13359->13360 13361 1001a2d0 44 API calls 13360->13361 13362 1000e2e7 _rand 13361->13362 13363 1001a2d0 44 API calls 13362->13363 13364 1000e3b8 13363->13364 13364->13345 13406 10011d5c 13364->13406 13367 10011d5c 119 API calls 13368 1000e3ef 13367->13368 13368->13345 13370 10013150 13369->13370 13371 100130c8 GetVersion 13369->13371 13373 10013182 13370->13373 13374 10013156 13370->13374 14025 10016950 HeapCreate 13371->14025 13376 1001311b 13373->13376 13377 10014324 31 API calls 13373->13377 13374->13376 13378 10013171 13374->13378 14123 1001278c 13374->14123 13375 100130da 13375->13376 14047 10014238 13375->14047 13376->13335 13377->13376 14037 1001634f 13378->14037 13382 10013112 13384 10013116 13382->13384 13385 1001311f GetCommandLineA 13382->13385 14057 100169ad 13384->14057 14064 100166a9 13385->14064 13390 100169ad 6 API calls 13390->13376 13393 10013139 14101 1001645c 13393->14101 13395 1001313e 14110 100163a3 13395->14110 13397 10013143 13397->13376 13399 1001a323 13398->13399 13401 1001a2e8 13398->13401 13400 1001470e ctype 29 API calls 13399->13400 13405 1001a333 13399->13405 13400->13405 13401->13352 13402 1001a37a 13402->13401 13417 1001476f RtlLeaveCriticalSection 13402->13417 13403 10011f3e 15 API calls 13403->13405 13405->13402 13405->13403 13418 100143c4 13406->13418 13408 10011d69 _rand 13409 10011db7 13408->13409 13411 10011d77 CreateThread 13408->13411 13410 10013264 ctype 29 API calls 13409->13410 13414 10011dbd 13410->13414 13412 10011da3 ResumeThread 13411->13412 13413 10011daf GetLastError 13411->13413 13471 10011dd3 TlsGetValue 13411->13471 13412->13413 13415 1000e3de 13412->13415 13413->13409 13414->13415 13429 100141b3 13414->13429 13415->13367 13417->13401 13419 100143f9 _rand 13418->13419 13420 100144df 13419->13420 13421 1001470e ctype 29 API calls 13419->13421 13422 100144b1 RtlAllocateHeap 13419->13422 13424 10016f7d _rand 5 API calls 13419->13424 13428 10014473 13419->13428 13446 1001445d 13419->13446 13420->13408 13421->13419 13422->13419 13423 1001470e ctype 29 API calls 13423->13428 13424->13419 13425 10017a20 _rand 6 API calls 13425->13428 13428->13419 13428->13422 13428->13423 13428->13425 13449 100144e6 13428->13449 13454 1001422f 13429->13454 13432 100141ec 13434 10014226 35 API calls 13432->13434 13433 100141d5 13435 100141fc 13433->13435 13437 100141df 13433->13437 13436 100141f1 13434->13436 13438 10014219 13435->13438 13440 1001420c 13435->13440 13436->13415 13457 10014226 13437->13457 13441 10014226 35 API calls 13438->13441 13444 10014226 35 API calls 13440->13444 13442 1001421e 13441->13442 13442->13415 13445 10014211 13444->13445 13445->13415 13452 1001476f RtlLeaveCriticalSection 13446->13452 13448 10014464 13448->13419 13453 1001476f RtlLeaveCriticalSection 13449->13453 13451 100144ed 13451->13428 13452->13448 13453->13451 13460 100142bd GetLastError TlsGetValue 13454->13460 13456 100141b9 13456->13432 13456->13433 13458 100142bd _rand 35 API calls 13457->13458 13459 100141e4 13458->13459 13459->13415 13461 100142d9 13460->13461 13462 10014318 SetLastError 13460->13462 13463 100143c4 _rand 30 API calls 13461->13463 13462->13456 13464 100142e2 13463->13464 13465 10014310 13464->13465 13466 100142ea TlsSetValue 13464->13466 13468 10013231 _rand 7 API calls 13465->13468 13466->13465 13467 100142fb _rand 13466->13467 13470 10014301 GetCurrentThreadId 13467->13470 13469 10014317 13468->13469 13469->13462 13470->13462 13472 10011e20 TlsSetValue 13471->13472 13473 10011e0b 13471->13473 13476 10011e37 13472->13476 13478 10011e3e 13472->13478 13484 10014324 13473->13484 13477 10013231 _rand 7 API calls 13476->13477 13477->13478 13506 1000db11 Sleep 13478->13506 13530 1000c855 GetModuleFileNameA 13478->13530 13479 10011e54 13705 10011e90 13479->13705 13481 10011e5a 13485 100143c3 13484->13485 13486 10014332 13484->13486 13485->13472 13487 10014348 13486->13487 13488 1001433b TlsGetValue 13486->13488 13490 10014355 13487->13490 13491 10013264 ctype 29 API calls 13487->13491 13488->13487 13489 100143b4 TlsSetValue 13488->13489 13489->13485 13492 10014363 13490->13492 13493 10013264 ctype 29 API calls 13490->13493 13491->13490 13494 10014371 13492->13494 13496 10013264 ctype 29 API calls 13492->13496 13493->13492 13495 1001437f 13494->13495 13497 10013264 ctype 29 API calls 13494->13497 13498 1001438d 13495->13498 13499 10013264 ctype 29 API calls 13495->13499 13496->13494 13497->13495 13500 1001439b 13498->13500 13501 10013264 ctype 29 API calls 13498->13501 13499->13498 13502 100143ac 13500->13502 13504 10013264 ctype 29 API calls 13500->13504 13501->13500 13503 10013264 ctype 29 API calls 13502->13503 13505 100143b3 13503->13505 13504->13502 13505->13489 13507 1000e770 29 API calls 13506->13507 13508 1000db44 13507->13508 13509 1000e770 29 API calls 13508->13509 13510 1000db50 13509->13510 13511 1000db74 EnumWindows 13510->13511 13518 1000dca6 Sleep 13510->13518 13519 1000dc17 IsBadWritePtr 13510->13519 13521 1000db6f 13510->13521 13525 1000dba1 allocator _rand 13510->13525 13715 10010bd0 13511->13715 13512 1000e810 29 API calls 13514 1000dcc7 13512->13514 13515 1000e810 29 API calls 13514->13515 13516 1000dccf 13515->13516 13516->13479 13517 1000e830 30 API calls 13517->13525 13518->13510 13519->13510 13519->13518 13521->13512 13522 1000e7a0 allocator 30 API calls 13522->13525 13523 1000e850 30 API calls 13523->13525 13525->13510 13525->13517 13525->13522 13525->13523 13526 1000dc79 GetFileAttributesA 13525->13526 13718 1000e7e0 13525->13718 13723 10004099 13525->13723 13526->13518 13527 1000dc85 Sleep 13526->13527 13528 1000e7a0 allocator 30 API calls 13527->13528 13529 1000dc9e 13528->13529 13529->13518 13531 1000c875 13530->13531 13532 1000c86b Sleep 13530->13532 13533 1000e850 30 API calls 13531->13533 13532->13530 13534 1000c884 13533->13534 13535 1000e830 30 API calls 13534->13535 13536 1000c893 13535->13536 13774 10001f7a 13536->13774 13538 1000c89d 13781 1000b234 GetVersion 13538->13781 13540 1000c923 13541 1000c995 GetCurrentThreadId GetCurrentProcessId 13540->13541 13782 1000ea70 13540->13782 13542 1000c9b0 13541->13542 13545 1000ca70 GetSystemDirectoryA 13542->13545 13549 1000e770 29 API calls 13542->13549 13548 1000e850 30 API calls 13545->13548 13546 1000e830 30 API calls 13550 1000c952 13546->13550 13547 1000e950 30 API calls 13556 1000c8a5 13547->13556 13551 1000ca8f 13548->13551 13552 1000c9cc 13549->13552 13553 1000e810 29 API calls 13550->13553 13554 10001f7a 30 API calls 13551->13554 13560 1000e7e0 30 API calls 13552->13560 13555 1000c95d 13553->13555 13557 1000ca99 GetWindowsDirectoryA 13554->13557 13558 1000e7a0 allocator 30 API calls 13555->13558 13556->13540 13556->13547 13559 1000e850 30 API calls 13557->13559 13561 1000c970 13558->13561 13562 1000cabb 13559->13562 13563 1000ca4a 13560->13563 13785 10001f20 13561->13785 13566 10001f7a 30 API calls 13562->13566 13569 1000ca68 13563->13569 13570 1000ca5b 13563->13570 13568 1000cac5 GetTempPathA 13566->13568 13567 1000e830 30 API calls 13571 1000c98a 13567->13571 13572 1000e850 30 API calls 13568->13572 13575 1000e810 29 API calls 13569->13575 13573 1000e810 29 API calls 13570->13573 13574 1000e810 29 API calls 13571->13574 13576 1000cae7 13572->13576 13704 1000ca63 13573->13704 13574->13541 13575->13545 13577 1000e850 30 API calls 13576->13577 13578 1000caf6 13577->13578 13579 1000e7a0 allocator 30 API calls 13578->13579 13580 1000cb0c 13579->13580 13581 10001f20 30 API calls 13580->13581 13582 1000cb18 13581->13582 13583 10010bd0 30 API calls 13582->13583 13584 1000cb21 13583->13584 13585 1000e810 29 API calls 13584->13585 13586 1000cb35 13585->13586 13587 1000cb53 13586->13587 13588 1000e890 30 API calls 13586->13588 13589 1000e7a0 allocator 30 API calls 13587->13589 13588->13587 13590 1000cb69 13589->13590 13591 10001f20 30 API calls 13590->13591 13592 1000cb75 13591->13592 13593 10010bd0 30 API calls 13592->13593 13594 1000cb7e 13593->13594 13595 1000e810 29 API calls 13594->13595 13596 1000cb92 13595->13596 13597 1000cbb1 13596->13597 13598 1000e890 30 API calls 13596->13598 13599 1000e7a0 allocator 30 API calls 13597->13599 13598->13597 13600 1000cbc7 13599->13600 13601 10001f20 30 API calls 13600->13601 13602 1000cbd3 13601->13602 13603 10010bd0 30 API calls 13602->13603 13604 1000cbdc 13603->13604 13605 1000e810 29 API calls 13604->13605 13606 1000cbf0 13605->13606 13607 1000e890 30 API calls 13606->13607 13608 1000cc0f 13606->13608 13607->13608 13796 10010b90 13608->13796 13611 1000e830 30 API calls 13612 1000cc78 13611->13612 13613 1000e810 29 API calls 13612->13613 13614 1000cc83 13613->13614 13615 10010b90 30 API calls 13614->13615 13616 1000cca1 13615->13616 13617 1000e830 30 API calls 13616->13617 13618 1000ccaf 13617->13618 13619 1000e810 29 API calls 13618->13619 13620 1000ccba 13619->13620 13621 1000ccdc 13620->13621 13622 1000ce6f 13620->13622 13623 1000cced GetModuleHandleA 13621->13623 13624 10010b90 30 API calls 13622->13624 13625 1000cd20 13623->13625 13626 1000cd06 13623->13626 13627 1000ced1 13624->13627 13628 1000cd88 GetProcAddress 13625->13628 13630 1000cd10 LoadLibraryA 13626->13630 13629 1000e830 30 API calls 13627->13629 13628->13622 13631 1000cdb8 13628->13631 13632 1000cedf 13629->13632 13630->13625 13631->13622 13634 1000cddc allocator 13631->13634 13633 1000e810 29 API calls 13632->13633 13635 1000ceea 13633->13635 13637 1000ce4d WriteProcessMemory 13634->13637 13805 10010c20 13635->13805 13637->13622 13638 10010b90 30 API calls 13639 1000cfb6 13638->13639 13640 1000e830 30 API calls 13639->13640 13641 1000cfc4 13640->13641 13643 1000e810 29 API calls 13641->13643 13642 1000cef9 13642->13638 13642->13704 13644 1000cfcf 13643->13644 13645 10010c20 30 API calls 13644->13645 13646 1000cfde 13645->13646 13647 10010b90 30 API calls 13646->13647 13648 1000d03f 13647->13648 13649 1000e830 30 API calls 13648->13649 13650 1000d04d 13649->13650 13651 1000e810 29 API calls 13650->13651 13652 1000d058 RtlInitializeCriticalSection RtlInitializeCriticalSection 13651->13652 13653 1000d073 13652->13653 13808 10012598 GetLocalTime GetSystemTime 13653->13808 13657 1000d083 13658 1000d0c0 GetModuleFileNameA 13657->13658 13659 1000d16e 13658->13659 13660 1000d0de 13658->13660 13663 1000d1ac Sleep 13659->13663 13666 1000d1bc 13659->13666 13659->13704 13661 1000e850 30 API calls 13660->13661 13662 1000d0f4 GetShortPathNameA 13661->13662 13817 10012576 13662->13817 13663->13666 13665 1000d1cc Sleep 13680 1000d1dc 13665->13680 13666->13665 13666->13680 13667 1000d10e 13669 1000e7a0 allocator 30 API calls 13667->13669 13668 1000d166 13670 1000e7a0 allocator 30 API calls 13668->13670 13671 1000d141 13669->13671 13672 1000d230 13670->13672 13820 100041c6 13671->13820 13675 1000d235 Sleep 13672->13675 13676 1000d248 13675->13676 13679 1000e7a0 allocator 30 API calls 13676->13679 13677 10001f7a 30 API calls 13677->13668 13678 1001276a 32 API calls 13678->13668 13681 1000d257 13679->13681 13680->13668 13680->13678 13682 1000d26b Sleep 13681->13682 13683 1000d276 13681->13683 13682->13683 13684 1000d35b 13683->13684 13685 1000d29b 13683->13685 13690 1000d367 13684->13690 13697 1000d387 13684->13697 13686 1000d2a6 13685->13686 13687 1000d2ad Sleep 13685->13687 13689 1001276a 32 API calls 13686->13689 13688 1000d2c4 13687->13688 13691 10012576 _rand 35 API calls 13688->13691 13694 1000d2d0 13688->13694 13689->13687 13693 1000c1aa 45 API calls 13690->13693 13692 1000d2dc 13691->13692 13692->13694 13695 1000d376 13693->13695 13828 1000e4c0 13694->13828 13698 1001276a 32 API calls 13695->13698 13695->13704 13697->13479 13698->13697 13700 10012576 _rand 35 API calls 13701 1000d32d 13700->13701 13702 1000d347 13701->13702 13701->13704 13833 1000c1aa 13702->13833 13704->13479 13706 10011e99 13705->13706 13707 100142bd _rand 35 API calls 13706->13707 13708 10011ea1 13707->13708 13709 10011eae 13708->13709 13710 10013231 _rand 7 API calls 13708->13710 13711 10011eb7 CloseHandle 13709->13711 13712 10011ebe 13709->13712 13710->13709 13711->13712 13713 10014324 31 API calls 13712->13713 13714 10011ec4 RtlExitUserThread 13713->13714 13714->13481 13740 10010af0 13715->13740 13719 1000f6a0 ctype 29 API calls 13718->13719 13720 1000e7fb 13719->13720 13721 1000f3a0 allocator 30 API calls 13720->13721 13722 1000e807 13721->13722 13722->13525 13751 10010b50 13723->13751 13725 100040c3 13726 1000416a 13725->13726 13727 100040db Sleep 13725->13727 13728 1000e810 29 API calls 13726->13728 13729 10010b50 30 API calls 13727->13729 13730 10004176 13728->13730 13731 10004107 13729->13731 13732 1000e810 29 API calls 13730->13732 13731->13726 13734 1000411b Sleep 13731->13734 13733 10004165 13732->13733 13733->13525 13735 10010b50 30 API calls 13734->13735 13736 10004147 13735->13736 13737 1000e810 29 API calls 13736->13737 13738 1000415d 13737->13738 13739 1000e810 29 API calls 13738->13739 13739->13733 13743 10011100 13740->13743 13744 10011110 allocator 13743->13744 13747 10011130 13744->13747 13746 10010aff 13746->13510 13748 10011144 13747->13748 13750 10011149 13747->13750 13749 1001158b allocator 30 API calls 13748->13749 13749->13750 13750->13746 13752 1000e7a0 allocator 30 API calls 13751->13752 13753 10010b66 13752->13753 13760 1000e870 13753->13760 13756 1000e7a0 allocator 30 API calls 13757 10010b76 13756->13757 13758 1000e810 29 API calls 13757->13758 13759 10010b7e 13758->13759 13759->13725 13763 1000f0f0 13760->13763 13766 1000fb40 13763->13766 13765 1000e883 13765->13756 13767 1000fb51 allocator 13766->13767 13768 1001158b allocator 30 API calls 13767->13768 13769 1000fb5b allocator 13767->13769 13768->13769 13770 1000fb8c 13769->13770 13771 1001135f allocator 30 API calls 13769->13771 13772 1000fe00 allocator 30 API calls 13770->13772 13773 1000fbac allocator 13770->13773 13771->13770 13772->13773 13773->13765 13838 1000e8d0 13774->13838 13778 10001f93 13779 1000e8d0 30 API calls 13778->13779 13780 10001f9c 13779->13780 13780->13538 13781->13556 13848 1000f0b0 13782->13848 13786 10001f2c allocator 13785->13786 13787 10001f31 allocator 13786->13787 13788 10001f5a 13786->13788 13792 1000ea70 30 API calls 13787->13792 13789 1000e7e0 30 API calls 13788->13789 13790 10001f6b 13789->13790 13791 1000e810 29 API calls 13790->13791 13794 10001f55 13791->13794 13793 10001f4d 13792->13793 13795 1000e810 29 API calls 13793->13795 13794->13567 13795->13794 13797 1000e7a0 allocator 30 API calls 13796->13797 13798 10010ba6 13797->13798 13799 1000e890 30 API calls 13798->13799 13800 10010bad 13799->13800 13801 1000e7a0 allocator 30 API calls 13800->13801 13802 10010bb6 13801->13802 13803 1000e810 29 API calls 13802->13803 13804 1000cc6a 13803->13804 13804->13611 13853 100110d0 13805->13853 13809 100125c2 13808->13809 13810 100125fd GetTimeZoneInformation 13808->13810 13809->13810 13811 100125f6 13809->13811 13810->13811 13857 10014ab0 13811->13857 13814 10012569 13815 100142bd _rand 35 API calls 13814->13815 13816 1001256e 13815->13816 13816->13657 13818 100142bd _rand 35 API calls 13817->13818 13819 1001257b 13818->13819 13819->13667 13822 100041d4 allocator 13820->13822 13821 10004250 13823 1000e810 29 API calls 13821->13823 13822->13821 13825 10004206 GetFileSize 13822->13825 13824 10004263 13823->13824 13824->13677 13824->13704 13826 1001255b allocator 29 API calls 13825->13826 13827 10004225 ReadFile CloseHandle 13826->13827 13827->13821 13829 1000e4e4 13828->13829 13830 1000e4cf CloseHandle 13828->13830 13831 1000d305 13829->13831 13832 1000e4ed UnmapViewOfFile 13829->13832 13830->13829 13831->13700 13831->13704 13832->13831 13836 1000c1be 13833->13836 13834 1000c1d5 13834->13704 13836->13834 13837 1000c1e8 Sleep 13836->13837 13937 1000426d 13836->13937 13837->13836 13844 1000f5e0 13838->13844 13840 10001f8a 13841 1000e8f0 13840->13841 13842 1000f5e0 30 API calls 13841->13842 13843 1000e8ff 13842->13843 13843->13778 13845 1000f633 ctype 13844->13845 13846 1000f5f0 ctype 13844->13846 13845->13840 13846->13845 13847 1000fe00 allocator 30 API calls 13846->13847 13847->13845 13849 1000f6a0 ctype 29 API calls 13848->13849 13850 1000f0cb 13849->13850 13851 1000f220 allocator 30 API calls 13850->13851 13852 1000c947 13851->13852 13852->13546 13854 100110df allocator 13853->13854 13855 10011130 30 API calls 13854->13855 13856 10010c2f 13855->13856 13856->13642 13858 10014ac9 13857->13858 13860 1000d07a 13857->13860 13858->13860 13863 10018928 13858->13863 13860->13814 13864 10018931 13863->13864 13870 10014af4 13863->13870 13865 1001470e ctype 29 API calls 13864->13865 13866 10018938 13865->13866 13869 10018947 13866->13869 13876 10018956 13866->13876 13904 1001476f RtlLeaveCriticalSection 13869->13904 13870->13860 13871 10018bdd 13870->13871 13872 1001470e ctype 29 API calls 13871->13872 13873 10018be5 13872->13873 13936 1001476f RtlLeaveCriticalSection 13873->13936 13875 10018bf7 13875->13860 13877 1001470e ctype 29 API calls 13876->13877 13878 1001896c 13877->13878 13905 1001a52c 13878->13905 13881 10018997 13911 1001476f RtlLeaveCriticalSection 13881->13911 13882 10018bd1 13919 1001476f RtlLeaveCriticalSection 13882->13919 13885 1001899d GetTimeZoneInformation 13889 100189b3 WideCharToMultiByte 13885->13889 13900 10018a7d _rand 13885->13900 13886 10013264 ctype 29 API calls 13888 10018ac2 _rand 13886->13888 13887 10018a94 13887->13882 13887->13886 13892 100138ce ctype 29 API calls 13888->13892 13891 10018a40 WideCharToMultiByte 13889->13891 13891->13900 13893 10018acf 13892->13893 13893->13882 13895 10018adf _rand 13893->13895 13912 1001476f RtlLeaveCriticalSection 13895->13912 13897 10018aec _rand 13913 1001a4a1 13897->13913 13900->13869 13901 1001a4a1 6 API calls 13902 10018b4a 13901->13902 13902->13900 13903 1001a4a1 6 API calls 13902->13903 13903->13900 13904->13870 13906 1001a53e 13905->13906 13910 1001898c 13905->13910 13907 1001a54f _rand 13906->13907 13906->13910 13920 1001b143 13906->13920 13907->13910 13927 1001b104 13907->13927 13910->13881 13910->13887 13911->13885 13912->13897 13915 1001a4a9 13913->13915 13917 1001a4d7 13915->13917 13932 100149a8 13915->13932 13916 100149a8 6 API calls 13916->13917 13917->13916 13918 10018b1c 13917->13918 13918->13900 13918->13901 13919->13900 