Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
R55-RFQ.exe

Overview

General Information

Sample name:R55-RFQ.exe
Analysis ID:1571274
MD5:152bed497cb453798846b46a9cbe8710
SHA1:9948a22ad3b4f15f658a6c8ddbe34c99a485ec50
SHA256:38100e0eb4432850500bed29244869b5e9b8d328e907352605b35f923ac903a9
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • R55-RFQ.exe (PID: 4184 cmdline: "C:\Users\user\Desktop\R55-RFQ.exe" MD5: 152BED497CB453798846B46A9CBE8710)
    • RegSvcs.exe (PID: 5412 cmdline: "C:\Users\user\Desktop\R55-RFQ.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "w133y@jeepcommerce.rs", "Password": "Q6]7rLSD*gU2"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3917611574.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.3917611574.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000002.00000002.3918436813.0000000002F31000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000002.00000002.3918436813.0000000002F31000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000002.00000002.3918436813.0000000002F5E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 9 entries
            SourceRuleDescriptionAuthorStrings
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  2.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x34703:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x34775:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x347ff:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x34891:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x348fb:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x3496d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x34a03:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x34a93:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  2.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x318f7:$s2: GetPrivateProfileString
                  • 0x30fd4:$s3: get_OSFullName
                  • 0x32638:$s5: remove_Key
                  • 0x3279b:$s5: remove_Key
                  • 0x336f3:$s6: FtpWebRequest
                  • 0x346e5:$s7: logins
                  • 0x34c57:$s7: logins
                  • 0x3795c:$s7: logins
                  • 0x37a1a:$s7: logins
                  • 0x3936d:$s7: logins
                  • 0x385b4:$s9: 1.85 (Hash, version 2, native byte-order)
                  Click to see the 9 entries
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: http://ftp.jeepcommerce.rsAvira URL Cloud: Label: malware
                  Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "w133y@jeepcommerce.rs", "Password": "Q6]7rLSD*gU2"}
                  Source: R55-RFQ.exeVirustotal: Detection: 37%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: R55-RFQ.exeJoe Sandbox ML: detected
                  Source: R55-RFQ.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: R55-RFQ.exe, 00000000.00000003.1495977819.00000000036A0000.00000004.00001000.00020000.00000000.sdmp, R55-RFQ.exe, 00000000.00000003.1496110682.0000000003840000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: R55-RFQ.exe, 00000000.00000003.1495977819.00000000036A0000.00000004.00001000.00020000.00000000.sdmp, R55-RFQ.exe, 00000000.00000003.1496110682.0000000003840000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008B445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_008B445A
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BC6D1 FindFirstFileW,FindClose,0_2_008BC6D1
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_008BC75C
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_008BEF95
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_008BF0F2
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_008BF3F3
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008B37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_008B37EF
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008B3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_008B3B12
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_008BBCBC

                  Networking

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008C22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_008C22EE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: global trafficDNS traffic detected: DNS query: ftp.jeepcommerce.rs
                  Source: RegSvcs.exe, 00000002.00000002.3918436813.0000000002F5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.jeepcommerce.rs
                  Source: RegSvcs.exe, 00000002.00000002.3918436813.0000000002F01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: R55-RFQ.exe, 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3917611574.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3918436813.0000000002F01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: RegSvcs.exe, 00000002.00000002.3918436813.0000000002F01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: R55-RFQ.exe, 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3917611574.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, NmHr1WHWKO.cs.Net Code: _5X3Zzx6JgyO
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008C4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_008C4164
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008C4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_008C4164
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008C3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_008C3F66
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008B001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_008B001C
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008DCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_008DCABC

                  System Summary

                  barindex
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.R55-RFQ.exe.3660000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.R55-RFQ.exe.3660000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: This is a third-party compiled AutoIt script.0_2_00853B3A
                  Source: R55-RFQ.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: R55-RFQ.exe, 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c08decdd-a
                  Source: R55-RFQ.exe, 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_adcd78ab-4
                  Source: R55-RFQ.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_97b3b301-a
                  Source: R55-RFQ.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_35bc566e-7
                  Source: initial sampleStatic PE information: Filename: R55-RFQ.exe
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_008BA1EF
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008A8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_008A8310
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008B51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_008B51BD
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_0085E6A00_2_0085E6A0
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_0087D9750_2_0087D975
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_0085FCE00_2_0085FCE0
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008721C50_2_008721C5
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008862D20_2_008862D2
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008D03DA0_2_008D03DA
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_0088242E0_2_0088242E
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008725FA0_2_008725FA
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008666E10_2_008666E1
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008AE6160_2_008AE616
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_0088878F0_2_0088878F
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008B88890_2_008B8889
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008688080_2_00868808
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008868440_2_00886844
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008D08570_2_008D0857
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_0087CB210_2_0087CB21
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00886DB60_2_00886DB6
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00866F9E0_2_00866F9E
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008630300_2_00863030
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008731870_2_00873187
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_0087F1D90_2_0087F1D9
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008512870_2_00851287
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008714840_2_00871484
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008655200_2_00865520
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008776960_2_00877696
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008657600_2_00865760
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008719780_2_00871978
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00889AB50_2_00889AB5
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00871D900_2_00871D90
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_0087BDA60_2_0087BDA6
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008D7DDB0_2_008D7DDB
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00863FE00_2_00863FE0
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_0085DF000_2_0085DF00
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_01056A280_2_01056A28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011F4A882_2_011F4A88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011FADA82_2_011FADA8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011FECA82_2_011FECA8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011F3E702_2_011F3E70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011F41B82_2_011F41B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067C7E682_2_067C7E68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067C66E02_2_067C66E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067C52682_2_067C5268
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067CC2902_2_067CC290
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067CB3282_2_067CB328
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067C2BB82_2_067C2BB8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067C77882_2_067C7788
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067CE4B82_2_067CE4B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067C00402_2_067C0040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067C59D82_2_067C59D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067C00142_2_067C0014
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: String function: 00857DE1 appears 35 times
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: String function: 00878900 appears 42 times
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: String function: 00870AE3 appears 70 times
                  Source: R55-RFQ.exe, 00000000.00000003.1496790668.00000000037C3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs R55-RFQ.exe
                  Source: R55-RFQ.exe, 00000000.00000003.1497708685.00000000039BD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs R55-RFQ.exe
                  Source: R55-RFQ.exe, 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename90cf818a-462d-43ad-9b06-442ae93cc408.exe4 vs R55-RFQ.exe
                  Source: R55-RFQ.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.R55-RFQ.exe.3660000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.R55-RFQ.exe.3660000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/2
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BA06A GetLastError,FormatMessageW,0_2_008BA06A
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008A81CB AdjustTokenPrivileges,CloseHandle,0_2_008A81CB
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008A87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_008A87E1
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BB3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_008BB3FB
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008CEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_008CEE0D
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BC397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_008BC397
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00854E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00854E89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\R55-RFQ.exeFile created: C:\Users\user\AppData\Local\Temp\aut46B.tmpJump to behavior
                  Source: R55-RFQ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: R55-RFQ.exeVirustotal: Detection: 37%
                  Source: unknownProcess created: C:\Users\user\Desktop\R55-RFQ.exe "C:\Users\user\Desktop\R55-RFQ.exe"
                  Source: C:\Users\user\Desktop\R55-RFQ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\R55-RFQ.exe"
                  Source: C:\Users\user\Desktop\R55-RFQ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\R55-RFQ.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: R55-RFQ.exeStatic file information: File size 1070080 > 1048576
                  Source: R55-RFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: R55-RFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: R55-RFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: R55-RFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: R55-RFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: R55-RFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: R55-RFQ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: R55-RFQ.exe, 00000000.00000003.1495977819.00000000036A0000.00000004.00001000.00020000.00000000.sdmp, R55-RFQ.exe, 00000000.00000003.1496110682.0000000003840000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: R55-RFQ.exe, 00000000.00000003.1495977819.00000000036A0000.00000004.00001000.00020000.00000000.sdmp, R55-RFQ.exe, 00000000.00000003.1496110682.0000000003840000.00000004.00001000.00020000.00000000.sdmp
                  Source: R55-RFQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: R55-RFQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: R55-RFQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: R55-RFQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: R55-RFQ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00854B37 LoadLibraryA,GetProcAddress,0_2_00854B37
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00878945 push ecx; ret 0_2_00878958
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008548D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_008548D7
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008D5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_008D5376
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00873187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00873187
                  Source: C:\Users\user\Desktop\R55-RFQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\R55-RFQ.exeAPI/Special instruction interceptor: Address: 105664C
                  Source: RegSvcs.exe, 00000002.00000002.3918436813.0000000002F31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: R55-RFQ.exe, 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3917611574.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLLESELECT * FROM WIN32_COMPUTERSYSTEM
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599094Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597984Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597313Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597203Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597094Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596969Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596859Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596749Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596640Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596531Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596422Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596311Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596203Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596094Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595969Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595859Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595750Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595641Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595531Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595422Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595312Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595203Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595094Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594984Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594641Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1067Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8785Jump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-105219
                  Source: C:\Users\user\Desktop\R55-RFQ.exeAPI coverage: 4.6 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008B445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_008B445A
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BC6D1 FindFirstFileW,FindClose,0_2_008BC6D1
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_008BC75C
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_008BEF95
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_008BF0F2
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_008BF3F3
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008B37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_008B37EF
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008B3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_008B3B12
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008BBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_008BBCBC
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008549A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008549A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599094Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598985Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598860Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598735Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598610Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598485Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597984Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597313Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597203Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597094Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596969Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596859Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596749Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596640Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596531Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596422Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596311Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596203Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596094Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595969Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595859Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595750Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595641Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595531Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595422Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595312Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595203Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595094Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594984Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594641Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594406Jump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.3918436813.0000000002F31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: RegSvcs.exe, 00000002.00000002.3918436813.0000000002F31000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: RegSvcs.exe, 00000002.00000002.3917611574.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBox
                  Source: R55-RFQ.exe, 00000000.00000003.1461755208.0000000000FAB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exe
                  Source: RegSvcs.exe, 00000002.00000002.3920328239.00000000062BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\R55-RFQ.exeAPI call chain: ExitProcess graph end nodegraph_0-104033

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_011F7078 CheckRemoteDebuggerPresent,2_2_011F7078
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008C3F09 BlockInput,0_2_008C3F09
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00853B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00853B3A
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00885A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00885A7C
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00854B37 LoadLibraryA,GetProcAddress,0_2_00854B37
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_01055288 mov eax, dword ptr fs:[00000030h]0_2_01055288
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_01056918 mov eax, dword ptr fs:[00000030h]0_2_01056918
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_010568B8 mov eax, dword ptr fs:[00000030h]0_2_010568B8
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008A80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_008A80A9
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_0087A124 SetUnhandledExceptionFilter,0_2_0087A124
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_0087A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0087A155
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\R55-RFQ.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: D3A008Jump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008A87B1 LogonUserW,0_2_008A87B1
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00853B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00853B3A
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008548D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_008548D7
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008B4C27 mouse_event,0_2_008B4C27
                  Source: C:\Users\user\Desktop\R55-RFQ.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\R55-RFQ.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008A7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_008A7CAF
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008A874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_008A874B
                  Source: R55-RFQ.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: R55-RFQ.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_0087862B cpuid 0_2_0087862B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00884E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00884E87
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00891E06 GetUserNameW,0_2_00891E06
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_00883F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00883F3A
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008549A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008549A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.R55-RFQ.exe.3660000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3917611574.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3918436813.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3918436813.0000000002F5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: R55-RFQ.exe PID: 4184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5412, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: R55-RFQ.exeBinary or memory string: WIN_81
                  Source: R55-RFQ.exeBinary or memory string: WIN_XP
                  Source: R55-RFQ.exeBinary or memory string: WIN_XPe
                  Source: R55-RFQ.exeBinary or memory string: WIN_VISTA
                  Source: R55-RFQ.exeBinary or memory string: WIN_7
                  Source: R55-RFQ.exeBinary or memory string: WIN_8
                  Source: R55-RFQ.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.R55-RFQ.exe.3660000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3917611574.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3918436813.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: R55-RFQ.exe PID: 4184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5412, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.R55-RFQ.exe.3660000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.R55-RFQ.exe.3660000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3917611574.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3918436813.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3918436813.0000000002F5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: R55-RFQ.exe PID: 4184, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5412, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008C6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_008C6283
                  Source: C:\Users\user\Desktop\R55-RFQ.exeCode function: 0_2_008C6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_008C6747
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS138
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  2
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets651
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts231
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials231
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  R55-RFQ.exe38%VirustotalBrowse
                  R55-RFQ.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://ftp.jeepcommerce.rs100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ftp.jeepcommerce.rs
                  195.252.110.253
                  truefalse
                    high
                    ip-api.com
                    208.95.112.1
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://ip-api.com/line/?fields=hostingfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://ftp.jeepcommerce.rsRegSvcs.exe, 00000002.00000002.3918436813.0000000002F5E000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://account.dyn.com/R55-RFQ.exe, 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3917611574.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3918436813.0000000002F01000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://ip-api.comRegSvcs.exe, 00000002.00000002.3918436813.0000000002F01000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              208.95.112.1
                              ip-api.comUnited States
                              53334TUT-ASUSfalse
                              195.252.110.253
                              ftp.jeepcommerce.rsSerbia
                              6700BEOTEL-AShttpwwwbeotelnetRSfalse
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1571274
                              Start date and time:2024-12-09 08:30:25 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 8m 37s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:9
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:R55-RFQ.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/2@2/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 54
                              • Number of non-executed functions: 274
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe
                              • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              02:31:47API Interceptor10058224x Sleep call for process: RegSvcs.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              208.95.112.1YXHoexbTFp.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                              • ip-api.com/json/
                              file.exeGet hashmaliciousBlank GrabberBrowse
                              • ip-api.com/json/?fields=225545
                              spoolsv.exeGet hashmaliciousRedLine, StormKitty, XWormBrowse
                              • ip-api.com/line/?fields=hosting
                              2477.exeGet hashmaliciousNoCry, RedLine, StormKitty, XWormBrowse
                              • ip-api.com/line/?fields=hosting
                              BA9qyj2c9G.exeGet hashmaliciousWhiteSnake StealerBrowse
                              • ip-api.com/line?fields=query,country
                              xooSsYaHN0.exeGet hashmaliciousGo Stealer, Skuld StealerBrowse
                              • ip-api.com/json
                              ea4LTmpMwl.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                              • ip-api.com/json/
                              file.exeGet hashmaliciousAmadey, Credential Flusher, DarkTortilla, Discord Token Stealer, DotStealer, LummaC Stealer, StealcBrowse
                              • ip-api.com/json/
                              file.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                              • ip-api.com/json/
                              u7e3vb5dfk.exeGet hashmaliciousXWormBrowse
                              • ip-api.com/line/?fields=hosting
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              ip-api.comYXHoexbTFp.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                              • 208.95.112.1
                              file.exeGet hashmaliciousBlank GrabberBrowse
                              • 208.95.112.1
                              spoolsv.exeGet hashmaliciousRedLine, StormKitty, XWormBrowse
                              • 208.95.112.1
                              2477.exeGet hashmaliciousNoCry, RedLine, StormKitty, XWormBrowse
                              • 208.95.112.1
                              BA9qyj2c9G.exeGet hashmaliciousWhiteSnake StealerBrowse
                              • 208.95.112.1
                              xooSsYaHN0.exeGet hashmaliciousGo Stealer, Skuld StealerBrowse
                              • 208.95.112.1
                              ea4LTmpMwl.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                              • 208.95.112.1
                              file.exeGet hashmaliciousAmadey, Credential Flusher, DarkTortilla, Discord Token Stealer, DotStealer, LummaC Stealer, StealcBrowse
                              • 208.95.112.1
                              file.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                              • 208.95.112.1
                              u7e3vb5dfk.exeGet hashmaliciousXWormBrowse
                              • 208.95.112.1
                              ftp.jeepcommerce.rs2zaGROpmo0.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              Eemw0Iqp2J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              b83NG35487.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              [Purchase Order] PO2411024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              INV & BANK DETAILS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              PO#150003191.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              dg4Bwri6Cy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              DHOYXfCAeB.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              RgAm3scap8.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              EgjKf0gmd1.exeGet hashmaliciousAgentTeslaBrowse
                              • 195.252.110.253
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              TUT-ASUSYXHoexbTFp.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                              • 208.95.112.1
                              file.exeGet hashmaliciousBlank GrabberBrowse
                              • 208.95.112.1
                              spoolsv.exeGet hashmaliciousRedLine, StormKitty, XWormBrowse
                              • 208.95.112.1
                              2477.exeGet hashmaliciousNoCry, RedLine, StormKitty, XWormBrowse
                              • 208.95.112.1
                              BA9qyj2c9G.exeGet hashmaliciousWhiteSnake StealerBrowse
                              • 208.95.112.1
                              xooSsYaHN0.exeGet hashmaliciousGo Stealer, Skuld StealerBrowse
                              • 208.95.112.1
                              ea4LTmpMwl.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                              • 208.95.112.1
                              file.exeGet hashmaliciousAmadey, Credential Flusher, DarkTortilla, Discord Token Stealer, DotStealer, LummaC Stealer, StealcBrowse
                              • 208.95.112.1
                              file.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                              • 208.95.112.1
                              u7e3vb5dfk.exeGet hashmaliciousXWormBrowse
                              • 208.95.112.1
                              BEOTEL-AShttpwwwbeotelnetRS2zaGROpmo0.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              Eemw0Iqp2J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              b83NG35487.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              arm.nn-20241201-1515.elfGet hashmaliciousMirai, OkiruBrowse
                              • 62.193.140.91
                              [Purchase Order] PO2411024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              INV & BANK DETAILS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              PO#150003191.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              dg4Bwri6Cy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              DHOYXfCAeB.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              RgAm3scap8.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              No context
                              No context
                              Process:C:\Users\user\Desktop\R55-RFQ.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):145390
                              Entropy (8bit):7.9304143760835295
                              Encrypted:false
                              SSDEEP:3072:8IoxUa8qdxuUZfxaGFHkrovYZ3aIVyssBv+d1KdQzzjAw1UtUVmTsaHGfRnzjWJ4:aUXUZf4lov23ayyB2nKyAw1UtIQXHGFF
                              MD5:1D24235A8300D179BC629B5109282231
                              SHA1:A306A832221F5D2CC3B693188A26E465FBAD6536
                              SHA-256:20145FEE264D8E87FCD154C8DC097BC4E39ED0F36F721A7F7367E5E43C08C57D
                              SHA-512:DFFD13F9EAEB4740B96472A457D8E85430AFF88AFD2581BA34D7D795A0C10287DC3BDA48C49F513DED52C5225BB45B2CB7CFDC1D8D66C3C61F3B99A72E88F607
                              Malicious:false
                              Reputation:low
                              Preview:EA06.....Zu4.|.C..*.N.g9.S..J=2...Tfs.`.ni...O..4.S.3zg.a....-..[.O.\.A>..n.*.^E#..d2+d.{8....E..c.H.R..r}3..'f1.....|.#k..@....h.z...Q....../.9..l.44...r#3....J...R.4...sQ9.2.;...R.s.S)......4.fs....(....a.uh...Z..i ._="sU.....~....^.....H.F@..x..3...............'z.V.M...T.^...N[..B...|i....X.D...2...G...@ ..U@'>..B..S..qt....q.Nk.8_B.H.Y&S.x.9B..*....%{...f..m.cr...V._.u1u.N&A..P....O.....L.'e...d.]....\..-]......8.ruF.pr.....G...1....).S7.h...x....:t..I.q..{_2SJ.do.\...o.m.P...-..h..>.jm...d...;j....W.....N:..........tj........5..ns.y\.5...1S .2j..O.4.0....4$`....t.. .p..>........{...B..hL...$.G.x.u.....#_v.H..C..s.[..3....(.n..e.^....<..&..l..........Ou.U".z..1..N)T..n.C.....7.....z.:.L..a.x>...m-]|e.....}...B{....g9....NGZ....7 ..3..4l...d.MC...9.J. ..e..<.g;..h..d......I<........P.W..Z...P..+.......q.:=2.7..+.(..G..j....4D.t...H.K* ....)UM|..L.O.P.#.k7.4,.).h.PX..9..wL..m0.$..V...4.l..U..h.j.....S'5032.H.......qs....e.g9.S,........"r.m..
                              Process:C:\Users\user\Desktop\R55-RFQ.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):245248
                              Entropy (8bit):6.468793210984542
                              Encrypted:false
                              SSDEEP:6144:cvZ4Lufqp7UHAgnISQLti2skv7e38R2RDd6AzzP6Bh:cvZ+uSNWAMISQxip936ovP6Bh
                              MD5:21C602C9666CAAF13BCE2F1B115D8400
                              SHA1:CFF30497B627E5843E82EA0F1BEC4CEDDCBA5BD4
                              SHA-256:23E94ECB309B55169422FDB59A15D839F6A26DA87593A3F89227B274ABE88743
                              SHA-512:DF1F7E5A3B1AEF077A36273929C067635CAD95275EA66C09702474DB2DEA6AF13052680636044044368ED4DCEB1C6F5C70546032798453CBFEA864D94B5EB52C
                              Malicious:false
                              Reputation:low
                              Preview:.i.LO9YCCLVH..39.L9YCGLV.VQ39LL9YCGLVHVQ39LL9YCGLVHVQ39LL9YC.LVHXN.7L.0.b.M..w.[P?lI+, >7%v2RW"#My!"l$=8qZWl.v.c*#2-x\>3hL9YCGLV..Q3uMO9.k.)VHVQ39LL.YAFGWCVQ.:LL1YCGLVHx.09Ll9YC.OVHV.39lL9YAGLRHVQ39LL=YCGLVHVQ.=LL;YCGLVHTQs.LL)YCWLVHVA39\L9YCGLFHVQ39LL9YCG..KV.39LL.ZC.IVHVQ39LL9YCGLVHVQ39LH9UCGLVHVQ39LL9YCGLVHVQ39LL9YCGLVHVQ39LL9YCGLVHVQ39LL9YcGL^HVQ39LL9YCGDvHV.39LL9YCGLVHx%VA8L9Yw.OVHvQ39.O9YAGLVHVQ39LL9YCGlVH6.AJ>/9YC.IVHV.09LJ9YC.OVHVQ39LL9YCGL.HV..K) V:CG@VHVQ3=LL;YCG.UHVQ39LL9YCGLV.VQq9LL9YCGLVHVQ39LL).@GLVHV.39LN9\C..TH.d29OL9YBGLPHVQ39LL9YCGLVHVQ39LL9YCGLVHVQ39LL9YCGLVHVQ39LL9Y^.....q1r3;D.j./.R._. ..C.].*'....T....q$5..L.Vs..A...9.1\:F......YG=71.0cY).L.....x7...N8.I...Gk.)Jr.....jo...C"....M..Z6.i-&8:4.j-*X+*.N.IVQ39........!..i.OC'mQ?.....+4....2VHV539L>9YC&LVH.Q39#L9Y-GLV6VQ3GLL9.CGL.HVQ.9LL.YCG!VHVu39L29YC.1YG...P?..YCGLV}....!....{..gB.2.[a...2...i<..61.0.....=..'u.T.'Pk..48JH<[DCOZuX....m;]GBNQLU].7....b.j.o..=..=.*HVQ39L.9Y.GLV..Q.9LL.Y.G..HVQ..L.9.C...H
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):7.020176195953405
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:R55-RFQ.exe
                              File size:1'070'080 bytes
                              MD5:152bed497cb453798846b46a9cbe8710
                              SHA1:9948a22ad3b4f15f658a6c8ddbe34c99a485ec50
                              SHA256:38100e0eb4432850500bed29244869b5e9b8d328e907352605b35f923ac903a9
                              SHA512:ccfa46a0dc4a3a4600629d685a3b024541bfa991dfad0b865055ba677a44d33e636dadaf667cade2fb88bdc3eb807b27438402185f390d94a20be504bfbe8c2b
                              SSDEEP:24576:2u6J33O0c+JY5UZ+XC0kGso6FarYQT0Xk8cWeoi3XuWY:Yu0c++OCvkGs9FarF8wpdY
                              TLSH:6E35BE2273DDC360CB669173BF6AB7016EBF7C614630B85B2F880D7DA950162162D7A3
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                              Icon Hash:aaf3e3e3938382a0
                              Entrypoint:0x427dcd
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                              Time Stamp:0x675636F8 [Mon Dec 9 00:16:56 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:1
                              File Version Major:5
                              File Version Minor:1
                              Subsystem Version Major:5
                              Subsystem Version Minor:1
                              Import Hash:afcdf79be1557326c854b6e20cb900a7
                              Instruction
                              call 00007FAE70DC916Ah
                              jmp 00007FAE70DBBF34h
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              push edi
                              push esi
                              mov esi, dword ptr [esp+10h]
                              mov ecx, dword ptr [esp+14h]
                              mov edi, dword ptr [esp+0Ch]
                              mov eax, ecx
                              mov edx, ecx
                              add eax, esi
                              cmp edi, esi
                              jbe 00007FAE70DBC0BAh
                              cmp edi, eax
                              jc 00007FAE70DBC41Eh
                              bt dword ptr [004C31FCh], 01h
                              jnc 00007FAE70DBC0B9h
                              rep movsb
                              jmp 00007FAE70DBC3CCh
                              cmp ecx, 00000080h
                              jc 00007FAE70DBC284h
                              mov eax, edi
                              xor eax, esi
                              test eax, 0000000Fh
                              jne 00007FAE70DBC0C0h
                              bt dword ptr [004BE324h], 01h
                              jc 00007FAE70DBC590h
                              bt dword ptr [004C31FCh], 00000000h
                              jnc 00007FAE70DBC25Dh
                              test edi, 00000003h
                              jne 00007FAE70DBC26Eh
                              test esi, 00000003h
                              jne 00007FAE70DBC24Dh
                              bt edi, 02h
                              jnc 00007FAE70DBC0BFh
                              mov eax, dword ptr [esi]
                              sub ecx, 04h
                              lea esi, dword ptr [esi+04h]
                              mov dword ptr [edi], eax
                              lea edi, dword ptr [edi+04h]
                              bt edi, 03h
                              jnc 00007FAE70DBC0C3h
                              movq xmm1, qword ptr [esi]
                              sub ecx, 08h
                              lea esi, dword ptr [esi+08h]
                              movq qword ptr [edi], xmm1
                              lea edi, dword ptr [edi+08h]
                              test esi, 00000007h
                              je 00007FAE70DBC115h
                              bt esi, 03h
                              jnc 00007FAE70DBC168h
                              Programming Language:
                              • [ASM] VS2013 build 21005
                              • [ C ] VS2013 build 21005
                              • [C++] VS2013 build 21005
                              • [ C ] VS2008 SP1 build 30729
                              • [IMP] VS2008 SP1 build 30729
                              • [ASM] VS2013 UPD4 build 31101
                              • [RES] VS2013 build 21005
                              • [LNK] VS2013 UPD4 build 31101
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x3ca48.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1040000x711c.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0xc70000x3ca480x3cc0061743ebf04f5603270b005fc4ea0bac5False0.8908741640946503data7.806858156797682IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x1040000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                              RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                              RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                              RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                              RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                              RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                              RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                              RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                              RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                              RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                              RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                              RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                              RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                              RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                              RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                              RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                              RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                              RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                              RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                              RT_RCDATA0xcf7b80x33d0ddata1.0003345316792076
                              RT_GROUP_ICON0x1034c80x76dataEnglishGreat Britain0.6610169491525424
                              RT_GROUP_ICON0x1035400x14dataEnglishGreat Britain1.25
                              RT_GROUP_ICON0x1035540x14dataEnglishGreat Britain1.15
                              RT_GROUP_ICON0x1035680x14dataEnglishGreat Britain1.25
                              RT_VERSION0x10357c0xdcdataEnglishGreat Britain0.6181818181818182
                              RT_MANIFEST0x1036580x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                              DLLImport
                              WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                              VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                              WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                              PSAPI.DLLGetProcessMemoryInfo
                              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                              USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                              UxTheme.dllIsThemeActive
                              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                              USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                              GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                              COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                              OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                              Language of compilation systemCountry where language is spokenMap
                              EnglishGreat Britain
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 9, 2024 08:31:45.762655973 CET4970180192.168.2.11208.95.112.1
                              Dec 9, 2024 08:31:45.881937981 CET8049701208.95.112.1192.168.2.11
                              Dec 9, 2024 08:31:45.882020950 CET4970180192.168.2.11208.95.112.1
                              Dec 9, 2024 08:31:45.882925034 CET4970180192.168.2.11208.95.112.1
                              Dec 9, 2024 08:31:46.002176046 CET8049701208.95.112.1192.168.2.11
                              Dec 9, 2024 08:31:47.053378105 CET8049701208.95.112.1192.168.2.11
                              Dec 9, 2024 08:31:47.104617119 CET4970180192.168.2.11208.95.112.1
                              Dec 9, 2024 08:31:48.202969074 CET4970221192.168.2.11195.252.110.253
                              Dec 9, 2024 08:31:48.322297096 CET2149702195.252.110.253192.168.2.11
                              Dec 9, 2024 08:31:48.322402954 CET4970221192.168.2.11195.252.110.253
                              Dec 9, 2024 08:31:48.326360941 CET4970221192.168.2.11195.252.110.253
                              Dec 9, 2024 08:31:48.445700884 CET2149702195.252.110.253192.168.2.11
                              Dec 9, 2024 08:31:48.445760012 CET4970221192.168.2.11195.252.110.253
                              Dec 9, 2024 08:32:20.689589977 CET8049701208.95.112.1192.168.2.11
                              Dec 9, 2024 08:32:20.689697027 CET4970180192.168.2.11208.95.112.1
                              Dec 9, 2024 08:32:37.651855946 CET4970180192.168.2.11208.95.112.1
                              Dec 9, 2024 08:32:37.771177053 CET8049701208.95.112.1192.168.2.11
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 9, 2024 08:31:45.619590044 CET5725653192.168.2.111.1.1.1
                              Dec 9, 2024 08:31:45.756495953 CET53572561.1.1.1192.168.2.11
                              Dec 9, 2024 08:31:47.638202906 CET6029653192.168.2.111.1.1.1
                              Dec 9, 2024 08:31:48.201992035 CET53602961.1.1.1192.168.2.11
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Dec 9, 2024 08:31:45.619590044 CET192.168.2.111.1.1.10xc4d1Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                              Dec 9, 2024 08:31:47.638202906 CET192.168.2.111.1.1.10x9bf1Standard query (0)ftp.jeepcommerce.rsA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Dec 9, 2024 08:31:45.756495953 CET1.1.1.1192.168.2.110xc4d1No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                              Dec 9, 2024 08:31:48.201992035 CET1.1.1.1192.168.2.110x9bf1No error (0)ftp.jeepcommerce.rs195.252.110.253A (IP address)IN (0x0001)false
                              • ip-api.com
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.1149701208.95.112.1805412C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              TimestampBytes transferredDirectionData
                              Dec 9, 2024 08:31:45.882925034 CET80OUTGET /line/?fields=hosting HTTP/1.1
                              Host: ip-api.com
                              Connection: Keep-Alive
                              Dec 9, 2024 08:31:47.053378105 CET175INHTTP/1.1 200 OK
                              Date: Mon, 09 Dec 2024 07:31:46 GMT
                              Content-Type: text/plain; charset=utf-8
                              Content-Length: 6
                              Access-Control-Allow-Origin: *
                              X-Ttl: 60
                              X-Rl: 44
                              Data Raw: 66 61 6c 73 65 0a
                              Data Ascii: false