13921 1001b1a4 13920->13921 13924 1001b156 13920->13924 13921->13907 13922 1001b15c WideCharToMultiByte 13922->13921 13922->13924 13923 100138ce ctype 29 API calls 13923->13924 13924->13921 13924->13922 13924->13923 13925 1001b17d WideCharToMultiByte 13924->13925 13926 1001b6f5 44 API calls 13924->13926 13925->13921 13925->13924 13926->13924 13928 1001b111 13927->13928 13929 1001b10d 13927->13929 13930 1001b44d 9 API calls 13928->13930 13929->13907 13931 1001b130 13930->13931 13931->13907 13933 100149c6 13932->13933 13934 100149ba 13932->13934 13935 100187df 6 API calls 13933->13935 13934->13915 13935->13934 13936->13875 13938 1000427e 13937->13938 13939 10010af0 30 API calls 13938->13939 13940 1000428f 13939->13940 13941 1000e7a0 allocator 30 API calls 13940->13941 13965 1000429b 13940->13965 13942 100042e4 13941->13942 13943 10001f20 30 API calls 13942->13943 13944 100042ed 13943->13944 13945 10010af0 30 API calls 13944->13945 13946 100042f6 13945->13946 13947 1000e810 29 API calls 13946->13947 13948 10004304 13947->13948 13949 1000e770 29 API calls 13948->13949 13948->13965 13950 10004324 13949->13950 13951 1000e830 30 API calls 13950->13951 13952 10004331 13951->13952 13953 1000e890 30 API calls 13952->13953 13954 10004346 13953->13954 13955 1000e7a0 allocator 30 API calls 13954->13955 13956 1000438e 13955->13956 13957 1000e7e0 30 API calls 13956->13957 13958 100043ab 13957->13958 13959 10004099 32 API calls 13958->13959 13960 100043b0 13959->13960 13961 100043d9 13960->13961 13962 100043bc 13960->13962 13964 1000e7a0 allocator 30 API calls 13961->13964 13963 1000e810 29 API calls 13962->13963 13963->13965 13966 100043eb 13964->13966 13965->13836 13967 100041c6 32 API calls 13966->13967 13968 100043f0 13967->13968 13969 10004419 13968->13969 13970 100043fc 13968->13970 13972 10004422 allocator 13969->13972 13978 1000446d allocator 13969->13978 13971 1000e810 29 API calls 13970->13971 13971->13965 13973 1000442a DeleteFileA 13972->13973 13974 10011354 ctype 29 API calls 13973->13974 13975 10004446 13974->13975 13977 1000e810 29 API calls 13975->13977 13976 100044c4 allocator 13979 100044cc DeleteFileA 13976->13979 13977->13965 13978->13976 13980 1000450f 13978->13980 13981 10011354 ctype 29 API calls 13979->13981 13983 1000e770 29 API calls 13980->13983 13982 100044e8 13981->13982 13984 1000e810 29 API calls 13982->13984 13985 10004542 13983->13985 13984->13965 13986 10010b90 30 API calls 13985->13986 13987 10004560 13986->13987 13988 1000e830 30 API calls 13987->13988 13989 1000456c 13988->13989 13990 1000e810 29 API calls 13989->13990 13991 10004577 allocator 13990->13991 13992 1000458a MoveFileA 13991->13992 14018 1000e990 13992->14018 13994 1000459d MoveFileExA 13995 100045b0 allocator 13994->13995 13996 100045b9 CopyFileA 13995->13996 13997 100045d4 allocator 13996->13997 13998 1000e7e0 30 API calls 13997->13998 13999 100045dc 13998->13999 14020 100034ce 13999->14020 14001 100045e1 allocator 14002 1000e7e0 30 API calls 14001->14002 14003 10004602 14002->14003 14004 100034ce 30 API calls 14003->14004 14005 10004607 allocator 14004->14005 14006 1000e7e0 30 API calls 14005->14006 14007 10004626 14006->14007 14008 100034ce 30 API calls 14007->14008 14009 1000462b 14008->14009 14010 1000e4c0 2 API calls 14009->14010 14011 10004638 allocator 14010->14011 14012 10004640 LoadLibraryA 14011->14012 14013 10011354 ctype 29 API calls 14012->14013 14014 1000465c 14013->14014 14015 1000e810 29 API calls 14014->14015 14016 10004678 14015->14016 14017 1000e810 29 API calls 14016->14017 14017->13965 14019 1000e9a2 allocator 14018->14019 14019->13994 14021 1000e990 allocator 14020->14021 14022 100034db SetFileAttributesA 14021->14022 14023 1000e810 29 API calls 14022->14023 14024 100034ea 14023->14024 14024->14001 14026 10016970 14025->14026 14027 100169a6 14025->14027 14126 10016808 14026->14126 14027->13375 14030 1001698c 14033 100169a9 14030->14033 14035 10017728 _rand 5 API calls 14030->14035 14031 1001697f 14138 10016be1 RtlAllocateHeap 14031->14138 14033->13375 14034 10016989 14034->14033 14036 1001699a HeapDestroy 14034->14036 14035->14034 14036->14027 14038 10016357 14037->14038 14039 10013176 14038->14039 14040 10013264 ctype 29 API calls 14038->14040 14041 10016371 RtlDeleteCriticalSection 14038->14041 14042 1001428c 14039->14042 14040->14038 14041->14038 14192 100146a2 14042->14192 14044 10014291 14045 1001317b 14044->14045 14046 1001429b TlsFree 14044->14046 14045->13390 14046->14045 14197 10014679 RtlInitializeCriticalSection RtlInitializeCriticalSection RtlInitializeCriticalSection RtlInitializeCriticalSection 14047->14197 14049 1001423e TlsAlloc 14050 10014288 14049->14050 14051 1001424e 14049->14051 14050->13382 14052 100143c4 _rand 30 API calls 14051->14052 14053 10014257 14052->14053 14053->14050 14054 1001425f TlsSetValue 14053->14054 14054->14050 14055 10014270 _rand 14054->14055 14056 10014276 GetCurrentThreadId 14055->14056 14056->13382 14058 100169b9 14057->14058 14059 10016a1f 14057->14059 14060 10016a0b HeapFree 14058->14060 14062 100169d9 VirtualFree VirtualFree HeapFree 14058->14062 14061 10016a46 HeapDestroy 14059->14061 14063 10016a32 VirtualFree 14059->14063 14060->14061 14061->13376 14062->14060 14062->14062 14063->14059 14065 100166c4 GetEnvironmentStringsW 14064->14065 14066 100166f7 14064->14066 14067 100166d8 GetEnvironmentStrings 14065->14067 14068 100166cc 14065->14068 14066->14068 14069 100166e8 14066->14069 14067->14069 14070 1001312f 14067->14070 14071 10016710 WideCharToMultiByte 14068->14071 14072 10016704 GetEnvironmentStringsW 14068->14072 14069->14070 14073 10016796 14069->14073 14074 1001678a GetEnvironmentStrings 14069->14074 14087 10016193 14070->14087 14076 10016744 14071->14076 14077 10016776 FreeEnvironmentStringsW 14071->14077 14072->14070 14072->14071 14078 100138ce ctype 29 API calls 14073->14078 14074->14070 14074->14073 14079 100138ce ctype 29 API calls 14076->14079 14077->14070 14085 100167b1 allocator 14078->14085 14080 1001674a 14079->14080 14080->14077 14081 10016753 WideCharToMultiByte 14080->14081 14083 1001676d 14081->14083 14084 10016764 14081->14084 14082 100167c7 FreeEnvironmentStringsA 14082->14070 14083->14077 14086 10013264 ctype 29 API calls 14084->14086 14085->14082 14086->14083 14088 100138ce ctype 29 API calls 14087->14088 14089 100161a6 14088->14089 14090 100161b4 GetStartupInfoA 14089->14090 14091 10013231 _rand 7 API calls 14089->14091 14098 100162d3 14090->14098 14100 10016202 14090->14100 14091->14090 14093 1001633e SetHandleCount 14093->13393 14094 100162fe GetStdHandle 14096 1001630c GetFileType 14094->14096 14094->14098 14095 100138ce ctype 29 API calls 14095->14100 14096->14098 14097 10016279 14097->14098 14099 1001629b GetFileType 14097->14099 14098->14093 14098->14094 14099->14097 14100->14095 14100->14097 14100->14098 14102 10016473 GetModuleFileNameA 14101->14102 14103 1001646e 14101->14103 14105 10016496 14102->14105 14198 10019bb4 14103->14198 14106 100138ce ctype 29 API calls 14105->14106 14107 100164b7 14106->14107 14108 100164c7 14107->14108 14109 10013231 _rand 7 API calls 14107->14109 14108->13395 14109->14108 14111 100163b0 14110->14111 14112 100163b5 _rand 14110->14112 14113 10019bb4 48 API calls 14111->14113 14114 100138ce ctype 29 API calls 14112->14114 14113->14112 14115 100163e2 14114->14115 14116 10013231 _rand 7 API calls 14115->14116 14122 100163f6 _rand 14115->14122 14116->14122 14117 10016439 14118 10013264 ctype 29 API calls 14117->14118 14119 10016445 14118->14119 14119->13397 14120 100138ce ctype 29 API calls 14120->14122 14121 10013231 _rand 7 API calls 14121->14122 14122->14117 14122->14120 14122->14121 14124 1001279b 32 API calls 14123->14124 14125 10012797 14124->14125 14125->13378 14140 100187b0 14126->14140 14129 10016831 14130 1001684b GetEnvironmentVariableA 14129->14130 14131 10016843 14129->14131 14133 1001686a 14130->14133 14137 10016928 14130->14137 14131->14030 14131->14031 14134 100168af GetModuleFileNameA 14133->14134 14135 100168a7 14133->14135 14134->14135 14135->14137 14142 10019bd0 14135->14142 14137->14131 14145 100167db GetModuleHandleA 14137->14145 14139 10016bfd 14138->14139 14139->14034 14141 10016815 GetVersionExA 14140->14141 14141->14129 14141->14130 14147 10019be7 14142->14147 14146 100167f2 14145->14146 14146->14131 14149 10019bff 14147->14149 14148 100149a8 6 API calls 14148->14149 14149->14148 14150 10019c2f 14149->14150 14151 100149a8 6 API calls 14150->14151 14152 10019d58 14150->14152 14155 10019be3 14150->14155 14156 10012009 14150->14156 14151->14150 14154 10014226 35 API calls 14152->14154 14152->14155 14154->14155 14155->14137 14157 10012027 InterlockedIncrement 14156->14157 14158 10012014 14156->14158 14159 1001204d 14157->14159 14160 10012043 InterlockedDecrement 14157->14160 14158->14150 14167 10012078 14159->14167 14161 1001470e ctype 29 API calls 14160->14161 14161->14159 14164 10012063 14173 1001476f RtlLeaveCriticalSection 14164->14173 14165 1001206d InterlockedDecrement 14165->14158 14169 100120a3 14167->14169 14172 1001205a 14167->14172 14168 100120bf 14168->14172 14174 10014784 14168->14174 14169->14168 14170 100149a8 6 API calls 14169->14170 14170->14168 14172->14164 14172->14165 14173->14158 14175 100147b4 LCMapStringW 14174->14175 14176 100147d0 14174->14176 14175->14176 14177 100147d8 LCMapStringA 14175->14177 14179 10014836 14176->14179 14180 10014819 LCMapStringA 14176->14180 14177->14176 14178 10014912 14177->14178 14178->14172 14179->14178 14181 1001484c MultiByteToWideChar 14179->14181 14180->14178 14181->14178 14182 10014876 14181->14182 14182->14178 14183 100148ac MultiByteToWideChar 14182->14183 14183->14178 14184 100148c5 LCMapStringW 14183->14184 14184->14178 14185 100148e0 14184->14185 14186 100148e6 14185->14186 14188 10014926 14185->14188 14186->14178 14187 100148f4 LCMapStringW 14186->14187 14187->14178 14188->14178 14189 1001495e LCMapStringW 14188->14189 14189->14178 14190 10014976 WideCharToMultiByte 14189->14190 14190->14178 14194 100146af 14192->14194 14193 100146eb RtlDeleteCriticalSection RtlDeleteCriticalSection RtlDeleteCriticalSection RtlDeleteCriticalSection 14193->14044 14194->14193 14195 100146d5 RtlDeleteCriticalSection 14194->14195 14196 10013264 ctype 29 API calls 14195->14196 14196->14194 14197->14049 14199 10019bbd 14198->14199 14200 10019bc4 14198->14200 14202 100197dc 14199->14202 14200->14102 14203 1001470e ctype 29 API calls 14202->14203 14204 100197ec 14203->14204 14213 10019989 14204->14213 14208 10019981 14208->14200 14209 10019828 GetCPInfo 14212 1001983e 14209->14212 14211 10019803 14226 1001476f RtlLeaveCriticalSection 14211->14226 14212->14211 14218 10019a2f GetCPInfo 14212->14218 14214 100199a9 14213->14214 14215 10019999 GetOEMCP 14213->14215 14216 100199ae GetACP 14214->14216 14217 100197f4 14214->14217 14215->14214 14216->14217 14217->14209 14217->14211 14217->14212 14219 10019b1a 14218->14219 14222 10019a52 14218->14222 14219->14211 14227 100187df 14222->14227 14223 10014784 9 API calls 14224 10019af2 14223->14224 14225 10014784 9 API calls 14224->14225 14225->14219 14226->14208 14228 10018810 GetStringTypeW 14227->14228 14229 10018828 14227->14229 14228->14229 14230 1001882c GetStringTypeA 14228->14230 14231 10018853 GetStringTypeA 14229->14231 14234 10018877 14229->14234 14230->14229 14233 10018914 14230->14233 14231->14233 14233->14223 14234->14233 14235 1001888d MultiByteToWideChar 14234->14235 14235->14233 14236 100188b1 _rand 14235->14236 14236->14233 14237 100188eb MultiByteToWideChar 14236->14237 14237->14233 14238 10018904 GetStringTypeW 14237->14238 14238->14233 14239 1000d737 14240 1000d742 VirtualProtect VirtualProtect 14239->14240 14242 1000d7bb allocator 14240->14242 14243 1000d8ef GetModuleHandleA 14242->14243 14244 1000d961 14243->14244 14245 1000d929 14243->14245 14247 1000e7e0 30 API calls 14244->14247 14246 1000e850 30 API calls 14245->14246 14248 1000d948 14246->14248 14249 1000d973 14247->14249 14250 1000e850 30 API calls 14248->14250 14262 1000257a 14249->14262 14252 1000d957 Sleep 14250->14252 14254 1000d991 14252->14254 14257 1000e7e0 30 API calls 14254->14257 14255 1000d980 14271 100024a3 14255->14271 14256 1000d996 GetProcessHeap HeapFree 14256->14254 14259 1000d9bb 14257->14259 14260 1000d9c0 SetLastError 14259->14260 14261 1000d9d7 14260->14261 14263 10002589 14262->14263 14264 100025ee 14263->14264 14266 1000e7a0 30 API calls allocator 14263->14266 14268 100025d9 14263->14268 14282 10002069 14263->14282 14265 1000e810 29 API calls 14264->14265 14270 100025e7 14265->14270 14266->14263 14269 1000e810 29 API calls 14268->14269 14269->14270 14270->14255 14270->14256 14295 1000e510 14271->14295 14274 1000e850 30 API calls 14275 100024c9 14274->14275 14276 1000e850 30 API calls 14275->14276 14277 100024d6 14276->14277 14300 1000eb70 14277->14300 14283 10002078 14282->14283 14284 100020d8 14283->14284 14286 10012009 47 API calls 14283->14286 14285 1000210b 14284->14285 14290 100020f2 14284->14290 14287 1000e810 29 API calls 14285->14287 14286->14283 14288 10002117 14287->14288 14289 1000e810 29 API calls 14288->14289 14294 10002106 14289->14294 14291 1000e810 29 API calls 14290->14291 14292 100020fe 14291->14292 14293 1000e810 29 API calls 14292->14293 14293->14294 14294->14263 14296 1000e770 29 API calls 14295->14296 14297 1000e525 14296->14297 14298 1000e770 29 API calls 14297->14298 14299 100024b1 14298->14299 14299->14274 14301 1000eb83 allocator 14300->14301 14309 1000f760 14301->14309 14303 100024e4 14304 1000e420 14303->14304 14305 1000e810 29 API calls 14304->14305 14306 1000e432 14305->14306 14307 1000e810 29 API calls 14306->14307 14308 100024ec 14307->14308 14308->14254 14310 1000f771 14309->14310 14313 1000ff60 14310->14313 14312 1000f795 14312->14303 14314 1000ff86 14313->14314 14315 1001008b 14313->14315 14340 10010920 14314->14340 14316 100100a1 14315->14316 14317 10010117 14315->14317 14318 100108a0 30 API calls 14316->14318 14320 100108a0 30 API calls 14317->14320 14339 1001004e 14317->14339 14319 100100c0 14318->14319 14321 100108e0 30 API calls 14319->14321 14322 10010142 14320->14322 14323 100100ea 14321->14323 14359 10010d20 14322->14359 14355 10010cf0 14323->14355 14327 10010cf0 30 API calls 14327->14339 14334 100108a0 30 API calls 14335 10010012 14334->14335 14351 1000f800 14335->14351 14338 1000ff40 ctype 29 API calls 14338->14339 14339->14312 14363 10010ea0 14340->14363 14343 100108a0 14344 100108a9 14343->14344 14345 1000ffdc 14344->14345 14367 10010a70 14344->14367 14347 100108e0 14345->14347 14350 100108e9 14347->14350 14348 1000fff3 14348->14334 14349 10010a70 allocator 30 API calls 14349->14350 14350->14348 14350->14349 14352 1000f809 14351->14352 14353 1000f828 14352->14353 14379 100101a0 14352->14379 14353->14338 14356 10010cf5 14355->14356 14357 10010d14 14356->14357 14390 10010fa0 14356->14390 14357->14339 14360 10010d23 14359->14360 14361 10010161 14360->14361 14362 10010fa0 30 API calls 14360->14362 14361->14327 14362->14360 14364 10010ea9 14363->14364 14365 1001255b allocator 29 API calls 14364->14365 14366 1000ffc2 14365->14366 14366->14343 14370 10010f20 14367->14370 14371 10010f31 allocator 14370->14371 14372 10010a84 14371->14372 14374 10011080 14371->14374 14372->14344 14375 1000e7a0 allocator 30 API calls 14374->14375 14376 10011093 14375->14376 14377 1000e7a0 allocator 30 API calls 14376->14377 14378 100110a5 14377->14378 14378->14372 14382 10010d50 14379->14382 14385 10010ff0 14382->14385 14386 1000e420 29 API calls 14385->14386 14387 10010fff 14386->14387 14388 100101b0 14387->14388 14389 10011354 ctype 29 API calls 14387->14389 14388->14352 14389->14388 14391 1000e830 30 API calls 14390->14391 14392 10010fb3 14391->14392 14393 1000e830 30 API calls 14392->14393 14394 10010fc5 14393->14394 14394->14356 14395 1000afbb 14396 1000afd0 14395->14396 14397 1000afdd 14395->14397 14398 1000e810 29 API calls 14396->14398 14399 1000e770 29 API calls 14397->14399 14400 1000afd8 14398->14400 14401 1000b008 14399->14401 14402 1000e770 29 API calls 14401->14402 14403 1000b017 14402->14403 14404 1000e770 29 API calls 14403->14404 14405 1000b026 14404->14405 14406 10010b90 30 API calls 14405->14406 14407 1000b043 14406->14407 14408 1000e830 30 API calls 14407->14408 14409 1000b04f 14408->14409 14410 1000e810 29 API calls 14409->14410 14411 1000b05a allocator 14410->14411 14412 1000b069 FindFirstFileA 14411->14412 14413 1000b1f7 14412->14413 14427 1000b0bc allocator 14412->14427 14414 1000e7a0 allocator 30 API calls 14413->14414 14417 1000b205 14414->14417 14415 1000e850 30 API calls 14415->14427 14416 10010af0 30 API calls 14416->14427 14419 1000e810 29 API calls 14417->14419 14418 1000b1d2 FindNextFileA 14420 1000b1eb FindClose 14418->14420 14418->14427 14421 1000b215 14419->14421 14420->14417 14422 1000e810 29 API calls 14421->14422 14423 1000b21d 14422->14423 14424 1000e810 29 API calls 14423->14424 14425 1000b225 14424->14425 14426 1000e810 29 API calls 14425->14426 14426->14400 14427->14415 14427->14416 14427->14418 14428 1000e7e0 30 API calls 14427->14428 14429 1000e7a0 allocator 30 API calls 14427->14429 14430 10001f20 30 API calls 14427->14430 14431 10002069 47 API calls 14427->14431 14432 10010b90 30 API calls 14427->14432 14433 10010b50 30 API calls 14427->14433 14434 1000e830 30 API calls 14427->14434 14435 1000e810 29 API calls 14427->14435 14436 1000b1cb DeleteFileA 14427->14436 14428->14427 14429->14427 14430->14427 14431->14427 14432->14427 14433->14427 14434->14427 14435->14427 14436->14418 14437 1000469c LookupPrivilegeValueA 14438 10004776 14437->14438 14439 10004783 LoadLibraryA GetProcAddress AdjustTokenPrivileges GetLastError 14438->14439 14440 100021dd 14441 10001709 14440->14441 14442 100022a7 GetModuleHandleA 14441->14442 14443 100022d0 14442->14443 14444 100022ba 14442->14444 14446 100022df GetProcAddress 14443->14446 14447 100022f6 14443->14447 14445 100022c3 LoadLibraryA 14444->14445 14445->14443 14446->14447 14448 100023cd LoadLibraryA GetProcAddress 14447->14448 14449 1000249c 14448->14449 14450 100023eb allocator 14448->14450 14450->14449 14451 10002480 WriteProcessMemory 14450->14451 14451->14449

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 98 1000c855-1000c869 GetModuleFileNameA 99 1000c875-1000c8a0 call 1000e850 call 1000e830 call 10001f7a call 1000b234 98->99 100 1000c86b-1000c873 Sleep 98->100 108 1000c8a5-1000c8b8 99->108 100->98 109 1000c8c3-1000c8ca 108->109 110 1000c927-1000c92b 109->110 111 1000c8cc-1000c8e5 call 1000e950 109->111 112 1000c995-1000c9ab GetCurrentThreadId GetCurrentProcessId call 10003428 110->112 113 1000c92d-1000c990 call 1000ea70 call 1000e830 call 1000e810 call 1000e7a0 call 10001f20 call 1000e830 call 1000e810 110->113 120 1000c8f2-1000c906 call 1000e950 111->120 121 1000c8e7-1000c8f0 111->121 118 1000c9b0-1000c9b7 112->118 113->112 122 1000ca70-1000cb42 GetSystemDirectoryA call 1000e850 call 10001f7a GetWindowsDirectoryA call 1000e850 call 10001f7a GetTempPathA call 1000e850 * 2 call 1000e7a0 call 10001f20 call 10010bd0 call 1000e810 118->122 123 1000c9bd-1000ca59 call 1000e770 call 10001709 call 1000e7e0 call 100037b4 118->123 135 1000c908-1000c90b 120->135 136 1000c90e-1000c921 call 1000e950 120->136 125 1000c925 121->125 178 1000cb53-1000cba0 call 1000e7a0 call 10001f20 call 10010bd0 call 1000e810 122->178 179 1000cb44-1000cb4e call 1000e890 122->179 158 1000ca68-1000ca6b call 1000e810 123->158 159 1000ca5b-1000ca63 call 1000e810 123->159 125->109 135->136 136->125 145 1000c923 136->145 145->110 158->122 169 1000d484-1000d48a 159->169 189 1000cbb1-1000cbfe call 1000e7a0 call 10001f20 call 10010bd0 call 1000e810 178->189 190 1000cba2-1000cbac call 1000e890 178->190 179->178 200 1000cc00-1000cc0a call 1000e890 189->200 201 1000cc0f call 1000c1fc 189->201 190->189 200->201 204 1000cc14-1000ccd6 call 10001709 call 10010b90 call 1000e830 call 1000e810 call 10001709 call 10010b90 call 1000e830 call 1000e810 call 10001709 call 1000e9f0 201->204 225 1000ccdc-1000cd04 call 10001709 GetModuleHandleA 204->225 226 1000ce6f-1000cf03 call 10001709 call 10010b90 call 1000e830 call 1000e810 call 10010c20 204->226 232 1000cd20-1000cdb2 call 10001709 GetProcAddress 225->232 233 1000cd06-1000cd1a call 10001709 LoadLibraryA 225->233 250 1000cf54-1000cfe8 call 10001709 call 10010b90 call 1000e830 call 1000e810 call 10010c20 226->250 251 1000cf05-1000cf2b call 10001709 call 1000e560 226->251 232->226 240 1000cdb8-1000cdc3 232->240 233->232 240->226 242 1000cdc9-1000cdd6 240->242 242->226 244 1000cddc-1000ce69 call 10011970 WriteProcessMemory 242->244 244->226 273 1000cff1-1000d053 call 10001709 call 10010b90 call 1000e830 call 1000e810 250->273 274 1000cfea 250->274 261 1000cf32-1000cf4f call 10001709 call 1000e600 call 1000b5d0 251->261 262 1000cf2d 251->262 261->250 262->169 282 1000d058-1000d075 RtlInitializeCriticalSection * 2 call 100098d2 call 10012598 273->282 274->273 286 1000d07a-1000d07e call 10012569 282->286 288 1000d083-1000d090 call 100021cb 286->288 290 1000d095-1000d0b2 call 10001709 call 1000e9f0 288->290 295 1000d0b4 290->295 296 1000d0bb call 1000c7e2 290->296 295->296 298 1000d0c0-1000d0d8 GetModuleFileNameA 296->298 299 1000d16e-1000d175 298->299 300 1000d0de-1000d0ef call 1000e850 298->300 301 1000d177-1000d19e 299->301 302 1000d1de 299->302 306 1000d0f4-1000d109 GetShortPathNameA call 10012576 300->306 304 1000d1a0-1000d1aa 301->304 305 1000d1c1-1000d1ca 301->305 302->169 304->305 307 1000d1ac-1000d1b1 Sleep 304->307 309 1000d1dc-1000d1ed 305->309 310 1000d1cc-1000d1d1 Sleep 305->310 312 1000d10e-1000d126 306->312 311 1000d1b7-1000d1bc call 10008183 call 10007723 307->311 315 1000d221-1000d243 call 1000e7a0 call 1000afa9 Sleep call 100085a7 309->315 316 1000d1ef-1000d20e call 10001709 call 1000e560 309->316 313 1000d1d7 call 10008183 310->313 311->305 318 1000d128 call 1000b255 312->318 319 1000d12d-1000d141 call 1000e7a0 call 100041c6 312->319 313->309 339 1000d248-1000d269 call 1000e7a0 call 10008339 315->339 335 1000d210-1000d215 call 10008183 call 10007723 316->335 336 1000d21a-1000d21c call 1001276a 316->336 318->319 332 1000d146-1000d155 319->332 337 1000d157 332->337 338 1000d15c-1000d169 call 10001f7a 332->338 335->336 336->315 337->169 338->315 350 1000d276-1000d295 call 10001709 call 1000e560 339->350 351 1000d26b-1000d270 Sleep 339->351 356 1000d35b-1000d365 350->356 357 1000d29b-1000d2a4 350->357 351->350 358 1000d387-1000d3ab call 10001709 call 1000e600 356->358 359 1000d367-1000d371 call 10008183 call 10007723 call 1000c1aa 356->359 360 1000d2a6-1000d2a8 call 1001276a 357->360 361 1000d2ad-1000d2b9 Sleep 357->361 379 1000d3b7-1000d3bc call 10001684 358->379 380 1000d3ad-1000d3b2 call 1000e5d0 358->380 386 1000d376-1000d379 359->386 360->361 362 1000d2bf-1000d2ce call 100085a7 361->362 369 1000d2d0-1000d2d5 call 10008183 362->369 370 1000d2d7-1000d2f4 call 10012576 362->370 382 1000d2fb-1000d300 call 1000e4c0 369->382 370->382 383 1000d2f6 call 10008183 370->383 380->379 393 1000d305-1000d30f 382->393 383->382 390 1000d380-1000d382 call 1001276a 386->390 391 1000d37b 386->391 390->358 391->169 394 1000d311-1000d31a 393->394 395 1000d328-1000d345 call 10012576 393->395 394->395 397 1000d31c-1000d323 394->397 399 1000d356 395->399 400 1000d347 call 1000c1aa 395->400 397->169 399->169 402 1000d34c-1000d34f 400->402 402->399 403 1000d351 402->403 403->169
                                                APIs
                                                • GetModuleFileNameA.KERNELBASE(00000000,C:\Program Files\Common Files\System\symsrv.dll,00000104), ref: 1000C861
                                                • Sleep.KERNEL32(0000000A), ref: 1000C86D
                                                • GetCurrentThreadId.KERNEL32 ref: 1000C995
                                                • GetCurrentProcessId.KERNEL32 ref: 1000C9A0
                                                • GetSystemDirectoryA.KERNEL32(C:\Program Files\Common Files\System\symsrv.dll,00000104), ref: 1000CA7A
                                                • GetWindowsDirectoryA.KERNEL32(C:\Program Files\Common Files\System\symsrv.dll,00000104), ref: 1000CAA6
                                                • GetTempPathA.KERNEL32(00000104,C:\Program Files\Common Files\System\symsrv.dll,C:\Program Files\Common Files\System\symsrv.dll), ref: 1000CAD2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: CurrentDirectory$FileModuleNamePathProcessSleepSystemTempThreadWindows
                                                • String ID: '$0$C:\PROGRA~1\COMMON~1\System\symsrv.dll$C:\Program Files\Common Files\System\symsrv.dll$E$N$i$k
                                                • API String ID: 1781033083-3469198408
                                                • Opcode ID: 4f1bdc6b06ee9027aff4994ce6243d8717ec2cce636f1064e14d603884b63dba
                                                • Instruction ID: a733f807f674a3ead1363c1710542011ba7e1a2e3ca67a53d60f2b956809581b
                                                • Opcode Fuzzy Hash: 4f1bdc6b06ee9027aff4994ce6243d8717ec2cce636f1064e14d603884b63dba
                                                • Instruction Fuzzy Hash: 78526474D042C59AFB20E3B88C46BDD7B61DF26394F448298F1997B2CBDB70A9418772