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:02:31:40
                              Start date:09/12/2024
                              Path:C:\Users\user\Desktop\R55-RFQ.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\R55-RFQ.exe"
                              Imagebase:0x850000
                              File size:1'070'080 bytes
                              MD5 hash:152BED497CB453798846B46A9CBE8710
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                              • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.1500596372.0000000003660000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                              Reputation:low
                              Has exited:true

                              Target ID:2
                              Start time:02:31:44
                              Start date:09/12/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\R55-RFQ.exe"
                              Imagebase:0xba0000
                              File size:45'984 bytes
                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3917611574.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3917611574.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3918436813.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3918436813.0000000002F31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3918436813.0000000002F5E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:3.8%
                                Dynamic/Decrypted Code Coverage:0.4%
                                Signature Coverage:6.5%
                                Total number of Nodes:2000
                                Total number of Limit Nodes:188
                                execution_graph 103977 851055 103982 852649 103977->103982 103992 857667 103982->103992 103987 852754 103988 85105a 103987->103988 104000 853416 59 API calls 2 library calls 103987->104000 103989 872d40 103988->103989 104046 872c44 103989->104046 103991 851064 104001 870db6 103992->104001 103994 857688 103995 870db6 Mailbox 59 API calls 103994->103995 103996 8526b7 103995->103996 103997 853582 103996->103997 104039 8535b0 103997->104039 104000->103987 104003 870dbe 104001->104003 104004 870dd8 104003->104004 104006 870ddc std::exception::exception 104003->104006 104011 87571c 104003->104011 104028 8733a1 DecodePointer 104003->104028 104004->103994 104029 87859b RaiseException 104006->104029 104008 870e06 104030 8784d1 58 API calls _free 104008->104030 104010 870e18 104010->103994 104012 875797 104011->104012 104020 875728 104011->104020 104037 8733a1 DecodePointer 104012->104037 104014 87579d 104038 878b28 58 API calls __getptd_noexit 104014->104038 104017 87575b RtlAllocateHeap 104017->104020 104027 87578f 104017->104027 104019 875733 104019->104020 104031 87a16b 58 API calls __NMSG_WRITE 104019->104031 104032 87a1c8 58 API calls 6 library calls 104019->104032 104033 87309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104019->104033 104020->104017 104020->104019 104021 875783 104020->104021 104025 875781 104020->104025 104034 8733a1 DecodePointer 104020->104034 104035 878b28 58 API calls __getptd_noexit 104021->104035 104036 878b28 58 API calls __getptd_noexit 104025->104036 104027->104003 104028->104003 104029->104008 104030->104010 104031->104019 104032->104019 104034->104020 104035->104025 104036->104027 104037->104014 104038->104027 104040 8535bd 104039->104040 104041 8535a1 104039->104041 104040->104041 104042 8535c4 RegOpenKeyExW 104040->104042 104041->103987 104042->104041 104043 8535de RegQueryValueExW 104042->104043 104044 853614 RegCloseKey 104043->104044 104045 8535ff 104043->104045 104044->104041 104045->104044 104047 872c50 __write 104046->104047 104054 873217 104047->104054 104053 872c77 __write 104053->103991 104071 879c0b 104054->104071 104056 872c59 104057 872c88 DecodePointer DecodePointer 104056->104057 104058 872c65 104057->104058 104059 872cb5 104057->104059 104068 872c82 104058->104068 104059->104058 104117 8787a4 59 API calls __cftoe_l 104059->104117 104061 872d18 EncodePointer EncodePointer 104061->104058 104062 872cc7 104062->104061 104063 872cec 104062->104063 104118 878864 61 API calls 2 library calls 104062->104118 104063->104058 104066 872d06 EncodePointer 104063->104066 104119 878864 61 API calls 2 library calls 104063->104119 104066->104061 104067 872d00 104067->104058 104067->104066 104120 873220 104068->104120 104072 879c2f EnterCriticalSection 104071->104072 104073 879c1c 104071->104073 104072->104056 104078 879c93 104073->104078 104075 879c22 104075->104072 104102 8730b5 58 API calls 3 library calls 104075->104102 104079 879c9f __write 104078->104079 104080 879cc0 104079->104080 104081 879ca8 104079->104081 104089 879ce1 __write 104080->104089 104106 87881d 58 API calls 2 library calls 104080->104106 104103 87a16b 58 API calls __NMSG_WRITE 104081->104103 104083 879cad 104104 87a1c8 58 API calls 6 library calls 104083->104104 104086 879cd5 104087 879cdc 104086->104087 104088 879ceb 104086->104088 104107 878b28 58 API calls __getptd_noexit 104087->104107 104092 879c0b __lock 58 API calls 104088->104092 104089->104075 104090 879cb4 104105 87309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104090->104105 104094 879cf2 104092->104094 104096 879d17 104094->104096 104097 879cff 104094->104097 104109 872d55 104096->104109 104108 879e2b InitializeCriticalSectionAndSpinCount 104097->104108 104100 879d0b 104115 879d33 LeaveCriticalSection _doexit 104100->104115 104103->104083 104104->104090 104106->104086 104107->104089 104108->104100 104110 872d5e RtlFreeHeap 104109->104110 104111 872d87 __dosmaperr 104109->104111 104110->104111 104112 872d73 104110->104112 104111->104100 104116 878b28 58 API calls __getptd_noexit 104112->104116 104114 872d79 GetLastError 104114->104111 104115->104089 104116->104114 104117->104062 104118->104063 104119->104067 104123 879d75 LeaveCriticalSection 104120->104123 104122 872c87 104122->104053 104123->104122 104124 877c56 104125 877c62 __write 104124->104125 104161 879e08 GetStartupInfoW 104125->104161 104127 877c67 104163 878b7c GetProcessHeap 104127->104163 104129 877cbf 104130 877cca 104129->104130 104246 877da6 58 API calls 3 library calls 104129->104246 104164 879ae6 104130->104164 104133 877cd0 104134 877cdb __RTC_Initialize 104133->104134 104247 877da6 58 API calls 3 library calls 104133->104247 104185 87d5d2 104134->104185 104137 877cea 104138 877cf6 GetCommandLineW 104137->104138 104248 877da6 58 API calls 3 library calls 104137->104248 104204 884f23 GetEnvironmentStringsW 104138->104204 104141 877cf5 104141->104138 104144 877d10 104145 877d1b 104144->104145 104249 8730b5 58 API calls 3 library calls 104144->104249 104214 884d58 104145->104214 104148 877d21 104149 877d2c 104148->104149 104250 8730b5 58 API calls 3 library calls 104148->104250 104228 8730ef 104149->104228 104152 877d34 104154 877d3f __wwincmdln 104152->104154 104251 8730b5 58 API calls 3 library calls 104152->104251 104234 8547d0 104154->104234 104156 877d53 104157 877d62 104156->104157 104252 873358 58 API calls _doexit 104156->104252 104253 8730e0 58 API calls _doexit 104157->104253 104160 877d67 __write 104162 879e1e 104161->104162 104162->104127 104163->104129 104254 873187 36 API calls 2 library calls 104164->104254 104166 879aeb 104255 879d3c InitializeCriticalSectionAndSpinCount __alloc_osfhnd 104166->104255 104168 879af0 104169 879af4 104168->104169 104257 879d8a TlsAlloc 104168->104257 104256 879b5c 61 API calls 2 library calls 104169->104256 104172 879b06 104172->104169 104174 879b11 104172->104174 104173 879af9 104173->104133 104258 8787d5 104174->104258 104177 879b53 104266 879b5c 61 API calls 2 library calls 104177->104266 104180 879b32 104180->104177 104182 879b38 104180->104182 104181 879b58 104181->104133 104265 879a33 58 API calls 4 library calls 104182->104265 104184 879b40 GetCurrentThreadId 104184->104133 104186 87d5de __write 104185->104186 104187 879c0b __lock 58 API calls 104186->104187 104188 87d5e5 104187->104188 104189 8787d5 __calloc_crt 58 API calls 104188->104189 104190 87d5f6 104189->104190 104191 87d661 GetStartupInfoW 104190->104191 104192 87d601 __write @_EH4_CallFilterFunc@8 104190->104192 104198 87d676 104191->104198 104201 87d7a5 104191->104201 104192->104137 104193 87d86d 104280 87d87d LeaveCriticalSection _doexit 104193->104280 104195 8787d5 __calloc_crt 58 API calls 104195->104198 104196 87d7f2 GetStdHandle 104196->104201 104197 87d805 GetFileType 104197->104201 104198->104195 104199 87d6c4 104198->104199 104198->104201 104200 87d6f8 GetFileType 104199->104200 104199->104201 104278 879e2b InitializeCriticalSectionAndSpinCount 104199->104278 104200->104199 104201->104193 104201->104196 104201->104197 104279 879e2b InitializeCriticalSectionAndSpinCount 104201->104279 104205 877d06 104204->104205 104206 884f34 104204->104206 104210 884b1b GetModuleFileNameW 104205->104210 104281 87881d 58 API calls 2 library calls 104206->104281 104208 884f5a _memmove 104209 884f70 FreeEnvironmentStringsW 104208->104209 104209->104205 104211 884b4f _wparse_cmdline 104210->104211 104213 884b8f _wparse_cmdline 104211->104213 104282 87881d 58 API calls 2 library calls 104211->104282 104213->104144 104215 884d71 __wsetenvp 104214->104215 104219 884d69 104214->104219 104216 8787d5 __calloc_crt 58 API calls 104215->104216 104217 884d9a __wsetenvp 104216->104217 104217->104219 104220 8787d5 __calloc_crt 58 API calls 104217->104220 104221 884df1 104217->104221 104222 884e16 104217->104222 104225 884e2d 104217->104225 104283 884607 58 API calls __cftoe_l 104217->104283 104218 872d55 _free 58 API calls 104218->104219 104219->104148 104220->104217 104221->104218 104224 872d55 _free 58 API calls 104222->104224 104224->104219 104284 878dc6 IsProcessorFeaturePresent 104225->104284 104227 884e39 104227->104148 104229 8730fb __IsNonwritableInCurrentImage 104228->104229 104307 87a4d1 104229->104307 104231 873119 __initterm_e 104232 872d40 __cinit 67 API calls 104231->104232 104233 873138 __cinit __IsNonwritableInCurrentImage 104231->104233 104232->104233 104233->104152 104235 8547ea 104234->104235 104245 854889 104234->104245 104236 854824 IsThemeActive 104235->104236 104310 87336c 104236->104310 104240 854850 104322 8548fd SystemParametersInfoW SystemParametersInfoW 104240->104322 104242 85485c 104323 853b3a 104242->104323 104244 854864 SystemParametersInfoW 104244->104245 104245->104156 104246->104130 104247->104134 104248->104141 104252->104157 104253->104160 104254->104166 104255->104168 104256->104173 104257->104172 104261 8787dc 104258->104261 104260 878817 104260->104177 104264 879de6 TlsSetValue 104260->104264 104261->104260 104263 8787fa 104261->104263 104267 8851f6 104261->104267 104263->104260 104263->104261 104275 87a132 Sleep 104263->104275 104264->104180 104265->104184 104266->104181 104268 885201 104267->104268 104274 88521c 104267->104274 104269 88520d 104268->104269 104268->104274 104276 878b28 58 API calls __getptd_noexit 104269->104276 104271 88522c HeapAlloc 104272 885212 104271->104272 104271->104274 104272->104261 104274->104271 104274->104272 104277 8733a1 DecodePointer 104274->104277 104275->104263 104276->104272 104277->104274 104278->104199 104279->104201 104280->104192 104281->104208 104282->104213 104283->104217 104285 878dd1 104284->104285 104290 878c59 104285->104290 104289 878dec 104289->104227 104291 878c73 _memset __call_reportfault 104290->104291 104292 878c93 IsDebuggerPresent 104291->104292 104298 87a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 104292->104298 104295 878d7a 104297 87a140 GetCurrentProcess TerminateProcess 104295->104297 104296 878d57 __call_reportfault 104299 87c5f6 104296->104299 104297->104289 104298->104296 104300 87c600 IsProcessorFeaturePresent 104299->104300 104301 87c5fe 104299->104301 104303 88590a 104300->104303 104301->104295 104306 8858b9 5 API calls 2 library calls 104303->104306 104305 8859ed 104305->104295 104306->104305 104308 87a4d4 EncodePointer 104307->104308 104308->104308 104309 87a4ee 104308->104309 104309->104231 104311 879c0b __lock 58 API calls 104310->104311 104312 873377 DecodePointer EncodePointer 104311->104312 104375 879d75 LeaveCriticalSection 104312->104375 104314 854849 104315 8733d4 104314->104315 104316 8733de 104315->104316 104317 8733f8 104315->104317 104316->104317 104376 878b28 58 API calls __getptd_noexit 104316->104376 104317->104240 104319 8733e8 104377 878db6 9 API calls __cftoe_l 104319->104377 104321 8733f3 104321->104240 104322->104242 104324 853b47 __write_nolock 104323->104324 104325 857667 59 API calls 104324->104325 104326 853b51 GetCurrentDirectoryW 104325->104326 104378 853766 104326->104378 104328 853b7a IsDebuggerPresent 104329 88d272 MessageBoxA 104328->104329 104330 853b88 104328->104330 104332 88d28c 104329->104332 104330->104332 104333 853ba5 104330->104333 104365 853c61 104330->104365 104331 853c68 SetCurrentDirectoryW 104336 853c75 Mailbox 104331->104336 104597 857213 59 API calls Mailbox 104332->104597 104459 857285 104333->104459 104336->104244 104337 88d29c 104342 88d2b2 SetCurrentDirectoryW 104337->104342 104339 853bc3 GetFullPathNameW 104475 857bcc 104339->104475 104341 853bfe 104484 86092d 104341->104484 104342->104336 104345 853c1c 104346 853c26 104345->104346 104598 8a874b AllocateAndInitializeSid CheckTokenMembership FreeSid 104345->104598 104500 853a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 104346->104500 104349 88d2cf 104349->104346 104353 88d2e0 104349->104353 104352 853c30 104354 853c43 104352->104354 104508 85434a 104352->104508 104599 854706 104353->104599 104519 8609d0 104354->104519 104356 88d2e8 104606 857de1 104356->104606 104360 853c4e 104360->104365 104365->104331 104375->104314 104376->104319 104377->104321 104379 857667 59 API calls 104378->104379 104380 85377c 104379->104380 104626 853d31 104380->104626 104382 85379a 104383 854706 61 API calls 104382->104383 104384 8537ae 104383->104384 104385 857de1 59 API calls 104384->104385 104386 8537bb 104385->104386 104640 854ddd 104386->104640 104389 8537dc Mailbox 104664 858047 104389->104664 104390 88d173 104711 8b955b 104390->104711 104393 88d192 104396 872d55 _free 58 API calls 104393->104396 104398 88d19f 104396->104398 104400 854e4a 84 API calls 104398->104400 104402 88d1a8 104400->104402 104406 853ed0 59 API calls 104402->104406 104403 857de1 59 API calls 104404 853808 104403->104404 104671 8584c0 104404->104671 104408 88d1c3 104406->104408 104407 85381a Mailbox 104409 857de1 59 API calls 104407->104409 104410 853ed0 59 API calls 104408->104410 104411 853840 104409->104411 104412 88d1df 104410->104412 104413 8584c0 69 API calls 104411->104413 104414 854706 61 API calls 104412->104414 104416 85384f Mailbox 104413->104416 104415 88d204 104414->104415 104417 853ed0 59 API calls 104415->104417 104419 857667 59 API calls 104416->104419 104418 88d210 104417->104418 104420 858047 59 API calls 104418->104420 104421 85386d 104419->104421 104422 88d21e 104420->104422 104675 853ed0 104421->104675 104424 853ed0 59 API calls 104422->104424 104427 88d22d 104424->104427 104432 858047 59 API calls 104427->104432 104428 853887 104428->104402 104429 853891 104428->104429 104430 872efd _W_store_winword 60 API calls 104429->104430 104431 85389c 104430->104431 104431->104408 104433 8538a6 104431->104433 104434 88d24f 104432->104434 104435 872efd _W_store_winword 60 API calls 104433->104435 104436 853ed0 59 API calls 104434->104436 104437 8538b1 104435->104437 104438 88d25c 104436->104438 104437->104412 104439 8538bb 104437->104439 104438->104438 104440 872efd _W_store_winword 60 API calls 104439->104440 104441 8538c6 104440->104441 104441->104427 104442 853907 104441->104442 104444 853ed0 59 API calls 104441->104444 104442->104427 104443 853914 104442->104443 104691 8592ce 104443->104691 104446 8538ea 104444->104446 104448 858047 59 API calls 104446->104448 104449 8538f8 104448->104449 104451 853ed0 59 API calls 104449->104451 104451->104442 104454 85928a 59 API calls 104456 85394f 104454->104456 104455 858ee0 60 API calls 104455->104456 104456->104454 104456->104455 104457 853ed0 59 API calls 104456->104457 104458 853995 Mailbox 104456->104458 104457->104456 104458->104328 104460 857292 __write_nolock 104459->104460 104461 88ea22 _memset 104460->104461 104462 8572ab 104460->104462 104464 88ea3e GetOpenFileNameW 104461->104464 105600 854750 104462->105600 104466 88ea8d 104464->104466 104468 857bcc 59 API calls 104466->104468 104470 88eaa2 104468->104470 104470->104470 104472 8572c9 105628 85686a 104472->105628 104476 857c45 104475->104476 104477 857bd8 __wsetenvp 104475->104477 104478 857d2c 59 API calls 104476->104478 104479 857c13 104477->104479 104480 857bee 104477->104480 104483 857bf6 _memmove 104478->104483 104482 858029 59 API calls 104479->104482 105897 857f27 59 API calls Mailbox 104480->105897 104482->104483 104483->104341 104485 86093a __write_nolock 104484->104485 105898 856d80 104485->105898 104487 86093f 104499 853c14 104487->104499 105909 86119e 89 API calls 104487->105909 104489 86094c 104489->104499 105910 863ee7 91 API calls Mailbox 104489->105910 104491 860955 104492 860959 GetFullPathNameW 104491->104492 104491->104499 104493 857bcc 59 API calls 104492->104493 104494 860985 104493->104494 104495 857bcc 59 API calls 104494->104495 104496 860992 104495->104496 104497 894cab _wcscat 104496->104497 104498 857bcc 59 API calls 104496->104498 104498->104499 104499->104337 104499->104345 104501 853ab0 LoadImageW RegisterClassExW 104500->104501 104502 88d261 104500->104502 105948 853041 7 API calls 104501->105948 105949 8547a0 LoadImageW EnumResourceNamesW 104502->105949 104505 853b34 104507 8539d5 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 104505->104507 104506 88d26a 104507->104352 104509 854375 _memset 104508->104509 105950 854182 104509->105950 104513 854414 Shell_NotifyIconW 104516 854422 104513->104516 104514 854430 Shell_NotifyIconW 104514->104516 104515 8543fa 104515->104513 104515->104514 104520 894cc3 104519->104520 104534 8609f5 104519->104534 106116 8b9e4a 89 API calls 4 library calls 104520->106116 104522 860cfa 104522->104360 104525 860ee4 104525->104522 104527 860a4b PeekMessageW 104594 860a05 Mailbox 104527->104594 104531 894e81 Sleep 104531->104594 104533 860ce4 104533->104522 106113 861070 10 API calls Mailbox 104533->106113 104534->104594 106117 859e5d 60 API calls 104534->106117 106118 8a6349 331 API calls 104534->106118 104538 894d50 TranslateAcceleratorW 104541 860e43 PeekMessageW 104538->104541 104538->104594 104539 859e5d 60 API calls 104539->104594 104540 860ea5 TranslateMessage DispatchMessageW 104540->104541 104541->104594 104542 89581f WaitForSingleObject 104545 89583c GetExitCodeProcess CloseHandle 104542->104545 104542->104594 104544 860d13 timeGetTime 104544->104594 104580 860f95 104545->104580 104546 860e5f Sleep 104579 860e70 Mailbox 104546->104579 104547 858047 59 API calls 104547->104594 104548 857667 59 API calls 104548->104579 104549 895af8 Sleep 104549->104579 104551 870db6 59 API calls Mailbox 104551->104594 104553 860f4e timeGetTime 106115 859e5d 60 API calls 104553->106115 104554 87049f timeGetTime 104554->104579 104557 895b8f GetExitCodeProcess 104559 8d5f25 110 API calls 104559->104579 104560 85b7dd 109 API calls 104560->104579 104565 895874 104565->104580 104566 895078 Sleep 104566->104594 104567 895c17 Sleep 104567->104594 104569 857de1 59 API calls 104569->104579 104573 859ea0 304 API calls 104573->104594 104579->104548 104579->104554 104579->104557 104579->104559 104579->104560 104579->104565 104579->104566 104579->104567 104579->104569 104579->104580 104579->104594 106153 8b2408 60 API calls 104579->106153 106154 859e5d 60 API calls 104579->106154 106155 8589b3 69 API calls Mailbox 104579->106155 106156 85b73c 331 API calls 104579->106156 106157 8a64da 60 API calls 104579->106157 106158 8b5244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 104579->106158 106159 8b3c55 66 API calls Mailbox 104579->106159 104580->104360 104581 857de1 59 API calls 104581->104594 104582 8b9e4a 89 API calls 104582->104594 104584 859c90 59 API calls Mailbox 104584->104594 104586 8584c0 69 API calls 104586->104594 104587 8a617e 59 API calls Mailbox 104587->104594 104588 8589b3 69 API calls 104588->104594 104589 8955d5 VariantClear 104589->104594 104590 8a6e8f 59 API calls 104590->104594 104591 89566b VariantClear 104591->104594 104592 858cd4 59 API calls Mailbox 104592->104594 104593 895419 VariantClear 104593->104594 104594->104527 104594->104531 104594->104533 104594->104538 104594->104539 104594->104540 104594->104541 104594->104542 104594->104544 104594->104546 104594->104547 104594->104549 104594->104551 104594->104553 104594->104573 104594->104579 104594->104580 104594->104581 104594->104582 104594->104584 104594->104586 104594->104587 104594->104588 104594->104589 104594->104590 104594->104591 104594->104592 104594->104593 104595 85b73c 304 API calls 104594->104595 105977 85e6a0 104594->105977 106008 85f460 104594->106008 106027 8531ce 104594->106027 106032 85e420 331 API calls 104594->106032 106033 85fce0 104594->106033 106119 8d6018 59 API calls 104594->106119 106120 8b9a15 59 API calls Mailbox 104594->106120 106121 8ad4f2 59 API calls 104594->106121 106122 859837 104594->106122 106140 8a60ef 59 API calls 2 library calls 104594->106140 106141 858401 59 API calls 104594->106141 106142 8582df 104594->106142 104595->104594 104597->104337 104598->104349 104600 881940 __write_nolock 104599->104600 104601 854713 GetModuleFileNameW 104600->104601 104602 857de1 59 API calls 104601->104602 104603 854739 104602->104603 104604 854750 60 API calls 104603->104604 104605 854743 Mailbox 104604->104605 104605->104356 104607 857df0 __wsetenvp _memmove 104606->104607 104608 870db6 Mailbox 59 API calls 104607->104608 104627 853d3e __write_nolock 104626->104627 104628 857bcc 59 API calls 104627->104628 104633 853ea4 Mailbox 104627->104633 104630 853d70 104628->104630 104638 853da6 Mailbox 104630->104638 104752 8579f2 104630->104752 104631 8579f2 59 API calls 104631->104638 104632 853e77 104632->104633 104634 857de1 59 API calls 104632->104634 104633->104382 104636 853e98 104634->104636 104635 857de1 59 API calls 104635->104638 104637 853f74 59 API calls 104636->104637 104637->104633 104638->104631 104638->104632 104638->104633 104638->104635 104755 853f74 104638->104755 104765 854bb5 104640->104765 104645 854e08 LoadLibraryExW 104775 854b6a 104645->104775 104646 88d8e6 104647 854e4a 84 API calls 104646->104647 104649 88d8ed 104647->104649 104652 854b6a 3 API calls 104649->104652 104654 88d8f5 104652->104654 104653 854e2f 104653->104654 104655 854e3b 104653->104655 104801 854f0b 104654->104801 104656 854e4a 84 API calls 104655->104656 104658 8537d4 104656->104658 104658->104389 104658->104390 104661 88d91c 104809 854ec7 104661->104809 104663 88d929 104665 858052 104664->104665 104666 8537ef 104664->104666 105239 857f77 59 API calls 2 library calls 104665->105239 104668 85928a 104666->104668 104669 870db6 Mailbox 59 API calls 104668->104669 104670 8537fb 104669->104670 104670->104403 104672 8584cb 104671->104672 104674 8584f2 104672->104674 105240 8589b3 69 API calls Mailbox 104672->105240 104674->104407 104676 853ef3 104675->104676 104677 853eda 104675->104677 104679 857bcc 59 API calls 104676->104679 104678 858047 59 API calls 104677->104678 104680 853879 104678->104680 104679->104680 104681 872efd 104680->104681 104682 872f7e 104681->104682 104683 872f09 104681->104683 105243 872f90 60 API calls 3 library calls 104682->105243 104690 872f2e 104683->104690 105241 878b28 58 API calls __getptd_noexit 104683->105241 104686 872f8b 104686->104428 104687 872f15 105242 878db6 9 API calls __cftoe_l 104687->105242 104689 872f20 104689->104428 104690->104428 104692 8592d6 104691->104692 104693 870db6 Mailbox 59 API calls 104692->104693 104694 8592e4 104693->104694 104695 853924 104694->104695 105244 8591fc 59 API calls Mailbox 104694->105244 104697 859050 104695->104697 105245 859160 104697->105245 104699 85905f 104700 870db6 Mailbox 59 API calls 104699->104700 104701 853932 104699->104701 104700->104701 104702 858ee0 104701->104702 104703 88f17c 104702->104703 104705 858ef7 104702->104705 104703->104705 105272 858bdb 59 API calls Mailbox 104703->105272 104706 859040 104705->104706 104707 858ff8 104705->104707 104710 858fff 104705->104710 105259 859d3c 104706->105259 104709 870db6 Mailbox 59 API calls 104707->104709 104709->104710 104710->104456 104712 854ee5 85 API calls 104711->104712 104713 8b95ca 104712->104713 105275 8b9734 104713->105275 104716 854f0b 74 API calls 104717 8b95f7 104716->104717 104718 854f0b 74 API calls 104717->104718 104719 8b9607 104718->104719 104720 854f0b 74 API calls 104719->104720 104721 8b9622 104720->104721 104722 854f0b 74 API calls 104721->104722 104723 8b963d 104722->104723 104724 854ee5 85 API calls 104723->104724 104725 8b9654 104724->104725 104726 87571c __malloc_crt 58 API calls 104725->104726 104727 8b965b 104726->104727 104728 87571c __malloc_crt 58 API calls 104727->104728 104729 8b9665 104728->104729 104730 854f0b 74 API calls 104729->104730 104731 8b9679 104730->104731 104732 8b9109 GetSystemTimeAsFileTime 104731->104732 104733 8b968c 104732->104733 104734 8b96a1 104733->104734 104735 8b96b6 104733->104735 104736 872d55 _free 58 API calls 104734->104736 104737 8b971b 104735->104737 104738 8b96bc 104735->104738 104739 8b96a7 104736->104739 104741 872d55 _free 58 API calls 104737->104741 105281 8b8b06 104738->105281 104742 872d55 _free 58 API calls 104739->104742 104744 88d186 104741->104744 104742->104744 104744->104393 104746 854e4a 104744->104746 104745 872d55 _free 58 API calls 104745->104744 104747 854e54 104746->104747 104748 854e5b 104746->104748 104749 8753a6 __fcloseall 83 API calls 104747->104749 104750 854e7b FreeLibrary 104748->104750 104751 854e6a 104748->104751 104749->104748 104750->104751 104751->104393 104761 857e4f 104752->104761 104754 8579fd 104754->104630 104756 853f82 104755->104756 104760 853fa4 _memmove 104755->104760 104758 870db6 Mailbox 59 API calls 104756->104758 104757 870db6 Mailbox 59 API calls 104759 853fb8 104757->104759 104758->104760 104759->104638 104760->104757 104762 857e62 104761->104762 104764 857e5f _memmove 104761->104764 104763 870db6 Mailbox 59 API calls 104762->104763 104763->104764 104764->104754 104814 854c03 104765->104814 104768 854c03 2 API calls 104771 854bdc 104768->104771 104769 854bf5 104772 87525b 104769->104772 104770 854bec FreeLibrary 104770->104769 104771->104769 104771->104770 104818 875270 104772->104818 104774 854dfc 104774->104645 104774->104646 104976 854c36 104775->104976 104778 854b8f 104780 854ba1 FreeLibrary 104778->104780 104781 854baa 104778->104781 104779 854c36 2 API calls 104779->104778 104780->104781 104782 854c70 104781->104782 104783 870db6 Mailbox 59 API calls 104782->104783 104784 854c85 104783->104784 104980 85522e 104784->104980 104786 854c91 _memmove 104787 854ccc 104786->104787 104789 854dc1 104786->104789 104790 854d89 104786->104790 104788 854ec7 69 API calls 104787->104788 104797 854cd5 104788->104797 104994 8b991b 95 API calls 104789->104994 104983 854e89 CreateStreamOnHGlobal 104790->104983 104793 854f0b 74 API calls 104793->104797 104795 854d69 104795->104653 104796 88d8a7 104798 854ee5 85 API calls 104796->104798 104797->104793 104797->104795 104797->104796 104989 854ee5 104797->104989 104799 88d8bb 104798->104799 104800 854f0b 74 API calls 104799->104800 104800->104795 104802 88d9cd 104801->104802 104803 854f1d 104801->104803 105018 8755e2 104803->105018 104806 8b9109 105216 8b8f5f 104806->105216 104808 8b911f 104808->104661 104810 854ed6 104809->104810 104811 88d990 104809->104811 105221 875c60 104810->105221 104813 854ede 104813->104663 104815 854bd0 104814->104815 104816 854c0c LoadLibraryA 104814->104816 104815->104768 104815->104771 104816->104815 104817 854c1d GetProcAddress 104816->104817 104817->104815 104819 87527c __write 104818->104819 104820 87528f 104819->104820 104823 8752c0 104819->104823 104867 878b28 58 API calls __getptd_noexit 104820->104867 104822 875294 104868 878db6 9 API calls __cftoe_l 104822->104868 104837 8804e8 104823->104837 104826 8752c5 104827 8752ce 104826->104827 104828 8752db 104826->104828 104869 878b28 58 API calls __getptd_noexit 104827->104869 104830 875305 104828->104830 104831 8752e5 104828->104831 104852 880607 104830->104852 104870 878b28 58 API calls __getptd_noexit 104831->104870 104833 87529f __write @_EH4_CallFilterFunc@8 104833->104774 104838 8804f4 __write 104837->104838 104839 879c0b __lock 58 API calls 104838->104839 104849 880502 104839->104849 104840 880576 104872 8805fe 104840->104872 104841 88057d 104877 87881d 58 API calls 2 library calls 104841->104877 104844 8805f3 __write 104844->104826 104845 880584 104845->104840 104878 879e2b InitializeCriticalSectionAndSpinCount 104845->104878 104847 879c93 __mtinitlocknum 58 API calls 104847->104849 104849->104840 104849->104841 104849->104847 104875 876c50 59 API calls __lock 