                                                Control-flow Graph

                                                APIs
                                                • GetUserNameA.ADVAPI32(?,00000104), ref: 1000C313
                                                • GetModuleHandleA.KERNEL32(00000000,00000000,00000000), ref: 1000C3B1
                                                • LoadLibraryA.KERNEL32(00000000), ref: 1000C3D5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: HandleLibraryLoadModuleNameUser
                                                • String ID: $2$<$=$A$B$F$F$G$Q$Z$Z$[$]$]$]$_$`$b$b$b$e$j$k$k$|
                                                • API String ID: 2828708801-2692872198
                                                • Opcode ID: 0dfb5bdb681409ac153bad3bd0c7ea0d2243132f166f1bf51e45dded76afa326
                                                • Instruction ID: 10224049d10c4ba984f412ff21e5452163c6903c7485fc333e9c19f4ce280a82
                                                • Opcode Fuzzy Hash: 0dfb5bdb681409ac153bad3bd0c7ea0d2243132f166f1bf51e45dded76afa326
                                                • Instruction Fuzzy Hash: 0F51D360C087D9D9EB22C3BC98487CDBE755F23314F4842C9E0A86B2D2D7B94649DB76

                                                Control-flow Graph

                                                APIs
                                                • FindFirstFileA.KERNEL32(00000000,?,00000000), ref: 1000B06A
                                                • FindNextFileA.KERNEL32(?,?), ref: 1000B1DD
                                                • FindClose.KERNEL32(?), ref: 1000B1EF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Find$File$CloseFirstNext
                                                • String ID: ($7$E$X$\
                                                • API String ID: 3541575487-490530916
                                                • Opcode ID: ad34d529ce8fd2a3c06390e6bec0523498eea3e45192d3d583346b12ede68a2f
                                                • Instruction ID: 91f0a4fd0c70f6f0cae64176a13c2d9396df7fa32df48a5b0134076d7c45fd39
                                                • Opcode Fuzzy Hash: ad34d529ce8fd2a3c06390e6bec0523498eea3e45192d3d583346b12ede68a2f
                                                • Instruction Fuzzy Hash: 5261E776C14298AAFB15DBA0DC95EEE7738EF14340F4449A8F51976086EF306B48CBA1

                                                Control-flow Graph

                                                APIs
                                                • VirtualProtect.KERNELBASE(?,000000F8,00000040,?), ref: 1000D759
                                                • VirtualProtect.KERNELBASE(?,000000F8,?,?), ref: 1000D794
                                                • GetModuleHandleA.KERNEL32(00000000), ref: 1000D91E
                                                • Sleep.KERNELBASE(00000064,1002595C,?), ref: 1000D959
                                                • SetLastError.KERNEL32(00000000), ref: 1000D9C5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual$ErrorHandleLastModuleSleep
                                                • String ID:
                                                • API String ID: 789627168-0
                                                • Opcode ID: de88272510c9d8d8f67cf94dcb16393da77082f97589e9c0fc7917d1ad7932df
                                                • Instruction ID: 7bb754b7f352ebe9f7f92ee2beb9795494308d0c5fc70c108ef66ead31156f9f
                                                • Opcode Fuzzy Hash: de88272510c9d8d8f67cf94dcb16393da77082f97589e9c0fc7917d1ad7932df
                                                • Instruction Fuzzy Hash: 86A10575A00109AFEB04DF98C891EEEB7B5FF88354F148259F919AB385D730A950CBA1

                                                Control-flow Graph

                                                APIs
                                                • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 100046AE
                                                • LoadLibraryA.KERNEL32(00000000), ref: 10004787
                                                • GetProcAddress.KERNEL32(00000000), ref: 1000478E
                                                • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000), ref: 100047A7
                                                • GetLastError.KERNEL32 ref: 100047AA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: AddressAdjustErrorLastLibraryLoadLookupPrivilegePrivilegesProcTokenValue
                                                • String ID: =
                                                • API String ID: 2597230620-2322244508
                                                • Opcode ID: d92c3bc4c884d189298ce29acb1f866a8a0a45c90e38cefa8e7054883b974a3e
                                                • Instruction ID: 1d37563caeedf872c2bbec29f4a6d94c3dcff0b103c3b124c2aacc26225018e0
                                                • Opcode Fuzzy Hash: d92c3bc4c884d189298ce29acb1f866a8a0a45c90e38cefa8e7054883b974a3e
                                                • Instruction Fuzzy Hash: 6B41F9119187CA9DDB22C7BC8C48ADEBF755B6B134F0843C8E5F07A2E6D3644206C3A6

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 712 10018956-10018991 call 1001470e call 1001a52c 717 10018a94-10018a97 712->717 718 10018997-100189ad call 1001476f GetTimeZoneInformation 712->718 719 10018bd1-10018bd7 call 1001476f 717->719 720 10018a9d-10018aa4 717->720 729 100189b3-100189d6 718->729 730 10018bd8-10018bdc 718->730 719->730 723 10018ab7-10018ad9 call 10013264 call 100124e0 call 100138ce 720->723 724 10018aa6-10018ab1 call 10012960 720->724 723->719 747 10018adf-10018b0c call 10012870 call 1001476f call 100185f0 723->747 724->719 724->723 733 100189e4-100189eb 729->733 734 100189d8-100189df 729->734 735 10018a08-10018a0e 733->735 736 100189ed-100189f4 733->736 734->733 739 10018a14-10018a3e WideCharToMultiByte 735->739 736->735 738 100189f6-10018a06 736->738 738->739 741 10018a50-10018a55 739->741 742 10018a40-10018a43 739->742 746 10018a58-10018a77 WideCharToMultiByte 741->746 742->741 744 10018a45-10018a4e 742->744 744->746 748 10018bc7-10018bcf 746->748 749 10018a7d-10018a80 746->749 757 10018b16-10018b27 call 1001a4a1 747->757 758 10018b0e-10018b15 747->758 748->730 749->748 751 10018a86-10018a8f 749->751 751->730 761 10018b2d-10018b31 757->761 758->757 762 10018b33-10018b35 761->762 763 10018b3b-10018b3c 761->763 764 10018b37-10018b39 762->764 765 10018b3e-10018b41 762->765 763->761 764->763 764->765 766 10018b91-10018b95 765->766 767 10018b43-10018b56 call 1001a4a1 765->767 768 10018b97-10018b99 766->768 769 10018b9f-10018ba9 766->769 774 10018b5c-10018b60 767->774 768->769 769->748 771 10018bab-10018bc5 call 100185f0 769->771 771->730 776 10018b62-10018b64 774->776 777 10018b69-10018b6c 774->777 776->777 778 10018b66-10018b67 776->778 777->766 779 10018b6e-10018b7e call 1001a4a1 777->779 778->774 782 10018b84-10018b88 779->782 782->766 783 10018b8a-10018b8c 782->783 783->766 784 10018b8e-10018b8f 783->784 784->782
                                                APIs
                                                  • Part of subcall function 1001470E: RtlInitializeCriticalSection.NTDLL(00000000), ref: 1001474B
                                                  • Part of subcall function 1001470E: RtlEnterCriticalSection.NTDLL(10011E5A), ref: 10014766
                                                  • Part of subcall function 1001476F: RtlLeaveCriticalSection.NTDLL ref: 1001477C
                                                • GetTimeZoneInformation.KERNELBASE(0000000C,?,?,?,0000000B,0000000B,?,10018947,10014AF4,?,?,?,?,10012666,?,?), ref: 100189A4
                                                • WideCharToMultiByte.KERNEL32(00000220,Eastern Standard Time,000000FF,0000003F,00000000,?,?,10018947,10014AF4,?,?,?,?,10012666,?,?), ref: 10018A3A
                                                • WideCharToMultiByte.KERNEL32(00000220,Eastern Summer Time,000000FF,0000003F,00000000,?,?,10018947,10014AF4,?,?,?,?,10012666,?,?), ref: 10018A73
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: CriticalSection$ByteCharMultiWide$EnterInformationInitializeLeaveTimeZone
                                                • String ID: Eastern Standard Time$Eastern Summer Time
                                                • API String ID: 3442286286-239921721
                                                • Opcode ID: a6ae5782dddeabc4c60a0d9b4630bda052b470c4a8dc841844afe3ef80610f6a
                                                • Instruction ID: 72ab1e9aa48903f52e9c1a6c876504514b9565d80192bcb08feff608f09bf5b7
                                                • Opcode Fuzzy Hash: a6ae5782dddeabc4c60a0d9b4630bda052b470c4a8dc841844afe3ef80610f6a
                                                • Instruction Fuzzy Hash: D2618FB19083A09FE711CB68CCC1A697FEAFB02254F72052AF4859B1A2D771DBC2C755

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 785 406050-406081 GetLocaleInfoA 788 406087-40608b 785->788 789 40616a-406171 785->789 790 406097-4060ad 788->790 791 40608d-406091 788->791 793 4060b0-4060b3 790->793 791->789 791->790 794 4060b5-4060bd 793->794 795 4060bf-4060c7 793->795 794->795 796 4060af 794->796 795->789 797 4060cd-4060d2 795->797 796->793 798 4060d4-4060fa 797->798 799 4060fc-4060fe 797->799 798->799 799->789 800 406100-406104 799->800 800->789 801 406106-406136 LoadLibraryExA 800->801 801->789 805 406138-406168 LoadLibraryExA 801->805 805->789
                                                APIs
                                                • GetLocaleInfoA.KERNELBASE(00000000), ref: 00406073
                                                • LoadLibraryExA.KERNELBASE(00000000,00000000,00000002), ref: 0040612D
                                                • LoadLibraryExA.KERNELBASE(00000000,00000000,00000002), ref: 00406163
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: LibraryLoad$InfoLocale
                                                • String ID: .
                                                • API String ID: 4237408684-248832578
                                                • Opcode ID: aed9d4decfd67b3f8e087d36bc5631469c1971adc071affd3ba93eb20d7079be
                                                • Instruction ID: d5961b152249e163c8a4aefe5a3d4337f74588dd9b2580b06351314193e505ed
                                                • Opcode Fuzzy Hash: aed9d4decfd67b3f8e087d36bc5631469c1971adc071affd3ba93eb20d7079be
                                                • Instruction Fuzzy Hash: C6319375E0025D6AFB26D6B88C46FDF7BAC8B04344F0541F7B605F61C2EA788E848B54

                                                Control-flow Graph

                                                APIs
                                                • GetModuleHandleA.KERNEL32(00000000), ref: 100022AB
                                                • LoadLibraryA.KERNELBASE(00000000), ref: 100022C7
                                                • GetProcAddress.KERNELBASE(?,00000000), ref: 100022E7
                                                • LoadLibraryA.KERNEL32(00000000,00000000), ref: 100023D1
                                                • GetProcAddress.KERNEL32(00000000), ref: 100023D8
                                                • WriteProcessMemory.KERNELBASE(000000FF,?,?,00000005,?), ref: 10002496
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc$HandleMemoryModuleProcessWrite
                                                • String ID: $"$"$"$"$"$#$$$%$%$%$)$)$)$*$*$-$/$/$4$8$8$9$:$<$<$>$>$?$?$@$A$I$J$J$L$N$N$P$Q$U$U$U$U$\$]$`$a$c$c$d$d$f$g$g$g$g$g$g$j$l$l$l$m$n$p$v$v$z${
                                                • API String ID: 2057502401-2508479926
                                                • Opcode ID: c1014eec9416fa3c2b52ba93eff12223e773908593d619bc2bae335d97a14e42
                                                • Instruction ID: 4e0abb666f08f4022c9a6e8e0e86adbd2890ae4587ce7265ef776366e2200a0a
                                                • Opcode Fuzzy Hash: c1014eec9416fa3c2b52ba93eff12223e773908593d619bc2bae335d97a14e42
                                                • Instruction Fuzzy Hash: BCB1F660C083C8DEEB12C7E8D4587DEBFB55F26308F184199D1847B287C7BA5649CB66

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 29 100098e5-10009a56 GetCurrentProcess OpenProcessToken call 10001709 call 1000468d CloseHandle call 10001709 GetModuleHandleA 36 10009a71-10009a78 29->36 37 10009a58-10009a6b call 10001709 LoadLibraryA 29->37 38 10009aba-10009b54 call 10001709 GetModuleHandleA 36->38 39 10009a7a-10009aa4 call 10001709 GetProcAddress 36->39 37->36 47 10009b72-10009b79 38->47 48 10009b56-10009b6c call 10001709 LoadLibraryA 38->48 39->38 46 10009aa6-10009ab2 call 10001944 39->46 54 10009ab7 46->54 51 10009db7-10009dcb call 10008da2 47->51 52 10009b7f-10009c2e call 10001709 GetProcAddress 47->52 48->47 60 10009dd9-10009e39 call 10001709 call 1000e9f0 51->60 61 10009dcd-10009dd2 call 10001a33 51->61 52->51 59 10009c34-10009c62 52->59 54->38 59->51 65 10009c68-10009c7e 59->65 77 10009e42-10009ee2 call 10001709 GetProcAddress 60->77 78 10009e3b-10009e3d call 1001276a 60->78 61->60 68 10009c84-10009c98 65->68 69 10009d3e-10009d51 65->69 68->69 71 10009c9e-10009cb1 68->71 72 10009db2 69->72 73 10009d53-10009d6a 69->73 71->69 75 10009cb7-10009cce 71->75 72->51 73->72 76 10009d6c-10009d83 73->76 75->69 79 10009cd0-10009ce6 75->79 76->72 80 10009d85-10009d99 76->80 86 10009ee8-10009ef6 77->86 87 10009f8e-10009f90 call 10008962 77->87 78->77 79->69 83 10009ce8-10009d3c WriteProcessMemory 79->83 80->72 84 10009d9b-10009dae 80->84 83->51 84->72 88 10009db0 84->88 86->87 89 10009efc-10009f88 call 10011970 WriteProcessMemory 86->89 92 10009f95-10009f9f 87->92 88->51 89->87 94 10009fa1-10009fa6 call 10001a33 92->94 95 10009fad-10009fb3 92->95 94->95
                                                APIs
                                                • GetCurrentProcess.KERNEL32(00000020,?), ref: 100098EE
                                                • OpenProcessToken.ADVAPI32(00000000), ref: 100098F5
                                                • CloseHandle.KERNEL32(?), ref: 10009974
                                                • GetModuleHandleA.KERNEL32(00000000), ref: 10009A43
                                                • LoadLibraryA.KERNEL32(00000000), ref: 10009A65
                                                • GetProcAddress.KERNEL32(?,00000000), ref: 10009A91
                                                • GetModuleHandleA.KERNEL32(00000000), ref: 10009B41
                                                • LoadLibraryA.KERNELBASE(00000000), ref: 10009B66
                                                • GetProcAddress.KERNEL32(?,00000000), ref: 10009C1B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Handle$AddressLibraryLoadModuleProcProcess$CloseCurrentOpenToken
                                                • String ID: *$*$+$+$+$-$-$3$5$6$7$7$8$8$:$<$<$<$<$D$K$Y$]$^$`$d$d$f$f$h$l$l$l$n$q$s$z$z$|$}
                                                • API String ID: 2911793071-3312574243
                                                • Opcode ID: 3c663efaba5962c88d892cbffeed0b1b32bac1979cbb8ae8162b76b0a0623c58
                                                • Instruction ID: 7d7937479aa8ab84115c2a0502d8e9b3c77517eda7480cd020832e116561bcce
                                                • Opcode Fuzzy Hash: 3c663efaba5962c88d892cbffeed0b1b32bac1979cbb8ae8162b76b0a0623c58
                                                • Instruction Fuzzy Hash: C9225260D083D9CDEB21C7788C48BDDBFB15F26224F0883D9D1A96B2D6D3754A85CB62

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 423 10009c4c-10009c62 425 10009db7-10009dcb call 10008da2 423->425 426 10009c68-10009c7e 423->426 434 10009dd9-10009e39 call 10001709 call 1000e9f0 425->434 435 10009dcd-10009dd2 call 10001a33 425->435 428 10009c84-10009c98 426->428 429 10009d3e-10009d51 426->429 428->429 431 10009c9e-10009cb1 428->431 432 10009db2 429->432 433 10009d53-10009d6a 429->433 431->429 436 10009cb7-10009cce 431->436 432->425 433->432 437 10009d6c-10009d83 433->437 449 10009e42-10009ee2 call 10001709 GetProcAddress 434->449 450 10009e3b-10009e3d call 1001276a 434->450 435->434 436->429 439 10009cd0-10009ce6 436->439 437->432 441 10009d85-10009d99 437->441 439->429 443 10009ce8-10009d3c WriteProcessMemory 439->443 441->432 445 10009d9b-10009dae 441->445 443->425 445->432 447 10009db0 445->447 447->425 454 10009ee8-10009ef6 449->454 455 10009f8e-10009f9f call 10008962 449->455 450->449 454->455 456 10009efc-10009f88 call 10011970 WriteProcessMemory 454->456 461 10009fa1-10009fa6 call 10001a33 455->461 462 10009fad-10009fb3 455->462 456->455 461->462
                                                APIs
                                                • WriteProcessMemory.KERNEL32(000000FF,?,00000033,00000005,?), ref: 10009D36
                                                • GetProcAddress.KERNEL32(774B0000,00000000), ref: 10009EC2
                                                • WriteProcessMemory.KERNEL32(000000FF,?,?,00000005,?), ref: 10009F88
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite$AddressProc
                                                • String ID: *$*$+$+$+$-$-$3$5$6$7$7$8$8$:$<$<$<$<$Y$d
                                                • API String ID: 1576538433-890581407
                                                • Opcode ID: cf9e8e39d8329feb2e8cc34bd602e6bc8fb5d931548e7ed7a7cb2c0e7a67ab56
                                                • Instruction ID: 5fd1f56bfbb58330aa1018ac920baed12bdd2403633b8cc0c362beed382b6541
                                                • Opcode Fuzzy Hash: cf9e8e39d8329feb2e8cc34bd602e6bc8fb5d931548e7ed7a7cb2c0e7a67ab56
                                                • Instruction Fuzzy Hash: 1191D730D082D9DEEB21C768C844BDDBFB19F16354F4882D9D1997B2C2D3754A45CB62

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 539 1001b44d-1001b47e 540 1001b4c0-1001b4c5 539->540 541 1001b480-1001b493 CompareStringW 539->541 544 1001b4d7-1001b4da 540->544 545 1001b4c7-1001b4d4 call 1001b6ca 540->545 542 1001b495-1001b49b 541->542 543 1001b49d-1001b4b0 CompareStringA 541->543 542->540 546 1001b6b6 543->546 547 1001b4b6 543->547 549 1001b4ec-1001b4f4 544->549 550 1001b4dc-1001b4e9 call 1001b6ca 544->550 545->544 552 1001b6b8-1001b6c9 546->552 547->540 554 1001b511-1001b513 549->554 555 1001b4f6-1001b50c CompareStringA 549->555 550->549 554->546 556 1001b519-1001b51c 554->556 555->552 558 1001b526-1001b528 556->558 559 1001b51e-1001b523 556->559 560 1001b533-1001b536 558->560 561 1001b52a-1001b52d 558->561 559->558 563 1001b540-1001b543 560->563 564 1001b538 560->564 561->560 562 1001b5cb-1001b5e1 MultiByteToWideChar 561->562 562->546 568 1001b5e7-1001b61d call 100187b0 562->568 566 1001b545-1001b547 563->566 567 1001b54c-1001b54e 563->567 565 1001b53a-1001b53b 564->565 565->552 566->552 569 1001b591-1001b593 567->569 570 1001b550-1001b55f GetCPInfo 567->570 568->546 577 1001b623-1001b63b MultiByteToWideChar 568->577 569->565 570->546 572 1001b565-1001b567 570->572 575 1001b595-1001b598 572->575 576 1001b569-1001b56d 572->576 575->562 578 1001b59a-1001b59e 575->578 576->569 579 1001b56f-1001b575 576->579 577->546 580 1001b63d-1001b653 MultiByteToWideChar 577->580 578->566 581 1001b5a0-1001b5a6 578->581 579->569 582 1001b577-1001b57c 579->582 580->546 584 1001b655-1001b687 call 100187b0 580->584 581->566 585 1001b5a8-1001b5ad 581->585 582->569 583 1001b57e-1001b585 582->583 586 1001b587-1001b589 583->586 587 1001b58b-1001b58f 583->587 584->546 595 1001b689-1001b69e MultiByteToWideChar 584->595 585->566 589 1001b5af-1001b5b6 585->589 586->564 586->587 587->569 587->582 591 1001b5c0-1001b5c4 589->591 592 1001b5b8-1001b5ba 589->592 591->585 594 1001b5c6 591->594 592->564 592->591 594->566 595->546 596 1001b6a0-1001b6b4 CompareStringW 595->596 596->552
                                                APIs
                                                • CompareStringW.KERNEL32(00000000,00000000,1001C384,00000001,1001C384,00000001,00000000,0068118C,10014AF4,0000000C,?,?,?,0000000B,0000000B), ref: 1001B48B
                                                • CompareStringA.KERNEL32(00000000,00000000,1001C380,00000001,1001C380,00000001,?,10018947), ref: 1001B4A8
                                                • CompareStringA.KERNEL32(?,?,00000000,10018947,?,0000000B,00000000,0068118C,10014AF4,0000000C,?,?,?,0000000B,0000000B), ref: 1001B506
                                                • GetCPInfo.KERNEL32(0000000B,00000000,00000000,0068118C,10014AF4,0000000C,?,?,?,0000000B,0000000B,?,10018947), ref: 1001B557
                                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,0000000B,00000000,00000000,?,10018947), ref: 1001B5D6
                                                • MultiByteToWideChar.KERNEL32(?,00000001,00000000,0000000B,?,?,?,10018947), ref: 1001B637
                                                • MultiByteToWideChar.KERNEL32(00000000,00000009,?,00000000,00000000,00000000,?,10018947), ref: 1001B64A
                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,?,00000000,?,10018947), ref: 1001B696
                                                • CompareStringW.KERNEL32(?,?,00000000,00000000,?,00000000,?,00000000,?,10018947), ref: 1001B6AE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: ByteCharCompareMultiStringWide$Info
                                                • String ID:
                                                • API String ID: 1651298574-0
                                                • Opcode ID: 146c12c68f6d2c960b9ee43d01a89832004135fe910e0164c3854f899a4b7fb0
                                                • Instruction ID: 1f765cab58222e79d966b81d0bde82bf4c8a1c0bbe4d60f552caf681d713b902
                                                • Opcode Fuzzy Hash: 146c12c68f6d2c960b9ee43d01a89832004135fe910e0164c3854f899a4b7fb0
                                                • Instruction Fuzzy Hash: CF71AF71A00A9AEFDF21CF908C85ADE7FBAEB05384F11412AF950AA160D335DD91DB90

                                                Control-flow Graph

                                                APIs
                                                • Sleep.KERNELBASE(00001388), ref: 1000DB32
                                                • EnumWindows.USER32(Function_0000D9F6,00001E5C), ref: 1000DB80
                                                • IsBadWritePtr.KERNEL32(00000000,00000001), ref: 1000DC20
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: EnumSleepWindowsWrite
                                                • String ID: }
                                                • API String ID: 1646427702-4239843852
                                                • Opcode ID: 45e349d6bfc97253593caa86f7035e6b763d2f6482b559f54145bc8ebd1f5f9b
                                                • Instruction ID: bd095a3c4a1ad5d1e619146e2f16f3011249ac1a2abf0d68d606d93722cf1396
                                                • Opcode Fuzzy Hash: 45e349d6bfc97253593caa86f7035e6b763d2f6482b559f54145bc8ebd1f5f9b
                                                • Instruction Fuzzy Hash: 3B412375A042459AFB00FBA8CC86FEE3774EF44381F448529F406B62D6DB71A804CBB5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 701 100169ad-100169b7 702 100169b9-100169c9 701->702 703 10016a1f-10016a22 701->703 704 10016a0b-10016a1d HeapFree 702->704 705 100169cb-100169d6 702->705 706 10016a24-10016a29 703->706 707 10016a46-10016a54 HeapDestroy 703->707 704->707 708 100169d9-10016a09 VirtualFree * 2 HeapFree 705->708 709 10016a2b-10016a30 706->709 708->704 708->708 710 10016a40-10016a44 709->710 711 10016a32-10016a3a VirtualFree 709->711 710->707 710->709 711->710
                                                APIs
                                                • VirtualFree.KERNEL32(0000000C,00100000,00004000,?,?,?,?,10013180,100131D4,?,?,?), ref: 100169E5
                                                • VirtualFree.KERNEL32(0000000C,00000000,00008000,?,?,?,?,10013180,100131D4,?,?,?), ref: 100169F0
                                                • HeapFree.KERNEL32(00000000,?,?,?,?,?,10013180,100131D4,?,?,?), ref: 100169FD
                                                • HeapFree.KERNEL32(00000000,?,?,?,?,10013180,100131D4,?,?,?), ref: 10016A19
                                                • VirtualFree.KERNEL32(FFFFFFFF,00000000,00008000,?,?,10013180,100131D4,?,?,?), ref: 10016A3A
                                                • HeapDestroy.KERNELBASE(?,?,10013180,100131D4,?,?,?), ref: 10016A4C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Free$HeapVirtual$Destroy
                                                • String ID:
                                                • API String ID: 716807051-0
                                                • Opcode ID: a8ef3d0b687a4371e74b7a30ffd01a8a9c2997e16e07f86ca4cf120adce3355b
                                                • Instruction ID: 32430127ef2a12ce82ab4650aea6dd4bbe8663c0aee62abd58dfd68e7977107f
                                                • Opcode Fuzzy Hash: a8ef3d0b687a4371e74b7a30ffd01a8a9c2997e16e07f86ca4cf120adce3355b
                                                • Instruction Fuzzy Hash: 4911AD31280265ABE661EF10CEC5F05B7A5EB48761F768024F642BB0A1C772FC82CF48

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 807 1002df80-1002df85 808 1002e144 807->808 809 1002df8b-1002df9b 807->809 808->808 810 1002dfaa-1002dfaf 809->810 811 1002dfb1 810->811 812 1002dfb3 811->812 813 1002dfa0-1002dfa5 811->813 814 1002dfb8-1002dfba 812->814 815 1002dfa6-1002dfa8 813->815 816 1002dfc3-1002dfc7 814->816 817 1002dfbc-1002dfc1 814->817 815->810 815->811 816->814 818 1002dfc9 816->818 817->816 819 1002dfd4-1002dfd9 818->819 820 1002dfcb-1002dfd2 818->820 821 1002dfdb-1002dfe4 819->821 822 1002dfe8-1002dfea 819->822 820->814 820->819 823 1002dfe6 821->823 824 1002e05a-1002e05d 821->824 825 1002dff3-1002dff7 822->825 826 1002dfec-1002dff1 822->826 823->822 827 1002e062-1002e065 824->827 828 1002e000-1002e002 825->828 829 1002dff9-1002dffe 825->829 826->825 830 1002e067-1002e069 827->830 831 1002e024-1002e033 828->831 832 1002e004 828->832 829->828 830->827 835 1002e06b-1002e06e 830->835 833 1002e044-1002e051 831->833 834 1002e035-1002e03c 831->834 836 1002e005-1002e007 832->836 833->833 840 1002e053-1002e055 833->840 834->834 839 1002e03e 834->839 835->827 841 1002e070-1002e08c 835->841 837 1002e010-1002e014 836->837 838 1002e009-1002e00e 836->838 837->836 842 1002e016 837->842 838->837 839->815 840->815 841->830 843 1002e08e 841->843 845 1002e021 842->845 846 1002e018-1002e01f 842->846 844 1002e094-1002e098 843->844 847 1002e0d6-1002e0d9 844->847 848 1002e09a-1002e0b0 LoadLibraryA 844->848 845->831 846->836 846->845 850 1002e0dc-1002e0e3 847->850 849 1002e0b1-1002e0b6 848->849 849->844 851 1002e0b8-1002e0c7 GetProcAddress 849->851 852 1002e107-1002e137 VirtualProtect * 2 850->852 853 1002e0e5-1002e0e7 850->853 854 1002e0d0-1002e0d3 851->854 855 1002e0c9-1002e0ce 851->855 858 1002e13b-1002e13f 852->858 856 1002e0fa-1002e105 853->856 857 1002e0e9-1002e0f8 853->857 855->849 856->857 857->850 858->858 859 1002e141 858->859 859->808
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 924f5878d330e6ae71c2633518a33a6ec05d637f4d63d454074fd01cf40d346c
                                                • Instruction ID: eed6df2236576beabf2c7d52bd3b6cb6e2f7a67aa77d779b0fbfd08cb0478442
                                                • Opcode Fuzzy Hash: 924f5878d330e6ae71c2633518a33a6ec05d637f4d63d454074fd01cf40d346c
                                                • Instruction Fuzzy Hash: 6D513571A842D24BD710EA78ECC4794BBD0EB45364BA90739D9E6CB3C6E7E45C468360