104849->104875 104876 876cba LeaveCriticalSection LeaveCriticalSection _doexit 104849->104876 104850 8805aa EnterCriticalSection 104850->104840 104861 880627 __wopenfile 104852->104861 104853 880641 104883 878b28 58 API calls __getptd_noexit 104853->104883 104854 8807fc 104854->104853 104859 88085f 104854->104859 104856 880646 104884 878db6 9 API calls __cftoe_l 104856->104884 104858 875310 104871 875332 LeaveCriticalSection LeaveCriticalSection _fprintf 104858->104871 104880 8885a1 104859->104880 104861->104853 104861->104854 104861->104861 104885 8737cb 60 API calls 2 library calls 104861->104885 104863 8807f5 104863->104854 104886 8737cb 60 API calls 2 library calls 104863->104886 104865 880814 104865->104854 104887 8737cb 60 API calls 2 library calls 104865->104887 104867->104822 104868->104833 104869->104833 104870->104833 104871->104833 104879 879d75 LeaveCriticalSection 104872->104879 104874 880605 104874->104844 104875->104849 104876->104849 104877->104845 104878->104850 104879->104874 104888 887d85 104880->104888 104882 8885ba 104882->104858 104883->104856 104884->104858 104885->104863 104886->104865 104887->104854 104891 887d91 __write 104888->104891 104889 887da7 104973 878b28 58 API calls __getptd_noexit 104889->104973 104891->104889 104893 887ddd 104891->104893 104892 887dac 104974 878db6 9 API calls __cftoe_l 104892->104974 104899 887e4e 104893->104899 104896 887df9 104975 887e22 LeaveCriticalSection __unlock_fhandle 104896->104975 104898 887db6 __write 104898->104882 104900 887e6e 104899->104900 104901 8744ea __wsopen_nolock 58 API calls 104900->104901 104904 887e8a 104901->104904 104902 878dc6 __invoke_watson 8 API calls 104903 8885a0 104902->104903 104905 887d85 __wsopen_helper 103 API calls 104903->104905 104906 887ec4 104904->104906 104909 887ee7 104904->104909 104922 887fc1 104904->104922 104907 8885ba 104905->104907 104908 878af4 __write 58 API calls 104906->104908 104907->104896 104910 887ec9 104908->104910 104913 887fa5 104909->104913 104921 887f83 104909->104921 104911 878b28 __cftoe_l 58 API calls 104910->104911 104912 887ed6 104911->104912 104914 878db6 __cftoe_l 9 API calls 104912->104914 104915 878af4 __write 58 API calls 104913->104915 104916 887ee0 104914->104916 104917 887faa 104915->104917 104916->104896 104918 878b28 __cftoe_l 58 API calls 104917->104918 104919 887fb7 104918->104919 104920 878db6 __cftoe_l 9 API calls 104919->104920 104920->104922 104923 87d294 __alloc_osfhnd 61 API calls 104921->104923 104922->104902 104924 888051 104923->104924 104925 88805b 104924->104925 104926 88807e 104924->104926 104928 878af4 __write 58 API calls 104925->104928 104927 887cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 104926->104927 104938 8880a0 104927->104938 104929 888060 104928->104929 104931 878b28 __cftoe_l 58 API calls 104929->104931 104930 88811e GetFileType 104933 888129 GetLastError 104930->104933 104934 88816b 104930->104934 104932 88806a 104931->104932 104936 878b28 __cftoe_l 58 API calls 104932->104936 104937 878b07 __dosmaperr 58 API calls 104933->104937 104945 87d52a __set_osfhnd 59 API calls 104934->104945 104935 8880ec GetLastError 104939 878b07 __dosmaperr 58 API calls 104935->104939 104936->104916 104940 888150 CloseHandle 104937->104940 104938->104930 104938->104935 104941 887cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 104938->104941 104942 888111 104939->104942 104940->104942 104943 88815e 104940->104943 104944 8880e1 104941->104944 104946 878b28 __cftoe_l 58 API calls 104942->104946 104947 878b28 __cftoe_l 58 API calls 104943->104947 104944->104930 104944->104935 104950 888189 104945->104950 104946->104922 104948 888163 104947->104948 104948->104942 104949 888344 104949->104922 104952 888517 CloseHandle 104949->104952 104950->104949 104951 8818c1 __lseeki64_nolock 60 API calls 104950->104951 104967 88820a 104950->104967 104953 8881f3 104951->104953 104954 887cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 104952->104954 104956 878af4 __write 58 API calls 104953->104956 104953->104967 104955 88853e 104954->104955 104958 888572 104955->104958 104959 888546 GetLastError 104955->104959 104956->104967 104957 880e5b 70 API calls __read_nolock 104957->104967 104958->104922 104960 878b07 __dosmaperr 58 API calls 104959->104960 104962 888552 104960->104962 104961 88823c 104964 8897a2 __chsize_nolock 82 API calls 104961->104964 104961->104967 104965 87d43d __free_osfhnd 59 API calls 104962->104965 104963 880add __close_nolock 61 API calls 104963->104967 104964->104961 104965->104958 104966 87d886 __write 78 API calls 104966->104967 104967->104949 104967->104957 104967->104961 104967->104963 104967->104966 104968 8883c1 104967->104968 104971 8818c1 60 API calls __lseeki64_nolock 104967->104971 104969 880add __close_nolock 61 API calls 104968->104969 104970 8883c8 104969->104970 104972 878b28 __cftoe_l 58 API calls 104970->104972 104971->104967 104972->104922 104973->104892 104974->104898 104975->104898 104977 854b83 104976->104977 104978 854c3f LoadLibraryA 104976->104978 104977->104778 104977->104779 104978->104977 104979 854c50 GetProcAddress 104978->104979 104979->104977 104981 870db6 Mailbox 59 API calls 104980->104981 104982 855240 104981->104982 104982->104786 104984 854ec0 104983->104984 104985 854ea3 FindResourceExW 104983->104985 104984->104787 104985->104984 104986 88d933 LoadResource 104985->104986 104986->104984 104987 88d948 SizeofResource 104986->104987 104987->104984 104988 88d95c LockResource 104987->104988 104988->104984 104990 854ef4 104989->104990 104991 88d9ab 104989->104991 104995 87584d 104990->104995 104993 854f02 104993->104797 104994->104787 104998 875859 __write 104995->104998 104996 87586b 105008 878b28 58 API calls __getptd_noexit 104996->105008 104998->104996 104999 875891 104998->104999 105010 876c11 104999->105010 105000 875870 105009 878db6 9 API calls __cftoe_l 105000->105009 105003 875897 105016 8757be 83 API calls 5 library calls 105003->105016 105005 8758a6 105017 8758c8 LeaveCriticalSection LeaveCriticalSection _fprintf 105005->105017 105007 87587b __write 105007->104993 105008->105000 105009->105007 105011 876c43 EnterCriticalSection 105010->105011 105012 876c21 105010->105012 105014 876c39 105011->105014 105012->105011 105013 876c29 105012->105013 105015 879c0b __lock 58 API calls 105013->105015 105014->105003 105015->105014 105016->105005 105017->105007 105021 8755fd 105018->105021 105020 854f2e 105020->104806 105022 875609 __write 105021->105022 105023 87564c 105022->105023 105024 875644 __write 105022->105024 105027 87561f _memset 105022->105027 105025 876c11 __lock_file 59 API calls 105023->105025 105024->105020 105026 875652 105025->105026 105034 87541d 105026->105034 105048 878b28 58 API calls __getptd_noexit 105027->105048 105030 875639 105049 878db6 9 API calls __cftoe_l 105030->105049 105035 875453 105034->105035 105038 875438 _memset 105034->105038 105050 875686 LeaveCriticalSection LeaveCriticalSection _fprintf 105035->105050 105036 875443 105146 878b28 58 API calls __getptd_noexit 105036->105146 105038->105035 105038->105036 105046 875493 105038->105046 105039 875448 105147 878db6 9 API calls __cftoe_l 105039->105147 105042 8755a4 _memset 105149 878b28 58 API calls __getptd_noexit 105042->105149 105046->105035 105046->105042 105051 8746e6 105046->105051 105058 880e5b 105046->105058 105126 880ba7 105046->105126 105148 880cc8 58 API calls 3 library calls 105046->105148 105048->105030 105049->105024 105050->105024 105052 874705 105051->105052 105053 8746f0 105051->105053 105052->105046 105150 878b28 58 API calls __getptd_noexit 105053->105150 105055 8746f5 105151 878db6 9 API calls __cftoe_l 105055->105151 105057 874700 105057->105046 105059 880e7c 105058->105059 105060 880e93 105058->105060 105161 878af4 58 API calls __getptd_noexit 105059->105161 105062 8815cb 105060->105062 105067 880ecd 105060->105067 105177 878af4 58 API calls __getptd_noexit 105062->105177 105064 880e81 105162 878b28 58 API calls __getptd_noexit 105064->105162 105065 8815d0 105178 878b28 58 API calls __getptd_noexit 105065->105178 105069 880ed5 105067->105069 105074 880eec 105067->105074 105163 878af4 58 API calls __getptd_noexit 105069->105163 105070 880ee1 105179 878db6 9 API calls __cftoe_l 105070->105179 105072 880eda 105164 878b28 58 API calls __getptd_noexit 105072->105164 105075 880f01 105074->105075 105078 880f1b 105074->105078 105079 880f39 105074->105079 105106 880e88 105074->105106 105165 878af4 58 API calls __getptd_noexit 105075->105165 105078->105075 105083 880f26 105078->105083 105166 87881d 58 API calls 2 library calls 105079->105166 105081 880f49 105084 880f6c 105081->105084 105085 880f51 105081->105085 105152 885c6b 105083->105152 105169 8818c1 60 API calls 3 library calls 105084->105169 105167 878b28 58 API calls __getptd_noexit 105085->105167 105086 88103a 105088 8810b3 ReadFile 105086->105088 105093 881050 GetConsoleMode 105086->105093 105091 881593 GetLastError 105088->105091 105092 8810d5 105088->105092 105090 880f56 105168 878af4 58 API calls __getptd_noexit 105090->105168 105095 8815a0 105091->105095 105096 881093 105091->105096 105092->105091 105100 8810a5 105092->105100 105097 8810b0 105093->105097 105098 881064 105093->105098 105175 878b28 58 API calls __getptd_noexit 105095->105175 105109 881099 105096->105109 105170 878b07 58 API calls 3 library calls 105096->105170 105097->105088 105098->105097 105101 88106a ReadConsoleW 105098->105101 105108 881377 105100->105108 105100->105109 105111 88110a 105100->105111 105101->105100 105104 88108d GetLastError 105101->105104 105103 8815a5 105176 878af4 58 API calls __getptd_noexit 105103->105176 105104->105096 105106->105046 105107 872d55 _free 58 API calls 105107->105106 105108->105109 105113 88147d ReadFile 105108->105113 105109->105106 105109->105107 105112 881176 ReadFile 105111->105112 105118 8811f7 105111->105118 105114 881197 GetLastError 105112->105114 105121 8811a1 105112->105121 105117 8814a0 GetLastError 105113->105117 105124 8814ae 105113->105124 105114->105121 105115 8812b4 105120 881264 MultiByteToWideChar 105115->105120 105173 8818c1 60 API calls 3 library calls 105115->105173 105116 8812a4 105172 878b28 58 API calls __getptd_noexit 105116->105172 105117->105124 105118->105109 105118->105115 105118->105116 105118->105120 105120->105104 105120->105109 105121->105111 105171 8818c1 60 API calls 3 library calls 105121->105171 105124->105108 105174 8818c1 60 API calls 3 library calls 105124->105174 105127 880bb2 105126->105127 105131 880bc7 105126->105131 105213 878b28 58 API calls __getptd_noexit 105127->105213 105129 880bb7 105214 878db6 9 API calls __cftoe_l 105129->105214 105132 880bfc 105131->105132 105138 880bc2 105131->105138 105215 885fe4 58 API calls __malloc_crt 105131->105215 105134 8746e6 _fprintf 58 API calls 105132->105134 105135 880c10 105134->105135 105180 880d47 105135->105180 105137 880c17 105137->105138 105139 8746e6 _fprintf 58 API calls 105137->105139 105138->105046 105140 880c3a 105139->105140 105140->105138 105141 8746e6 _fprintf 58 API calls 105140->105141 105142 880c46 105141->105142 105142->105138 105143 8746e6 _fprintf 58 API calls 105142->105143 105144 880c53 105143->105144 105145 8746e6 _fprintf 58 API calls 105144->105145 105145->105138 105146->105039 105147->105035 105148->105046 105149->105039 105150->105055 105151->105057 105153 885c83 105152->105153 105154 885c76 105152->105154 105156 885c8f 105153->105156 105157 878b28 __cftoe_l 58 API calls 105153->105157 105155 878b28 __cftoe_l 58 API calls 105154->105155 105158 885c7b 105155->105158 105156->105086 105159 885cb0 105157->105159 105158->105086 105160 878db6 __cftoe_l 9 API calls 105159->105160 105160->105158 105161->105064 105162->105106 105163->105072 105164->105070 105165->105072 105166->105081 105167->105090 105168->105106 105169->105083 105170->105109 105171->105121 105172->105109 105173->105120 105174->105124 105175->105103 105176->105109 105177->105065 105178->105070 105179->105106 105181 880d53 __write 105180->105181 105182 880d60 105181->105182 105183 880d77 105181->105183 105184 878af4 __write 58 API calls 105182->105184 105185 880e3b 105183->105185 105188 880d8b 105183->105188 105187 880d65 105184->105187 105186 878af4 __write 58 API calls 105185->105186 105189 880dae 105186->105189 105190 878b28 __cftoe_l 58 API calls 105187->105190 105191 880da9 105188->105191 105192 880db6 105188->105192 105198 878b28 __cftoe_l 58 API calls 105189->105198 105205 880d6c __write 105190->105205 105195 878af4 __write 58 API calls 105191->105195 105193 880dd8 105192->105193 105194 880dc3 105192->105194 105197 87d206 ___lock_fhandle 59 API calls 105193->105197 105196 878af4 __write 58 API calls 105194->105196 105195->105189 105199 880dc8 105196->105199 105200 880dde 105197->105200 105201 880dd0 105198->105201 105202 878b28 __cftoe_l 58 API calls 105199->105202 105203 880df1 105200->105203 105204 880e04 105200->105204 105207 878db6 __cftoe_l 9 API calls 105201->105207 105202->105201 105206 880e5b __read_nolock 70 API calls 105203->105206 105208 878b28 __cftoe_l 58 API calls 105204->105208 105205->105137 105209 880dfd 105206->105209 105207->105205 105210 880e09 105208->105210 105212 880e33 __read LeaveCriticalSection 105209->105212 105211 878af4 __write 58 API calls 105210->105211 105211->105209 105212->105205 105213->105129 105214->105138 105215->105132 105219 87520a GetSystemTimeAsFileTime 105216->105219 105218 8b8f6e 105218->104808 105220 875238 __aulldiv 105219->105220 105220->105218 105222 875c6c __write 105221->105222 105223 875c93 105222->105223 105224 875c7e 105222->105224 105226 876c11 __lock_file 59 API calls 105223->105226 105235 878b28 58 API calls __getptd_noexit 105224->105235 105228 875c99 105226->105228 105227 875c83 105236 878db6 9 API calls __cftoe_l 105227->105236 105237 8758d0 67 API calls 6 library calls 105228->105237 105231 875ca4 105238 875cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 105231->105238 105233 875cb6 105234 875c8e __write 105233->105234 105234->104813 105235->105227 105236->105234 105237->105231 105238->105233 105239->104666 105240->104674 105241->104687 105242->104689 105243->104686 105244->104695 105246 859169 Mailbox 105245->105246 105247 88f19f 105246->105247 105252 859173 105246->105252 105249 870db6 Mailbox 59 API calls 105247->105249 105248 85917a 105248->104699 105250 88f1ab 105249->105250 105252->105248 105253 859c90 105252->105253 105254 859c9b 105253->105254 105255 859cd2 105254->105255 105258 858cd4 59 API calls Mailbox 105254->105258 105255->105252 105257 859cfd 105257->105252 105258->105257 105260 859d4a 105259->105260 105270 859d78 Mailbox 105259->105270 105261 859d9d 105260->105261 105262 859d50 Mailbox 105260->105262 105264 858047 59 API calls 105261->105264 105263 859d64 105262->105263 105267 88fa0f 105262->105267 105265 859dcc 105263->105265 105266 859d6f 105263->105266 105263->105270 105264->105270 105265->105270 105273 858cd4 59 API calls Mailbox 105265->105273 105268 88f9e6 VariantClear 105266->105268 105266->105270 105267->105270 105274 8a6e8f 59 API calls 105267->105274 105268->105270 105270->104710 105272->104705 105273->105270 105274->105270 105278 8b9748 __tzset_nolock _wcscmp 105275->105278 105276 8b9109 GetSystemTimeAsFileTime 105276->105278 105277 8b95dc 105277->104716 105277->104744 105278->105276 105278->105277 105279 854f0b 74 API calls 105278->105279 105280 854ee5 85 API calls 105278->105280 105279->105278 105280->105278 105282 8b8b11 105281->105282 105283 8b8b1f 105281->105283 105284 87525b 115 API calls 105282->105284 105285 8b8b64 105283->105285 105286 87525b 115 API calls 105283->105286 105296 8b8b28 105283->105296 105284->105283 105312 8b8d91 105285->105312 105287 8b8b49 105286->105287 105287->105285 105290 8b8b52 105287->105290 105289 8b8ba8 105291 8b8bcd 105289->105291 105292 8b8bac 105289->105292 105293 8753a6 __fcloseall 83 API calls 105290->105293 105290->105296 105316 8b89a9 105291->105316 105295 8b8bb9 105292->105295 105298 8753a6 __fcloseall 83 API calls 105292->105298 105293->105296 105295->105296 105299 8753a6 __fcloseall 83 API calls 105295->105299 105296->104745 105298->105295 105299->105296 105300 8b8bfb 105325 8b8c2b 105300->105325 105301 8b8bdb 105303 8b8be8 105301->105303 105305 8753a6 __fcloseall 83 API calls 105301->105305 105303->105296 105307 8753a6 __fcloseall 83 API calls 105303->105307 105305->105303 105307->105296 105309 8b8c16 105309->105296 105311 8753a6 __fcloseall 83 API calls 105309->105311 105311->105296 105313 8b8db6 105312->105313 105315 8b8d9f __tzset_nolock _memmove 105312->105315 105314 8755e2 __fread_nolock 74 API calls 105313->105314 105314->105315 105315->105289 105317 87571c __malloc_crt 58 API calls 105316->105317 105318 8b89b8 105317->105318 105319 87571c __malloc_crt 58 API calls 105318->105319 105320 8b89cc 105319->105320 105321 87571c __malloc_crt 58 API calls 105320->105321 105322 8b89e0 105321->105322 105323 8b8d0d 58 API calls 105322->105323 105324 8b89f3 105322->105324 105323->105324 105324->105300 105324->105301 105329 8b8c40 105325->105329 105326 8b8cf8 105358 8b8f35 105326->105358 105327 8b8a05 74 API calls 105327->105329 105329->105326 105329->105327 105332 8b8c02 105329->105332 105354 8b8e12 105329->105354 105362 8b8aa1 74 API calls 105329->105362 105333 8b8d0d 105332->105333 105334 8b8d1a 105333->105334 105337 8b8d20 105333->105337 105335 872d55 _free 58 API calls 105334->105335 105335->105337 105336 8b8d31 105339 8b8c09 105336->105339 105340 872d55 _free 58 API calls 105336->105340 105337->105336 105338 872d55 _free 58 API calls 105337->105338 105338->105336 105339->105309 105341 8753a6 105339->105341 105340->105339 105342 8753b2 __write 105341->105342 105343 8753c6 105342->105343 105344 8753de 105342->105344 105411 878b28 58 API calls __getptd_noexit 105343->105411 105346 876c11 __lock_file 59 API calls 105344->105346 105351 8753d6 __write 105344->105351 105348 8753f0 105346->105348 105347 8753cb 105412 878db6 9 API calls __cftoe_l 105347->105412 105395 87533a 105348->105395 105351->105309 105355 8b8e21 105354->105355 105357 8b8e61 105354->105357 105355->105329 105355->105355 105357->105355 105363 8b8ee8 105357->105363 105359 8b8f42 105358->105359 105361 8b8f53 105358->105361 105360 874863 80 API calls 105359->105360 105360->105361 105361->105332 105362->105329 105364 8b8f25 105363->105364 105365 8b8f14 105363->105365 105364->105357 105367 874863 105365->105367 105368 87486f __write 105367->105368 105369 87489d __write 105368->105369 105370 8748a5 105368->105370 105371 87488d 105368->105371 105369->105364 105373 876c11 __lock_file 59 API calls 105370->105373 105392 878b28 58 API calls __getptd_noexit 105371->105392 105375 8748ab 105373->105375 105374 874892 105393 878db6 9 API calls __cftoe_l 105374->105393 105380 87470a 105375->105380 105381 874719 105380->105381 105386 874737 105380->105386 105382 874727 105381->105382 105381->105386 105390 874751 _memmove 105381->105390 105383 878b28 __cftoe_l 58 API calls 105382->105383 105384 87472c 105383->105384 105385 878db6 __cftoe_l 9 API calls 105384->105385 105385->105386 105394 8748dd LeaveCriticalSection LeaveCriticalSection _fprintf 105386->105394 105387 87ae1e __flsbuf 78 API calls 105387->105390 105388 874a3d __flush 78 API calls 105388->105390 105389 8746e6 _fprintf 58 API calls 105389->105390 105390->105386 105390->105387 105390->105388 105390->105389 105391 87d886 __write 78 API calls 105390->105391 105391->105390 105392->105374 105393->105369 105394->105369 105396 87535d 105395->105396 105397 875349 105395->105397 105409 875359 105396->105409 105414 874a3d 105396->105414 105450 878b28 58 API calls __getptd_noexit 105397->105450 105399 87534e 105451 878db6 9 API calls __cftoe_l 105399->105451 105405 8746e6 _fprintf 58 API calls 105406 875377 105405->105406 105424 880a02 105406->105424 105408 87537d 105408->105409 105410 872d55 _free 58 API calls 105408->105410 105413 875415 LeaveCriticalSection LeaveCriticalSection _fprintf 105409->105413 105410->105409 105411->105347 105412->105351 105413->105351 105415 874a50 105414->105415 105419 874a74 105414->105419 105416 8746e6 _fprintf 58 API calls 105415->105416 105415->105419 105417 874a6d 105416->105417 105452 87d886 105417->105452 105420 880b77 105419->105420 105421 880b84 105420->105421 105423 875371 105420->105423 105422 872d55 _free 58 API calls 105421->105422 105421->105423 105422->105423 105423->105405 105425 880a0e __write 105424->105425 105426 880a1b 105425->105426 105427 880a32 105425->105427 105577 878af4 58 API calls __getptd_noexit 105426->105577 105429 880abd 105427->105429 105431 880a42 105427->105431 105582 878af4 58 API calls __getptd_noexit 105429->105582 105430 880a20 105578 878b28 58 API calls __getptd_noexit 105430->105578 105434 880a6a 105431->105434 105435 880a60 105431->105435 105437 87d206 ___lock_fhandle 59 API calls 105434->105437 105579 878af4 58 API calls __getptd_noexit 105435->105579 105436 880a65 105583 878b28 58 API calls __getptd_noexit 105436->105583 105440 880a70 105437->105440 105442 880a8e 105440->105442 105443 880a83 105440->105443 105441 880ac9 105584 878db6 9 API calls __cftoe_l 105441->105584 105580 878b28 58 API calls __getptd_noexit 105442->105580 105562 880add 105443->105562 105446 880a27 __write 105446->105408 105448 880a89 105581 880ab5 LeaveCriticalSection __unlock_fhandle 105448->105581 105450->105399 105451->105409 105453 87d892 __write 105452->105453 105454 87d8b6 105453->105454 105455 87d89f 105453->105455 105457 87d955 105454->105457 105458 87d8ca 105454->105458 105553 878af4 58 API calls __getptd_noexit 105455->105553 105559 878af4 58 API calls __getptd_noexit 105457->105559 105461 87d8f2 105458->105461 105462 87d8e8 105458->105462 105460 87d8a4 105554 878b28 58 API calls __getptd_noexit 105460->105554 105480 87d206 105461->105480 105555 878af4 58 API calls __getptd_noexit 105462->105555 105463 87d8ed 105560 878b28 58 API calls __getptd_noexit 105463->105560 105467 87d8f8 105469 87d91e 105467->105469 105470 87d90b 105467->105470 105556 878b28 58 API calls __getptd_noexit 105469->105556 105489 87d975 105470->105489 105471 87d961 105561 878db6 9 API calls __cftoe_l 105471->105561 105475 87d8ab __write 105475->105419 105476 87d917 105558 87d94d LeaveCriticalSection __unlock_fhandle 105476->105558 105477 87d923 105557 878af4 58 API calls __getptd_noexit 105477->105557 105481 87d212 __write 105480->105481 105482 87d261 EnterCriticalSection 105481->105482 105483 879c0b __lock 58 API calls 105481->105483 105484 87d287 __write 105482->105484 105485 87d237 105483->105485 105484->105467 105486 87d24f 105485->105486 105487 879e2b __alloc_osfhnd InitializeCriticalSectionAndSpinCount 105485->105487 105488 87d28b ___lock_fhandle LeaveCriticalSection 105486->105488 105487->105486 105488->105482 105490 87d982 __write_nolock 105489->105490 105491 87d9c1 105490->105491 105492 87d9e0 105490->105492 105522 87d9b6 105490->105522 105493 878af4 __write 58 API calls 105491->105493 105497 87da38 105492->105497 105498 87da1c 105492->105498 105496 87d9c6 105493->105496 105494 87c5f6 __atodbl_l 6 API calls 105495 87e1d6 105494->105495 105495->105476 105499 878b28 __cftoe_l 58 API calls 105496->105499 105500 87da51 105497->105500 105503 8818c1 __lseeki64_nolock 60 API calls 105497->105503 105501 878af4 __write 58 API calls 105498->105501 105502 87d9cd 105499->105502 105504 885c6b __flswbuf 58 API calls 105500->105504 105505 87da21 105501->105505 105506 878db6 __cftoe_l 9 API calls 105502->105506 105503->105500 105507 87da5f 105504->105507 105508 878b28 __cftoe_l 58 API calls 105505->105508 105506->105522 105509 87ddb8 105507->105509 105514 8799ac __setmbcp 58 API calls 105507->105514 105510 87da28 105508->105510 105512 87ddd6 105509->105512 105513 87e14b WriteFile 105509->105513 105511 878db6 __cftoe_l 9 API calls 105510->105511 105511->105522 105515 87defa 105512->105515 105520 87ddec 105512->105520 105516 87ddab GetLastError 105513->105516 105524 87dd78 105513->105524 105517 87da8b GetConsoleMode 105514->105517 105526 87dfef 105515->105526 105528 87df05 105515->105528 105516->105524 105517->105509 105519 87daca 105517->105519 105518 87e184 105518->105522 105523 878b28 __cftoe_l 58 API calls 105518->105523 105519->105509 105525 87dada GetConsoleCP 105519->105525 105520->105518 105521 87de5b WriteFile 105520->105521 105521->105516 105527 87de98 105521->105527 105522->105494 105529 87e1b2 105523->105529 105524->105518 105524->105522 105530 87ded8 105524->105530 105525->105518 105548 87db09 105525->105548 105526->105518 105531 87e064 WideCharToMultiByte 105526->105531 105527->105520 105532 87debc 105527->105532 105528->105518 105533 87df6a WriteFile 105528->105533 105534 878af4 __write 58 API calls 105529->105534 105535 87dee3 105530->105535 105536 87e17b 105530->105536 105531->105516 105545 87e0ab 105531->105545 105532->105524 105533->105516 105538 87dfb9 105533->105538 105534->105522 105539 878b28 __cftoe_l 58 API calls 105535->105539 105537 878b07 __dosmaperr 58 API calls 105536->105537 105537->105522 105538->105524 105538->105528 105538->105532 105541 87dee8 105539->105541 105540 87e0b3 WriteFile 105543 87e106 GetLastError 105540->105543 105540->105545 105544 878af4 __write 58 API calls 105541->105544 105542 8735f5 __write_nolock 58 API calls 105542->105548 105543->105545 105544->105522 105545->105524 105545->105526 105545->105532 105545->105540 105546 8862ba 60 API calls __write_nolock 105546->105548 105547 887a5e WriteConsoleW CreateFileW __putwch_nolock 105551 87dc5f 105547->105551 105548->105524 105548->105542 105548->105546 105549 87dbf2 WideCharToMultiByte 105548->105549 105548->105551 105549->105524 105550 87dc2d WriteFile 105549->105550 105550->105516 105550->105551 105551->105516 105551->105524 105551->105547 105551->105548 105552 87dc87 WriteFile 105551->105552 105552->105516 105552->105551 105553->105460 105554->105475 105555->105463 105556->105477 105557->105476 105558->105475 105559->105463 105560->105471 105561->105475 105585 87d4c3 105562->105585 105564 880b41 105598 87d43d 59 API calls 2 library calls 105564->105598 105566 880aeb 105566->105564 105567 880b1f 105566->105567 105569 87d4c3 __chsize_nolock 58 API calls 105566->105569 105567->105564 105570 87d4c3 __chsize_nolock 58 API calls 105567->105570 105568 880b49 105571 880b6b 105568->105571 105599 878b07 58 API calls 3 library calls 105568->105599 105572 880b16 105569->105572 105573 880b2b CloseHandle 105570->105573 105571->105448 105575 87d4c3 __chsize_nolock 58 API calls 105572->105575 105573->105564 105576 880b37 GetLastError 105573->105576 105575->105567 105576->105564 105577->105430 105578->105446 105579->105436 105580->105448 105581->105446 105582->105436 105583->105441 105584->105446 105586 87d4e3 105585->105586 105587 87d4ce 105585->105587 105589 878af4 __write 58 API calls 105586->105589 105593 87d508 105586->105593 105588 878af4 __write 58 API calls 105587->105588 105590 87d4d3 105588->105590 105591 87d512 105589->105591 105592 878b28 __cftoe_l 58 API calls 105590->105592 105594 878b28 __cftoe_l 58 API calls 105591->105594 105595 87d4db 105592->105595 105593->105566 105596 87d51a 105594->105596 105595->105566 105597 878db6 __cftoe_l 9 API calls 105596->105597 105597->105595 105598->105568 105599->105571 105662 881940 105600->105662 105603 85477c 105606 857bcc 59 API calls 105603->105606 105604 854799 105668 857d8c 105604->105668 105607 854788 105606->105607 105664 857726 105607->105664 105610 870791 105611 87079e __write_nolock 105610->105611 105612 87079f GetLongPathNameW 105611->105612 105613 857bcc 59 API calls 105612->105613 105614 8572bd 105613->105614 105615 85700b 105614->105615 105616 857667 59 API calls 105615->105616 105617 85701d 105616->105617 105618 854750 60 API calls 105617->105618 105619 857028 105618->105619 105620 857033 105619->105620 105624 88e885 105619->105624 105622 853f74 59 API calls 105620->105622 105623 85703f 105622->105623 105676 8534c2 105623->105676 105625 88e89f 105624->105625 105682 857908 61 API calls 105624->105682 105627 857052 Mailbox 105627->104472 105629 854ddd 136 API calls 105628->105629 105630 85688f 105629->105630 105631 88e031 105630->105631 105633 854ddd 136 API calls 105630->105633 105632 8b955b 122 API calls 105631->105632 105634 88e046 105632->105634 105635 8568a3 105633->105635 105636 88e04a 105634->105636 105637 88e067 105634->105637 105635->105631 105638 8568ab 105635->105638 105639 854e4a 84 API calls 105636->105639 105640 870db6 Mailbox 59 API calls 105637->105640 105641 8568b7 105638->105641 105642 88e052 105638->105642 105639->105642 105661 88e0ac Mailbox 105640->105661 105683 856a8c 105641->105683 105790 8b42f8 90 API calls _wprintf 105642->105790 105645 88e060 105645->105637 105647 88e260 105648 872d55 _free 58 API calls 105647->105648 105649 88e268 105648->105649 105650 854e4a 84 API calls 105649->105650 105655 88e271 105650->105655 105654 872d55 _free 58 API calls 105654->105655 105655->105654 105657 854e4a 84 API calls 105655->105657 105794 8af7a1 89 API calls 4 library calls 105655->105794 105657->105655 105658 857de1 59 API