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 860 483364-4833c0 call 4069e4 call 406b6c 866 4833c5-4833cf GetLastError 860->866 867 4833d1-4833e0 call 483030 866->867 868 4833e5-4833ed 866->868 875 4834af-4834cc 867->875 872 48344b-483450 868->872 873 4833ef-483449 call 408da4 868->873 872->875 873->872 888 483452-4834a3 873->888 888->875
                                                APIs
                                                  • Part of subcall function 004069E4: GetModuleHandleA.KERNEL32(00000000,?,0048337F), ref: 004069F0
                                                  • Part of subcall function 00406B6C: CreateMutexA.KERNEL32(?,?,?,?,004833C5,00000000,000000FF,FSFocus), ref: 00406B82
                                                • GetLastError.KERNEL32(00000000,000000FF,FSFocus), ref: 004833C5
                                                  • Part of subcall function 00483030: FindWindowA.USER32(FastStoneScreenFocusPanel,00000000), ref: 00483065
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: CreateErrorFindHandleLastModuleMutexWindow
                                                • String ID: FSFocus$FSQuitNow$Screen Focus
                                                • API String ID: 4003053590-3403729768
                                                • Opcode ID: 0b469434849ab8f021ceb396ac2d7fbd6134b4e47b4bacd9e40a932e0b826fad
                                                • Instruction ID: b98a893a2d5c0dc265f364808c145081ca19208f5c959136749e89e239dbfa26
                                                • Opcode Fuzzy Hash: 0b469434849ab8f021ceb396ac2d7fbd6134b4e47b4bacd9e40a932e0b826fad
                                                • Instruction Fuzzy Hash: 2F31BF706042018FD701FF65C88296E77A4EB89B19B51497BF914D73E2EE389A04CB6E
                                                APIs
                                                • GetLocalTime.KERNEL32(?), ref: 100125A5
                                                • GetSystemTime.KERNEL32(?), ref: 100125AF
                                                • GetTimeZoneInformation.KERNELBASE(?), ref: 10012604
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Time$InformationLocalSystemZone
                                                • String ID:
                                                • API String ID: 2475273158-0
                                                • Opcode ID: 3e1ca9ace8f0922f5f16b5d304d6fc68c37fa7b30300a325030dfed90a2fc59a
                                                • Instruction ID: ac16bf9539afbedd2c5e5af88f7939321bc5791ed11b9dbcd7e1e6b9e2384753
                                                • Opcode Fuzzy Hash: 3e1ca9ace8f0922f5f16b5d304d6fc68c37fa7b30300a325030dfed90a2fc59a
                                                • Instruction Fuzzy Hash: E62162B980141AE9DB11EB98C984AFEB3F9FB09761F900101F921AA1D0E375CDD2D774
                                                APIs
                                                • GetFileSize.KERNEL32(000000FF,00000000,00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 1000420C
                                                • ReadFile.KERNELBASE(000000FF,00000000,?,?,00000000), ref: 10004245
                                                • CloseHandle.KERNEL32(000000FF), ref: 1000424F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: File$CloseHandleReadSize
                                                • String ID:
                                                • API String ID: 3642004256-0
                                                • Opcode ID: 385a44d6ba7514c4266fc13b8da5f4ee3dd73cf86c0f12b003f9c06b97154f09
                                                • Instruction ID: 3b2cce6aa4bc0e1df35e5fc4b422913606dacb86dc9628502f3f091f081f667c
                                                • Opcode Fuzzy Hash: 385a44d6ba7514c4266fc13b8da5f4ee3dd73cf86c0f12b003f9c06b97154f09
                                                • Instruction Fuzzy Hash: EE1121B9E00208EBDB04DF98CC86FDE7B79EF48750F104558F605A7284DB71AA41CBA1
                                                APIs
                                                • TlsGetValue.KERNEL32 ref: 10011DFF
                                                • TlsSetValue.KERNEL32(?), ref: 10011E2D
                                                  • Part of subcall function 10014324: TlsGetValue.KERNEL32(FFFFFFFF,00000000,10011EC4,00000000,?,10011E5A), ref: 1001433C
                                                  • Part of subcall function 10014324: TlsSetValue.KERNEL32(00000000,00000000,10011EC4,00000000,?,10011E5A), ref: 100143BC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Value
                                                • String ID: Y6
                                                • API String ID: 3702945584-770635656
                                                • Opcode ID: 6b1c1ecef028cbef58cf321e3a47119cf15ae2dbd1553cea674b2e1b5e2399de
                                                • Instruction ID: a894eb4b2a1526ab7af96094cbfdb570735578eee3b6b7a34983b6b6d128135a
                                                • Opcode Fuzzy Hash: 6b1c1ecef028cbef58cf321e3a47119cf15ae2dbd1553cea674b2e1b5e2399de
                                                • Instruction Fuzzy Hash: 0311C272500625EFD714DFA9CC45F9A7BF8FB04760F108529F9119B6A0DB35ED80CA94
                                                APIs
                                                  • Part of subcall function 100143C4: RtlAllocateHeap.NTDLL(00000008,10011E5A,00000000), ref: 100144BA
                                                • CreateThread.KERNELBASE(00000000,00000004,Function_00011DD3,00000000,00000004,00000000), ref: 10011D94
                                                • ResumeThread.KERNELBASE(00000000,?,?,1000E3DE,Function_0000C842,00000000,00000000), ref: 10011DA4
                                                • GetLastError.KERNEL32(?,?,1000E3DE,Function_0000C842,00000000,00000000), ref: 10011DAF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Thread$AllocateCreateErrorHeapLastResume
                                                • String ID:
                                                • API String ID: 1716352560-0
                                                • Opcode ID: 4a693c1a7c0130d8256d54b02b3a0db4a5b2461d7771a31befb7a034707c6015
                                                • Instruction ID: 6b40658bdb990657c0e624a7753350b0d9b8fe889fb6d86fda8b0815184f8898
                                                • Opcode Fuzzy Hash: 4a693c1a7c0130d8256d54b02b3a0db4a5b2461d7771a31befb7a034707c6015
                                                • Instruction Fuzzy Hash: FA01D63A5057206BD224DB3ABC44D9B7AE5DFC6670F12061DFA64DB2D0CF70D8818691
                                                APIs
                                                • WriteProcessMemory.KERNELBASE(000000FF,0000008B,?,00000005,?), ref: 10001A26
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID: U
                                                • API String ID: 3559483778-3372436214
                                                • Opcode ID: 95bcbcd445a861993f6133570b15523b5340e37b7dc674ea86adea5778b856c8
                                                • Instruction ID: d8bb290e16210fd3f6e19a525eeec851f8e0a4be218f06497376150335ff61ed
                                                • Opcode Fuzzy Hash: 95bcbcd445a861993f6133570b15523b5340e37b7dc674ea86adea5778b856c8
                                                • Instruction Fuzzy Hash: 72312675A04189AFDB00CBB8D8A5BEFBFB1EF0A360F548398E5659B2C5D7309640C791
                                                APIs
                                                • HeapCreate.KERNELBASE(00000000,00001000,00000000,100130DA,00000001), ref: 10016961
                                                  • Part of subcall function 10016808: GetVersionExA.KERNEL32 ref: 10016827
                                                • HeapDestroy.KERNEL32 ref: 100169A0
                                                  • Part of subcall function 10016BE1: RtlAllocateHeap.NTDLL(00000000,00000140,10016989), ref: 10016BEE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Heap$AllocateCreateDestroyVersion
                                                • String ID:
                                                • API String ID: 760317429-0
                                                • Opcode ID: d57b725f33a924c1015ce50ccdf05509821a3f6b87ac5c3d16db616949c7e180
                                                • Instruction ID: bdbd41b82c7ac91006049f6af939f6a340871bdd2ff2836b0351b3e30c2b98b1
                                                • Opcode Fuzzy Hash: d57b725f33a924c1015ce50ccdf05509821a3f6b87ac5c3d16db616949c7e180
                                                • Instruction Fuzzy Hash: 16F06D74664312ABFB519B708EC6B5936DCEB48792F314829F801CD0A5EB71D5C1D602
                                                APIs
                                                • CreateFileA.KERNELBASE(?,?,?,?,?,?,?), ref: 100016E2
                                                • RtlLeaveCriticalSection.NTDLL(10021420), ref: 100016F7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: CreateCriticalFileLeaveSection
                                                • String ID:
                                                • API String ID: 241413389-0
                                                • Opcode ID: 78e251c624cdf51bf2bdc9fcb5406858180ed0e91f405c9448da0aacb1f6967f
                                                • Instruction ID: a9e70f15d98e270bbb7fe75853633fd90720edd09bc5374121c6fc5a0956b38e
                                                • Opcode Fuzzy Hash: 78e251c624cdf51bf2bdc9fcb5406858180ed0e91f405c9448da0aacb1f6967f
                                                • Instruction Fuzzy Hash: E1F0D476640148EBDB00CF98EC88EDA7BE8EB9D301F148149FA09D3351D739E959CBA4
                                                APIs
                                                • EnumWindows.USER32(Function_000032C5,00001E5C), ref: 100085E4
                                                • Sleep.KERNELBASE(00000064), ref: 100085EC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: EnumSleepWindows
                                                • String ID:
                                                • API String ID: 498413330-0
                                                • Opcode ID: 3dc0e4d5e070a7a70453f0807675e30ef6759b51afd3c0b37bfd59074e937e50
                                                • Instruction ID: 0bc78a7fa69e3e467ad7f653599aa045c5a3ab046108907200b6942465f154de
                                                • Opcode Fuzzy Hash: 3dc0e4d5e070a7a70453f0807675e30ef6759b51afd3c0b37bfd59074e937e50
                                                • Instruction Fuzzy Hash: 63E022316042C49FE300DBA4CE4456E7BB4FB8328772181BADA85CB216D631CE05DB25
                                                APIs
                                                • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 10001D00
                                                • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 10001D1A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: MemoryProcessProtectVirtualWrite
                                                • String ID:
                                                • API String ID: 214326562-0
                                                • Opcode ID: 53b8d29059f3c53da0740756323cb53de5d3c03976e2e2d845130a82039365a9
                                                • Instruction ID: 90996afca376c582a65bd943481bd12db638c31c0766fa15e59b2c7a81935a7a
                                                • Opcode Fuzzy Hash: 53b8d29059f3c53da0740756323cb53de5d3c03976e2e2d845130a82039365a9
                                                • Instruction Fuzzy Hash: C6E07EBA240109BBDB04DF99E894DEB77A9FB8D221F108259FA19D7250C631E9118BA0
                                                APIs
                                                • RtlAllocateHeap.NTDLL(00000000,-0000000F,00000000), ref: 100139F3
                                                  • Part of subcall function 1001470E: RtlInitializeCriticalSection.NTDLL(00000000), ref: 1001474B
                                                  • Part of subcall function 1001470E: RtlEnterCriticalSection.NTDLL(10011E5A), ref: 10014766
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: CriticalSection$AllocateEnterHeapInitialize
                                                • String ID:
                                                • API String ID: 1616793339-0
                                                • Opcode ID: 65b8887dd7ce0afcce7474163219d1aa0826ff1a6789e0b51af4cd8c498a35f5
                                                • Instruction ID: 6876498b62955bb29e28edacedd82be48d713326a8307753d163bd518600bc88
                                                • Opcode Fuzzy Hash: 65b8887dd7ce0afcce7474163219d1aa0826ff1a6789e0b51af4cd8c498a35f5
                                                • Instruction Fuzzy Hash: 7B21C832A04215ABDB00DFA5DC82B8EB7A8FB01764F218525F861EF1D1C7B4E9C18B94
                                                APIs
                                                • GetFileAttributesA.KERNELBASE(00000000,00000000), ref: 100083A3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: AttributesFile
                                                • String ID:
                                                • API String ID: 3188754299-0
                                                • Opcode ID: d5daecca44004ef12fd6d9ef0c0880db4f131a5b247fff9b342e9f43078ecc74
                                                • Instruction ID: 6f94ab387ec959997d3855d9bc9298f8262591e4f15be920aad47798307c6f30
                                                • Opcode Fuzzy Hash: d5daecca44004ef12fd6d9ef0c0880db4f131a5b247fff9b342e9f43078ecc74
                                                • Instruction Fuzzy Hash: 8C11E635C042C999EB01D7B8DC959EEBB38DF21350F00CA98E465360D6DF346B06C7A1
                                                APIs
                                                • CreateWindowExA.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 00407759
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: 0a9f5100fc918968e01ce87abca33f99820cddca8862cc32bc6a170c84909b0b
                                                • Instruction ID: 5c1343b9f7c50fd4d1f4b6af425b026c83073c7ee43b4003069ba5d46ce7d63d
                                                • Opcode Fuzzy Hash: 0a9f5100fc918968e01ce87abca33f99820cddca8862cc32bc6a170c84909b0b
                                                • Instruction Fuzzy Hash: A0E0FEB2204209BFEB00DE8ADCC1DABB7ACFB4C654F804115BB1C97242D275AD608B71
                                                APIs
                                                • CreateWindowExA.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 00407759
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: 776143f7715d542f9dbac4eb9774147f02f5dda3c42c994d9bc7221095acc648
                                                • Instruction ID: dd2f81adcbd704d1fa72263cc1433ce0b9390083bc081abfe4ae1f3a173ab130
                                                • Opcode Fuzzy Hash: 776143f7715d542f9dbac4eb9774147f02f5dda3c42c994d9bc7221095acc648
                                                • Instruction Fuzzy Hash: 9EE002B2204309BFEB00DE8ADCC1DABB7ACFB4C654F804105BB1C972429275BD608B71
                                                APIs
                                                • CreateMutexA.KERNEL32(?,?,?,?,004833C5,00000000,000000FF,FSFocus), ref: 00406B82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: CreateMutex
                                                • String ID:
                                                • API String ID: 1964310414-0
                                                • Opcode ID: 21e0619b74412fae9514185c35c6bd95fbb7b52f213a822672066e7264c0ded7
                                                • Instruction ID: 10e0cef987d71490a28e34074a8695c6cb9ac52d543c3eee2fc8a7d14aa20fed
                                                • Opcode Fuzzy Hash: 21e0619b74412fae9514185c35c6bd95fbb7b52f213a822672066e7264c0ded7
                                                • Instruction Fuzzy Hash: 5BC01273550348ABC700EEB9CC05D9B33DC5718609B04C425B519C7100C13DE5508B64
                                                APIs
                                                  • Part of subcall function 100146A2: RtlDeleteCriticalSection.NTDLL(00000000), ref: 100146D6
                                                  • Part of subcall function 100146A2: RtlDeleteCriticalSection.NTDLL(?), ref: 100146F1
                                                  • Part of subcall function 100146A2: RtlDeleteCriticalSection.NTDLL ref: 100146F9
                                                  • Part of subcall function 100146A2: RtlDeleteCriticalSection.NTDLL ref: 10014701
                                                  • Part of subcall function 100146A2: RtlDeleteCriticalSection.NTDLL ref: 10014709
                                                • TlsFree.KERNELBASE(FFFFFFFF,1001317B,100131D4,?,?,?), ref: 1001429C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: CriticalDeleteSection$Free
                                                • String ID:
                                                • API String ID: 1584690612-0
                                                • Opcode ID: a74f767b184570ca40bb88cf255787fb85a01160242663b9f46070779e8f5448
                                                • Instruction ID: 0bc67f5c26d48e8e3b49aebb244aaf441ed27bead98c9941f436497231dd84b6
                                                • Opcode Fuzzy Hash: a74f767b184570ca40bb88cf255787fb85a01160242663b9f46070779e8f5448
                                                • Instruction Fuzzy Hash: 6EC04C385405A15AF50097358C8A40C36A5B7463343E14B00F5B6D71F1DF35E8838640
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: +$+$-$-$0$0$0$0$0$1$1$9$9$9$9$9$9$C$E$c$e
                                                • API String ID: 0-1157002505
                                                • Opcode ID: 02c3caaac3c92d81e763761eb11773d502a5f362e8cef113d214514b31a5d748
                                                • Instruction ID: 1151663046375f0bd72665096eb55200e10bb20f319d8389160cc346b3c20120
                                                • Opcode Fuzzy Hash: 02c3caaac3c92d81e763761eb11773d502a5f362e8cef113d214514b31a5d748
                                                • Instruction Fuzzy Hash: 8CE1DE31D4829ACEEB25CBA4C9817EDBBF2EF06391F644016D801AF192D778D9C1DB51
                                                APIs
                                                • InitializeSecurityDescriptor.ADVAPI32(?,00000001), ref: 1000E635
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,00000000,00000000), ref: 1000E645
                                                • CreateFileMappingA.KERNEL32(000000FF,0000000C,00000004,00000000,0000000C,?), ref: 1000E65D
                                                • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000), ref: 1000E679
                                                • InitializeSecurityDescriptor.ADVAPI32(?,00000001), ref: 1000E6C9
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,00000000,00000000), ref: 1000E6D9
                                                • UnmapViewOfFile.KERNEL32(?), ref: 1000E6E6
                                                • CreateFileMappingA.KERNEL32(000000FF,0000000C,00000004,00000000,?,00000000), ref: 1000E6FE
                                                • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000), ref: 1000E71A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: File$DescriptorSecurity$View$CreateDaclInitializeMapping$Unmap
                                                • String ID:
                                                • API String ID: 2976166598-0
                                                • Opcode ID: f12682f1efea132ace4a08111bff6bcb4100753d33b8be5f90b0e0aa8278098a
                                                • Instruction ID: d80dcd57228ff9489ba574671cb5d72d9d387f93bd786646ed1c1ec871a04610
                                                • Opcode Fuzzy Hash: f12682f1efea132ace4a08111bff6bcb4100753d33b8be5f90b0e0aa8278098a
                                                • Instruction Fuzzy Hash: BD41A079A40208EBEB14CF94C985F9DB7B5EB48714F208549EA15AB281C7B1AA42CB54
                                                APIs
                                                • GetDriveTypeA.KERNEL32(00000000,?), ref: 100077C9
                                                • FindFirstFileA.KERNEL32(00000000,?,0000002A,?,00000000,00000000), ref: 1000783C
                                                • FindClose.KERNEL32(000000FF), ref: 1000784F
                                                • SetErrorMode.KERNEL32(00008003), ref: 1000788A
                                                • _rand.LIBCMT ref: 100078A0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Find$CloseDriveErrorFileFirstModeType_rand
                                                • String ID: z
                                                • API String ID: 1985845384-1657960367
                                                • Opcode ID: 08bf31815ac2e9826e0790b2dfe7cfebb163826cd52d1fec506ecf311d19cd9b
                                                • Instruction ID: 1702e389a595363f7e77714cb365bb6fb82423c9edef5d24fac9a96a4de05a7f
                                                • Opcode Fuzzy Hash: 08bf31815ac2e9826e0790b2dfe7cfebb163826cd52d1fec506ecf311d19cd9b
                                                • Instruction Fuzzy Hash: B151AC75D041589BEB14EBA0DC96ADD7374FF08380F1088A9E41AB7196EF35AE44CBA1
                                                APIs
                                                • GetDriveTypeA.KERNEL32(00000000,?), ref: 10008493
                                                • FindFirstFileA.KERNEL32(00000000,?,0000002A,?,00000000,00000000), ref: 10008506
                                                • FindClose.KERNEL32(000000FF), ref: 10008519
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Find$CloseDriveFileFirstType
                                                • String ID: z
                                                • API String ID: 1265060940-1657960367
                                                • Opcode ID: 3e22c44693aa2dd86ddb1620ab672697263d0526e67f5394c0f725933d6d4254
                                                • Instruction ID: 2f7907a1dd21136cec039dc86337fc36dfa9d4f331b8e4b8f0617d5f268f2e15
                                                • Opcode Fuzzy Hash: 3e22c44693aa2dd86ddb1620ab672697263d0526e67f5394c0f725933d6d4254
                                                • Instruction Fuzzy Hash: 39418C76C10159ABEB04EBA0EC91AEEB778FF04380F508959E45A77199EF306F44CB91
                                                APIs
                                                • FindFirstFileA.KERNEL32(00000000,?,0000002A,?,?,?,?,?,?,00000001,?), ref: 10006749
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 100069A8
                                                • FindClose.KERNEL32(000000FF), ref: 100069BA
                                                • GetTickCount.KERNEL32 ref: 10006B4E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Find$File$CloseCountFirstNextTick
                                                • String ID:
                                                • API String ID: 1235538443-0
                                                • Opcode ID: 629ca1a912482b7b1786a38ec84271b8db7efbb429891b7987317043b7735b5c
                                                • Instruction ID: 3f32b28ad389ff5f4a89660a98533d0622329e44ff147a94ff582a6079f94869
                                                • Opcode Fuzzy Hash: 629ca1a912482b7b1786a38ec84271b8db7efbb429891b7987317043b7735b5c
                                                • Instruction Fuzzy Hash: 3B026775C101999AFB14EBA0CC92EED7778EF14380F5048A9E4097709AEF357E89CB61
                                                APIs
                                                • FindFirstFileA.KERNEL32(00000000,?,0000002A,?,?,?,?,?,?,00000001,?), ref: 10006174
                                                • FindNextFileA.KERNEL32(000000FF,?), ref: 100063D3
                                                • FindClose.KERNEL32(000000FF,?,?), ref: 100063E5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Find$File$CloseFirstNext
                                                • String ID:
                                                • API String ID: 3541575487-0
                                                • Opcode ID: 0595b5e666b05330276af15fa0a8dee4885658fe47077d74699f6994bc2ede05
                                                • Instruction ID: c794df64d86015f92d61ac747eb0828bc0ae87cf9b6233a5be2aeae37ea1312a
                                                • Opcode Fuzzy Hash: 0595b5e666b05330276af15fa0a8dee4885658fe47077d74699f6994bc2ede05
                                                • Instruction Fuzzy Hash: 4FE1A4758142999AFB14EBA0CC92DED7778EF14380F5048A9F4067709AEF307E89CB61
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32(00000008,?), ref: 1000798C
                                                • Module32First.KERNEL32(000000FF,00000224), ref: 100079DC
                                                • Module32Next.KERNEL32(?,?), ref: 10007AF1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Module32$CreateFirstNextSnapshotToolhelp32
                                                • String ID:
                                                • API String ID: 3702378198-0
                                                • Opcode ID: 5fbb554c9afe30d57229345c5d634db22eb16a9c270f58801ec610c4d54cc545
                                                • Instruction ID: 5c8bc627f96ea7ae32483b8212d146e4c73b4b086cee794b2d4e36ce44408996
                                                • Opcode Fuzzy Hash: 5fbb554c9afe30d57229345c5d634db22eb16a9c270f58801ec610c4d54cc545
                                                • Instruction Fuzzy Hash: 7D71C376D011549AFB24EB64CC46BEE73B4FF44380F5049E9E40DA218AEF35AF448B52
                                                APIs
                                                • FindFirstFileA.KERNEL32(00000000), ref: 00408F73
                                                • FindClose.KERNEL32(00000000,00000000), ref: 00408F7E
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00408F97
                                                • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 00408FA8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: FileTime$Find$CloseDateFirstLocal
                                                • String ID:
                                                • API String ID: 2659516521-0
                                                • Opcode ID: 2a3b8a708d3ee5bb83b022e150c25873814ee872db9c5a27df9b0c703696359f
                                                • Instruction ID: a69bb797b09d6502853dc52a00d293f1bb6eaee65df40a2cd5fc7594c1a6da3c
                                                • Opcode Fuzzy Hash: 2a3b8a708d3ee5bb83b022e150c25873814ee872db9c5a27df9b0c703696359f
                                                • Instruction Fuzzy Hash: 39F0ECB290021CA6CB10EAE58D85ACFB3BC5B45324F5006BBB569F21D2EB39AB544B54
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(Function_00017DF5), ref: 10017E40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: c569d3c020144b871088230af9e94d2e91b7433bf872932a80fd5e8bb619b43e
                                                • Instruction ID: c02097a40a87b29e4e2698d4c43607d8a69446dd7d27b78697932df694000373
                                                • Opcode Fuzzy Hash: c569d3c020144b871088230af9e94d2e91b7433bf872932a80fd5e8bb619b43e
                                                • Instruction Fuzzy Hash: 8EA022B00002388BFB008F308CC88003A30FB02223B30000CFB2B80228CB30C0C28E00
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 10017E52
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: a7b67f61ca3d209bdfb73f2036888beb0adc4db11d7805f53fb53d5d41f9821b
                                                • Instruction ID: d91e04de4154f9aa53e37bed44e58d41ebb069b1f44d79994f4cf31f0f072eac
                                                • Opcode Fuzzy Hash: a7b67f61ca3d209bdfb73f2036888beb0adc4db11d7805f53fb53d5d41f9821b
                                                • Instruction Fuzzy Hash:
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
                                                • Instruction ID: 47d46cdca21bb5d075aabbafd900a2f731485a37008bf14c38e3e398d20af243
                                                • Opcode Fuzzy Hash: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
                                                • Instruction Fuzzy Hash: FAB15A3590064A9FDB15CF08C5D0A98BBF2FB48358F25819DD90A5F392D731EA86CB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e65a41849ba1dff17564a555de7faa284a3be694d3db7f60d411abc468340149
                                                • Instruction ID: 7792282e75a1af133dd375dae3b182fee8b30d43b289de230fac5753d8ce34cd
                                                • Opcode Fuzzy Hash: e65a41849ba1dff17564a555de7faa284a3be694d3db7f60d411abc468340149
                                                • Instruction Fuzzy Hash: 76113DF760018247D794CA69D4B02BBA3DAEFC52607FD827AD0428F254D672D9E58502
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 513abba944a6704ba96046797d2ca8b674e185bfdc8e44f0bff91194aff11df4
                                                • Instruction ID: f6b481a4330650b55a3c66bcc2282b7ef7fbec61ad93bbe0eca31214826b80fe
                                                • Opcode Fuzzy Hash: 513abba944a6704ba96046797d2ca8b674e185bfdc8e44f0bff91194aff11df4
                                                • Instruction Fuzzy Hash:
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e04e6d1d4b5fa03757e4f5fd44c8a52fde6cb8f8d8db54abf43b958a5f92554a
                                                • Instruction ID: 88784f5078c2631f061ba3e7bedd5c0b667efe7ce51ac804275c8b81a5e5a29e
                                                • Opcode Fuzzy Hash: e04e6d1d4b5fa03757e4f5fd44c8a52fde6cb8f8d8db54abf43b958a5f92554a
                                                • Instruction Fuzzy Hash:
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 24542dfc314b9ce201237aa137af3c4ec3adf7c99a688794abf8e79bb88e6456