calls 105658->105661 105661->105647 105661->105655 105661->105658 105776 85750f 105661->105776 105784 85735d 105661->105784 105791 8af73d 59 API calls 2 library calls 105661->105791 105792 8af65e 61 API calls 2 library calls 105661->105792 105793 8b737f 59 API calls Mailbox 105661->105793 105663 85475d GetFullPathNameW 105662->105663 105663->105603 105663->105604 105665 857734 105664->105665 105672 857d2c 105665->105672 105667 854794 105667->105610 105669 857da6 105668->105669 105671 857d99 105668->105671 105670 870db6 Mailbox 59 API calls 105669->105670 105670->105671 105671->105607 105673 857d3a 105672->105673 105675 857d43 _memmove 105672->105675 105674 857e4f 59 API calls 105673->105674 105673->105675 105674->105675 105675->105667 105677 8534d4 105676->105677 105681 8534f3 _memmove 105676->105681 105679 870db6 Mailbox 59 API calls 105677->105679 105678 870db6 Mailbox 59 API calls 105680 85350a 105678->105680 105679->105681 105680->105627 105681->105678 105682->105624 105684 856ab5 105683->105684 105685 88e41e 105683->105685 105800 8557a6 60 API calls Mailbox 105684->105800 105867 8af7a1 89 API calls 4 library calls 105685->105867 105688 856ad7 105801 8557f6 67 API calls 105688->105801 105689 88e431 105868 8af7a1 89 API calls 4 library calls 105689->105868 105691 856aec 105691->105689 105693 856af4 105691->105693 105695 857667 59 API calls 105693->105695 105694 88e44d 105697 856b61 105694->105697 105696 856b00 105695->105696 105802 870957 60 API calls __write_nolock 105696->105802 105700 88e460 105697->105700 105701 856b6f 105697->105701 105699 856b0c 105702 857667 59 API calls 105699->105702 105703 855c6f CloseHandle 105700->105703 105704 857667 59 API calls 105701->105704 105705 856b18 105702->105705 105706 88e46c 105703->105706 105707 856b78 105704->105707 105708 854750 60 API calls 105705->105708 105709 854ddd 136 API calls 105706->105709 105710 857667 59 API calls 105707->105710 105711 856b26 105708->105711 105712 88e488 105709->105712 105713 856b81 105710->105713 105803 855850 ReadFile SetFilePointerEx 105711->105803 105715 88e4b1 105712->105715 105719 8b955b 122 API calls 105712->105719 105805 85459b 105713->105805 105869 8af7a1 89 API calls 4 library calls 105715->105869 105718 856b52 105804 855aee SetFilePointerEx SetFilePointerEx 105718->105804 105724 88e4a4 105719->105724 105720 856b98 105721 857b2e 59 API calls 105720->105721 105725 856ba9 SetCurrentDirectoryW 105721->105725 105722 88e4c8 105754 856d0c Mailbox 105722->105754 105726 88e4ac 105724->105726 105727 88e4cd 105724->105727 105732 856bbc Mailbox 105725->105732 105729 854e4a 84 API calls 105726->105729 105728 854e4a 84 API calls 105727->105728 105730 88e4d2 105728->105730 105729->105715 105731 870db6 Mailbox 59 API calls 105730->105731 105738 88e506 105731->105738 105734 870db6 Mailbox 59 API calls 105732->105734 105736 856bcf 105734->105736 105735 853bbb 105735->104339 105735->104365 105737 85522e 59 API calls 105736->105737 105765 856bda Mailbox __wsetenvp 105737->105765 105739 85750f 59 API calls 105738->105739 105773 88e54f Mailbox 105739->105773 105740 856ce7 105863 855c6f 105740->105863 105743 88e740 105874 8b72df 59 API calls Mailbox 105743->105874 105744 856cf3 SetCurrentDirectoryW 105744->105754 105747 88e762 105875 8cfbce 59 API calls 2 library calls 105747->105875 105750 88e76f 105752 872d55 _free 58 API calls 105750->105752 105751 88e7d9 105878 8af7a1 89 API calls 4 library calls 105751->105878 105752->105754 105795 8557d4 105754->105795 105756 85750f 59 API calls 105756->105773 105757 88e7f2 105757->105740 105759 88e7d1 105877 8af5f7 59 API calls 4 library calls 105759->105877 105762 857de1 59 API calls 105762->105765 105765->105740 105765->105751 105765->105759 105765->105762 105856 85586d 67 API calls _wcscpy 105765->105856 105857 856f5d GetStringTypeW 105765->105857 105858 856ecc 60 API calls __wcsnicmp 105765->105858 105859 856faa GetStringTypeW __wsetenvp 105765->105859 105860 87363d GetStringTypeW _iswctype 105765->105860 105861 8568dc 165 API calls 3 library calls 105765->105861 105862 857213 59 API calls Mailbox 105765->105862 105766 857de1 59 API calls 105766->105773 105770 88e792 105876 8af7a1 89 API calls 4 library calls 105770->105876 105772 88e7ab 105774 872d55 _free 58 API calls 105772->105774 105773->105743 105773->105756 105773->105766 105773->105770 105870 8af73d 59 API calls 2 library calls 105773->105870 105871 8af65e 61 API calls 2 library calls 105773->105871 105872 8b737f 59 API calls Mailbox 105773->105872 105873 857213 59 API calls Mailbox 105773->105873 105775 88e7be 105774->105775 105775->105754 105777 8575af 105776->105777 105780 857522 _memmove 105776->105780 105779 870db6 Mailbox 59 API calls 105777->105779 105778 870db6 Mailbox 59 API calls 105781 857529 105778->105781 105779->105780 105780->105778 105782 870db6 Mailbox 59 API calls 105781->105782 105783 857552 105781->105783 105782->105783 105783->105661 105785 857370 105784->105785 105788 85741e 105784->105788 105787 870db6 Mailbox 59 API calls 105785->105787 105789 8573a2 105785->105789 105786 870db6 59 API calls Mailbox 105786->105789 105787->105789 105788->105661 105789->105786 105789->105788 105790->105645 105791->105661 105792->105661 105793->105661 105794->105655 105796 855c6f CloseHandle 105795->105796 105797 8557dc Mailbox 105796->105797 105798 855c6f CloseHandle 105797->105798 105799 8557eb 105798->105799 105799->105735 105800->105688 105801->105691 105802->105699 105803->105718 105804->105697 105806 857667 59 API calls 105805->105806 105807 8545b1 105806->105807 105808 857667 59 API calls 105807->105808 105809 8545b9 105808->105809 105810 857667 59 API calls 105809->105810 105811 8545c1 105810->105811 105812 857667 59 API calls 105811->105812 105813 8545c9 105812->105813 105814 8545fd 105813->105814 105815 88d4d2 105813->105815 105816 85784b 59 API calls 105814->105816 105817 858047 59 API calls 105815->105817 105818 85460b 105816->105818 105819 88d4db 105817->105819 105820 857d2c 59 API calls 105818->105820 105821 857d8c 59 API calls 105819->105821 105822 854615 105820->105822 105824 854640 105821->105824 105823 85784b 59 API calls 105822->105823 105822->105824 105826 854636 105823->105826 105825 854680 105824->105825 105827 85465f 105824->105827 105838 88d4fb 105824->105838 105879 85784b 105825->105879 105830 857d2c 59 API calls 105826->105830 105832 8579f2 59 API calls 105827->105832 105829 854691 105833 8546a3 105829->105833 105836 858047 59 API calls 105829->105836 105830->105824 105831 88d5cb 105834 857bcc 59 API calls 105831->105834 105835 854669 105832->105835 105837 8546b3 105833->105837 105839 858047 59 API calls 105833->105839 105851 88d588 105834->105851 105835->105825 105842 85784b 59 API calls 105835->105842 105836->105833 105841 8546ba 105837->105841 105843 858047 59 API calls 105837->105843 105838->105831 105840 88d5b4 105838->105840 105849 88d532 105838->105849 105839->105837 105840->105831 105845 88d59f 105840->105845 105844 858047 59 API calls 105841->105844 105853 8546c1 Mailbox 105841->105853 105842->105825 105843->105841 105844->105853 105848 857bcc 59 API calls 105845->105848 105846 88d590 105847 857bcc 59 API calls 105846->105847 105847->105851 105848->105851 105849->105846 105854 88d57b 105849->105854 105850 8579f2 59 API calls 105850->105851 105851->105825 105851->105850 105892 857924 59 API calls 2 library calls 105851->105892 105853->105720 105855 857bcc 59 API calls 105854->105855 105855->105851 105856->105765 105857->105765 105858->105765 105859->105765 105860->105765 105861->105765 105862->105765 105864 855c79 105863->105864 105865 855c88 105863->105865 105864->105744 105865->105864 105866 855c8d CloseHandle 105865->105866 105866->105864 105867->105689 105868->105694 105869->105722 105870->105773 105871->105773 105872->105773 105873->105773 105874->105747 105875->105750 105876->105772 105877->105751 105878->105757 105880 8578b7 105879->105880 105881 85785a 105879->105881 105882 857d2c 59 API calls 105880->105882 105881->105880 105883 857865 105881->105883 105888 857888 _memmove 105882->105888 105884 88eb09 105883->105884 105885 857880 105883->105885 105894 858029 105884->105894 105893 857f27 59 API calls Mailbox 105885->105893 105888->105829 105889 88eb13 105890 870db6 Mailbox 59 API calls 105889->105890 105891 88eb33 105890->105891 105892->105851 105893->105888 105895 870db6 Mailbox 59 API calls 105894->105895 105896 858033 105895->105896 105896->105889 105897->104483 105899 856d95 105898->105899 105904 856ea9 105898->105904 105900 870db6 Mailbox 59 API calls 105899->105900 105899->105904 105902 856dbc 105900->105902 105901 870db6 Mailbox 59 API calls 105903 856e31 105901->105903 105902->105901 105903->105904 105907 85735d 59 API calls 105903->105907 105908 85750f 59 API calls 105903->105908 105911 856240 105903->105911 105936 8a6553 59 API calls Mailbox 105903->105936 105904->104487 105907->105903 105908->105903 105909->104489 105910->104491 105937 857a16 105911->105937 105913 85646a 105914 85750f 59 API calls 105913->105914 105915 856484 Mailbox 105914->105915 105915->105903 105918 85750f 59 API calls 105929 856265 105918->105929 105919 88dff6 105946 8af8aa 91 API calls 4 library calls 105919->105946 105923 857d8c 59 API calls 105923->105929 105924 88e004 105925 85750f 59 API calls 105924->105925 105927 88e01a 105925->105927 105926 856799 _memmove 105947 8af8aa 91 API calls 4 library calls 105926->105947 105927->105915 105928 88df92 105930 858029 59 API calls 105928->105930 105929->105913 105929->105918 105929->105919 105929->105923 105929->105926 105929->105928 105933 857e4f 59 API calls 105929->105933 105942 855f6c 60 API calls 105929->105942 105943 855d41 59 API calls Mailbox 105929->105943 105944 855e72 60 API calls 105929->105944 105945 857924 59 API calls 2 library calls 105929->105945 105932 88df9d 105930->105932 105935 870db6 Mailbox 59 API calls 105932->105935 105934 85643b CharUpperBuffW 105933->105934 105934->105929 105935->105926 105936->105903 105938 870db6 Mailbox 59 API calls 105937->105938 105939 857a3b 105938->105939 105940 858029 59 API calls 105939->105940 105941 857a4a 105940->105941 105941->105929 105942->105929 105943->105929 105944->105929 105945->105929 105946->105924 105947->105915 105948->104505 105949->104506 105951 854196 105950->105951 105952 88d423 105950->105952 105951->104515 105976 8b2f94 62 API calls _W_store_winword 105951->105976 105952->105951 105953 88d42c DestroyIcon 105952->105953 105953->105951 105976->104515 105978 85e6d5 105977->105978 106009 85f650 106008->106009 106010 85f4ba 106008->106010 106013 857de1 59 API calls 106009->106013 106011 85f4c6 106010->106011 106012 89441e 106010->106012 106028 853212 106027->106028 106029 8531e0 106027->106029 106028->104594 106029->106028 106032->104594 106485 858180 106033->106485 106113->104525 106115->104594 106116->104534 106117->104534 106118->104534 106119->104594 106120->104594 106121->104594 106123 859851 106122->106123 106132 85984b 106122->106132 106124 88f5d3 __i64tow 106123->106124 106125 859899 106123->106125 106129 859857 __itow 106123->106129 106131 88f4da 106123->106131 106132->104594 106140->104594 106141->104594 106143 8582f2 106142->106143 106144 88eda1 106142->106144 106145 858339 Mailbox 106143->106145 106149 8585c0 59 API calls 106143->106149 106145->104594 106153->104579 106154->104579 106155->104579 106156->104579 106157->104579 106158->104579 106159->104579 106543 851016 106548 854974 106543->106548 106546 872d40 __cinit 67 API calls 106547 851025 106546->106547 106549 870db6 Mailbox 59 API calls 106548->106549 106550 85497c 106549->106550 106551 85101b 106550->106551 106555 854936 106550->106555 106551->106546 106556 854951 106555->106556 106557 85493f 106555->106557 106559 8549a0 106556->106559 106558 872d40 __cinit 67 API calls 106557->106558 106558->106556 106560 857667 59 API calls 106559->106560 106561 8549b8 GetVersionExW 106560->106561 106562 857bcc 59 API calls 106561->106562 106563 8549fb 106562->106563 106564 857d2c 59 API calls 106563->106564 106567 854a28 106563->106567 106565 854a1c 106564->106565 106566 857726 59 API calls 106565->106566 106566->106567 106568 854a93 GetCurrentProcess IsWow64Process 106567->106568 106570 88d864 106567->106570 106569 854aac 106568->106569 106571 854ac2 106569->106571 106572 854b2b GetSystemInfo 106569->106572 106583 854b37 106571->106583 106573 854af8 106572->106573 106573->106551 106576 854ad4 106579 854b37 2 API calls 106576->106579 106577 854b1f GetSystemInfo 106578 854ae9 106577->106578 106578->106573 106580 854aef FreeLibrary 106578->106580 106581 854adc GetNativeSystemInfo 106579->106581 106580->106573 106581->106578 106584 854ad0 106583->106584 106585 854b40 LoadLibraryA 106583->106585 106584->106576 106584->106577 106585->106584 106586 854b51 GetProcAddress 106585->106586 106586->106584 106587 851066 106592 85f76f 106587->106592 106589 85106c 106590 872d40 __cinit 67 API calls 106589->106590 106591 851076 106590->106591 106593 85f790 106592->106593 106625 86ff03 106593->106625 106597 85f7d7 106598 857667 59 API calls 106597->106598 106599 85f7e1 106598->106599 106600 857667 59 API calls 106599->106600 106601 85f7eb 106600->106601 106602 857667 59 API calls 106601->106602 106603 85f7f5 106602->106603 106604 857667 59 API calls 106603->106604 106605 85f833 106604->106605 106606 857667 59 API calls 106605->106606 106607 85f8fe 106606->106607 106635 865f87 106607->106635 106611 85f930 106612 857667 59 API calls 106611->106612 106613 85f93a 106612->106613 106663 86fd9e 106613->106663 106615 85f981 106616 85f991 GetStdHandle 106615->106616 106617 8945ab 106616->106617 106618 85f9dd 106616->106618 106617->106618 106620 8945b4 106617->106620 106619 85f9e5 OleInitialize 106618->106619 106619->106589 106670 8b6b38 64 API calls Mailbox 106620->106670 106622 8945bb 106671 8b7207 CreateThread 106622->106671 106624 8945c7 CloseHandle 106624->106619 106672 86ffdc 106625->106672 106628 86ffdc 59 API calls 106629 86ff45 106628->106629 106630 857667 59 API calls 106629->106630 106631 86ff51 106630->106631 106632 857bcc 59 API calls 106631->106632 106633 85f796 106632->106633 106634 870162 6 API calls 106633->106634 106634->106597 106636 857667 59 API calls 106635->106636 106637 865f97 106636->106637 106638 857667 59 API calls 106637->106638 106639 865f9f 106638->106639 106679 865a9d 106639->106679 106642 865a9d 59 API calls 106643 865faf 106642->106643 106644 857667 59 API calls 106643->106644 106645 865fba 106644->106645 106646 870db6 Mailbox 59 API calls 106645->106646 106647 85f908 106646->106647 106648 8660f9 106647->106648 106649 866107 106648->106649 106650 857667 59 API calls 106649->106650 106651 866112 106650->106651 106652 857667 59 API calls 106651->106652 106653 86611d 106652->106653 106654 857667 59 API calls 106653->106654 106655 866128 106654->106655 106656 857667 59 API calls 106655->106656 106657 866133 106656->106657 106658 865a9d 59 API calls 106657->106658 106659 86613e 106658->106659 106660 870db6 Mailbox 59 API calls 106659->106660 106661 866145 RegisterWindowMessageW 106660->106661 106661->106611 106664 8a576f 106663->106664 106665 86fdae 106663->106665 106682 8b9ae7 60 API calls 106664->106682 106666 870db6 Mailbox 59 API calls 106665->106666 106668 86fdb6 106666->106668 106668->106615 106669 8a577a 106670->106622 106671->106624 106683 8b71ed 65 API calls 106671->106683 106673 857667 59 API calls 106672->106673 106674 86ffe7 106673->106674 106675 857667 59 API calls 106674->106675 106676 86ffef 106675->106676 106677 857667 59 API calls 106676->106677 106678 86ff3b 106677->106678 106678->106628 106680 857667 59 API calls 106679->106680 106681 865aa5 106680->106681 106681->106642 106682->106669 106684 88fdfc 106722 85ab30 Mailbox _memmove 106684->106722 106686 8a617e Mailbox 59 API calls 106706 85a057 106686->106706 106687 859c90 Mailbox 59 API calls 106687->106722 106689 85b525 106784 8b9e4a 89 API calls 4 library calls 106689->106784 106691 890055 106783 8b9e4a 89 API calls 4 library calls 106691->106783 106692 870db6 59 API calls Mailbox 106709 859f37 Mailbox 106692->106709 106694 85b900 60 API calls 106694->106709 106695 85b475 106701 858047 59 API calls 106695->106701 106697 890064 106698 858047 59 API calls 106698->106709 106699 85b47a 106699->106691 106712 8909e5 106699->106712 106701->106706 106704 857667 59 API calls 106704->106709 106705 8a6e8f 59 API calls 106705->106709 106707 857de1 59 API calls 106707->106722 106708 872d40 67 API calls __cinit 106708->106709 106709->106691 106709->106692 106709->106694 106709->106695 106709->106698 106709->106699 106709->106704 106709->106705 106709->106706 106709->106708 106710 8909d6 106709->106710 106713 85a55a 106709->106713 106780 85c8c0 331 API calls 2 library calls 106709->106780 106787 8b9e4a 89 API calls 4 library calls 106710->106787 106788 8b9e4a 89 API calls 4 library calls 106712->106788 106786 8b9e4a 89 API calls 4 library calls 106713->106786 106714 8cbc6b 331 API calls 106714->106722 106716 85b2b6 106781 85f6a3 331 API calls 106716->106781 106718 859ea0 331 API calls 106718->106722 106719 89086a 106720 859c90 Mailbox 59 API calls 106719->106720 106724 89085c 106720->106724 106721 890878 106785 8b9e4a 89 API calls 4 library calls 106721->106785 106722->106687 106722->106689 106722->106706 106722->106707 106722->106709 106722->106714 106722->106716 106722->106718 106722->106719 106722->106721 106722->106724 106725 85b21c 106722->106725 106727 870db6 59 API calls Mailbox 106722->106727 106730 8a6e8f 59 API calls 106722->106730 106733 8cdf37 106722->106733 106736 8cdf23 106722->106736 106739 8cc2e0 106722->106739 106771 8b7956 106722->106771 106777 8a617e 106722->106777 106782 8cc193 85 API calls 2 library calls 106722->106782 106724->106686 106724->106706 106726 859d3c 60 API calls 106725->106726 106728 85b22d 106726->106728 106727->106722 106729 859d3c 60 API calls 106728->106729 106729->106716 106730->106722 106789 8ccadd 106733->106789 106735 8cdf47 106735->106722 106737 8ccadd 130 API calls 106736->106737 106738 8cdf33 106737->106738 106738->106722 106740 857667 59 API calls 106739->106740 106741 8cc2f4 106740->106741 106742 857667 59 API calls 106741->106742 106743 8cc2fc 106742->106743 106744 857667 59 API calls 106743->106744 106745 8cc304 106744->106745 106746 859837 84 API calls 106745->106746 106770 8cc312 106746->106770 106747 857bcc 59 API calls 106747->106770 106748 857924 59 API calls 106748->106770 106749 8cc4fb 106750 8cc528 Mailbox 106749->106750 106880 859a3c 59 API calls Mailbox 106749->106880 106750->106722 106751 8cc4e2 106755 857cab 59 API calls 106751->106755 106753 8cc4fd 106756 857cab 59 API calls 106753->106756 106754 858047 59 API calls 106754->106770 106757 8cc4ef 106755->106757 106758 8cc50c 106756->106758 106760 857b2e 59 API calls 106757->106760 106761 857b2e 59 API calls 106758->106761 106759 857e4f 59 API calls 106763 8cc3a9 CharUpperBuffW 106759->106763 106760->106749 106761->106749 106762 857e4f 59 API calls 106764 8cc469 CharUpperBuffW 106762->106764 106878 85843a 68 API calls 106763->106878 106879 85c5a7 69 API calls 2 library calls 106764->106879 106767 857cab 59 API calls 106767->106770 106768 859837 84 API calls 106768->106770 106769 857b2e 59 API calls 106769->106770 106770->106747 106770->106748 106770->106749 106770->106750 106770->106751 106770->106753 106770->106754 106770->106759 106770->106762 106770->106767 106770->106768 106770->106769 106772 8b7962 106771->106772 106773 870db6 Mailbox 59 API calls 106772->106773 106774 8b7970 106773->106774 106775 8b797e 106774->106775 106776 857667 59 API calls 106774->106776 106775->106722 106776->106775 106881 8a60c0 106777->106881 106779 8a618c 106779->106722 106780->106709 106781->106689 106782->106722 106783->106697 106784->106724 106785->106724 106786->106706 106787->106712 106788->106706 106790 859837 84 API calls 106789->106790 106791 8ccb1a 106790->106791 106793 8ccb61 Mailbox 106791->106793 106827 8cd7a5 106791->106827 106793->106735 106794 8ccf2e 106865 8cd8c8 92 API calls Mailbox 106794->106865 106795 8ccdc7 106840 8cc96e 106795->106840 106798 8ccf3d 106798->106795 106800 8ccf49 106798->106800 106799 859837 84 API calls 106815 8ccbb2 Mailbox 106799->106815 106800->106793 106805 8cce00 106855 870c08 106805->106855 106808 8cce1a 106861 8b9e4a 89 API calls 4 library calls 106808->106861 106809 8cce33 106811 8592ce 59 API calls 106809->106811 106814 8cce3f 106811->106814 106812 8cce25 GetCurrentProcess TerminateProcess 106812->106809 106813 8ccdb9 106813->106794 106813->106795 106816 859050 59 API calls 106814->106816 106815->106793 106815->106799 106815->106813 106859 8cfbce 59 API calls 2 library calls 106815->106859 106860 8ccfdf 61 API calls 2 library calls 106815->106860 106817 8cce55 106816->106817 106825 8cce7c 106817->106825 106862 858d40 59 API calls Mailbox 106817->106862 106819 8ccfa4 106819->106793 106823 8ccfb8 FreeLibrary 106819->106823 106820 8cce6b 106863 8cd649 107 API calls _free 106820->106863 106823->106793 106825->106819 106826 859d3c 60 API calls 106825->106826 106864 858d40 59 API calls Mailbox 106825->106864 106866 8cd649 107 API calls _free 106825->106866 106826->106825 106828 857e4f 59 API calls 106827->106828 106829 8cd7c0 CharLowerBuffW 106828->106829 106867 8af167 106829->106867 106833 857667 59 API calls 106834 8cd7f9 106833->106834 106835 85784b 59 API calls 106834->106835 106836 8cd810 106835->106836 106837 857d2c 59 API calls 106836->106837 106838 8cd81c Mailbox 106837->106838 106839 8cd858 Mailbox 106838->106839 106874 8ccfdf 61 API calls 2 library calls 106838->106874 106839->106815 106841 8cc989 106840->106841 106842 8cc9de 106840->106842 106843 870db6 Mailbox 59 API calls 106841->106843 106846 8cda50 106842->106846 106845 8cc9ab 106843->106845 106844 870db6 Mailbox 59 API calls 106844->106845 106845->106842 106845->106844 106847 8cdc79 Mailbox 106846->106847 106854 8cda73 _strcat _wcscpy __wsetenvp 106846->106854 106847->106805 106848 859be6 59 API calls 106848->106854 106849 859b3c 59 API calls 106849->106854 106850 859b98 59 API calls 106850->106854 106851 859837 84 API calls 106851->106854 106852 87571c 58 API calls __malloc_crt 106852->106854 106854->106847 106854->106848 106854->106849 106854->106850 106854->106851 106854->106852 106877 8b5887 61 API calls 2 library calls 106854->106877 106856 870c1d 106855->106856 106857 870cb5 VirtualProtect 106856->106857 106858 870c83 106856->106858 106857->106858 106858->106808 106858->106809 106859->106815 106860->106815 106861->106812 106862->106820 106863->106825 106864->106825 106865->106798 106866->106825 106868 8af192 __wsetenvp 106867->106868 106869 8af1d1 106868->106869 106871 8af1c7 106868->106871 106873 8af278 106868->106873 106869->106833 106869->106838 106871->106869 106875 8578c4 61 API calls 106871->106875 106873->106869 106876 8578c4 61 API calls 106873->106876 106874->106839 106875->106871 106876->106873 106877->106854 106878->106770 106879->106770 106880->106750 106882 8a60cb 106881->106882 106883 8a60e8 106881->106883 106882->106883 106885 8a60ab 59 API calls Mailbox 106882->106885 106883->106779 106885->106882 106886 853633 106887 85366a 106886->106887 106888 8536e7 106887->106888 106889 853688 106887->106889 106930 8536e5 106887->106930 106891 88d0cc 106888->106891 106892 8536ed 106888->106892 106893 853695 106889->106893 106894 85374b PostQuitMessage 106889->106894 106890 8536ca DefWindowProcW 106927 8536d8 106890->106927 106941 861070 10 API calls Mailbox 106891->106941 106895 853715 SetTimer RegisterWindowMessageW 106892->106895 106896 8536f2 106892->106896 106898 8536a0 106893->106898 106899 88d154 106893->106899 106894->106927 106903 85373e CreatePopupMenu 106895->106903 106895->106927 106900 88d06f 106896->106900 106901 8536f9 KillTimer 106896->106901 106904 853755 106898->106904 106905 8536a8 106898->106905 106946 8b2527 71 API calls _memset 106899->106946 106907 88d0a8 MoveWindow 106900->106907 106908 88d074 106900->106908 106938 85443a Shell_NotifyIconW _memset 106901->106938 106902 88d0f3 106942 861093 331 API calls Mailbox 106902->106942 106903->106927 106931 8544a0 106904->106931 106911 88d139 106905->106911 106912 8536b3 106905->106912 106907->106927 106915 88d078 106908->106915 106916 88d097 SetFocus 106908->106916 106911->106890 106945 8a7c36 59 API calls Mailbox 106911->106945 106918 8536be 106912->106918 106919 88d124 106912->106919 106913 88d166 106913->106890 106913->106927 106915->106918 106920 88d081 106915->106920 106916->106927 106917 85370c 106939 853114 DeleteObject DestroyWindow Mailbox 106917->106939 106918->106890 106943 85443a Shell_NotifyIconW _memset 106918->106943 106944 8b2d36 81 API calls _memset 106919->106944 106940 861070 10 API calls Mailbox 106920->106940 106925 88d134 106925->106927 106928 88d118 106929 85434a 68 API calls 106928->106929 106929->106930 106930->106890 106932 8544b7 _memset 106931->106932 106933 854539 106931->106933 106934 85407c 61 API calls 106932->106934 106933->106927 106937 8544de 106934->106937 106935 854522 KillTimer SetTimer 106935->106933 106936 88d4ab Shell_NotifyIconW 106936->106935 106937->106935 106937->106936 106938->106917 106939->106927 106940->106927 106941->106902 106942->106918 106943->106928 106944->106925 106945->106930 106946->106913 106947 89416f 106951 8a5fe6 106947->106951 106949 89417a 106950 8a5fe6 85 API calls 106949->106950 106950->106949 106956 8a6020 106951->106956 106959 8a5ff3 106951->106959 106952 8a6022 106963 859328 84 API calls Mailbox 106952->106963 106953 8a6027 106955 859837 84 API calls 106953->106955 106957 8a602e 106955->106957 106956->106949 106958 857b2e 59 API calls 106957->106958 106958->106956 106959->106952 106959->106953 106959->106956 106960 8a601a 106959->106960 106962 8595a0 59 API calls _wcsstr 106960->106962 106962->106956 106963->106953 106964 85107d 106969 85708b 106964->106969 106966 85108c 106967 872d40 __cinit 67 API calls 106966->106967 106968 851096 106967->106968 106970 85709b __write_nolock 106969->106970 106971 857667 59 API calls 106970->106971 106972 857151 106971->106972 106973 854706 61 API calls 106972->106973 106974 85715a 106973->106974 107000 87050b 106974->107000 106977 857cab 59 API calls 106978 857173 106977->106978 106979 853f74 59 API calls 106978->106979 106980 857182 106979->106980 106981 857667 59 API calls 106980->106981 106982 85718b 106981->106982 106983 857d8c 59 API calls 106982->106983 106984 857194 RegOpenKeyExW 106983->106984 106985 88e8b1 RegQueryValueExW 106984->106985 106989 8571b6 Mailbox 106984->106989 106986 88e8ce 106985->106986 106987 88e943 RegCloseKey 106985->106987 106988 870db6 Mailbox 59 API calls 106986->106988 106987->106989 106999 88e955 _wcscat Mailbox __wsetenvp 106987->106999 106990 88e8e7 106988->106990 106989->106966 106991 85522e 59 API calls 106990->106991 106992 88e8f2 RegQueryValueExW 106991->106992 106994 88e90f 106992->106994 106996 88e929 106992->106996 106993 8579f2 59 API calls 106993->106999 106995 857bcc 59 API calls 106994->106995 106995->106996 106996->106987 106997 857de1 59 API calls 106997->106999 106998 853f74 59 API calls 106998->106999 106999->106989 106999->106993 106999->106997 106999->106998 107001 881940 __write_nolock 107000->107001 107002 870518 GetFullPathNameW 107001->107002 107003 87053a 107002->107003 107004 857bcc 59 API calls 107003->107004 107005 857165 107004->107005 107005->106977 107006 85be19 107007 85c36a 107006->107007 107008 85be22 107006->107008 107016 85ba8b Mailbox 107007->107016 107021 8a7bdb 59 API calls _memmove 107007->107021 107008->107007 107009 859837 84 API calls 107008->107009 107010 85be4d 107009->107010 107010->107007 107011 85be5d 107010->107011 107014 857a51 59 API calls 107011->107014 107013 891085 107015 858047 59 API calls 107013->107015 107014->107016 107015->107016 107018 891361 107016->107018 107020 85baab 107016->107020 107023 858cd4 59 API calls Mailbox 107016->107023 107018->107020 107022 873d46 59 API calls __wtof_l 107018->107022 107021->107013 107022->107020 107023->107016 107024 10557c8 107038 1053418 107024->107038 107026 105588c 107041 10556b8 107026->107041 107044 10568b8 GetPEB 107038->107044 107040 1053aa3 107040->107026 107042 10556c1 Sleep 107041->107042 107043 10556cf 107042->107043 107045 10568e2 107044->107045 107045->107040 107046 88fe27 107059 86f944 107046->107059 107048 88fe3d 107049 88febe 107048->107049 107050 88fe53 107048->107050 107055 85fce0 331 API calls 107049->107055 107068 859e5d 60 API calls 107050->107068 107052 88fe92 107053 88fe9a 107052->107053 107054 89089c 107052->107054 107069 8b834f 59 API calls Mailbox 107053->107069 107070 8b9e4a 89 API calls 4 library calls 107054->107070 107058 88feb2 Mailbox 107055->107058 107060 86f962 107059->107060 107061 86f950 107059->107061 107063 86f991 107060->107063 107064 86f968 107060->107064 107062 859d3c 60 API calls 107061->107062 107067 86f95a 107062->107067 107065 859d3c 60 API calls 107063->107065 107066 870db6 Mailbox 59 API calls 107064->107066 107065->107067 107066->107067 107067->107048 107068->107052 107069->107058 107070->107058