                                                • Instruction ID: 06a5b63d2aa0240abf9938974b3832a831a89302596b008f7c5ae1d3ab3c5d52
                                                • Opcode Fuzzy Hash: 24542dfc314b9ce201237aa137af3c4ec3adf7c99a688794abf8e79bb88e6456
                                                • Instruction Fuzzy Hash:
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c72ce178160ebff565d734ed4456d783b6eb63050c4fc46844c843551e4d155b
                                                • Instruction ID: 9a8733431a16fb51ea847228a2ad478304c93ad08a3d2f017486dbf9d9cfb1d6
                                                • Opcode Fuzzy Hash: c72ce178160ebff565d734ed4456d783b6eb63050c4fc46844c843551e4d155b
                                                • Instruction Fuzzy Hash:
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cff0e13bbdb64392c44ae99d64693b57b1ee51eb4591f86bd93de0be90c30feb
                                                • Instruction ID: 57b3d0b1ce7f4e4e815a6d0a4dbb296904f3ce9e1177829c1eafc01fb081bcb4
                                                • Opcode Fuzzy Hash: cff0e13bbdb64392c44ae99d64693b57b1ee51eb4591f86bd93de0be90c30feb
                                                • Instruction Fuzzy Hash:
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c34b950086b863648969448265815386960dd3fe9602b64ed7689d24cf8851ee
                                                • Instruction ID: c7fda2fdc208d4249dae4d2089c2792b1f27b8c3772d2eba6b0b5c2dcefcc1b1
                                                • Opcode Fuzzy Hash: c34b950086b863648969448265815386960dd3fe9602b64ed7689d24cf8851ee
                                                • Instruction Fuzzy Hash:
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 42a477201cb35d04e638189247212ca949ee49a5600206acd2e1d5ccf787d419
                                                • Instruction ID: 200264b61f2cb464ed1d4d491cbb42a9a3d257d8e0e1818ca8a1f3853d7320e4
                                                • Opcode Fuzzy Hash: 42a477201cb35d04e638189247212ca949ee49a5600206acd2e1d5ccf787d419
                                                • Instruction Fuzzy Hash:
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8f1f3704861c6b89405fc67d7b250e19e41bd47e1fb1055f3b083a17747df7ae
                                                • Instruction ID: 99dc444df88c35d30f42f3621fe0381e7d7b32666ca6e6f144d2d004b374cb08
                                                • Opcode Fuzzy Hash: 8f1f3704861c6b89405fc67d7b250e19e41bd47e1fb1055f3b083a17747df7ae
                                                • Instruction Fuzzy Hash:
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 479cd0fd67c0cb8450aee28bc7ad59f868df35d48cf09a943289ca252f3537ef
                                                • Instruction ID: a52261933bcb20fa8f81388f402c651fdda3ccd1e9420f88302b0ade4d47ec9a
                                                • Opcode Fuzzy Hash: 479cd0fd67c0cb8450aee28bc7ad59f868df35d48cf09a943289ca252f3537ef
                                                • Instruction Fuzzy Hash:
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c4044781f96c27733fa505e3a412f32c5a8609047184a4b0509a5ceeed5de11b
                                                • Instruction ID: 27beef34a3f813a31b48f356e3fa70e160ee7bc64abe10ca4eb239830420ab49
                                                • Opcode Fuzzy Hash: c4044781f96c27733fa505e3a412f32c5a8609047184a4b0509a5ceeed5de11b
                                                • Instruction Fuzzy Hash:
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bffc1c7798dcda639e7e28170b4033f71cebe151a5cb95b6eaff02d11f3852ad
                                                • Instruction ID: 6b2e58c861650b41210681ab189fdc4d6865c85e23d40d6b2823cbda0107df9a
                                                • Opcode Fuzzy Hash: bffc1c7798dcda639e7e28170b4033f71cebe151a5cb95b6eaff02d11f3852ad
                                                • Instruction Fuzzy Hash:
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a4996a81f5e63e4312c2d3e8dd9ac88ac69993b12e4ab715772a90f756dd1962
                                                • Instruction ID: e0cad26c11644657dc6c620dec55ea3936f483d286ada863ac0396425938823c
                                                • Opcode Fuzzy Hash: a4996a81f5e63e4312c2d3e8dd9ac88ac69993b12e4ab715772a90f756dd1962
                                                • Instruction Fuzzy Hash:
                                                APIs
                                                • GetFileAttributesA.KERNEL32(00000000), ref: 1000738E
                                                • Sleep.KERNEL32(0000003C), ref: 100073A4
                                                • SetFileAttributesA.KERNEL32(00000000,00000007), ref: 100073BF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: AttributesFile$Sleep
                                                • String ID: "$"$'$($($($)$+$+$.$/$/$0$4$4$7$<$@$@$B$D$D$D$E$E$F$G$G$G$I$I$J$L$M$M$M$P$Q$Q$X$X$Z$[$a$a$a$a$a$b$b$c$e$h$h$h$i$k$k$l$n$o$s$t$t$u$u$x$y$z$}$~
                                                • API String ID: 3637897523-1094257450
                                                • Opcode ID: 3bae2ad89de1e6fde6f341a39782d41b075a69fbe6cd56f798c530bf5ccf55c2
                                                • Instruction ID: 075c273ffff61ae4cb6696391920be94bb349695b8b234a1009d2e6a093629ea
                                                • Opcode Fuzzy Hash: 3bae2ad89de1e6fde6f341a39782d41b075a69fbe6cd56f798c530bf5ccf55c2
                                                • Instruction Fuzzy Hash: 28121E51C083D9C9EB22C3B88C497DEBF745B22314F0846D9E1993A2D7DBB55A48CB72
                                                APIs
                                                • GetModuleHandleA.KERNEL32(00000000), ref: 10003AD5
                                                • LoadLibraryA.KERNEL32(00000000), ref: 10003AF7
                                                • GetProcAddress.KERNEL32(?,00000000), ref: 10003B41
                                                • GetProcAddress.KERNEL32(?,00000000), ref: 10003B9E
                                                • GetProcAddress.KERNEL32(?,00000000), ref: 10003E5D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: AddressProc$HandleLibraryLoadModule
                                                • String ID: %$,$4$7$8$@$@$@$I$K$K$K$Q$Q$R$R$S$U$W$W$Y$Z$\$a$c$d$g$g$h$i$j$l$n$n$p$t$t$t$u$u$v$v$v$v$v${$}$}$}$~$~
                                                • API String ID: 384173800-4112467968
                                                • Opcode ID: 348e69799074d46e567ea8e3e3605243c458405470cb24f2c652e6dbb5d650ee
                                                • Instruction ID: c73f02275797b288a3dba8e9e5f8f61b8e1867e1f75f96d7c7aef259adbbbf6e
                                                • Opcode Fuzzy Hash: 348e69799074d46e567ea8e3e3605243c458405470cb24f2c652e6dbb5d650ee
                                                • Instruction Fuzzy Hash: EAF13690C087D9C9EB21C7788C487CEBF745F16358F0841D8D29C662D2D7B95A89CB6A
                                                APIs
                                                • RemoveDirectoryA.KERNEL32(00000000), ref: 10003549
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: DirectoryRemove
                                                • String ID: %$'$'$'$'$'$($($($)$0$1$1$1$<$>$>$>$>$>$O$T$V$X$b$b$c$c$d$d$f$j$r$s$u$z$z${${${$}$}
                                                • API String ID: 597925465-1573442331
                                                • Opcode ID: 07d9973b8181c083f464c5b9cd82a09bc44ed53e9ea09fc40759ee2d3a68e603
                                                • Instruction ID: 8511aa442a6f71641b444ada92ce6f0bc022d9d497a1deddc61b231c94919a10
                                                • Opcode Fuzzy Hash: 07d9973b8181c083f464c5b9cd82a09bc44ed53e9ea09fc40759ee2d3a68e603
                                                • Instruction Fuzzy Hash: 9E918234C082C8D9FB02D7B4C859BDEBF789F21384F448498E4497A1D6DBBA6649C772
                                                APIs
                                                • IsBadReadPtr.KERNEL32(00000000,00000001), ref: 1000DE08
                                                • DisableThreadLibraryCalls.KERNEL32(?), ref: 1000DE32
                                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1000DE52
                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1000DE66
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: CallsDirectoryDisableFileLibraryModuleNameReadSystemThread
                                                • String ID: #$#$'$($($)$-$2$7$8$>$>$>$>$E$E$F$F$N$P$P$P$U$Y$[$[$e$h$k$l$l$q$u$z$z$z
                                                • API String ID: 3981859294-3918468125
                                                • Opcode ID: 7141d3d1507d067a0c928fefa00816f564826cd1996f8eeb76695807d09bf90a
                                                • Instruction ID: 622606248922636cb9dcec4c54b25f8917374ab843a5ef39112fbbb93fef9a86
                                                • Opcode Fuzzy Hash: 7141d3d1507d067a0c928fefa00816f564826cd1996f8eeb76695807d09bf90a
                                                • Instruction Fuzzy Hash: 2E024161C087E98ADB32C7788C497CEBF745B26314F0842D8E09C6A2D2D7755BC9CB62
                                                APIs
                                                • RegOpenKeyExA.ADVAPI32(80000002,00000000), ref: 1000B2B2
                                                • RegQueryValueExA.ADVAPI32(?,00000000), ref: 1000B35F
                                                • RegSetValueExA.ADVAPI32(?,00000000,00000000), ref: 1000B3E2
                                                • RegSetValueExA.ADVAPI32(?,00000000), ref: 1000B4A9
                                                • RegSetValueExA.ADVAPI32(?,00000000), ref: 1000B5AF
                                                • RegCloseKey.ADVAPI32(?), ref: 1000B5BC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Value$CloseOpenQuery
                                                • String ID: $%$%$%$&$'$'$'$($+$+$+$,$,$-$0$1$2$2$3$6$6$7$B$C:\PROGRA~1\COMMON~1\System\symsrv.dll$K$i
                                                • API String ID: 237177642-2208146747
                                                • Opcode ID: 07dd20263758b53605061da9e8644a32bbc1c200b7d51e5380c7c905e5ac8bf6
                                                • Instruction ID: d7ffd36e3fc649d87268a548135784987c6f1deef2e906aa5cff512d09507537
                                                • Opcode Fuzzy Hash: 07dd20263758b53605061da9e8644a32bbc1c200b7d51e5380c7c905e5ac8bf6
                                                • Instruction Fuzzy Hash: 3AA146708087ECD9EB36C6288C497CDBF745B16318F0441C8E29C6A2D2D7B54B85CF66
                                                APIs
                                                • GetProcAddress.KERNEL32(774B0000,00000000), ref: 1000C43B
                                                • GetProcAddress.KERNEL32(774B0000,00000000), ref: 1000C4F0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: AddressProc
                                                • String ID: %$8$?$I$I$M$V$c$c$e$h$h$i$i$n$n$o$o$p$r$s$t$t$u$u$v$x$x$x$|$~
                                                • API String ID: 190572456-3762297867
                                                • Opcode ID: 7dfb619f267f275168528171f402fbe1169908cbf31e02c37dbb2435c866621e
                                                • Instruction ID: 07a796bec1b5bb6dfccb493179a8595110490467b2e30aa6663b5b61b00816a5
                                                • Opcode Fuzzy Hash: 7dfb619f267f275168528171f402fbe1169908cbf31e02c37dbb2435c866621e
                                                • Instruction Fuzzy Hash: 19517760D0C6D8CDFB12C6688C597CEBEB11B27348F4841C8D18C7A292C7BB1689CB76
                                                APIs
                                                • GetModuleHandleA.KERNEL32(00000000), ref: 10001A68
                                                • LoadLibraryA.KERNEL32(00000000), ref: 10001A85
                                                • GetProcAddress.KERNEL32(?,00000000), ref: 10001AEB
                                                • WriteProcessMemory.KERNEL32(000000FF,00000000,00000033,00000005,?), ref: 10001B1E
                                                • GetProcAddress.KERNEL32(?,00000000), ref: 10001B81
                                                • WriteProcessMemory.KERNEL32(000000FF,00000000,00000033,00000005,?), ref: 10001BB4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: AddressMemoryProcProcessWrite$HandleLibraryLoadModule
                                                • String ID: $3$3$4$4$A$C$E$E$E$E$I$R$R$T$V$a$c$m$s
                                                • API String ID: 756567434-2756889688
                                                • Opcode ID: 2cfb8028a8d18eeeecad93b1b11854b2ac8ec88e3b213fc01f2c2c404b980732
                                                • Instruction ID: cfe7ae8f554539807d6733649d24731fd10262907a3c8d5ef0d048077f1ef90e
                                                • Opcode Fuzzy Hash: 2cfb8028a8d18eeeecad93b1b11854b2ac8ec88e3b213fc01f2c2c404b980732
                                                • Instruction Fuzzy Hash: DE510A60C087C9DAEB12C7FC9848BCEBFB45B26328F084348E1A47B2D6D3A94545C776
                                                APIs
                                                • FindResourceA.KERNEL32(?,00000001), ref: 1000897D
                                                • SizeofResource.KERNEL32(?,00000000), ref: 100089A4
                                                • LoadResource.KERNEL32(?,00000000), ref: 100089B8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Resource$FindLoadSizeof
                                                • String ID: "$%$<$A$E$Q$S$W$\$`$b$d$f$h$j$l$q$s$w$x${$|
                                                • API String ID: 507330600-1845518766
                                                • Opcode ID: 2a584a685d93ad1d8ed408115ea3aca1dd9cb96f47de5b84e233e59b92b93ded
                                                • Instruction ID: 697e40266fc9f2c134aad7ecdc35b070e79b0050cc1a4af9ee0ce26bd25e8e04
                                                • Opcode Fuzzy Hash: 2a584a685d93ad1d8ed408115ea3aca1dd9cb96f47de5b84e233e59b92b93ded
                                                • Instruction Fuzzy Hash: E9D16360C083C8DAEB21C7B8D844BDEBFB46F26354F184299E1987B2C7D7755648CB62
                                                APIs
                                                • GetProcAddress.KERNEL32(?,00000000), ref: 10001C16
                                                • WriteProcessMemory.KERNEL32(000000FF,00000000,00000033,00000005,?), ref: 10001C49
                                                • GetProcAddress.KERNEL32(?,00000000), ref: 10001CA4
                                                • WriteProcessMemory.KERNEL32(000000FF,00000000,00000033,00000005,?), ref: 10001CD7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: AddressMemoryProcProcessWrite
                                                • String ID: +$/$3$3$7$A$S$]$`$b$d$q$w$w$w$x${$|
                                                • API String ID: 3726410293-4123826176
                                                • Opcode ID: 138b313170caafbb0e5bbff21f197047dfb917f338a9fa1fdbd4be83995fdd27
                                                • Instruction ID: ad40b51b2249856820d58b7b37f1b5c2a2dd8c700d89039e6ecb3d97efc0ca23
                                                • Opcode Fuzzy Hash: 138b313170caafbb0e5bbff21f197047dfb917f338a9fa1fdbd4be83995fdd27
                                                • Instruction Fuzzy Hash: E041EE60D082CCD9EB12C7F8C448BDDBFB45B26358F18818DD1A56B2C6D3BA5609CB62
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: "$"$#$#$&$($+$+$-$8$8$8$D$j
                                                • API String ID: 0-723407705
                                                • Opcode ID: 2a082d9862e438165487024fa66b0e872b735e1ec01fd07440f40a93dfcf4318
                                                • Instruction ID: dde778835347eb008614cc527c638594fb2a8506f378ed4326422950a8d5d15e
                                                • Opcode Fuzzy Hash: 2a082d9862e438165487024fa66b0e872b735e1ec01fd07440f40a93dfcf4318
                                                • Instruction Fuzzy Hash: 22C1E3B5C002889BEB14D7E4CC45BEEBB78EF14340F044598E5097B286EF756A49CBA2
                                                APIs
                                                • GetFileTime.KERNEL32(000000FF,?,?,?,00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,?,00000000), ref: 1000AAEF
                                                • CloseHandle.KERNEL32(000000FF,?,?,?,00000000,?,?,?,?), ref: 1000AAF9
                                                • WriteFile.KERNEL32(000000FF,00000004,0000002A,?,00000000,00000000,40000000,00000000,00000000,00000002,00000000,00000000), ref: 1000AB51
                                                • SetFileTime.KERNEL32(000000FF,?,?,?), ref: 1000AB6A
                                                • CloseHandle.KERNEL32(000000FF), ref: 1000AB74
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: File$CloseHandleTime$Write
                                                • String ID: *$5$`$e$p
                                                • API String ID: 364540719-3005180831
                                                • Opcode ID: aa66145bfa2c0681ed919668a74ad22571c6e6ea153da5e3c2ba92a24b35d1d2
                                                • Instruction ID: 9ac8e5729ac0f084531a52e1b8c0c23e53f35f4596b280bb9a3513ac92dead5e
                                                • Opcode Fuzzy Hash: aa66145bfa2c0681ed919668a74ad22571c6e6ea153da5e3c2ba92a24b35d1d2
                                                • Instruction Fuzzy Hash: A3A152759002489AFB15EBA4CC96FEE7B3CEF14340F408958F51A76196EF30AA45CBA1
                                                APIs
                                                • GetModuleHandleA.KERNEL32(00000000), ref: 10003FB1
                                                • LoadLibraryA.KERNEL32(00000000), ref: 10003FCD
                                                • GetProcAddress.KERNEL32(?,00000000), ref: 10003FE7
                                                • GetCurrentThreadId.KERNEL32 ref: 10003FF0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: AddressCurrentHandleLibraryLoadModuleProcThread
                                                • String ID: <$b$s$u$u$x$x$y
                                                • API String ID: 1227477173-1608725744
                                                • Opcode ID: 3e7a82787ced7735ce029ed9a461b4b2b3090f4cbb6649259c4ba20726064426
                                                • Instruction ID: 33ff40ab1d131e30287cb64b03bcfa2079c32daa297a7db5e7cafda79f5c2fcc
                                                • Opcode Fuzzy Hash: 3e7a82787ced7735ce029ed9a461b4b2b3090f4cbb6649259c4ba20726064426
                                                • Instruction Fuzzy Hash: CB41A761C083C999EB11CBF8C849BEEBF749F1A254F044698E5A4B72C2D7795205C7B2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $!
                                                • API String ID: 0-2056089098
                                                • Opcode ID: b326289dc89059ba0ea4d12b0711c03597ab740b3afaef9a58047e8eb829b844
                                                • Instruction ID: 38a493ceaeaaf12bd6114039ea703b71470109976f11036ac34955238d57f70a
                                                • Opcode Fuzzy Hash: b326289dc89059ba0ea4d12b0711c03597ab740b3afaef9a58047e8eb829b844
                                                • Instruction Fuzzy Hash: E62248B4D001589BEB28CB68CC95BDDB7B2EF48340F1481D9E50DAB246DB31AE85CF65
                                                APIs
                                                • FindWindowA.USER32(MouseZ,Magellan MSWHEEL), ref: 0040777C
                                                • RegisterClipboardFormatA.USER32(MSWHEEL_ROLLMSG), ref: 00407788
                                                • RegisterClipboardFormatA.USER32(MSH_WHEELSUPPORT_MSG), ref: 00407797
                                                • RegisterClipboardFormatA.USER32(MSH_SCROLL_LINES_MSG), ref: 004077A3
                                                • SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004077BB
                                                • SendMessageA.USER32(00000000,?,00000000,00000000), ref: 004077DF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: ClipboardFormatRegister$MessageSend$FindWindow
                                                • String ID: MSH_SCROLL_LINES_MSG$MSH_WHEELSUPPORT_MSG$MSWHEEL_ROLLMSG$Magellan MSWHEEL$MouseZ
                                                • API String ID: 1416857345-3736581797
                                                • Opcode ID: 46a9f3e509111ab9809b85df57fcccb564169654f5328c36d85b0e8ae301a41f
                                                • Instruction ID: ba8f654debf8eb3512711421a0d23636ef6fb32deafc715d0e5f331a0b1b8180
                                                • Opcode Fuzzy Hash: 46a9f3e509111ab9809b85df57fcccb564169654f5328c36d85b0e8ae301a41f
                                                • Instruction Fuzzy Hash: F4112471A48341AFE710AF55CC81F66BB98EF44750F20847AB9446B3C1D6B87C40CBAA
                                                APIs
                                                • GetFileAttributesA.KERNEL32(00000000), ref: 1000A5CC
                                                • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 1000A5E4
                                                • GetTickCount.KERNEL32 ref: 1000A693
                                                • WriteFile.KERNEL32(000000FF,?,?,00000000,00000000), ref: 1000A708
                                                • CloseHandle.KERNEL32(000000FF), ref: 1000A712
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,1002174C,00000104), ref: 1000A78A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: File$AttributesByteCharCloseCountCreateDirectoryHandleMultiTickWideWrite
                                                • String ID:
                                                • API String ID: 2963317036-0
                                                • Opcode ID: 11b363bedbc0463798f619ac318b01a144feb87d1ddd9a4ae8ad973868246fe8
                                                • Instruction ID: 6622efe6a7c4ef8df84fe9feeecbc3f3fe37281f61cb7300f0988ebd6e412655
                                                • Opcode Fuzzy Hash: 11b363bedbc0463798f619ac318b01a144feb87d1ddd9a4ae8ad973868246fe8
                                                • Instruction Fuzzy Hash: B7E10475D102489AFB10DBA4CC46FED7779EF54380F4486A8F109771C6EB74AA85CB22
                                                APIs
                                                • OpenProcess.KERNEL32(001F0FFF,00000000,00000000), ref: 10007DFD
                                                • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000040), ref: 10007E8D
                                                • CloseHandle.KERNEL32(00000000), ref: 10007FEE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: AllocCloseHandleOpenProcessVirtual
                                                • String ID: h$h$h$j$j
                                                • API String ID: 754910816-3342286319
                                                • Opcode ID: 913cfa3d866773e2a2ed193946acc47d92da95edee84c7a04ca9d3a50713b3e4
                                                • Instruction ID: 289640527b795e8e78cbe4f788b6ae0a558b91ed9720cc56faf84fb20943ca64
                                                • Opcode Fuzzy Hash: 913cfa3d866773e2a2ed193946acc47d92da95edee84c7a04ca9d3a50713b3e4
                                                • Instruction Fuzzy Hash: 2051F975D00288EFEB05CBA4D895FEEBBB5AF19304F148198E1017B382D3769609CBB5
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: _rand$MessagePost$SleepWindow
                                                • String ID: d
                                                • API String ID: 390989685-2564639436
                                                • Opcode ID: 76cf03ca70b09789d4017d4a1953b19f5fcc4e017528165237ca35113cce41e1
                                                • Instruction ID: 72db5d6d3c14764c2f1263f99887a8bc7eb2128efdf1fd91c15336e0f9c52c8c
                                                • Opcode Fuzzy Hash: 76cf03ca70b09789d4017d4a1953b19f5fcc4e017528165237ca35113cce41e1
                                                • Instruction Fuzzy Hash: 07118EB9A05208EBEB04CFA4C895B9DB7B1FF88340F10C599F605DB251C635DA449B60
                                                APIs
                                                • LoadLibraryA.KERNEL32(user32.dll,?,00000000,00000000,10016BB2,?,Microsoft Visual C++ Runtime Library,00012010,?,1001C774,?,1001C7C4,?,?,?,Runtime Error!Program: ), ref: 10019F52
                                                • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 10019F6A
                                                • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 10019F7B
                                                • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 10019F88
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: AddressProc$LibraryLoad
                                                • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                • API String ID: 2238633743-4044615076
                                                • Opcode ID: 9bb47299df42860bad1c65134ab3767e55d8174c8aad63c1ce290f84051ca8ee
                                                • Instruction ID: 712b221e2c1690d5ed6358eefcf3477377f41dd8c94e1c720ccffffb55dae85a
                                                • Opcode Fuzzy Hash: 9bb47299df42860bad1c65134ab3767e55d8174c8aad63c1ce290f84051ca8ee
                                                • Instruction Fuzzy Hash: DC011A31609325BEE740DFB98CC4D6A3AE9EB88691731443DE605DA121FF72D8829B60
                                                APIs
                                                • LCMapStringW.KERNEL32(00000000,00000100,1001C384,00000001,00000000,00000000,774CE860,10026088,00000000,?,?,?,?,10001FEC,00000000), ref: 100147C6
                                                • LCMapStringA.KERNEL32(00000000,00000100,1001C380,00000001,00000000,00000000,?,?,?,10001FEC,00000000), ref: 100147E2
                                                • LCMapStringA.KERNEL32(00000000,10001FEC,?,?,?,?,774CE860,10026088,00000000,?,?,?,?,10001FEC,00000000), ref: 1001482B
                                                • MultiByteToWideChar.KERNEL32(00000000,10026089,?,?,00000000,00000000,774CE860,10026088,00000000,?,?,?,?,10001FEC,00000000), ref: 10014863
                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,?,?,10001FEC,00000000), ref: 100148BB
                                                • LCMapStringW.KERNEL32(00000000,10001FEC,00000000,00000000,00000000,00000000,?,?,?,10001FEC,00000000), ref: 100148D1
                                                • LCMapStringW.KERNEL32(00000000,10001FEC,00000000,00000000,?,?,?,?,?,10001FEC,00000000), ref: 10014904
                                                • LCMapStringW.KERNEL32(00000000,10001FEC,00000000,00000000,?,00000000,?,?,?,10001FEC,00000000), ref: 1001496C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: String$ByteCharMultiWide
                                                • String ID:
                                                • API String ID: 352835431-0
                                                • Opcode ID: d36b137f33267c043f39a8dbc9923c682399acf478bbd3179ea48cafc847e2de
                                                • Instruction ID: 6511a382c912848e6ac98b9d767bc157387f95797aafcdee9e9fa81957444595
                                                • Opcode Fuzzy Hash: d36b137f33267c043f39a8dbc9923c682399acf478bbd3179ea48cafc847e2de
                                                • Instruction Fuzzy Hash: F1515B7190025AAFDF12CF94CC85E9F7BB9FB49B90F214115F915AA160C732CD90EB61
                                                APIs
                                                • VirtualProtect.KERNEL32(?,000000F8,00000040,?), ref: 1000D4D1
                                                • VirtualProtect.KERNEL32(?,000000F8,?,?), ref: 1000D51B
                                                • VirtualProtect.KERNEL32(?,?,00000040,?), ref: 1000D541
                                                • WriteProcessMemory.KERNEL32(000000FF,?,?,?,?), ref: 1000D566
                                                • VirtualProtect.KERNEL32(?,?,?,?), ref: 1000D6B8
                                                • GetProcessHeap.KERNEL32(00000001,?), ref: 1000D6C4
                                                • HeapFree.KERNEL32(00000000), ref: 1000D6CB
                                                • GetModuleFileNameA.KERNEL32(?,?,00000104), ref: 1000D6E1
                                                • SetLastError.KERNEL32(00000000), ref: 1000D709
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual$HeapProcess$ErrorFileFreeLastMemoryModuleNameWrite
                                                • String ID:
                                                • API String ID: 1576130627-0
                                                • Opcode ID: e48b9a492583263708a67e167b2ef98b891b4f28ab3cb69d91b534f9a41c9ec8
                                                • Instruction ID: 1dc0e754acabc390e9bfbac236aa232de6eb276334465b9c75294942c2cdec66
                                                • Opcode Fuzzy Hash: e48b9a492583263708a67e167b2ef98b891b4f28ab3cb69d91b534f9a41c9ec8
                                                • Instruction Fuzzy Hash: 7981F3B59002299FDB18CF58CC81FD9B7B5FF49314F0481D9EA49AB241D670AE90CFA0
                                                APIs
                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,10011E5A), ref: 10016AFB
                                                • GetStdHandle.KERNEL32(000000F4,1001C774,00000000,00000000,00000000,10011E5A), ref: 10016BD1
                                                • WriteFile.KERNEL32(00000000), ref: 10016BD8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: File$HandleModuleNameWrite