                                Control-flow Graph

                                APIs
                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00853B68
                                • IsDebuggerPresent.KERNEL32 ref: 00853B7A
                                • GetFullPathNameW.KERNEL32(00007FFF,?,?,009152F8,009152E0,?,?), ref: 00853BEB
                                  • Part of subcall function 00857BCC: _memmove.LIBCMT ref: 00857C06
                                  • Part of subcall function 0086092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00853C14,009152F8,?,?,?), ref: 0086096E
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00853C6F
                                • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00907770,00000010), ref: 0088D281
                                • SetCurrentDirectoryW.KERNEL32(?,009152F8,?,?,?), ref: 0088D2B9
                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00904260,009152F8,?,?,?), ref: 0088D33F
                                • ShellExecuteW.SHELL32(00000000,?,?), ref: 0088D346
                                  • Part of subcall function 00853A46: GetSysColorBrush.USER32(0000000F), ref: 00853A50
                                  • Part of subcall function 00853A46: LoadCursorW.USER32(00000000,00007F00), ref: 00853A5F
                                  • Part of subcall function 00853A46: LoadIconW.USER32(00000063), ref: 00853A76
                                  • Part of subcall function 00853A46: LoadIconW.USER32(000000A4), ref: 00853A88
                                  • Part of subcall function 00853A46: LoadIconW.USER32(000000A2), ref: 00853A9A
                                  • Part of subcall function 00853A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00853AC0
                                  • Part of subcall function 00853A46: RegisterClassExW.USER32(?), ref: 00853B16
                                  • Part of subcall function 008539D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00853A03
                                  • Part of subcall function 008539D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00853A24
                                  • Part of subcall function 008539D5: ShowWindow.USER32(00000000,?,?), ref: 00853A38
                                  • Part of subcall function 008539D5: ShowWindow.USER32(00000000,?,?), ref: 00853A41
                                  • Part of subcall function 0085434A: _memset.LIBCMT ref: 00854370
                                  • Part of subcall function 0085434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00854415
                                Strings
                                • runas, xrefs: 0088D33A
                                • This is a third-party compiled AutoIt script., xrefs: 0088D279
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                • String ID: This is a third-party compiled AutoIt script.$runas
                                • API String ID: 529118366-3287110873
                                • Opcode ID: 0272efdf7d8cca7f8e2609a52f765fbf4b6ad5230b073dfad289b7abbf2f1ffa
                                • Instruction ID: c26f4a3fda3bf77092455d16a1211a33b8fd2cf7a26522d55fdec00a36bc4ccf
                                • Opcode Fuzzy Hash: 0272efdf7d8cca7f8e2609a52f765fbf4b6ad5230b073dfad289b7abbf2f1ffa
                                • Instruction Fuzzy Hash: 9F51E631E08208EEDF11EBB8EC059ED7B74FF85755F018565F822E21A2CA705A49DB22

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 996 8549a0-854a00 call 857667 GetVersionExW call 857bcc 1001 854a06 996->1001 1002 854b0b-854b0d 996->1002 1004 854a09-854a0e 1001->1004 1003 88d767-88d773 1002->1003 1005 88d774-88d778 1003->1005 1006 854a14 1004->1006 1007 854b12-854b13 1004->1007 1009 88d77a 1005->1009 1010 88d77b-88d787 1005->1010 1008 854a15-854a4c call 857d2c call 857726 1006->1008 1007->1008 1018 854a52-854a53 1008->1018 1019 88d864-88d867 1008->1019 1009->1010 1010->1005 1012 88d789-88d78e 1010->1012 1012->1004 1014 88d794-88d79b 1012->1014 1014->1003 1016 88d79d 1014->1016 1020 88d7a2-88d7a5 1016->1020 1018->1020 1021 854a59-854a64 1018->1021 1022 88d869 1019->1022 1023 88d880-88d884 1019->1023 1024 88d7ab-88d7c9 1020->1024 1025 854a93-854aaa GetCurrentProcess IsWow64Process 1020->1025 1026 88d7ea-88d7f0 1021->1026 1027 854a6a-854a6c 1021->1027 1028 88d86c 1022->1028 1030 88d86f-88d878 1023->1030 1031 88d886-88d88f 1023->1031 1024->1025 1029 88d7cf-88d7d5 1024->1029 1032 854aac 1025->1032 1033 854aaf-854ac0 1025->1033 1038 88d7fa-88d800 1026->1038 1039 88d7f2-88d7f5 1026->1039 1034 854a72-854a75 1027->1034 1035 88d805-88d811 1027->1035 1028->1030 1036 88d7df-88d7e5 1029->1036 1037 88d7d7-88d7da 1029->1037 1030->1023 1031->1028 1040 88d891-88d894 1031->1040 1032->1033 1041 854ac2-854ad2 call 854b37 1033->1041 1042 854b2b-854b35 GetSystemInfo 1033->1042 1043 88d831-88d834 1034->1043 1044 854a7b-854a8a 1034->1044 1046 88d81b-88d821 1035->1046 1047 88d813-88d816 1035->1047 1036->1025 1037->1025 1038->1025 1039->1025 1040->1030 1053 854ad4-854ae1 call 854b37 1041->1053 1054 854b1f-854b29 GetSystemInfo 1041->1054 1045 854af8-854b08 1042->1045 1043->1025 1052 88d83a-88d84f 1043->1052 1049 854a90 1044->1049 1050 88d826-88d82c 1044->1050 1046->1025 1047->1025 1049->1025 1050->1025 1055 88d859-88d85f 1052->1055 1056 88d851-88d854 1052->1056 1061 854ae3-854ae7 GetNativeSystemInfo 1053->1061 1062 854b18-854b1d 1053->1062 1057 854ae9-854aed 1054->1057 1055->1025 1056->1025 1057->1045 1059 854aef-854af2 FreeLibrary 1057->1059 1059->1045 1061->1057 1062->1061
                                APIs
                                • GetVersionExW.KERNEL32(?), ref: 008549CD
                                  • Part of subcall function 00857BCC: _memmove.LIBCMT ref: 00857C06
                                • GetCurrentProcess.KERNEL32(?,008DFAEC,00000000,00000000,?), ref: 00854A9A
                                • IsWow64Process.KERNEL32(00000000), ref: 00854AA1
                                • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00854AE7
                                • FreeLibrary.KERNEL32(00000000), ref: 00854AF2
                                • GetSystemInfo.KERNEL32(00000000), ref: 00854B23
                                • GetSystemInfo.KERNEL32(00000000), ref: 00854B2F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                • String ID:
                                • API String ID: 1986165174-0
                                • Opcode ID: b6c4a1a3528a5cbf46841785ed65e848f206b757db19d71bda349c56361c14d0
                                • Instruction ID: 31ec195e35aeb4933b371b580c489382851cd87850e511efdd29b13ae85af0aa
                                • Opcode Fuzzy Hash: b6c4a1a3528a5cbf46841785ed65e848f206b757db19d71bda349c56361c14d0
                                • Instruction Fuzzy Hash: FE91053198A7C4DECB32DB6894501AABFF5FF29305B044E6ED4C7C3A42D220A54CD75A

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1063 854e89-854ea1 CreateStreamOnHGlobal 1064 854ec1-854ec6 1063->1064 1065 854ea3-854eba FindResourceExW 1063->1065 1066 854ec0 1065->1066 1067 88d933-88d942 LoadResource 1065->1067 1066->1064 1067->1066 1068 88d948-88d956 SizeofResource 1067->1068 1068->1066 1069 88d95c-88d967 LockResource 1068->1069 1069->1066 1070 88d96d-88d98b 1069->1070 1070->1066
                                APIs
                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00854D8E,?,?,00000000,00000000), ref: 00854E99
                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00854D8E,?,?,00000000,00000000), ref: 00854EB0
                                • LoadResource.KERNEL32(?,00000000,?,?,00854D8E,?,?,00000000,00000000,?,?,?,?,?,?,00854E2F), ref: 0088D937
                                • SizeofResource.KERNEL32(?,00000000,?,?,00854D8E,?,?,00000000,00000000,?,?,?,?,?,?,00854E2F), ref: 0088D94C
                                • LockResource.KERNEL32(00854D8E,?,?,00854D8E,?,?,00000000,00000000,?,?,?,?,?,?,00854E2F,00000000), ref: 0088D95F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                • String ID: SCRIPT
                                • API String ID: 3051347437-3967369404
                                • Opcode ID: 02ba91814ec38e0b870c26c47da4160dd6d05a218ab51b5b6d5876a306a5128d
                                • Instruction ID: 36358aff0d65e3296dcade8f138473e8a0eea4f5ca289039613c4651e9c11d17
                                • Opcode Fuzzy Hash: 02ba91814ec38e0b870c26c47da4160dd6d05a218ab51b5b6d5876a306a5128d
                                • Instruction Fuzzy Hash: 05119A71200301BFD7218BA5EC49F277BBAFBC5B26F24826DF906C6250DB61E8449A60
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: BuffCharUpper
                                • String ID:
                                • API String ID: 3964851224-0
                                • Opcode ID: 28dc009beb6a259f6f3edef88dfef9d7991eb7e9ae61a5f624dca881591bbf90
                                • Instruction ID: 3c5322a17703bc0e11b2c3eff20dec7f68676147b94d5db94d1f067f8d0637c7
                                • Opcode Fuzzy Hash: 28dc009beb6a259f6f3edef88dfef9d7991eb7e9ae61a5f624dca881591bbf90
                                • Instruction Fuzzy Hash: A59236706083459FDB20DF18C480B2BBBE1FB85308F15896DE99ADB362D771E845CB96
                                APIs
                                • GetFileAttributesW.KERNELBASE(?,0088E398), ref: 008B446A
                                • FindFirstFileW.KERNELBASE(?,?), ref: 008B447B
                                • FindClose.KERNEL32(00000000), ref: 008B448B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: FileFind$AttributesCloseFirst
                                • String ID:
                                • API String ID: 48322524-0
                                • Opcode ID: 3caf002c6a04d948880f884cf21846b5fce67cff00c660eeba7eaa92c53b96da
                                • Instruction ID: bf5c7e676459863a90b8fdfa55307dca99fc0408e8f2f56b6cfda975230e974c
                                • Opcode Fuzzy Hash: 3caf002c6a04d948880f884cf21846b5fce67cff00c660eeba7eaa92c53b96da
                                • Instruction Fuzzy Hash: F0E020334125046B42106B38EC0E8E9775CFF05335F100717F936D12D1E7745D10A5D9
                                Strings
                                • Variable must be of type 'Object'., xrefs: 00893E62
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID: Variable must be of type 'Object'.
                                • API String ID: 0-109567571
                                • Opcode ID: dbc53c5f13bba6065e64e3da574eb543bbff2f85ec114d16fc2415a1b4034096
                                • Instruction ID: 520ba0adaaeef0b7b8cc70a0bae85dd351b4e1397e3bf1bdd64c140e8ca3ad99
                                • Opcode Fuzzy Hash: dbc53c5f13bba6065e64e3da574eb543bbff2f85ec114d16fc2415a1b4034096
                                • Instruction Fuzzy Hash: A9A27D75A00219CFCB28CF58C880AA9B7B2FF58315F688469DD15EB351D734EE4ACB91
                                APIs
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00860A5B
                                • timeGetTime.WINMM ref: 00860D16
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00860E53
                                • Sleep.KERNEL32(0000000A), ref: 00860E61
                                • LockWindowUpdate.USER32(00000000,?,?), ref: 00860EFA
                                • DestroyWindow.USER32 ref: 00860F06
                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00860F20
                                • Sleep.KERNEL32(0000000A,?,?), ref: 00894E83
                                • TranslateMessage.USER32(?), ref: 00895C60
                                • DispatchMessageW.USER32(?), ref: 00895C6E
                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00895C82
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                • API String ID: 4212290369-3242690629
                                • Opcode ID: b2c329d5a48599f399f9294e1746c0b00e878bc3e80cbf696042b1a3d9dd6bb1
                                • Instruction ID: 01d37bd4584d5e5b28e598b7dc6aa80cee32e54fbc8e6f0ce550cdda2f5189be
                                • Opcode Fuzzy Hash: b2c329d5a48599f399f9294e1746c0b00e878bc3e80cbf696042b1a3d9dd6bb1
                                • Instruction Fuzzy Hash: ECB2B270608741DFDB25EF28C884BAAB7E4FF84304F19891DE59AD72A1DB71E844CB46

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 008B8F5F: __time64.LIBCMT ref: 008B8F69
                                  • Part of subcall function 00854EE5: _fseek.LIBCMT ref: 00854EFD
                                • __wsplitpath.LIBCMT ref: 008B9234
                                  • Part of subcall function 008740FB: __wsplitpath_helper.LIBCMT ref: 0087413B
                                • _wcscpy.LIBCMT ref: 008B9247
                                • _wcscat.LIBCMT ref: 008B925A
                                • __wsplitpath.LIBCMT ref: 008B927F
                                • _wcscat.LIBCMT ref: 008B9295
                                • _wcscat.LIBCMT ref: 008B92A8
                                  • Part of subcall function 008B8FA5: _memmove.LIBCMT ref: 008B8FDE
                                  • Part of subcall function 008B8FA5: _memmove.LIBCMT ref: 008B8FED
                                • _wcscmp.LIBCMT ref: 008B91EF
                                  • Part of subcall function 008B9734: _wcscmp.LIBCMT ref: 008B9824
                                  • Part of subcall function 008B9734: _wcscmp.LIBCMT ref: 008B9837
                                • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 008B9452
                                • _wcsncpy.LIBCMT ref: 008B94C5
                                • DeleteFileW.KERNEL32(?,?), ref: 008B94FB
                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 008B9511
                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 008B9522
                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 008B9534
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                • String ID:
                                • API String ID: 1500180987-0
                                • Opcode ID: 5352087500cc84e0d75f03c0378e6965e6c31a0b3f845123c1902433a9663c50
                                • Instruction ID: 8fbf1b8b202d8bcacc8097a11c502439a8150fa11947bd01710113ef17315438
                                • Opcode Fuzzy Hash: 5352087500cc84e0d75f03c0378e6965e6c31a0b3f845123c1902433a9663c50
                                • Instruction Fuzzy Hash: 91C13DB1D00219AADF21DF99CC85ADEBBBDFF45314F0040A6F649E7251DB309A848F65

                                Control-flow Graph

                                APIs
                                • GetSysColorBrush.USER32(0000000F), ref: 00853074
                                • RegisterClassExW.USER32(00000030), ref: 0085309E
                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008530AF
                                • InitCommonControlsEx.COMCTL32(?), ref: 008530CC
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 008530DC
                                • LoadIconW.USER32(000000A9), ref: 008530F2
                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00853101
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                • API String ID: 2914291525-1005189915
                                • Opcode ID: e54b10407dd7e1f3ba2cf90808fb7b3ad08fb072bf5d3b9b439398b9ae31a6a3
                                • Instruction ID: 8494be01ab15af52f9ff02f8c428013403b2d033b3c0ec6c4edaba05fd5fd17c
                                • Opcode Fuzzy Hash: e54b10407dd7e1f3ba2cf90808fb7b3ad08fb072bf5d3b9b439398b9ae31a6a3
                                • Instruction Fuzzy Hash: 9C3167B1955349EFDB00CFA4E884ACDBBF0FB09310F15826AF691E62A1D3B40585DF90

                                Control-flow Graph

                                APIs
                                • GetSysColorBrush.USER32(0000000F), ref: 00853074
                                • RegisterClassExW.USER32(00000030), ref: 0085309E
                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008530AF
                                • InitCommonControlsEx.COMCTL32(?), ref: 008530CC
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 008530DC
                                • LoadIconW.USER32(000000A9), ref: 008530F2
                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00853101
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                • API String ID: 2914291525-1005189915
                                • Opcode ID: 2cd1aa7087d271477b2aa0a9b4b4baa59ff515d60e251cec733fcbaf3c2e162a
                                • Instruction ID: f4b6607bb7dc25cd26a93a103f4625a819c1bca1c32b964242a4df5d22e880ab
                                • Opcode Fuzzy Hash: 2cd1aa7087d271477b2aa0a9b4b4baa59ff515d60e251cec733fcbaf3c2e162a
                                • Instruction Fuzzy Hash: AA21E8B1A55618EFDB00DF94E848BDDBBF4FB08710F01822AF611A62A1D7B14544EF91

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 00854706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,009152F8,?,008537AE,?), ref: 00854724
                                  • Part of subcall function 0087050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00857165), ref: 0087052D
                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 008571A8
                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0088E8C8
                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0088E909
                                • RegCloseKey.ADVAPI32(?), ref: 0088E947
                                • _wcscat.LIBCMT ref: 0088E9A0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                • API String ID: 2673923337-2727554177
                                • Opcode ID: 3d97c71d9ba30e1bb4c9872c0e41076c239284c528fcb2a026919e11e134fa5e
                                • Instruction ID: 1b3ff6e5eecb2a847244fc0b600cf8e05a1865cbd8f8c994722f9cf322139199
                                • Opcode Fuzzy Hash: 3d97c71d9ba30e1bb4c9872c0e41076c239284c528fcb2a026919e11e134fa5e
                                • Instruction Fuzzy Hash: 4D719071A193019EC310EF29EC419ABBBF8FF85350F40892EF565C72A1DB709948DB52

                                Control-flow Graph

                                APIs
                                • GetSysColorBrush.USER32(0000000F), ref: 00853A50
                                • LoadCursorW.USER32(00000000,00007F00), ref: 00853A5F
                                • LoadIconW.USER32(00000063), ref: 00853A76
                                • LoadIconW.USER32(000000A4), ref: 00853A88
                                • LoadIconW.USER32(000000A2), ref: 00853A9A
                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00853AC0
                                • RegisterClassExW.USER32(?), ref: 00853B16
                                  • Part of subcall function 00853041: GetSysColorBrush.USER32(0000000F), ref: 00853074
                                  • Part of subcall function 00853041: RegisterClassExW.USER32(00000030), ref: 0085309E
                                  • Part of subcall function 00853041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008530AF
                                  • Part of subcall function 00853041: InitCommonControlsEx.COMCTL32(?), ref: 008530CC
                                  • Part of subcall function 00853041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 008530DC
                                  • Part of subcall function 00853041: LoadIconW.USER32(000000A9), ref: 008530F2
                                  • Part of subcall function 00853041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00853101
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                • String ID: #$0$AutoIt v3
                                • API String ID: 423443420-4155596026
                                • Opcode ID: 8f38198f364a4b971de07ca85294d9ba3102e0ba5bb8d6eeebf31062f842097e
                                • Instruction ID: 0a66f74005dcb43d2fa90b04d61d7de3354f319c284c320c722a1e6ba586053a
                                • Opcode Fuzzy Hash: 8f38198f364a4b971de07ca85294d9ba3102e0ba5bb8d6eeebf31062f842097e
                                • Instruction Fuzzy Hash: 87212A72E55308EFEB10DFA4EC09BDD7BB0FB48711F02851AE610A62A1D3B55644EF84

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 767 853633-853681 769 8536e1-8536e3 767->769 770 853683-853686 767->770 769->770 771 8536e5 769->771 772 8536e7 770->772 773 853688-85368f 770->773 774 8536ca-8536d2 DefWindowProcW 771->774 775 88d0cc-88d0fa call 861070 call 861093 772->775 776 8536ed-8536f0 772->776 777 853695-85369a 773->777 778 85374b-853753 PostQuitMessage 773->778 785 8536d8-8536de 774->785 814 88d0ff-88d106 775->814 779 853715-85373c SetTimer RegisterWindowMessageW 776->779 780 8536f2-8536f3 776->780 782 8536a0-8536a2 777->782 783 88d154-88d168 call 8b2527 777->783 784 853711-853713 778->784 779->784 789 85373e-853749 CreatePopupMenu 779->789 786 88d06f-88d072 780->786 787 8536f9-85370c KillTimer call 85443a call 853114 780->787 790 853755-85375f call 8544a0 782->790 791 8536a8-8536ad 782->791 783->784 808 88d16e 783->808 784->785 793 88d0a8-88d0c7 MoveWindow 786->793 794 88d074-88d076 786->794 787->784 789->784 809 853764 790->809 797 88d139-88d140 791->797 798 8536b3-8536b8 791->798 793->784 801 88d078-88d07b 794->801 802 88d097-88d0a3 SetFocus 794->802 797->774 804 88d146-88d14f call 8a7c36 797->804 806 8536be-8536c4 798->806 807 88d124-88d134 call 8b2d36 798->807 801->806 810 88d081-88d092 call 861070 801->810 802->784 804->774 806->774 806->814 807->784 808->774 809->784 810->784 814->774 818 88d10c-88d11f call 85443a call 85434a 814->818 818->774
                                APIs
                                • DefWindowProcW.USER32(?,?,?,?), ref: 008536D2
                                • KillTimer.USER32(?,00000001), ref: 008536FC
                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0085371F
                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0085372A
                                • CreatePopupMenu.USER32 ref: 0085373E
                                • PostQuitMessage.USER32(00000000), ref: 0085374D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                • String ID: TaskbarCreated
                                • API String ID: 129472671-2362178303
                                • Opcode ID: 4d884978cef8376e3c2bc043d13f60186a26b0900c876f0828c5cce92b134b8a
                                • Instruction ID: cc63baaf7f8020f624019f4f641b856d992b3e190757c83252ae425cfd791e3c
                                • Opcode Fuzzy Hash: 4d884978cef8376e3c2bc043d13f60186a26b0900c876f0828c5cce92b134b8a
                                • Instruction Fuzzy Hash: 9A411872714609EBDB206F68DC09BF93794FB54382F150529FA02C62A2CB609949B362

                                Control-flow Graph

                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                • API String ID: 1825951767-3513169116
                                • Opcode ID: 39f3ce3fb66c36c1d58438943ff8a08b721e12c75a3e1c30552d3c81861c7680
                                • Instruction ID: 8b9d7a6d3dd201e6bcc2875e479d54480f014a48449471c68a8ca91917272f2f
                                • Opcode Fuzzy Hash: 39f3ce3fb66c36c1d58438943ff8a08b721e12c75a3e1c30552d3c81861c7680
                                • Instruction Fuzzy Hash: B4A15F7291022D9ACB05EBA8DC55AEEBBB8FF14341F40452AF816F7191DF745A0CCB61

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 942 1055a08-1055ab6 call 1053418 945 1055abd-1055ae3 call 1056918 CreateFileW 942->945 948 1055ae5 945->948 949 1055aea-1055afa 945->949 950 1055c35-1055c39 948->950 954 1055b01-1055b1b VirtualAlloc 949->954 955 1055afc 949->955 952 1055c7b-1055c7e 950->952 953 1055c3b-1055c3f 950->953 956 1055c81-1055c88 952->956 957 1055c41-1055c44 953->957 958 1055c4b-1055c4f 953->958 959 1055b22-1055b39 ReadFile 954->959 960 1055b1d 954->960 955->950 961 1055cdd-1055cf2 956->961 962 1055c8a-1055c95 956->962 957->958 963 1055c51-1055c5b 958->963 964 1055c5f-1055c63 958->964 969 1055b40-1055b80 VirtualAlloc 959->969 970 1055b3b 959->970 960->950 965 1055cf4-1055cff VirtualFree 961->965 966 1055d02-1055d0a 961->966 971 1055c97 962->971 972 1055c99-1055ca5 962->972 963->964 967 1055c65-1055c6f 964->967 968 1055c73 964->968 965->966 967->968 968->952 973 1055b87-1055ba2 call 1056b68 969->973 974 1055b82 969->974 970->950 971->961 975 1055ca7-1055cb7 972->975 976 1055cb9-1055cc5 972->976 982 1055bad-1055bb7 973->982 974->950 978 1055cdb 975->978 979 1055cc7-1055cd0 976->979 980 1055cd2-1055cd8 976->980 978->956 979->978 980->978 983 1055bb9-1055be8 call 1056b68 982->983 984 1055bea-1055bfe call 1056978 982->984 983->982 990 1055c00 984->990 991 1055c02-1055c06 984->991 990->950 992 1055c12-1055c16 991->992 993 1055c08-1055c0c CloseHandle 991->993 994 1055c26-1055c2f 992->994 995 1055c18-1055c23 VirtualFree 992->995 993->992 994->945 994->950 995->994
                                APIs
                                • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01055AD9
                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01055CFF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1500463347.0000000001053000.00000040.00000020.00020000.00000000.sdmp, Offset: 01053000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1053000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CreateFileFreeVirtual
                                • String ID:
                                • API String ID: 204039940-0
                                • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                • Instruction ID: b276df0ce00735a3e36e6094afe7831dc57400207c6f180c7ffb70874073c934
                                • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                • Instruction Fuzzy Hash: 41A10670E0020DEFEB54CFA4C998BEEBBB5BF48304F208199E541AB281D7759A81CF54

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1073 8539d5-853a45 CreateWindowExW * 2 ShowWindow * 2
                                APIs
                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00853A03
                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00853A24
                                • ShowWindow.USER32(00000000,?,?), ref: 00853A38
                                • ShowWindow.USER32(00000000,?,?), ref: 00853A41
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$CreateShow
                                • String ID: AutoIt v3$edit
                                • API String ID: 1584632944-3779509399
                                • Opcode ID: 9e2970af94f2432236a4232972a46a03719d718ef5e5656e21ddc1a2e66c8715
                                • Instruction ID: 54e4d84e77115f2a23c0e3d247cf45ab9344993821b761a076f428827d6e3f3e
                                • Opcode Fuzzy Hash: 9e2970af94f2432236a4232972a46a03719d718ef5e5656e21ddc1a2e66c8715
                                • Instruction Fuzzy Hash: DBF03072655290BEEA306713AC08EAB3F7DE7C6F50F02852ABA10A2271C2710801EA70

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1074 10557c8-1055902 call 1053418 call 10556b8 CreateFileW 1081 1055904 1074->1081 1082 1055909-1055919 1074->1082 1083 10559b9-10559be 1081->1083 1085 1055920-105593a VirtualAlloc 1082->1085 1086 105591b 1082->1086 1087 105593c 1085->1087 1088 105593e-1055955 ReadFile 1085->1088 1086->1083 1087->1083 1089 1055957 1088->1089 1090 1055959-1055993 call 10556f8 call 10546b8 1088->1090 1089->1083 1095 1055995-10559aa call 1055748 1090->1095 1096 10559af-10559b7 ExitProcess 1090->1096 1095->1096 1096->1083
                                APIs
                                  • Part of subcall function 010556B8: Sleep.KERNELBASE(000001F4), ref: 010556C9
                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 010558F8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1500463347.0000000001053000.00000040.00000020.00020000.00000000.sdmp, Offset: 01053000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1053000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CreateFileSleep
                                • String ID: Q39LL9YCGLVHV
                                • API String ID: 2694422964-458470084
                                • Opcode ID: bb6b9760c92c097b689da2a534c557ef626796ad2c763593c6edf64213b242dd
                                • Instruction ID: 44366b33919f08d720e0554427db22133a4a4957caf0e2e89c98d8a02b80419d
                                • Opcode Fuzzy Hash: bb6b9760c92c097b689da2a534c557ef626796ad2c763593c6edf64213b242dd
                                • Instruction Fuzzy Hash: 54519E30D14249EBEF11DBE4D854BEFBB79AF18310F004199E649BB2C0DBB91A44CBA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1098 85407c-854092 1099 85416f-854173 1098->1099 1100 854098-8540ad call 857a16 1098->1100 1103 88d3c8-88d3d7 LoadStringW 1100->1103 1104 8540b3-8540d3 call 857bcc 1100->1104 1107 88d3e2-88d3fa call 857b2e call 856fe3 1103->1107 1104->1107 1108 8540d9-8540dd 1104->1108 1117 8540ed-85416a call 872de0 call 85454e call 872dbc Shell_NotifyIconW call 855904 1107->1117 1119 88d400-88d41e call 857cab call 856fe3 call 857cab 1107->1119 1110 854174-85417d call 858047 1108->1110 1111 8540e3-8540e8 call 857b2e 1108->1111 1110->1117 1111->1117 1117->1099 1119->1117
                                APIs
                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0088D3D7
                                  • Part of subcall function 00857BCC: _memmove.LIBCMT ref: 00857C06
                                • _memset.LIBCMT ref: 008540FC
                                • _wcscpy.LIBCMT ref: 00854150
                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00854160
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                • String ID: Line:
                                • API String ID: 3942752672-1585850449
                                • Opcode ID: a0ba08090bef884f0d43e2e4706020bbc28575e4fce60082fab88944c601eb21
                                • Instruction ID: 38424c60498d1296e45013c8f81e7ec5703dfc23e70b98908e36bc323dfc6b65
                                • Opcode Fuzzy Hash: a0ba08090bef884f0d43e2e4706020bbc28575e4fce60082fab88944c601eb21
                                • Instruction Fuzzy Hash: C831CE72108704AAD761EB64EC45BDB77D8FB80319F20891AB985D21E1EB70968CC783