                                                • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                • API String ID: 3784150691-4022980321
                                                • Opcode ID: 0046527c49c7b86006d49519c778fa2c1007f9ab20481858608caf9f5409c222
                                                • Instruction ID: 98ae7400ad47273dba575284e7417d74316d9bc07541b49a9590805c9c967986
                                                • Opcode Fuzzy Hash: 0046527c49c7b86006d49519c778fa2c1007f9ab20481858608caf9f5409c222
                                                • Instruction Fuzzy Hash: BB31A472A04229AFEF20DA60CC86EDE73ADEF49344F500596F545EE040EB70EAD68F51
                                                APIs
                                                • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,1001312F), ref: 100166C4
                                                • GetEnvironmentStrings.KERNEL32(?,?,?,?,1001312F), ref: 100166D8
                                                • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,1001312F), ref: 10016704
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?,1001312F), ref: 1001673C
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,1001312F), ref: 1001675E
                                                • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,1001312F), ref: 10016777
                                                • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,?,1001312F), ref: 1001678A
                                                • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 100167C8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                • String ID:
                                                • API String ID: 1823725401-0
                                                • Opcode ID: 977cc51eaa545a5ad0eeddd9850708274cd30f131da46609fd683bcdcee5c484
                                                • Instruction ID: 7311bfd8dda3cd57fdfb607f1036c22790811c8a0afbe793bba5daff6579dfa8
                                                • Opcode Fuzzy Hash: 977cc51eaa545a5ad0eeddd9850708274cd30f131da46609fd683bcdcee5c484
                                                • Instruction Fuzzy Hash: 2231C4B250C2766FE711ABB44CC882EB6DCEB4E2AD7124929F952CB181E631DCC18761
                                                APIs
                                                • IsBadReadPtr.KERNEL32(?,00000001), ref: 1000972B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Read
                                                • String ID: .$?$a$b$d$p$x
                                                • API String ID: 946204249-2934605707
                                                • Opcode ID: 68652ed76ac4d8d8ec3f9c1f8174d8d77194980ee954cdd873c77b5f6f0ec699
                                                • Instruction ID: 08955c9b4ac1cf693953f320f3b5539609d415794eee07b7e5fef20275824145
                                                • Opcode Fuzzy Hash: 68652ed76ac4d8d8ec3f9c1f8174d8d77194980ee954cdd873c77b5f6f0ec699
                                                • Instruction Fuzzy Hash: 8C517C75D14188EAEB04DBE4DC81EEEBB78EF14340F048428F54577286EB75AA49CBA1
                                                APIs
                                                • IsBadReadPtr.KERNEL32(00000000,00000001), ref: 1000922F
                                                • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 1000938A
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,10021540,00000104,?,?,?,?,00000001), ref: 100093BE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: ByteCharCopyFileMultiReadWide
                                                • String ID:
                                                • API String ID: 1453400745-0
                                                • Opcode ID: 148fb041f2f85bfcde16609aef86e5b53fcae3486bb7a87f05b7f703c5a52bba
                                                • Instruction ID: 5313af0f7624f080ba70e373a2bc2ee9b0dea30391b83c7ade08419758d990f8
                                                • Opcode Fuzzy Hash: 148fb041f2f85bfcde16609aef86e5b53fcae3486bb7a87f05b7f703c5a52bba
                                                • Instruction Fuzzy Hash: 59C15F75D001489BFB04DBE0CC92BEEBB79EF14380F548868E50676199EF35BA86CB51
                                                APIs
                                                • CreateFileA.KERNEL32(00000001,80000000,?,0000000C,00000001,00000080,00000000,?,00000000,00000000), ref: 100184CE
                                                • GetLastError.KERNEL32 ref: 100184DA
                                                • GetFileType.KERNEL32(00000000), ref: 100184EF
                                                • CloseHandle.KERNEL32(00000000), ref: 100184FA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: File$CloseCreateErrorHandleLastType
                                                • String ID: @$H
                                                • API String ID: 1809617866-104103126
                                                • Opcode ID: 35711d5a3fc08896e2b7680d6d469c4c61397692fae1c8bdf5757601b9541bb1
                                                • Instruction ID: 0c2a492b3064ec65b5e77294ca452c5e8e1e339a406a6163d89371c369e337c5
                                                • Opcode Fuzzy Hash: 35711d5a3fc08896e2b7680d6d469c4c61397692fae1c8bdf5757601b9541bb1
                                                • Instruction Fuzzy Hash: 6F813671C0465AABEB21CFA4C88479E7BE1EF013A4F254219E961AF1D1DBB4CBC48B51
                                                APIs
                                                • GetStringTypeW.KERNEL32(00000001,1001C384,00000001,00000000,?,00000100,00000000,10019ACE,00000001,00000020,00000100,?,00000000), ref: 1001881E
                                                • GetStringTypeA.KERNEL32(00000000,00000001,1001C380,00000001,?), ref: 10018838
                                                • GetStringTypeA.KERNEL32(00000000,?,00000100,00000020,00000001,?,00000100,00000000,10019ACE,00000001,00000020,00000100,?,00000000), ref: 1001886C
                                                • MultiByteToWideChar.KERNEL32(10019ACE,00000101,00000100,00000020,00000000,00000000,?,00000100,00000000,10019ACE,00000001,00000020,00000100,?,00000000), ref: 100188A4
                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?), ref: 100188FA
                                                • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?), ref: 1001890C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: StringType$ByteCharMultiWide
                                                • String ID:
                                                • API String ID: 3852931651-0
                                                • Opcode ID: ddc7f6aec35dd88b1752a05ac63d83e398efbdcf87eb4498d3db0a2a9795f805
                                                • Instruction ID: 80efe49769f9c55366b0b87d96394f5a1e97bb6fd917305025469127db8faf67
                                                • Opcode Fuzzy Hash: ddc7f6aec35dd88b1752a05ac63d83e398efbdcf87eb4498d3db0a2a9795f805
                                                • Instruction Fuzzy Hash: 49415C7290025ABFDB11DF94CC89EEE7BB9FB09264F204525FA11DA160C731DB91CBA1
                                                APIs
                                                • GetCurrentThreadId.KERNEL32 ref: 10009FBA
                                                • GetDesktopWindow.USER32 ref: 10009FC5
                                                • GetWindow.USER32(00000000), ref: 10009FCC
                                                • GetWindow.USER32(?,00000002), ref: 10009FE2
                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 10009FF9
                                                • IsWindowVisible.USER32(00000000), ref: 1000A008
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Window$Thread$CurrentDesktopProcessVisible
                                                • String ID:
                                                • API String ID: 4188469220-0
                                                • Opcode ID: ff1fe90d3c60e525a25bfc90ed3c43d6d79c8afb4235d603b0add2491515b06e
                                                • Instruction ID: 66a71734bf6b2c9025dda973603cbe68bc7d301e2066f01206c9f5a6d3b4bffb
                                                • Opcode Fuzzy Hash: ff1fe90d3c60e525a25bfc90ed3c43d6d79c8afb4235d603b0add2491515b06e
                                                • Instruction Fuzzy Hash: 5E0119B5E0020CEBEB00DFE0C988B9D7BB8EB09381F108595E50593240D735DA44AB21
                                                APIs
                                                • GetVersionExA.KERNEL32 ref: 10016827
                                                • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 1001685C
                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 100168BC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: EnvironmentFileModuleNameVariableVersion
                                                • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                • API String ID: 1385375860-4131005785
                                                • Opcode ID: be8fa36c8c6c7ce449380da2e9ede97b7d6262c0c96322e52423aadf451bd08d
                                                • Instruction ID: dc2ddc1df3c481c69c09107ba15e0aa1aed0b5da41c3f1abbec33f04c60deba1
                                                • Opcode Fuzzy Hash: be8fa36c8c6c7ce449380da2e9ede97b7d6262c0c96322e52423aadf451bd08d
                                                • Instruction Fuzzy Hash: 11310976D052996FEB21C6B05C91BDD37ECDB0A298F2040D5D545DE082EA30DFCACB21
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: aec80482876cbbfea10ac558f9ecc343b29c2d10e4ae21978737ec7475eb4ae6
                                                • Instruction ID: 8d3d557cf0c6aec5b3d5c0c3ea12377d7f55ab9f6b83c53f50cdda6170313262
                                                • Opcode Fuzzy Hash: aec80482876cbbfea10ac558f9ecc343b29c2d10e4ae21978737ec7475eb4ae6
                                                • Instruction Fuzzy Hash: 5991F4F5D00629AADB11DB68CC859DE7BB9EB096A0F208225F858BE191D731DDC08B60
                                                APIs
                                                • GetStartupInfoA.KERNEL32(?), ref: 100161F1
                                                • GetFileType.KERNEL32(00000480), ref: 1001629C
                                                • GetStdHandle.KERNEL32(-000000F6), ref: 100162FF
                                                • GetFileType.KERNEL32(00000000), ref: 1001630D
                                                • SetHandleCount.KERNEL32 ref: 10016344
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: FileHandleType$CountInfoStartup
                                                • String ID:
                                                • API String ID: 1710529072-0
                                                • Opcode ID: afbf0a58576d9836c3fb28c172e8f5e010b5c3f6d37731d462276d3656857e49
                                                • Instruction ID: 0f89c194aee37fe9091bac8226edfe15fd3f78554569c19e26152e2790274208
                                                • Opcode Fuzzy Hash: afbf0a58576d9836c3fb28c172e8f5e010b5c3f6d37731d462276d3656857e49
                                                • Instruction Fuzzy Hash: 5D51E4719046568FE710CB68CCC8B593BE4FB0A364F26466CD8A2DF2E1D730D986D750
                                                APIs
                                                • RtlAllocateHeap.NTDLL(00000000,00002020,1001ED80), ref: 10017749
                                                • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,10011E5A,10017BF4,00000000,00000010,00000000,00000009,00000009,?,100139B8,00000010,00000000), ref: 1001776D
                                                • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,10011E5A,10017BF4,00000000,00000010,00000000,00000009,00000009,?,100139B8,00000010,00000000), ref: 10017787
                                                • VirtualFree.KERNEL32(00000000,00000000,00008000,?,10011E5A,10017BF4,00000000,00000010,00000000,00000009,00000009,?,100139B8,00000010,00000000,10011E5A), ref: 10017848
                                                • HeapFree.KERNEL32(00000000,00000000,?,10011E5A,10017BF4,00000000,00000010,00000000,00000009,00000009,?,100139B8,00000010,00000000,10011E5A,00000000), ref: 1001785F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Virtual$AllocFreeHeap$Allocate
                                                • String ID:
                                                • API String ID: 3000792370-0
                                                • Opcode ID: 1317f6bf94321ac5039d2f6573fe4650433641b9730bbf980a711bc8cf4adbd4
                                                • Instruction ID: 5c6769bfca1cabdf35cebd79bb49ef2a9f463615a42f930bcb70ae22a3bf3036
                                                • Opcode Fuzzy Hash: 1317f6bf94321ac5039d2f6573fe4650433641b9730bbf980a711bc8cf4adbd4
                                                • Instruction Fuzzy Hash: 3031EF70680756AFE321CF24DC89B19BBF4FB45B94F118639E1699B2D0EB70E880CB44
                                                APIs
                                                • OpenProcess.KERNEL32(001F0FFF,00000000,00000000), ref: 10008116
                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 1000812B
                                                • EnumWindows.USER32(Function_000080C7,00000000), ref: 10008151
                                                • Sleep.KERNEL32(000001F4), ref: 1000815C
                                                • Sleep.KERNEL32(00000064), ref: 10008164
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: ProcessSleep$EnumOpenTerminateWindows
                                                • String ID:
                                                • API String ID: 3901766475-0
                                                • Opcode ID: 2653f1ba7b2de7905fe63a1328049569b8a04220ea8ce2a82db5d470f9a21bfe
                                                • Instruction ID: dcf86fc1c2a68d389fcba1d0a34524ab1569834cb49bc94813606b19601f9b6a
                                                • Opcode Fuzzy Hash: 2653f1ba7b2de7905fe63a1328049569b8a04220ea8ce2a82db5d470f9a21bfe
                                                • Instruction Fuzzy Hash: 5401D635A41258BBF300EBE08C4EFAD7B78EF05742F508154F641571C5D6729A418761
                                                APIs
                                                • GetLastError.KERNEL32(?,?,10011EA1,?,10011E5A), ref: 100142BF
                                                • TlsGetValue.KERNEL32(?,?,10011EA1,?,10011E5A), ref: 100142CD
                                                • SetLastError.KERNEL32(00000000,?,?,10011EA1,?,10011E5A), ref: 10014319
                                                  • Part of subcall function 100143C4: RtlAllocateHeap.NTDLL(00000008,10011E5A,00000000), ref: 100144BA
                                                • TlsSetValue.KERNEL32(00000000,?,?,10011EA1,?,10011E5A), ref: 100142F1
                                                • GetCurrentThreadId.KERNEL32 ref: 10014302
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: ErrorLastValue$AllocateCurrentHeapThread
                                                • String ID:
                                                • API String ID: 2047054392-0
                                                • Opcode ID: c5ce56e29ce2c7df3e2112a8290a8917a7478a1b086b89ada8db33f67a1db6b8
                                                • Instruction ID: baf11ef6314a733a67745f96bc4843d6e450a6e67434720a7bbf7ddb0416c940
                                                • Opcode Fuzzy Hash: c5ce56e29ce2c7df3e2112a8290a8917a7478a1b086b89ada8db33f67a1db6b8
                                                • Instruction Fuzzy Hash: F1F02B36640331ABE2216B309C49A0E3BA0EF05BB17134514F9549A1F1CF30D8C186D0
                                                APIs
                                                • RtlDeleteCriticalSection.NTDLL(00000000), ref: 100146D6
                                                  • Part of subcall function 10013264: HeapFree.KERNEL32(00000000,00000000,00000000,10011E5A,00000000,?,1001447A,00000009,00000000,00000000,?,?,10011EA1,?,10011E5A), ref: 10013338
                                                • RtlDeleteCriticalSection.NTDLL(?), ref: 100146F1
                                                • RtlDeleteCriticalSection.NTDLL ref: 100146F9
                                                • RtlDeleteCriticalSection.NTDLL ref: 10014701
                                                • RtlDeleteCriticalSection.NTDLL ref: 10014709
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: CriticalDeleteSection$FreeHeap
                                                • String ID:
                                                • API String ID: 447823528-0
                                                • Opcode ID: 18c0d9f19bdc8b801751fa9d754d1e20aa617660488453b16896868d3e2217f0
                                                • Instruction ID: d55dec6e7418e8cf56874f5e114f38f24bf6db44f7b4a9bd8a2d72889dd62492
                                                • Opcode Fuzzy Hash: 18c0d9f19bdc8b801751fa9d754d1e20aa617660488453b16896868d3e2217f0
                                                • Instruction Fuzzy Hash: F3F0FE7A8002F466EE60FB2DEC8988D7AD5DB813943474073E8597A270CD36DCC1AE93
                                                APIs
                                                  • Part of subcall function 1001470E: RtlInitializeCriticalSection.NTDLL(00000000), ref: 1001474B
                                                  • Part of subcall function 1001470E: RtlEnterCriticalSection.NTDLL(10011E5A), ref: 10014766
                                                • RtlInitializeCriticalSection.NTDLL(00000068), ref: 10017F48
                                                • RtlEnterCriticalSection.NTDLL(00000068), ref: 10017F5D
                                                • RtlLeaveCriticalSection.NTDLL(00000068), ref: 10017F6A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: CriticalSection$EnterInitialize$Leave
                                                • String ID:
                                                • API String ID: 713024617-3916222277
                                                • Opcode ID: 9c22dae6cc54d1c18cf2a1881882c6c8428f89c1f0811a5b2bd243d9fab75971
                                                • Instruction ID: 6ef4b17566e82d1d9c89d4f2e07564b769f87814507a5fe567181068abfd3b15
                                                • Opcode Fuzzy Hash: 9c22dae6cc54d1c18cf2a1881882c6c8428f89c1f0811a5b2bd243d9fab75971
                                                • Instruction Fuzzy Hash: F4311E721053458FE314CF20DC88B4A77E4FB85328F268A2DF66A8F1D1DB70E9898751
                                                APIs
                                                • GetModuleHandleA.KERNEL32(KERNEL32,1001267E), ref: 10014BC7
                                                • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 10014BD7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: AddressHandleModuleProc
                                                • String ID: IsProcessorFeaturePresent$KERNEL32
                                                • API String ID: 1646373207-3105848591
                                                • Opcode ID: f438bc2824015786c8322c3c982dd74fad5bb25ef5aefd6bb00551df9b3494b1
                                                • Instruction ID: ecf34e8fb414ecafba3c9d0f9ca35046255810938e54917a367b50dc2acdbc70
                                                • Opcode Fuzzy Hash: f438bc2824015786c8322c3c982dd74fad5bb25ef5aefd6bb00551df9b3494b1
                                                • Instruction Fuzzy Hash: E6C0122068C20AAAEA60DBA10C88F992188DB84682F428014A919EC0A0DF30C5809121
                                                APIs
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000100,00000000,00000000), ref: 1001A168
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000040), ref: 1001A172
                                                • ReadFile.KERNEL32(?,?,00000001,00000000,00000000,?,?,?,?,?,?,?,?,?,00000040), ref: 1001A238
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000040), ref: 1001A242
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastRead
                                                • String ID:
                                                • API String ID: 1948546556-0
                                                • Opcode ID: fa8a34b1c95c8f558b5ef233bce762404d57b81ac45ac34bd91910f6d3218ca6
                                                • Instruction ID: c97b55b41a2134303f54a2e79221e1239eea105ad0fc14d5cf7afb5f5831ce2c
                                                • Opcode Fuzzy Hash: fa8a34b1c95c8f558b5ef233bce762404d57b81ac45ac34bd91910f6d3218ca6
                                                • Instruction Fuzzy Hash: 7F519C34A04289AFDB22CFA8C880B9D7BF0EF07394F114499E8658F256C775DAC1CB51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7fc1584878c52e42eedf417549557393498b0f1fba9fabf17cc9982d8e3fef95
                                                • Instruction ID: 7fd3caaa0c8735fa156ef58f16e42b1b819c6edae53977ad4732a8f5661a72aa
                                                • Opcode Fuzzy Hash: 7fc1584878c52e42eedf417549557393498b0f1fba9fabf17cc9982d8e3fef95
                                                • Instruction Fuzzy Hash: 0A510AB4D042889BEF04DBF4DC81BEEBBB4EF44380F148418F519AB249DB30A945CB95
                                                APIs
                                                • WriteFile.KERNEL32(?,?,?,00000000,00000000,100185AA,00000000,00001000), ref: 10013EB7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: FileWrite
                                                • String ID:
                                                • API String ID: 3934441357-0
                                                • Opcode ID: 2c9a466c8644a6161075460cab3ac862f071b8edf59141906b0d5ac62503b907
                                                • Instruction ID: 81512a328ef80645aaa2c24cbce7a2567d8d456d63b51b19e8ca1c1534bd4a6b
                                                • Opcode Fuzzy Hash: 2c9a466c8644a6161075460cab3ac862f071b8edf59141906b0d5ac62503b907
                                                • Instruction Fuzzy Hash: 23515971A00258EFDB12CFA8C984A9D7BF5FF45390F21C1A9E8199F2A1D770DA85CB50
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 10007CC2
                                                • Process32First.KERNEL32(000000FF,00000128), ref: 10007CF3
                                                • Process32Next.KERNEL32(?,?), ref: 10007D67
                                                • CloseHandle.KERNEL32(000000FF,00000002,00000000), ref: 10007DAD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                • String ID:
                                                • API String ID: 420147892-0
                                                • Opcode ID: b54e942313e69b09f6dc935b109c7abda1b7ec0cf5d1d5ac743e452ed8de97b3
                                                • Instruction ID: 5b7634256d702fa112243bf971cbcd73c446e20312ca85d805dddcbd3fe03f12
                                                • Opcode Fuzzy Hash: b54e942313e69b09f6dc935b109c7abda1b7ec0cf5d1d5ac743e452ed8de97b3
                                                • Instruction Fuzzy Hash: 3B219C75D001688AEB25CB60CC51BEEB3B9FF4C350F0005E9E64DA6185DB38AF908F50
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(?,00000001,00000000,0000000B,?,?,?,10018947), ref: 1001B637
                                                • MultiByteToWideChar.KERNEL32(00000000,00000009,?,00000000,00000000,00000000,?,10018947), ref: 1001B64A
                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,?,00000000,?,10018947), ref: 1001B696
                                                • CompareStringW.KERNEL32(?,?,00000000,00000000,?,00000000,?,00000000,?,10018947), ref: 1001B6AE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$CompareString
                                                • String ID:
                                                • API String ID: 376665442-0
                                                • Opcode ID: 6d6723fc4f7e1aa026703879498489edced362beb76acae3a9dd45e8ebc8106d
                                                • Instruction ID: 3c791e5db717dc5f8eb7c9a0d518060fc5ad1f6e6c2c6b2207ffa5bebcf435df
                                                • Opcode Fuzzy Hash: 6d6723fc4f7e1aa026703879498489edced362beb76acae3a9dd45e8ebc8106d
                                                • Instruction Fuzzy Hash: 56210732900659EBDF21CF94CD859DEBFB5FB49390F114125FA10A6160C3369DA1DB90
                                                APIs
                                                • RtlReAllocateHeap.NTDLL(00000000,00000050,00000000,00000000), ref: 100172AE
                                                • RtlAllocateHeap.NTDLL(00000008,000041C4,00000000), ref: 100172E2
                                                • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 100172FC
                                                • HeapFree.KERNEL32(00000000,?), ref: 10017313
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Heap$Allocate$AllocFreeVirtual
                                                • String ID:
                                                • API String ID: 94566200-0
                                                • Opcode ID: f5781a85d2bc2be02f0326631f6c7da3a3b0202bb834cceb6cd5b36444548361
                                                • Instruction ID: 81c1aadd834f9d9ea75d6cccb01390e98c0b6a28ff94c40b486f444d783b1c84
                                                • Opcode Fuzzy Hash: f5781a85d2bc2be02f0326631f6c7da3a3b0202bb834cceb6cd5b36444548361
                                                • Instruction Fuzzy Hash: 10116A30200261AFE360CF19CDC5D167BB6FB853667604929F66ACA1B0D372D886CF04
                                                APIs
                                                • RtlInitializeCriticalSection.NTDLL(?), ref: 10014686
                                                • RtlInitializeCriticalSection.NTDLL ref: 1001468E
                                                • RtlInitializeCriticalSection.NTDLL ref: 10014696
                                                • RtlInitializeCriticalSection.NTDLL ref: 1001469E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: CriticalInitializeSection
                                                • String ID:
                                                • API String ID: 32694325-0
                                                • Opcode ID: 6d4efbb0744ee1c10942554acd1f197b4d45c8ec9ef45817c243cf8230d096f0
                                                • Instruction ID: cc55063fc7b5a48fa10e0a667aa9f0d9132b8b72e118f3a5e57df1b375cb6049
                                                • Opcode Fuzzy Hash: 6d4efbb0744ee1c10942554acd1f197b4d45c8ec9ef45817c243cf8230d096f0
                                                • Instruction Fuzzy Hash: C7C002318001B8DAEA122B99DE8688D3FA5EB043603098063E10C51070CE319C10EFC1
                                                APIs
                                                • GlobalHandle.KERNEL32 ref: 0040769B
                                                • GlobalUnlock.KERNEL32(00000000), ref: 004076A2
                                                • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 004076A7
                                                • GlobalLock.KERNEL32(00000000), ref: 004076AD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446181015.0000000000406000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1446165688.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446181015.0000000000483000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000486000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1446216712.0000000000488000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Global$AllocHandleLockUnlock
                                                • String ID:
                                                • API String ID: 2167344118-0
                                                • Opcode ID: 02361587569a7108faf9e0f0362d490eb3e06f259ceec45f1f04d6c7085ace01
                                                • Instruction ID: 3807b3356794369132dc4f3bb2ce9b8ce45a2f9ffab1771cbffe330104e2b1d3
                                                • Opcode Fuzzy Hash: 02361587569a7108faf9e0f0362d490eb3e06f259ceec45f1f04d6c7085ace01
                                                • Instruction Fuzzy Hash: 55B008C49182113DF90873B64D0AD3B14ACD980618382896E7586F2582D87D9825513A
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1446633807.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.1446621793.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001001E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010020000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.0000000010025000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446633807.000000001002B000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446721402.000000001002D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.1446738202.000000001002F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_2hp5ee36OS.jbxd
                                                Similarity
                                                • API ID: Info
                                                • String ID: $
                                                • API String ID: 1807457897-3032137957
                                                • Opcode ID: 83ac7559cc8ca374af63d89acc339386a51df988279e7b2339a052840e1e004a
                                                • Instruction ID: 3be436be159b28ec87dcb6c4778e46b1c8b46ca02f132deca1f07cf7560c732d
                                                • Opcode Fuzzy Hash: 83ac7559cc8ca374af63d89acc339386a51df988279e7b2339a052840e1e004a
                                                • Instruction Fuzzy Hash: 30414C315082A85FEB25CA54DEC9BEA7F9DDB05741F2000F5D586DF092C372DA84DBA2