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1133 87541d-875436 1134 875453 1133->1134 1135 875438-87543d 1133->1135 1137 875455-87545b 1134->1137 1135->1134 1136 87543f-875441 1135->1136 1138 875443-875448 call 878b28 1136->1138 1139 87545c-875461 1136->1139 1151 87544e call 878db6 1138->1151 1141 875463-87546d 1139->1141 1142 87546f-875473 1139->1142 1141->1142 1143 875493-8754a2 1141->1143 1144 875475-875480 call 872de0 1142->1144 1145 875483-875485 1142->1145 1149 8754a4-8754a7 1143->1149 1150 8754a9 1143->1150 1144->1145 1145->1138 1148 875487-875491 1145->1148 1148->1138 1148->1143 1153 8754ae-8754b3 1149->1153 1150->1153 1151->1134 1155 87559c-87559f 1153->1155 1156 8754b9-8754c0 1153->1156 1155->1137 1157 8754c2-8754ca 1156->1157 1158 875501-875503 1156->1158 1157->1158 1161 8754cc 1157->1161 1159 875505-875507 1158->1159 1160 87556d-87556e call 880ba7 1158->1160 1162 87552b-875536 1159->1162 1163 875509-875511 1159->1163 1170 875573-875577 1160->1170 1165 8754d2-8754d4 1161->1165 1166 8755ca 1161->1166 1171 87553a-87553d 1162->1171 1172 875538 1162->1172 1168 875513-87551f 1163->1168 1169 875521-875525 1163->1169 1173 8754d6-8754d8 1165->1173 1174 8754db-8754e0 1165->1174 1167 8755ce-8755d7 1166->1167 1167->1137 1177 875527-875529 1168->1177 1169->1177 1170->1167 1178 875579-87557e 1170->1178 1176 8755a4-8755a8 1171->1176 1179 87553f-87554b call 8746e6 call 880e5b 1171->1179 1172->1171 1173->1174 1175 8754e6-8754ff call 880cc8 1174->1175 1174->1176 1191 875562-87556b 1175->1191 1182 8755ba-8755c5 call 878b28 1176->1182 1183 8755aa-8755b7 call 872de0 1176->1183 1177->1171 1178->1176 1181 875580-875591 1178->1181 1194 875550-875555 1179->1194 1187 875594-875596 1181->1187 1182->1151 1183->1182 1187->1155 1187->1156 1191->1187 1195 8755dc-8755e0 1194->1195 1196 87555b-87555e 1194->1196 1195->1167 1196->1166 1197 875560 1196->1197 1197->1191
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                • String ID:
                                • API String ID: 1559183368-0
                                • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                • Instruction ID: 5c9068e03a01191e052322d61dc9ef55719721e91c96e86d644d22d0284fddda
                                • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                • Instruction Fuzzy Hash: C651A370A00B09DBDB249F69D88066E77A6FF40325F24C729F82DD62D8D7B0DD909B45
                                APIs
                                  • Part of subcall function 00854DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,009152F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00854E0F
                                • _free.LIBCMT ref: 0088E263
                                • _free.LIBCMT ref: 0088E2AA
                                  • Part of subcall function 00856A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00856BAD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _free$CurrentDirectoryLibraryLoad
                                • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                • API String ID: 2861923089-1757145024
                                • Opcode ID: 43f419727cb43e4691116e87f21ef9e279f6bacea8b187561e54594dbd8ce337
                                • Instruction ID: 02fcbf874823fdd90c09b3bebb9b8426bfee819fe22484a0e9284e2a962b9c4b
                                • Opcode Fuzzy Hash: 43f419727cb43e4691116e87f21ef9e279f6bacea8b187561e54594dbd8ce337
                                • Instruction Fuzzy Hash: 58918D71900219EFCF14EFA8CC919EDB7B8FF09315B10852AF816EB2A1DB70A955CB51
                                APIs
                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,008535A1,SwapMouseButtons,00000004,?), ref: 008535D4
                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,008535A1,SwapMouseButtons,00000004,?,?,?,?,00852754), ref: 008535F5
                                • RegCloseKey.KERNELBASE(00000000,?,?,008535A1,SwapMouseButtons,00000004,?,?,?,?,00852754), ref: 00853617
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID: Control Panel\Mouse
                                • API String ID: 3677997916-824357125
                                • Opcode ID: 04e585ea05e70cbdcaa269a60e24b42445678019f792c11ac88982792ade0e40
                                • Instruction ID: 9d2f050c36cffd8ed07fd9730895fc95edfd75cf2e13a28fcef46cb0b582c19d
                                • Opcode Fuzzy Hash: 04e585ea05e70cbdcaa269a60e24b42445678019f792c11ac88982792ade0e40
                                • Instruction Fuzzy Hash: D5114871511208BFDF218FA4DC40AAEB7F8FF14781F00856AF905E7210D2719E54A760
                                APIs
                                • CreateProcessW.KERNELBASE(?,00000000), ref: 01054EE5
                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01054F09
                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01054F2B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1500463347.0000000001053000.00000040.00000020.00020000.00000000.sdmp, Offset: 01053000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1053000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                • String ID:
                                • API String ID: 2438371351-0
                                • Opcode ID: e3f14b9100784c2d13b4d96e4da997e342e741b63af52aad6d222721779d43e7
                                • Instruction ID: df9b5ec4d9c4d14daf746dbb3bb53531d3b3bdb274cba1eae1b77e0b507f104d
                                • Opcode Fuzzy Hash: e3f14b9100784c2d13b4d96e4da997e342e741b63af52aad6d222721779d43e7
                                • Instruction Fuzzy Hash: 43621B30A14218DBEB64CFA4CC40BDEB776EF58300F1091A9E54DEB294E7769E81CB59
                                APIs
                                  • Part of subcall function 00854EE5: _fseek.LIBCMT ref: 00854EFD
                                  • Part of subcall function 008B9734: _wcscmp.LIBCMT ref: 008B9824
                                  • Part of subcall function 008B9734: _wcscmp.LIBCMT ref: 008B9837
                                • _free.LIBCMT ref: 008B96A2
                                • _free.LIBCMT ref: 008B96A9
                                • _free.LIBCMT ref: 008B9714
                                  • Part of subcall function 00872D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00879A24), ref: 00872D69
                                  • Part of subcall function 00872D55: GetLastError.KERNEL32(00000000,?,00879A24), ref: 00872D7B
                                • _free.LIBCMT ref: 008B971C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                • String ID:
                                • API String ID: 1552873950-0
                                • Opcode ID: 50af52b8f22919c11c7515362fb071ee60fc7e1c9e9e4129b0e36dbf2dd802cb
                                • Instruction ID: 8e25e60c7cdb4f48a45dd4311686c4d20da492f101f5f33b478f6a11dada63d4
                                • Opcode Fuzzy Hash: 50af52b8f22919c11c7515362fb071ee60fc7e1c9e9e4129b0e36dbf2dd802cb
                                • Instruction Fuzzy Hash: 43513AB1904218ABDF249F68CC85AAEBBB9FF48304F10449EF649E3351DB715A81CF59
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                • String ID:
                                • API String ID: 2782032738-0
                                • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                • Instruction ID: b9dc8781d08cc3bc41f93eaabcd6323c16dc36e531bef861cd175b45f2ffead5
                                • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                • Instruction Fuzzy Hash: F341B675A0074E9BDB1CCEA9C8809AE7BA5FF463A4B24D53DE81DCB648DB70DD408B41
                                APIs
                                • _memset.LIBCMT ref: 008544CF
                                  • Part of subcall function 0085407C: _memset.LIBCMT ref: 008540FC
                                  • Part of subcall function 0085407C: _wcscpy.LIBCMT ref: 00854150
                                  • Part of subcall function 0085407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00854160
                                • KillTimer.USER32(?,00000001,?,?), ref: 00854524
                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00854533
                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0088D4B9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                • String ID:
                                • API String ID: 1378193009-0
                                • Opcode ID: ab0e0571bf809751fe9c6114422f85b0ce7e4b3d529decaa142ebc0959768818
                                • Instruction ID: 07756c63d5698e69c320964dc1306c01a8247eaa6261d889cb2555e26eee68a5
                                • Opcode Fuzzy Hash: ab0e0571bf809751fe9c6114422f85b0ce7e4b3d529decaa142ebc0959768818
                                • Instruction Fuzzy Hash: 22210774908788AFE7329B248845BE6BBECFF01319F04009EE79ED6182D3742988DB45
                                APIs
                                • _memset.LIBCMT ref: 0088EA39
                                • GetOpenFileNameW.COMDLG32(?), ref: 0088EA83
                                  • Part of subcall function 00854750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00854743,?,?,008537AE,?), ref: 00854770
                                  • Part of subcall function 00870791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 008707B0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Name$Path$FileFullLongOpen_memset
                                • String ID: X
                                • API String ID: 3777226403-3081909835
                                • Opcode ID: 16fb354aeca0fd9675b27c14a94131db20fe94ddff91903046a8615f679d002c
                                • Instruction ID: 3bc50a32cb06f779b0dfa837a8a508a7b4863e0a5fa32cda97e0acf3c0115f2f
                                • Opcode Fuzzy Hash: 16fb354aeca0fd9675b27c14a94131db20fe94ddff91903046a8615f679d002c
                                • Instruction Fuzzy Hash: 7921D130A102489BCB119F98D845AEE7BFCFF48715F00805AE848E7281DBB4598D8FA2
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __fread_nolock_memmove
                                • String ID: EA06
                                • API String ID: 1988441806-3962188686
                                • Opcode ID: ab236ade746cb4da6d13bdc0be0b6ee1ece90359f73054a519ed583fd26213e6
                                • Instruction ID: c444d7ed01df3bcadcf5ec97d6f988e04a0db1b8140c0525c65952121b398aac
                                • Opcode Fuzzy Hash: ab236ade746cb4da6d13bdc0be0b6ee1ece90359f73054a519ed583fd26213e6
                                • Instruction Fuzzy Hash: A701F972904218BEDB18CAA8C816EEE7BFCDB11301F00419FF596D6281E9B5E6088B60
                                APIs
                                • GetTempPathW.KERNEL32(00000104,?), ref: 008B98F8
                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 008B990F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Temp$FileNamePath
                                • String ID: aut
                                • API String ID: 3285503233-3010740371
                                • Opcode ID: 3635ee42c9efee2271f02e4a706c21675c1ff2d98b953b76808ef6f9758f6fb4
                                • Instruction ID: 9587384e1188469f10971faae945ce49bb83a7dba2b9403511afea4b7ab71e4d
                                • Opcode Fuzzy Hash: 3635ee42c9efee2271f02e4a706c21675c1ff2d98b953b76808ef6f9758f6fb4
                                • Instruction Fuzzy Hash: DFD05E7954130DABDB50DBA0DC0EF9A773CE704704F0043B2BF95911A2EAB095989B95
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: eae640020c3c0efbfa03bbf02ffa06623ea555a979eab44e20a6d7977d587cde
                                • Instruction ID: 64193f830e3fae3bb31c0bb27dd019778708e03edffb9b3748366838f055d8cb
                                • Opcode Fuzzy Hash: eae640020c3c0efbfa03bbf02ffa06623ea555a979eab44e20a6d7977d587cde
                                • Instruction Fuzzy Hash: 17F116716083059FCB14DF28C480A6ABBE5FF89314F14896EF99ADB251DB70E945CF82
                                APIs
                                  • Part of subcall function 00870162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00870193
                                  • Part of subcall function 00870162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0087019B
                                  • Part of subcall function 00870162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 008701A6
                                  • Part of subcall function 00870162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 008701B1
                                  • Part of subcall function 00870162: MapVirtualKeyW.USER32(00000011,00000000), ref: 008701B9
                                  • Part of subcall function 00870162: MapVirtualKeyW.USER32(00000012,00000000), ref: 008701C1
                                  • Part of subcall function 008660F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0085F930), ref: 00866154
                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0085F9CD
                                • OleInitialize.OLE32(00000000), ref: 0085FA4A
                                • CloseHandle.KERNEL32(00000000), ref: 008945C8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                • String ID:
                                • API String ID: 1986988660-0
                                • Opcode ID: 08ca8687f01704049dc45a0e55ef8b416a6999eb9d77321326055e3fe5fdbb70
                                • Instruction ID: ba012a76cc64058c38d8a20cbe457dd79c789f4f7939ad926ffe7975113d002f
                                • Opcode Fuzzy Hash: 08ca8687f01704049dc45a0e55ef8b416a6999eb9d77321326055e3fe5fdbb70
                                • Instruction Fuzzy Hash: 2581CEB0B29B40CF9384DF69E8456987BE5FBD8306793C12A9119CB2B2E7704485EF12
                                APIs
                                • _memset.LIBCMT ref: 00854370
                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00854415
                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00854432
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: IconNotifyShell_$_memset
                                • String ID:
                                • API String ID: 1505330794-0
                                • Opcode ID: 4a8529584db1a4edd1f83a9ba7ebbd3a55ec9aa5a422fcd7db1a92785afa7d69
                                • Instruction ID: 21c7cd9e57d7fcd6d4adaf1f42394cc0a0ddadafe32a53a49738abfed2e07f33
                                • Opcode Fuzzy Hash: 4a8529584db1a4edd1f83a9ba7ebbd3a55ec9aa5a422fcd7db1a92785afa7d69
                                • Instruction Fuzzy Hash: 12318071609701DFC720DF24D884ADBBBF8FB48309F00492EEA9AC6251D771A988CB56
                                APIs
                                • __FF_MSGBANNER.LIBCMT ref: 00875733
                                  • Part of subcall function 0087A16B: __NMSG_WRITE.LIBCMT ref: 0087A192
                                  • Part of subcall function 0087A16B: __NMSG_WRITE.LIBCMT ref: 0087A19C
                                • __NMSG_WRITE.LIBCMT ref: 0087573A
                                  • Part of subcall function 0087A1C8: GetModuleFileNameW.KERNEL32(00000000,009133BA,00000104,?,00000001,00000000), ref: 0087A25A
                                  • Part of subcall function 0087A1C8: ___crtMessageBoxW.LIBCMT ref: 0087A308
                                  • Part of subcall function 0087309F: ___crtCorExitProcess.LIBCMT ref: 008730A5
                                  • Part of subcall function 0087309F: ExitProcess.KERNEL32 ref: 008730AE
                                  • Part of subcall function 00878B28: __getptd_noexit.LIBCMT ref: 00878B28
                                • RtlAllocateHeap.NTDLL(00E90000,00000000,00000001,00000000,?,?,?,00870DD3,?), ref: 0087575F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                • String ID:
                                • API String ID: 1372826849-0
                                • Opcode ID: 4795213d3a4b6cd4f79aef7dc59f34dfd687481a3f1de4ce319248662beff646
                                • Instruction ID: 489fe8b3122830bba18148f5d6eafc9ea76fc4c29d823889b9d487b743fda183
                                • Opcode Fuzzy Hash: 4795213d3a4b6cd4f79aef7dc59f34dfd687481a3f1de4ce319248662beff646
                                • Instruction Fuzzy Hash: 6D01D231340A01DAE719673CAC82A6E7398FB823A2F50C525F40DEA189DEB0DC40A662
                                APIs
                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,008B9548,?,?,?,?,?,00000004), ref: 008B98BB
                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,008B9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 008B98D1
                                • CloseHandle.KERNEL32(00000000,?,008B9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 008B98D8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: File$CloseCreateHandleTime
                                • String ID:
                                • API String ID: 3397143404-0
                                • Opcode ID: ad6defb695ea357f4d5f9e0477a09642418a8a4a1c0f26e365d14a7758353b42
                                • Instruction ID: 292e217f27f9cd1d9b69d5e641f643cf332a108986220f831d5bdd74074afea9
                                • Opcode Fuzzy Hash: ad6defb695ea357f4d5f9e0477a09642418a8a4a1c0f26e365d14a7758353b42
                                • Instruction Fuzzy Hash: F7E08632141224B7DB321B54EC09FCA7F19FF06760F104221FB55A91E187B11611A798
                                APIs
                                • _free.LIBCMT ref: 008B8D1B
                                  • Part of subcall function 00872D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00879A24), ref: 00872D69
                                  • Part of subcall function 00872D55: GetLastError.KERNEL32(00000000,?,00879A24), ref: 00872D7B
                                • _free.LIBCMT ref: 008B8D2C
                                • _free.LIBCMT ref: 008B8D3E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: c56cf7ee783aa8295308e84720220828ccc4d403300e1e82c1220f1652f177a4
                                • Instruction ID: abd6881cf1a8f9371a8fa78fe7d5f945947fb83c5df2462d11606407928ff265
                                • Opcode Fuzzy Hash: c56cf7ee783aa8295308e84720220828ccc4d403300e1e82c1220f1652f177a4
                                • Instruction Fuzzy Hash: ACE012A160260586DB34E57DA940AD717DCEF58352718491EB40DD728ACE64F842C124
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID: CALL
                                • API String ID: 0-4196123274
                                • Opcode ID: 3ec40f399d768a004f146c303daeb39cc7a09d509ef7a4575a64158229d0325b
                                • Instruction ID: d4ac49a38770c845f4b7d49c09a9693d2339e468850bea46ce1c6ed3e32bd921
                                • Opcode Fuzzy Hash: 3ec40f399d768a004f146c303daeb39cc7a09d509ef7a4575a64158229d0325b
                                • Instruction Fuzzy Hash: 11224A70608205DFDB28DF18C490A6ABBE1FF44315F15896DE98ADB362D731EC49CB82
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: EA06
                                • API String ID: 4104443479-3962188686
                                • Opcode ID: ffc623cb6a3a4e7358352651f8d66312062bfc1aca5741233de42dfebf84f796
                                • Instruction ID: 7e134594d3d62db2f942184b2a1f54ab6c23a117b206e6c3ec21870751c9007c
                                • Opcode Fuzzy Hash: ffc623cb6a3a4e7358352651f8d66312062bfc1aca5741233de42dfebf84f796
                                • Instruction Fuzzy Hash: 97417F21A0425C57CF219B6888517BE7F72FB4530EF686474FC82DB286D6349DCC83A2
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID:
                                • API String ID: 4104443479-0
                                • Opcode ID: 8787708196ce45b0a8645caae1a99237cce191730ca2271c137f8889e79cc621
                                • Instruction ID: da0b3cb9342bba271a7191a2164f7f9c55f13acd901e624ff0feb7e2e85cbbed
                                • Opcode Fuzzy Hash: 8787708196ce45b0a8645caae1a99237cce191730ca2271c137f8889e79cc621
                                • Instruction Fuzzy Hash: B731D4B2604616AFC704DF68D8D1E69F7A9FF48320714C629F819CB391EB30E924CB90
                                APIs
                                • IsThemeActive.UXTHEME ref: 00854834
                                  • Part of subcall function 0087336C: __lock.LIBCMT ref: 00873372
                                  • Part of subcall function 0087336C: DecodePointer.KERNEL32(00000001,?,00854849,008A7C74), ref: 0087337E
                                  • Part of subcall function 0087336C: EncodePointer.KERNEL32(?,?,00854849,008A7C74), ref: 00873389
                                  • Part of subcall function 008548FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00854915
                                  • Part of subcall function 008548FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0085492A
                                  • Part of subcall function 00853B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00853B68
                                  • Part of subcall function 00853B3A: IsDebuggerPresent.KERNEL32 ref: 00853B7A
                                  • Part of subcall function 00853B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,009152F8,009152E0,?,?), ref: 00853BEB
                                  • Part of subcall function 00853B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00853C6F
                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00854874
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                • String ID:
                                • API String ID: 1438897964-0
                                • Opcode ID: ac8c7d8e0453d9f9b370ce30f0174f0d81274f39d9f41882fcf844eb1eec08c9
                                • Instruction ID: 37d3ec598be48f7a3fc3c7fe0c28153ce346ff2593bb082f87dff29c661fa1b6
                                • Opcode Fuzzy Hash: ac8c7d8e0453d9f9b370ce30f0174f0d81274f39d9f41882fcf844eb1eec08c9
                                • Instruction Fuzzy Hash: CE11CD72A18341DBC700DF68E80594ABFE8FF95750F01892EF494C72B1DBB08648DB82
                                APIs
                                  • Part of subcall function 0087571C: __FF_MSGBANNER.LIBCMT ref: 00875733
                                  • Part of subcall function 0087571C: __NMSG_WRITE.LIBCMT ref: 0087573A
                                  • Part of subcall function 0087571C: RtlAllocateHeap.NTDLL(00E90000,00000000,00000001,00000000,?,?,?,00870DD3,?), ref: 0087575F
                                • std::exception::exception.LIBCMT ref: 00870DEC
                                • __CxxThrowException@8.LIBCMT ref: 00870E01
                                  • Part of subcall function 0087859B: RaiseException.KERNEL32(?,?,?,00909E78,00000000,?,?,?,?,00870E06,?,00909E78,?,00000001), ref: 008785F0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                • String ID:
                                • API String ID: 3902256705-0
                                • Opcode ID: 7a2cd545b7dc0453603c9a7deea7b8bf3fb8234625642d961e795fd6a0973094
                                • Instruction ID: aab72ebfada8c32af40357806c0a0019a11944187f9e1d6f2bf4ee0139822d60
                                • Opcode Fuzzy Hash: 7a2cd545b7dc0453603c9a7deea7b8bf3fb8234625642d961e795fd6a0973094
                                • Instruction Fuzzy Hash: 5CF0D63150031DA6CB20AA98EC055DE7BACFF01354F008415FA0CD6185DFF0DA8495D2
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __lock_file_memset
                                • String ID:
                                • API String ID: 26237723-0
                                • Opcode ID: 06f468e03d84fef532d0a44742b7f6a2820daad9aa1fa231dbf09dacab567a48
                                • Instruction ID: ecf26ceccba694e9d113daf66763956df549e33ca3d510f4300e0881dc7694e7
                                • Opcode Fuzzy Hash: 06f468e03d84fef532d0a44742b7f6a2820daad9aa1fa231dbf09dacab567a48
                                • Instruction Fuzzy Hash: 8E019E71800A08EACF22AF688C0649E7B61FFA1321F40C115B82C9A199DB71CA51DB92
                                APIs
                                  • Part of subcall function 00878B28: __getptd_noexit.LIBCMT ref: 00878B28
                                • __lock_file.LIBCMT ref: 008753EB
                                  • Part of subcall function 00876C11: __lock.LIBCMT ref: 00876C34
                                • __fclose_nolock.LIBCMT ref: 008753F6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                • String ID:
                                • API String ID: 2800547568-0
                                • Opcode ID: ed41f3ee9a35511c3d7fa5ac778db722c1ffc711559395c787f0de33a4d3369b
                                • Instruction ID: 93a648030e980e4a7a3bd36aed5eb2d6c9549a418d59b2f8f32e1ad5f9e75658
                                • Opcode Fuzzy Hash: ed41f3ee9a35511c3d7fa5ac778db722c1ffc711559395c787f0de33a4d3369b
                                • Instruction Fuzzy Hash: B5F09671800B04DAD7116B6D98057AD7AA0FF42374F20C208A42CEB2D9CFFCC9415B53
                                APIs
                                • CreateProcessW.KERNELBASE(?,00000000), ref: 01054EE5
                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01054F09
                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01054F2B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1500463347.0000000001053000.00000040.00000020.00020000.00000000.sdmp, Offset: 01053000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1053000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                • String ID:
                                • API String ID: 2438371351-0
                                • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                • Instruction ID: 24512b91002cde6293b95fda11913a13e268a82d7d4cc6b318a2ba50949c07db
                                • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                • Instruction Fuzzy Hash: 8612DF24E24658C6EB24DF64D8507DEB272EF68300F1090E9910DEB7A5E77A4F81CF5A
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                • Instruction ID: a2cd10710ee3cf73fb5786ad1ee14d3b20840f58f6b99d9b23e60359096ae5e0
                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                • Instruction Fuzzy Hash: 2F31A270A00109DBC71ADF58C484A69FBA6FB99304B64C6A5E80ACB359D631EEC1DF80
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ClearVariant
                                • String ID:
                                • API String ID: 1473721057-0
                                • Opcode ID: 2e7e971dba54e8186faa4a8461d6f3558596ec9574b4f21ba46e5cf503cd3c2b
                                • Instruction ID: f5a2f34488e3350fd99075b0931b5784bff84c7ef488cd3ceb2e27048f03b524
                                • Opcode Fuzzy Hash: 2e7e971dba54e8186faa4a8461d6f3558596ec9574b4f21ba46e5cf503cd3c2b
                                • Instruction Fuzzy Hash: 1A41D474504341CFDB14DF18C484B1ABBE1FF45319F1989ACE99A8B362C732E849CB52
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID:
                                • API String ID: 4104443479-0
                                • Opcode ID: 1c2203da2a02359585f090f97ea94e22528cfeb0f3bfc41a6940f8f0d9273e0f
                                • Instruction ID: 615e6ccfaf349f2275877ec2928eb8f4a8db1c22f4cbbbc685d0dbe3af10e6df
                                • Opcode Fuzzy Hash: 1c2203da2a02359585f090f97ea94e22528cfeb0f3bfc41a6940f8f0d9273e0f
                                • Instruction Fuzzy Hash: 2B213672A28A09EBDB109F15F8417AA7BB5FF14361F21C42DE88AC51A0EB30D5D0D702
                                APIs
                                  • Part of subcall function 00854BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00854BEF
                                  • Part of subcall function 0087525B: __wfsopen.LIBCMT ref: 00875266
                                • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,009152F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00854E0F
                                  • Part of subcall function 00854B6A: FreeLibrary.KERNEL32(00000000), ref: 00854BA4
                                  • Part of subcall function 00854C70: _memmove.LIBCMT ref: 00854CBA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Library$Free$Load__wfsopen_memmove
                                • String ID:
                                • API String ID: 1396898556-0
                                • Opcode ID: 9bcf9db1a52d52fbea67667ca24beb621f3f2c252da4f4082e4308950c69c536
                                • Instruction ID: db8ec848c27594decd9d15af6a89fbe4721cdde28e982b5ef770b85823320d3f
                                • Opcode Fuzzy Hash: 9bcf9db1a52d52fbea67667ca24beb621f3f2c252da4f4082e4308950c69c536
                                • Instruction Fuzzy Hash: C611E731600305ABCF14FFB8C817FAD77A5FF44729F108829F942E7182DA719A489B52
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ClearVariant
                                • String ID:
                                • API String ID: 1473721057-0
                                • Opcode ID: 41c2973076c7902f9673fb8eb365aba8aeb9d6eafc55f530a6a81fc1ed450249
                                • Instruction ID: 4ab745f5083d145067faa58f7d69eccc62424ff8ec9d7eca59b767f2a798d6eb
                                • Opcode Fuzzy Hash: 41c2973076c7902f9673fb8eb365aba8aeb9d6eafc55f530a6a81fc1ed450249
                                • Instruction Fuzzy Hash: AD21D0B4508341DFCB19DF64C484A1ABBE1FF88315F058A68F98A97722D731E849CB93
                                APIs
                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 008707B0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: LongNamePath
                                • String ID:
                                • API String ID: 82841172-0
                                • Opcode ID: 39039deafad59f984a5a4ac7e57e1ab82722266bee19f5693342fbee7f0a2444
                                • Instruction ID: 87a66e0e409f9ceab5c676e394ade06e730e36f813223439b0e4155184157380
                                • Opcode Fuzzy Hash: 39039deafad59f984a5a4ac7e57e1ab82722266bee19f5693342fbee7f0a2444
                                • Instruction Fuzzy Hash: 2E01D6794042945FC7134B3868019F47FF8EF4B620B0441E6E8948BA65D9201C45EBE1
                                APIs
                                • __lock_file.LIBCMT ref: 008748A6
                                  • Part of subcall function 00878B28: __getptd_noexit.LIBCMT ref: 00878B28
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __getptd_noexit__lock_file
                                • String ID:
                                • API String ID: 2597487223-0
                                • Opcode ID: 823c5d0fe5ad043319725a64939ed0a4b7f2dcbc51759d4c4f8c0a5079892486
                                • Instruction ID: 0d98a20418368f67faf6aaedca8664983bf34799715a42b5389a9034a3a02247
                                • Opcode Fuzzy Hash: 823c5d0fe5ad043319725a64939ed0a4b7f2dcbc51759d4c4f8c0a5079892486
                                • Instruction Fuzzy Hash: D1F0A43194060DEBDF11AFA88C0979E3AA0FF10325F15D524F42CD6199DB78C951DB53
                                APIs
                                • FreeLibrary.KERNEL32(?,?,009152F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00854E7E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: FreeLibrary
                                • String ID:
                                • API String ID: 3664257935-0
                                • Opcode ID: f648d0d00fe8cc4cfc07315f7a08434b92ab90fded53d0657e7afb8747fae120
                                • Instruction ID: 76ffe98fe4db5904dcf16214444135d247169f2bbb24d9a58c7e05dcb207bb2d
                                • Opcode Fuzzy Hash: f648d0d00fe8cc4cfc07315f7a08434b92ab90fded53d0657e7afb8747fae120
                                • Instruction Fuzzy Hash: D5F01C71501751CFCB349F64E495816B7E1FF1433E3209A3EE5D6C2621C771A888DB40
                                APIs
                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 008707B0
                                  • Part of subcall function 00857BCC: _memmove.LIBCMT ref: 00857C06
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: LongNamePath_memmove
                                • String ID:
                                • API String ID: 2514874351-0
                                • Opcode ID: 62615d75fa408398a57e6dbd0f1a43b2b544672b1b44d5db411367777f1e7114
                                • Instruction ID: fc1fdeee81f25bd487b687e303aa1515e8cd1c39e09cc0369b5ad9c3e6b9309f
                                • Opcode Fuzzy Hash: 62615d75fa408398a57e6dbd0f1a43b2b544672b1b44d5db411367777f1e7114
                                • Instruction Fuzzy Hash: C9E0CD3694512857C720E65C9C05FEA77DDEF887A1F0441F6FD0CD7245DD609C8086D1
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __fread_nolock
                                • String ID:
                                • API String ID: 2638373210-0
                                • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                • Instruction ID: 9b50e3ad931c7769e47011036eff88a4015faad75f0bdf79adaa116c8d8ab8fb
                                • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                • Instruction Fuzzy Hash: 76E092B0104B049FD7388A24D841BE373E5FB05304F00081DF2AAC3341EBA3B841CB59
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __wfsopen
                                • String ID:
                                • API String ID: 197181222-0
                                • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                • Instruction ID: ab7e37ac5fea9826c214b8285a4ffbea889a75aa7985baffcbfc8994f1f1935a
                                • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                • Instruction Fuzzy Hash: E2B0927644020C77CF012A86EC02A493B1AAB41B64F448020FB0C18162A6B3E6649A8A
                                APIs
                                • Sleep.KERNELBASE(000001F4), ref: 010556C9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1500463347.0000000001053000.00000040.00000020.00020000.00000000.sdmp, Offset: 01053000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_1053000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Sleep
                                • String ID:
                                • API String ID: 3472027048-0
                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                • Instruction ID: 556eaa66fea6ae23757b1dacc09b9e3864483cd344d47dd560881a06510cbf56
                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                • Instruction Fuzzy Hash: 1AE0E67494110DDFDB00DFB4D9496DE7BB4EF04302F100161FD01D2280D6309D508A72
                                APIs
                                  • Part of subcall function 00852612: GetWindowLongW.USER32(?,000000EB), ref: 00852623
                                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 008DCB37
                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 008DCB95
                                • GetWindowLongW.USER32(?,000000F0), ref: 008DCBD6
                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008DCC00
                                • SendMessageW.USER32 ref: 008DCC29
                                • _wcsncpy.LIBCMT ref: 008DCC95
                                • GetKeyState.USER32(00000011), ref: 008DCCB6
                                • GetKeyState.USER32(00000009), ref: 008DCCC3
                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 008DCCD9
                                • GetKeyState.USER32(00000010), ref: 008DCCE3
                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008DCD0C
                                • SendMessageW.USER32 ref: 008DCD33
                                • SendMessageW.USER32(?,00001030,?,008DB348), ref: 008DCE37
                                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 008DCE4D
                                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 008DCE60
                                • SetCapture.USER32(?), ref: 008DCE69
                                • ClientToScreen.USER32(?,?), ref: 008DCECE
                                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 008DCEDB
                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008DCEF5
                                • ReleaseCapture.USER32 ref: 008DCF00
                                • GetCursorPos.USER32(?), ref: 008DCF3A
                                • ScreenToClient.USER32(?,?), ref: 008DCF47
                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 008DCFA3
                                • SendMessageW.USER32 ref: 008DCFD1
                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 008DD00E
                                • SendMessageW.USER32 ref: 008DD03D
                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 008DD05E
                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 008DD06D
                                • GetCursorPos.USER32(?), ref: 008DD08D
                                • ScreenToClient.USER32(?,?), ref: 008DD09A
                                • GetParent.USER32(?), ref: 008DD0BA
                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 008DD123
                                • SendMessageW.USER32 ref: 008DD154
                                • ClientToScreen.USER32(?,?), ref: 008DD1B2
                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 008DD1E2
                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 008DD20C
                                • SendMessageW.USER32 ref: 008DD22F
                                • ClientToScreen.USER32(?,?), ref: 008DD281
                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 008DD2B5
                                  • Part of subcall function 008525DB: GetWindowLongW.USER32(?,000000EB), ref: 008525EC
                                • GetWindowLongW.USER32(?,000000F0), ref: 008DD351
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                • String ID: @GUI_DRAGID$F$V
                                • API String ID: 3977979337-1052069573
                                • Opcode ID: 207c9673ba1f543849f6953aba7086bb4344e32071ca3c9e074c550f87db9bed
                                • Instruction ID: 941962c07c9fb0a0e739dc4a196bbbe4084f197368072f7ee802d26d25307799
                                • Opcode Fuzzy Hash: 207c9673ba1f543849f6953aba7086bb4344e32071ca3c9e074c550f87db9bed
                                • Instruction Fuzzy Hash: 06429B74205342EFDB24CF28D845AAABBE5FF49320F14461AF696C73A1D731E844EB52
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memmove$_memset
                                • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                • API String ID: 1357608183-1798697756
                                • Opcode ID: 1162b2cf0dd6ee2425d713dbc8dda05a4c6b8acb17f6417466b6492e4008cf85
                                • Instruction ID: 5ac1388e3550015a672d540feb9e3a88d4119f1aa4140e0b1ecdee1d5d6e6c20
                                • Opcode Fuzzy Hash: 1162b2cf0dd6ee2425d713dbc8dda05a4c6b8acb17f6417466b6492e4008cf85
                                • Instruction Fuzzy Hash: A8938171A04219DFEF24CF98C881BADB7B1FF49714F25816AE945EB681E7709D81CB80
                                APIs
                                • GetForegroundWindow.USER32(00000000,?), ref: 008548DF
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0088D665
                                • IsIconic.USER32(?), ref: 0088D66E
                                • ShowWindow.USER32(?,00000009), ref: 0088D67B
                                • SetForegroundWindow.USER32(?), ref: 0088D685
                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0088D69B
                                • GetCurrentThreadId.KERNEL32 ref: 0088D6A2
                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0088D6AE
                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0088D6BF
                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0088D6C7
                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 0088D6CF
                                • SetForegroundWindow.USER32(?), ref: 0088D6D2
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0088D6E7
                                • keybd_event.USER32(00000012,00000000), ref: 0088D6F2
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0088D6FC
                                • keybd_event.USER32(00000012,00000000), ref: 0088D701
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0088D70A
                                • keybd_event.USER32(00000012,00000000), ref: 0088D70F
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0088D719
                                • keybd_event.USER32(00000012,00000000), ref: 0088D71E
                                • SetForegroundWindow.USER32(?), ref: 0088D721
                                • AttachThreadInput.USER32(?,?,00000000), ref: 0088D748
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                • String ID: Shell_TrayWnd
                                • API String ID: 4125248594-2988720461
                                • Opcode ID: 7cebc68820c7658629d23491712bae7210fc1756427057e067490cb34f841871
                                • Instruction ID: 57fe49f87d1b6719314978e2d0c52a26e67c3e7890a7711d319b3aafa4bf46ee
                                • Opcode Fuzzy Hash: 7cebc68820c7658629d23491712bae7210fc1756427057e067490cb34f841871
                                • Instruction Fuzzy Hash: A7317371A4131CBBEB206B619C49F7F7F6CFB44B50F104166FB05EA1D2D6B05900ABA0
                                APIs
                                  • Part of subcall function 008A87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 008A882B
                                  • Part of subcall function 008A87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 008A8858
                                  • Part of subcall function 008A87E1: GetLastError.KERNEL32 ref: 008A8865
                                • _memset.LIBCMT ref: 008A8353
                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 008A83A5
                                • CloseHandle.KERNEL32(?), ref: 008A83B6
                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 008A83CD
                                • GetProcessWindowStation.USER32 ref: 008A83E6
                                • SetProcessWindowStation.USER32(00000000), ref: 008A83F0
                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 008A840A
                                  • Part of subcall function 008A81CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,008A8309), ref: 008A81E0
                                  • Part of subcall function 008A81CB: CloseHandle.KERNEL32(?,?,008A8309), ref: 008A81F2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                • String ID: $default$winsta0
                                • API String ID: 2063423040-1027155976
                                • Opcode ID: b4157e2c52d16c823b1768f50a4b3dce4e901ace9cf851fdbb832cf7b865d59a
                                • Instruction ID: c6bb67ae118ef4b8a42ecb44ced446c82dfbf2592a0a2869758f4a68afaabea5
                                • Opcode Fuzzy Hash: b4157e2c52d16c823b1768f50a4b3dce4e901ace9cf851fdbb832cf7b865d59a
                                • Instruction Fuzzy Hash: C1814571C01209EFEF119FA4DC45AEEBBB9FF05304F14816AF915E2661DB318A14AB21
                                APIs
                                • FindFirstFileW.KERNEL32(?,?), ref: 008BC78D
                                • FindClose.KERNEL32(00000000), ref: 008BC7E1
                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 008BC806
                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 008BC81D
                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 008BC844
                                • __swprintf.LIBCMT ref: 008BC890
                                • __swprintf.LIBCMT ref: 008BC8D3
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                • __swprintf.LIBCMT ref: 008BC927
                                  • Part of subcall function 00873698: __woutput_l.LIBCMT ref: 008736F1
                                • __swprintf.LIBCMT ref: 008BC975
                                  • Part of subcall function 00873698: __flsbuf.LIBCMT ref: 00873713
                                  • Part of subcall function 00873698: __flsbuf.LIBCMT ref: 0087372B
                                • __swprintf.LIBCMT ref: 008BC9C4
                                • __swprintf.LIBCMT ref: 008BCA13
                                • __swprintf.LIBCMT ref: 008BCA62
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                • API String ID: 3953360268-2428617273
                                • Opcode ID: 7a47beb0635977be0d57d0100b391e2bff66fbce5b744aca8ffadf15cecda289
                                • Instruction ID: 4164296767ddf324a699c2c3e20915746ccc49e36425a4837d2c134b7f90a66e
                                • Opcode Fuzzy Hash: 7a47beb0635977be0d57d0100b391e2bff66fbce5b744aca8ffadf15cecda289
                                • Instruction Fuzzy Hash: 3FA10EB1504344ABC750EB98D885DAFB7ECFF94705F404929F995C6291EB34DA08CB63
                                APIs
                                • FindFirstFileW.KERNEL32(?,?,756E8FB0,?,00000000), ref: 008BEFB6
                                • _wcscmp.LIBCMT ref: 008BEFCB
                                • _wcscmp.LIBCMT ref: 008BEFE2
                                • GetFileAttributesW.KERNEL32(?), ref: 008BEFF4
                                • SetFileAttributesW.KERNEL32(?,?), ref: 008BF00E
                                • FindNextFileW.KERNEL32(00000000,?), ref: 008BF026
                                • FindClose.KERNEL32(00000000), ref: 008BF031
                                • FindFirstFileW.KERNEL32(*.*,?), ref: 008BF04D
                                • _wcscmp.LIBCMT ref: 008BF074
                                • _wcscmp.LIBCMT ref: 008BF08B
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 008BF09D
                                • SetCurrentDirectoryW.KERNEL32(00908920), ref: 008BF0BB
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 008BF0C5
                                • FindClose.KERNEL32(00000000), ref: 008BF0D2
                                • FindClose.KERNEL32(00000000), ref: 008BF0E4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                • String ID: *.*
                                • API String ID: 1803514871-438819550
                                • Opcode ID: 9c4f5f42cefbb08b5eff1ab99669bb643fac1b7ee536bb3f2e43232df30f1e42
                                • Instruction ID: 2c2c93a040c962848e8b24b0f8e7debfb0d157e7adfd8080777b18b5827f2a0f
                                • Opcode Fuzzy Hash: 9c4f5f42cefbb08b5eff1ab99669bb643fac1b7ee536bb3f2e43232df30f1e42
                                • Instruction Fuzzy Hash: 4331E332501A086FCB14ABB4DC48AEE77ACFF48360F144276FA55D22A3DB70DA45DE61
                                APIs
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008D0953
                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,008DF910,00000000,?,00000000,?,?), ref: 008D09C1
                                • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 008D0A09
                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 008D0A92
                                • RegCloseKey.ADVAPI32(?), ref: 008D0DB2
                                • RegCloseKey.ADVAPI32(00000000), ref: 008D0DBF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Close$ConnectCreateRegistryValue
                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                • API String ID: 536824911-966354055
                                • Opcode ID: 18e0d4f72bd7e2dba11679df349398b10dae4a8e6508ba75114127b885fdfccf
                                • Instruction ID: 366f37e272117cafcc16b74167262a4c6929193578fb63b22bd6a9766c4e3d05
                                • Opcode Fuzzy Hash: 18e0d4f72bd7e2dba11679df349398b10dae4a8e6508ba75114127b885fdfccf
                                • Instruction Fuzzy Hash: AC0237756046119FCB14EF28C851E2AB7E5FF89314F048569F98ADB3A2DB30ED45CB82
                                APIs
                                • FindFirstFileW.KERNEL32(?,?,756E8FB0,?,00000000), ref: 008BF113
                                • _wcscmp.LIBCMT ref: 008BF128
                                • _wcscmp.LIBCMT ref: 008BF13F
                                  • Part of subcall function 008B4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 008B43A0
                                • FindNextFileW.KERNEL32(00000000,?), ref: 008BF16E
                                • FindClose.KERNEL32(00000000), ref: 008BF179
                                • FindFirstFileW.KERNEL32(*.*,?), ref: 008BF195
                                • _wcscmp.LIBCMT ref: 008BF1BC
                                • _wcscmp.LIBCMT ref: 008BF1D3
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 008BF1E5
                                • SetCurrentDirectoryW.KERNEL32(00908920), ref: 008BF203
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 008BF20D
                                • FindClose.KERNEL32(00000000), ref: 008BF21A
                                • FindClose.KERNEL32(00000000), ref: 008BF22C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                • String ID: *.*
                                • API String ID: 1824444939-438819550
                                • Opcode ID: dc801715ee565a577d77e4c8f16b1694a2f0f93e5f0693e74a75e8c15d757665
                                • Instruction ID: fae51e82e0786884f8a232c5f5341cbb82153f7ceeb48af11bd73f918847dcac
                                • Opcode Fuzzy Hash: dc801715ee565a577d77e4c8f16b1694a2f0f93e5f0693e74a75e8c15d757665
                                • Instruction Fuzzy Hash: 0B3116365012197ACB14AFB8EC49EEE77ACFF45320F104272FA54E22A2DB30DE45DA55
                                APIs
                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 008BA20F
                                • __swprintf.LIBCMT ref: 008BA231
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 008BA26E
                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 008BA293
                                • _memset.LIBCMT ref: 008BA2B2
                                • _wcsncpy.LIBCMT ref: 008BA2EE
                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 008BA323
                                • CloseHandle.KERNEL32(00000000), ref: 008BA32E
                                • RemoveDirectoryW.KERNEL32(?), ref: 008BA337
                                • CloseHandle.KERNEL32(00000000), ref: 008BA341
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                • String ID: :$\$\??\%s
                                • API String ID: 2733774712-3457252023
                                • Opcode ID: afb347b68d865d375ee5976d07f61dd73f8b99433398fce321ba66565b0ad831
                                • Instruction ID: 7b6a94cfc731ff37fa573e6788f84f25fcdb85cdb5d7bad1ef33d08028101f0c
                                • Opcode Fuzzy Hash: afb347b68d865d375ee5976d07f61dd73f8b99433398fce321ba66565b0ad831
                                • Instruction Fuzzy Hash: 5131AFB590010AABDB21DFA4DC49FEB77BCFF89740F1041B6F609D2261EB7096448B25
                                APIs
                                  • Part of subcall function 008A8202: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 008A821E
                                  • Part of subcall function 008A8202: GetLastError.KERNEL32(?,008A7CE2,?,?,?), ref: 008A8228
                                  • Part of subcall function 008A8202: GetProcessHeap.KERNEL32(00000008,?,?,008A7CE2,?,?,?), ref: 008A8237
                                  • Part of subcall function 008A8202: HeapAlloc.KERNEL32(00000000,?,008A7CE2,?,?,?), ref: 008A823E
                                  • Part of subcall function 008A8202: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 008A8255
                                  • Part of subcall function 008A829F: GetProcessHeap.KERNEL32(00000008,008A7CF8,00000000,00000000,?,008A7CF8,?), ref: 008A82AB
                                  • Part of subcall function 008A829F: HeapAlloc.KERNEL32(00000000,?,008A7CF8,?), ref: 008A82B2
                                  • Part of subcall function 008A829F: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,008A7CF8,?), ref: 008A82C3
                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 008A7D13
                                • _memset.LIBCMT ref: 008A7D28
                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 008A7D47
                                • GetLengthSid.ADVAPI32(?), ref: 008A7D58
                                • GetAce.ADVAPI32(?,00000000,?), ref: 008A7D95
                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 008A7DB1
                                • GetLengthSid.ADVAPI32(?), ref: 008A7DCE
                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 008A7DDD
                                • HeapAlloc.KERNEL32(00000000), ref: 008A7DE4
                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 008A7E05
                                • CopySid.ADVAPI32(00000000), ref: 008A7E0C
                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 008A7E3D
                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 008A7E63
                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 008A7E77
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                • String ID:
                                • API String ID: 3996160137-0
                                • Opcode ID: 682737d12c51cf540aee9c2ba2187550270fc54c3af8969e72e837f8f7c5301b
                                • Instruction ID: a1282c4ed7dc4073f63bde1df3247fcd41a79f62ab2d5bd9182802c1a74a1c6a
                                • Opcode Fuzzy Hash: 682737d12c51cf540aee9c2ba2187550270fc54c3af8969e72e837f8f7c5301b
                                • Instruction Fuzzy Hash: 19614A71904609EFEF01DFA4DC84AAEBB79FF05700F04826AE916E7291DB319E15DB60
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                • API String ID: 0-4052911093
                                • Opcode ID: 3022f9995bc7132aa23e0ba7e63c4ae625967db2ed467ca96c945ecf67be4a18
                                • Instruction ID: 69a21955f68b299de5197db805f226bd4006f363b8ba2e3837fa3903bb3504e0
                                • Opcode Fuzzy Hash: 3022f9995bc7132aa23e0ba7e63c4ae625967db2ed467ca96c945ecf67be4a18
                                • Instruction Fuzzy Hash: 00729171E00219DBEF24CF58C8847AEB7B5FF49314F15816AE949EB681EB349D81CB90
                                APIs
                                • GetKeyboardState.USER32(?), ref: 008B0097
                                • SetKeyboardState.USER32(?), ref: 008B0102
                                • GetAsyncKeyState.USER32(000000A0), ref: 008B0122
                                • GetKeyState.USER32(000000A0), ref: 008B0139
                                • GetAsyncKeyState.USER32(000000A1), ref: 008B0168
                                • GetKeyState.USER32(000000A1), ref: 008B0179
                                • GetAsyncKeyState.USER32(00000011), ref: 008B01A5
                                • GetKeyState.USER32(00000011), ref: 008B01B3
                                • GetAsyncKeyState.USER32(00000012), ref: 008B01DC
                                • GetKeyState.USER32(00000012), ref: 008B01EA
                                • GetAsyncKeyState.USER32(0000005B), ref: 008B0213
                                • GetKeyState.USER32(0000005B), ref: 008B0221
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: State$Async$Keyboard
                                • String ID:
                                • API String ID: 541375521-0
                                • Opcode ID: 821b08392ff77c657fa927ca857bd3920d8584a6e52cf49aac43402008d1dfd0
                                • Instruction ID: 19a600b834fd87725018d773511c01d37d0439d1aedd831c744306ee7e08a239
                                • Opcode Fuzzy Hash: 821b08392ff77c657fa927ca857bd3920d8584a6e52cf49aac43402008d1dfd0
                                • Instruction Fuzzy Hash: 2A51CE2090478819FB35EB6488547EBBFF4FF11380F48459995C29A7C3DA549B8CCF52
                                APIs
                                  • Part of subcall function 008D0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,008CFDAD,?,?), ref: 008D0E31
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008D04AC
                                  • Part of subcall function 00859837: __itow.LIBCMT ref: 00859862
                                  • Part of subcall function 00859837: __swprintf.LIBCMT ref: 008598AC
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 008D054B
                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 008D05E3
                                • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 008D0822
                                • RegCloseKey.ADVAPI32(00000000), ref: 008D082F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                • String ID:
                                • API String ID: 1240663315-0
                                • Opcode ID: 1f24432f044b4f4fd48874a692924c0f47ee7148b70716762c9c2c1f453cd02b
                                • Instruction ID: b62b8dedffeb362b0514060ac08df8ee9f0bf7b1c8ca61fdd9488d956aeb2aa8
                                • Opcode Fuzzy Hash: 1f24432f044b4f4fd48874a692924c0f47ee7148b70716762c9c2c1f453cd02b
                                • Instruction Fuzzy Hash: 13E13B71604204AFCB14DF28C895E2ABBE5FF89314F04856DF94ADB262DA31E905CF92
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                • String ID:
                                • API String ID: 1737998785-0
                                • Opcode ID: 12d00af6de23f926fb915399873fc214ec71274cf11c47e68e8717d5de8226b5
                                • Instruction ID: 01ea87085f7ea2eecc015ecc28d2900dc30394aa8875cd17a5a1cde6e890817b
                                • Opcode Fuzzy Hash: 12d00af6de23f926fb915399873fc214ec71274cf11c47e68e8717d5de8226b5
                                • Instruction Fuzzy Hash: 44218D352012149FDB10AF24EC19F697BA8FF55711F14812AFA86DB2A2DB30E940DB55
                                APIs
                                  • Part of subcall function 00854750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00854743,?,?,008537AE,?), ref: 00854770
                                  • Part of subcall function 008B4A31: GetFileAttributesW.KERNEL32(?,008B370B), ref: 008B4A32
                                • FindFirstFileW.KERNEL32(?,?), ref: 008B38A3
                                • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 008B394B
                                • MoveFileW.KERNEL32(?,?), ref: 008B395E
                                • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 008B397B
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 008B399D
                                • FindClose.KERNEL32(00000000,?,?,?,?), ref: 008B39B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                • String ID: \*.*
                                • API String ID: 4002782344-1173974218
                                • Opcode ID: d8b2ca7eef9fca1b8494676aeb420dba4ecb9b7480a59872731c36401d7900b0
                                • Instruction ID: b4e4693d149e494ae3de4586c1d8fe105b3a301e963f601e40444a4d9f811c56
                                • Opcode Fuzzy Hash: d8b2ca7eef9fca1b8494676aeb420dba4ecb9b7480a59872731c36401d7900b0
                                • Instruction Fuzzy Hash: AE51523180514CAACF05EBA4D9529EDBB79FF15301F604169E806F62A2EB316F0DCB62
                                APIs
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 008BF440
                                • Sleep.KERNEL32(0000000A), ref: 008BF470
                                • _wcscmp.LIBCMT ref: 008BF484
                                • _wcscmp.LIBCMT ref: 008BF49F
                                • FindNextFileW.KERNEL32(?,?), ref: 008BF53D
                                • FindClose.KERNEL32(00000000), ref: 008BF553
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                • String ID: *.*
                                • API String ID: 713712311-438819550
                                • Opcode ID: adf72360ebc0b9c807be7a96e84c34323491a68f125c72c574fef5d3845b6810
                                • Instruction ID: ba01859414810dcc96d2fa423b17752c90603a3c2faa8ad0eef21bd2a42dcafd
                                • Opcode Fuzzy Hash: adf72360ebc0b9c807be7a96e84c34323491a68f125c72c574fef5d3845b6810
                                • Instruction Fuzzy Hash: 8B417B7190021AAFCF24EF68DC45AEEBBB4FF05314F144566E915E3292EB309E58CB51
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID:
                                • API String ID: 4104443479-0
                                • Opcode ID: 3f7abf7a32b3ce5a94d26a53e70dafa9b9d0d42d5cc0e865f4457d39b23d52c8
                                • Instruction ID: c1c66d36dbc5303cd360866430b30d07d45d09ee862de03569fd7c8d5faf115a
                                • Opcode Fuzzy Hash: 3f7abf7a32b3ce5a94d26a53e70dafa9b9d0d42d5cc0e865f4457d39b23d52c8
                                • Instruction Fuzzy Hash: D2128970A00A09DFDF14DFA9D981AAEB7F5FF48304F108529E806E7691EB36AD14CB51
                                APIs
                                  • Part of subcall function 00854750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00854743,?,?,008537AE,?), ref: 00854770
                                  • Part of subcall function 008B4A31: GetFileAttributesW.KERNEL32(?,008B370B), ref: 008B4A32
                                • FindFirstFileW.KERNEL32(?,?), ref: 008B3B89
                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 008B3BD9
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 008B3BEA
                                • FindClose.KERNEL32(00000000), ref: 008B3C01
                                • FindClose.KERNEL32(00000000), ref: 008B3C0A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                • String ID: \*.*
                                • API String ID: 2649000838-1173974218
                                • Opcode ID: 8dcea8aa0187c528fec76d5a578061410367aa868bc0e63a4dbda5f02fde972c
                                • Instruction ID: 7611439ee47de73def9ff5f964c65b53b0a725f01cdf4a08cb515aaf5c84b505
                                • Opcode Fuzzy Hash: 8dcea8aa0187c528fec76d5a578061410367aa868bc0e63a4dbda5f02fde972c
                                • Instruction Fuzzy Hash: 613150310093859BC301EB68D8918EFBBA8FE95315F404E2DF8D6D22A1EB219A0CD753
                                APIs
                                  • Part of subcall function 008A87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 008A882B
                                  • Part of subcall function 008A87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 008A8858
                                  • Part of subcall function 008A87E1: GetLastError.KERNEL32 ref: 008A8865
                                • ExitWindowsEx.USER32(?,00000000), ref: 008B51F9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                • String ID: $@$SeShutdownPrivilege
                                • API String ID: 2234035333-194228
                                • Opcode ID: 0bfab42616403ef4291f9b1ab5aebdd27208e92746c1fa49797df82f52d38b47
                                • Instruction ID: 439df5a529bae25ddb9c456b9adc10b35c6a2f150fa2130cac236c1b042c4ab9
                                • Opcode Fuzzy Hash: 0bfab42616403ef4291f9b1ab5aebdd27208e92746c1fa49797df82f52d38b47
                                • Instruction Fuzzy Hash: 7C0126317D36156FF7286268AC8BFFB7398FB05344F240521FA63E22D2DA511C0085A0
                                APIs
                                • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 008C62DC
                                • WSAGetLastError.WSOCK32(00000000), ref: 008C62EB
                                • bind.WSOCK32(00000000,?,00000010), ref: 008C6307
                                • listen.WSOCK32(00000000,00000005), ref: 008C6316
                                • WSAGetLastError.WSOCK32(00000000), ref: 008C6330
                                • closesocket.WSOCK32(00000000,00000000), ref: 008C6344
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ErrorLast$bindclosesocketlistensocket
                                • String ID:
                                • API String ID: 1279440585-0
                                • Opcode ID: 820e836407aed9cf4cde3ed72820c11d6740439d9e2f0cd2ef605416d544fba3
                                • Instruction ID: 8c6765a45887306dc5e89a3c3a57b27a55b0c4136a15170067173a20085aa8ed
                                • Opcode Fuzzy Hash: 820e836407aed9cf4cde3ed72820c11d6740439d9e2f0cd2ef605416d544fba3
                                • Instruction Fuzzy Hash: 9521BD306002049FDB00EF68C845F6EB7B9FF49720F148269E956E7392DB70AD15DB52
                                APIs
                                  • Part of subcall function 00870DB6: std::exception::exception.LIBCMT ref: 00870DEC
                                  • Part of subcall function 00870DB6: __CxxThrowException@8.LIBCMT ref: 00870E01
                                • _memmove.LIBCMT ref: 008A0258
                                • _memmove.LIBCMT ref: 008A036D
                                • _memmove.LIBCMT ref: 008A0414
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memmove$Exception@8Throwstd::exception::exception
                                • String ID:
                                • API String ID: 1300846289-0
                                • Opcode ID: 531ab24ea29683e84f449b26d008fb086e5f96a634b9b4a3de5da546a4be58d4
                                • Instruction ID: cd8f1f798ab385b7082e610d1190ab3bd1f2e32cbe273b382a4e0a64e7b9c6a7
                                • Opcode Fuzzy Hash: 531ab24ea29683e84f449b26d008fb086e5f96a634b9b4a3de5da546a4be58d4
                                • Instruction Fuzzy Hash: C002CDB0A00209DFDF04DF68D981AAEBBB5FF45304F158069E80ADB295EB35D954CF92
                                APIs
                                  • Part of subcall function 00852612: GetWindowLongW.USER32(?,000000EB), ref: 00852623
                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 008519FA
                                • GetSysColor.USER32(0000000F), ref: 00851A4E
                                • SetBkColor.GDI32(?,00000000), ref: 00851A61
                                  • Part of subcall function 00851290: DefDlgProcW.USER32(?,00000020,?), ref: 008512D8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ColorProc$LongWindow
                                • String ID:
                                • API String ID: 3744519093-0
                                • Opcode ID: 27c3ee59308b2b7d54f61b931bd94d94ab9a576e1e18fa2a5bdf5569ddc31ece
                                • Instruction ID: 517ed483a51e365a1be136c6742c0af67f986aad614a533bb38e0a97d3f69375
                                • Opcode Fuzzy Hash: 27c3ee59308b2b7d54f61b931bd94d94ab9a576e1e18fa2a5bdf5569ddc31ece
                                • Instruction Fuzzy Hash: 74A15B741165A9BADE2BAB2C4C4CFBF3A5DFB82747B15021AFD02D1192DA209D05D373
                                APIs
                                • FindFirstFileW.KERNEL32(?,?), ref: 008BBCE6
                                • _wcscmp.LIBCMT ref: 008BBD16
                                • _wcscmp.LIBCMT ref: 008BBD2B
                                • FindNextFileW.KERNEL32(00000000,?), ref: 008BBD3C
                                • FindClose.KERNEL32(00000000,00000001,00000000), ref: 008BBD6C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Find$File_wcscmp$CloseFirstNext
                                • String ID:
                                • API String ID: 2387731787-0
                                • Opcode ID: bd9c7c9023af2626cd673321a3dd7ea5dac3e911fd0de089a62852c0c74c15d2
                                • Instruction ID: 58ddc60697a18d3c6896db16cdfcc1c8e0d682e830b188dcce10437b94c60ac1
                                • Opcode Fuzzy Hash: bd9c7c9023af2626cd673321a3dd7ea5dac3e911fd0de089a62852c0c74c15d2
                                • Instruction Fuzzy Hash: AC518D356046029FD714DF68C490E9AB7E4FF49324F18462DE95ACB3A1DB74ED04CB92
                                APIs
                                  • Part of subcall function 008C7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 008C7DB6
                                • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 008C679E
                                • WSAGetLastError.WSOCK32(00000000), ref: 008C67C7
                                • bind.WSOCK32(00000000,?,00000010), ref: 008C6800
                                • WSAGetLastError.WSOCK32(00000000), ref: 008C680D
                                • closesocket.WSOCK32(00000000,00000000), ref: 008C6821
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                • String ID:
                                • API String ID: 99427753-0
                                • Opcode ID: c1ab70995073b8303cac2942b91f2de90aaa072acd8827b9c47cc1d3adab87ed
                                • Instruction ID: 264a8e4420331ee268fac70890790d0725106abb06c14587a054926f2e02d035
                                • Opcode Fuzzy Hash: c1ab70995073b8303cac2942b91f2de90aaa072acd8827b9c47cc1d3adab87ed
                                • Instruction Fuzzy Hash: 8241D575600214AFDB10AF288C86F2E77A4FF05714F04456DFD5AEB2D2DA709D048B92
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                • String ID:
                                • API String ID: 292994002-0
                                • Opcode ID: 84d614b5a6a9c5b7c88e2d50d45b33d20439d09497aeb33cdeeb5ea7da332089
                                • Instruction ID: ae84fc7bd324ecc9aff9b2782bd0ee5df642b5b86f7ec7cd6c4b81044a777610
                                • Opcode Fuzzy Hash: 84d614b5a6a9c5b7c88e2d50d45b33d20439d09497aeb33cdeeb5ea7da332089
                                • Instruction Fuzzy Hash: E1112731301911AFEB205F2ADC44A6E7B99FF453A1B00423BF946D7342CB70DD01CAA5
                                APIs
                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 008A80C0
                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 008A80CA
                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 008A80D9
                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 008A80E0
                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 008A80F6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                • String ID:
                                • API String ID: 44706859-0
                                • Opcode ID: 7aadf63651c9aefe7c0acb4746aaa0e6c68ed929a24399bff09c88eb68c473ec
                                • Instruction ID: 4ce9b11032c4591482b0fbcf2e1a250fcfd0edfd829d2e57e1deb589f0aac084
                                • Opcode Fuzzy Hash: 7aadf63651c9aefe7c0acb4746aaa0e6c68ed929a24399bff09c88eb68c473ec
                                • Instruction Fuzzy Hash: 5EF04F31241204EFEB114FA5EC8DE673BACFF4A755F040126FA46C6151CB659D41EA70
                                APIs
                                • CoInitialize.OLE32(00000000), ref: 008BC432
                                • CoCreateInstance.OLE32(008E2D6C,00000000,00000001,008E2BDC,?), ref: 008BC44A
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                • CoUninitialize.OLE32 ref: 008BC6B7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CreateInitializeInstanceUninitialize_memmove
                                • String ID: .lnk
                                • API String ID: 2683427295-24824748
                                • Opcode ID: c9e7e4de6ae04c6b71118a9ca838b44eb18493b967ee28ced57e52d5894d0256
                                • Instruction ID: 089123daf38dc2e1c43bae88bec252c99159fa1a2a4c4770ff89e663c1400cf5
                                • Opcode Fuzzy Hash: c9e7e4de6ae04c6b71118a9ca838b44eb18493b967ee28ced57e52d5894d0256
                                • Instruction Fuzzy Hash: FBA14B71104205AFD300EF58C891EABB7E8FF95355F00492DF595DB2A2EB71EA09CB62
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00854AD0), ref: 00854B45
                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00854B57
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: GetNativeSystemInfo$kernel32.dll
                                • API String ID: 2574300362-192647395
                                • Opcode ID: 2b7d76875886dc593fa4b45f48d751be8cc19a327e4b0458b4cda9512ca00fd2
                                • Instruction ID: 02d06edf537336057df6ef41ecf8106446118de39c1596d3b3d49f4ee74f2e9e
                                • Opcode Fuzzy Hash: 2b7d76875886dc593fa4b45f48d751be8cc19a327e4b0458b4cda9512ca00fd2
                                • Instruction Fuzzy Hash: 9ED0C730A00313CFCB208F72E828B0273E4FF013A2B14893BA9A3D2250E774E8C0DA14
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __itow__swprintf
                                • String ID:
                                • API String ID: 674341424-0
                                • Opcode ID: c39eca13d38656afd6116e5ea498ce405d2b6408342a28c42ffde65600cbc593
                                • Instruction ID: ac2b3ae33c220fe33742a22b782a88a9452731fa35d81049dcfb1a6d95c8c876
                                • Opcode Fuzzy Hash: c39eca13d38656afd6116e5ea498ce405d2b6408342a28c42ffde65600cbc593
                                • Instruction Fuzzy Hash: DB2257716083019FDB24DF28C891B6AB7E4FF84314F15492DF99AD7291EB71E908CB92
                                APIs
                                • CreateToolhelp32Snapshot.KERNEL32 ref: 008CEE3D
                                • Process32FirstW.KERNEL32(00000000,?), ref: 008CEE4B
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                • Process32NextW.KERNEL32(00000000,?), ref: 008CEF0B
                                • CloseHandle.KERNEL32(00000000,?,?,?), ref: 008CEF1A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                • String ID:
                                • API String ID: 2576544623-0
                                • Opcode ID: 8cefac661d5587b8c7229fae670b26ac1cfafd217b9ea3dd11a9dd7cdcf33472
                                • Instruction ID: e467608debdd1573d03debb84b34a05235189eb6eb1589fff51aa80c77f19046
                                • Opcode Fuzzy Hash: 8cefac661d5587b8c7229fae670b26ac1cfafd217b9ea3dd11a9dd7cdcf33472
                                • Instruction Fuzzy Hash: 86517B71104311AFD310EF28D885E6BBBE8FF94750F50482DF995D62A2EB70E908CB92
                                APIs
                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 008AE628
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: lstrlen
                                • String ID: ($|
                                • API String ID: 1659193697-1631851259
                                • Opcode ID: 007853aed9a95a90f1f805b802478c8b21c879ee5a2bbac7f780d0bbab5392e9
                                • Instruction ID: 0ae22ef131ab7bfac225d517132b143d1f403bc665c9559fd48892b3cc0b0a56
                                • Opcode Fuzzy Hash: 007853aed9a95a90f1f805b802478c8b21c879ee5a2bbac7f780d0bbab5392e9
                                • Instruction Fuzzy Hash: F6322575A007059FDB28CF59C481A6AB7F0FF58320B15C96EE89ADB7A1E770E941CB40
                                APIs
                                • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,008C180A,00000000), ref: 008C23E1
                                • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 008C2418
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Internet$AvailableDataFileQueryRead
                                • String ID:
                                • API String ID: 599397726-0
                                • Opcode ID: 9f7a3b8890ddf5bf3cac456362ed32068d80271a4f4d32295acad0bcc3dd4be9
                                • Instruction ID: fee8e319f568b6eed6c1c93916bbc591253b062506cffb0564a9718c90b4c5fe
                                • Opcode Fuzzy Hash: 9f7a3b8890ddf5bf3cac456362ed32068d80271a4f4d32295acad0bcc3dd4be9
                                • Instruction Fuzzy Hash: 0B41E371A04209BFEB10DEA9DC81FBBB7BCFB40728F10406EF605E6291DA75DE419654
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 008BB40B
                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 008BB465
                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 008BB4B2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ErrorMode$DiskFreeSpace
                                • String ID:
                                • API String ID: 1682464887-0
                                • Opcode ID: fce930740bd684fc74bcc831e26b8086295b386347c260c9f3b91c356e480d98
                                • Instruction ID: 03482bfde07ad646fd5dade0cc406ee04f9e7806407dd7fa24bdaaaf5d76b999
                                • Opcode Fuzzy Hash: fce930740bd684fc74bcc831e26b8086295b386347c260c9f3b91c356e480d98
                                • Instruction Fuzzy Hash: D2217435A00118DFCB00DF65D880AEDBBB8FF49315F1480AAE945EB352DB319915CF51
                                APIs
                                  • Part of subcall function 00870DB6: std::exception::exception.LIBCMT ref: 00870DEC
                                  • Part of subcall function 00870DB6: __CxxThrowException@8.LIBCMT ref: 00870E01
                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 008A882B
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 008A8858
                                • GetLastError.KERNEL32 ref: 008A8865
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                • String ID:
                                • API String ID: 1922334811-0
                                • Opcode ID: 889f45f4f529754383d99d63228a2996ae3c09ceea4dd555f0686691872e3d6a
                                • Instruction ID: 1c4f2cf3333f518f65d5301790e01e4b5980a605d769df242aff3f5395c4b1d6
                                • Opcode Fuzzy Hash: 889f45f4f529754383d99d63228a2996ae3c09ceea4dd555f0686691872e3d6a
                                • Instruction Fuzzy Hash: 9F116DB2414304EFE728DFA4DC85D6BBBE8FB45714B20862EE45697641EF34AC408B60
                                APIs
                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 008A8774
                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 008A878B
                                • FreeSid.ADVAPI32(?), ref: 008A879B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                • String ID:
                                • API String ID: 3429775523-0
                                • Opcode ID: 9dadd24eb0c1b7d6707d482f92d7eb90a974458e94bed5983dc51f204d158462
                                • Instruction ID: e01d0ea41bfb4c2e1be4af92b9eac3cba28af00779abcf52d26b76165b427217
                                • Opcode Fuzzy Hash: 9dadd24eb0c1b7d6707d482f92d7eb90a974458e94bed5983dc51f204d158462
                                • Instruction Fuzzy Hash: FFF03C75911208BBDB00DFE49C89AADB7B8FF08201F504569A602E2282D7715A049B50
                                APIs
                                • FindFirstFileW.KERNEL32(?,?), ref: 008BC6FB
                                • FindClose.KERNEL32(00000000), ref: 008BC72B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Find$CloseFileFirst
                                • String ID:
                                • API String ID: 2295610775-0
                                • Opcode ID: 11248b5474785adc2445bc1850d694666ba2dd1b801850fc0258f71eb232ec50
                                • Instruction ID: 5b6c7978dcbd74aab44b908855ec4380d08ce3b0cc3b49cad42c2273900daaa5
                                • Opcode Fuzzy Hash: 11248b5474785adc2445bc1850d694666ba2dd1b801850fc0258f71eb232ec50
                                • Instruction Fuzzy Hash: 451152716006049FDB10DF29D84596AF7E5FF45325F04861EF9A9DB391DB30A905CF81
                                APIs
                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,008C9468,?,008DFB84,?), ref: 008BA097
                                • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,008C9468,?,008DFB84,?), ref: 008BA0A9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ErrorFormatLastMessage
                                • String ID:
                                • API String ID: 3479602957-0
                                • Opcode ID: 84e86e8b7e5446731944dd5528cab6eda68dd35f29c9fac9db3c8af35e4618d8
                                • Instruction ID: 89f0ed2445fd21ab96b31d44a8783f1de913d97b853cd95060b81d3de3ca99c2
                                • Opcode Fuzzy Hash: 84e86e8b7e5446731944dd5528cab6eda68dd35f29c9fac9db3c8af35e4618d8
                                • Instruction Fuzzy Hash: 0CF0823515522DBBDB21AFA4DC48FEA776CFF08361F008266F909D6281DA309944CBA2
                                APIs
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,008A8309), ref: 008A81E0
                                • CloseHandle.KERNEL32(?,?,008A8309), ref: 008A81F2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: AdjustCloseHandlePrivilegesToken
                                • String ID:
                                • API String ID: 81990902-0
                                • Opcode ID: 9028583ef60427950a1c8f55aaa39bcd1b200107544fbd2843a27efbb051b0f9
                                • Instruction ID: 218b920f278d57e8a10d73626f8b3f3ea371adae3844e9da17db17e19ecab90b
                                • Opcode Fuzzy Hash: 9028583ef60427950a1c8f55aaa39bcd1b200107544fbd2843a27efbb051b0f9
                                • Instruction Fuzzy Hash: 45E0B672011A10EFE7252B65EC09D777BEAFB04310B14C92AB9AAC4475DB62ACD1EB50
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00878D57,?,?,?,00000001), ref: 0087A15A
                                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0087A163
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: b21c2ee4f52a08c1ef0723015cfe90ac9fa15716705e4eb21ae9ab3193e86e1f
                                • Instruction ID: 1eb755abf2017475ccc51ea8540c8a7bdb67c489fa987216bfd95980c7d7161b
                                • Opcode Fuzzy Hash: b21c2ee4f52a08c1ef0723015cfe90ac9fa15716705e4eb21ae9ab3193e86e1f
                                • Instruction Fuzzy Hash: 34B09231055208ABCA042B95EC09B883F68FB44AA2F418122F70E84262CB625450AA91
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 064190b35567f6dafb4b9e25c30b716a0b63127bef90c5a50a81634d212f754a
                                • Instruction ID: 19d733d5bdf4748038d4bde492470fa591d36119b601d2bb5a4aa8964669e158
                                • Opcode Fuzzy Hash: 064190b35567f6dafb4b9e25c30b716a0b63127bef90c5a50a81634d212f754a
                                • Instruction Fuzzy Hash: 85321422D29F814DD7239635D872336A648FFB73D4F15D737E919B99AAEB28C4834100
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f39ec0152940c58a95d3cf5211d938015145523a2cc6ecadd7f4a5ac33413615
                                • Instruction ID: 53eedfee01053c89c5e34a2be104930d775bf88af5a11d6c20e4b9230f65431a
                                • Opcode Fuzzy Hash: f39ec0152940c58a95d3cf5211d938015145523a2cc6ecadd7f4a5ac33413615
                                • Instruction Fuzzy Hash: 8BB1F120D2AF814DD323A6398871336B65CBFBB6C9F52D71BFC1674E62EB2195834241
                                APIs
                                • __time64.LIBCMT ref: 008B889B
                                  • Part of subcall function 0087520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,008B8F6E,00000000,?,?,?,?,008B911F,00000000,?), ref: 00875213
                                  • Part of subcall function 0087520A: __aulldiv.LIBCMT ref: 00875233
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Time$FileSystem__aulldiv__time64
                                • String ID:
                                • API String ID: 2893107130-0
                                • Opcode ID: f73ea278f0f411a2a2cfc9da31b7edb714768298ef1e2eed1070b97b50cdb9b2
                                • Instruction ID: 46920284f62f924fe7cfff964ad1e91234c3ec4a3aba955df4b4145135bd4140
                                • Opcode Fuzzy Hash: f73ea278f0f411a2a2cfc9da31b7edb714768298ef1e2eed1070b97b50cdb9b2
                                • Instruction Fuzzy Hash: 9521B432A35610CBC729CF29D841A92B3E5EFA5311B688E6CE0F5CB2C0CB74B905DB54
                                APIs
                                • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 008B4C4A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: mouse_event
                                • String ID:
                                • API String ID: 2434400541-0
                                • Opcode ID: f8f7e547b6251fa09a086543fd7f1db84fe3875dfb22c57efc5a3d66fb27c940
                                • Instruction ID: 68bb645f4e240b2f89ef62fabd0a962ae5b4fc9f578989b61e998666c3d49ff6
                                • Opcode Fuzzy Hash: f8f7e547b6251fa09a086543fd7f1db84fe3875dfb22c57efc5a3d66fb27c940
                                • Instruction Fuzzy Hash: A1D09E951A661E79ED5C0B649E2FFFA1A48F340F96FD4B2897602CA2C3ECB05C446132
                                APIs
                                • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,008A8389), ref: 008A87D1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: LogonUser
                                • String ID:
                                • API String ID: 1244722697-0
                                • Opcode ID: fc7a1371d78abb4f6dbff6ca89803e894866f5db737d044b9e8533b736437195
                                • Instruction ID: ad3b4468093ede5048782318e95f3890d4a8d14c34d2bdc932bf8bab76e7383e
                                • Opcode Fuzzy Hash: fc7a1371d78abb4f6dbff6ca89803e894866f5db737d044b9e8533b736437195
                                • Instruction Fuzzy Hash: 76D09E3226490EABEF019EA4DD05EAE3B69EB04B01F408511FE16D61A1C775D935AB60
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0087A12A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: 2a1cf90699b15c9e5a73ddb07651e9c5a130a7039459a8d539f12c26046a4d32
                                • Instruction ID: 76d8db1bd115f0388227c79c2f52dc81ce16b65204f9fcca6f98419d33c622ef
                                • Opcode Fuzzy Hash: 2a1cf90699b15c9e5a73ddb07651e9c5a130a7039459a8d539f12c26046a4d32
                                • Instruction Fuzzy Hash: 9AA0123000010CA7CA001B45EC044447F5CE600190B004021F50D40122873254105580
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5cb016ce8f0b2248bc49a9374c8aeedc137200dcb715a1c9c0180f42034df965
                                • Instruction ID: 753607d9f3c486e35356f720aabdcda143e7888510bf45917ef681f370cf6f1e
                                • Opcode Fuzzy Hash: 5cb016ce8f0b2248bc49a9374c8aeedc137200dcb715a1c9c0180f42034df965
                                • Instruction Fuzzy Hash: A0226A3051451ACBEF388B64C49477D7BA1FF42308F2A826BD94ADB992DB709DD1CB42
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                • Instruction ID: 0575c882fdaf774d868f911d1b20bee1580c2a083eac500afda2365cbe031dd0
                                • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                • Instruction Fuzzy Hash: 4CC183322050930ADF6D463D847503EFEA1FEA27B131A875DD8BACB5D9EE20C965D720
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                • Instruction ID: 939f90fa4c927bbd74b5182061d1de2e7cee3f55ed6797b266b14f0c97819e66
                                • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                • Instruction Fuzzy Hash: 6BC1963220519309DF2D463DC47513EBEA1FEA27B131A876DD4BADB5D8EE20C925D720
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                • Instruction ID: 967191d50447ca7adf4c12b87571d6ce97b757dac9b5e2c65d926b7dca0ae1a8
                                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                • Instruction Fuzzy Hash: 63C1843220519309DF2D463D847913EFEA1EFA27B131A875DD4BADB9C8EE20C965DB10
                                APIs
                                • DeleteObject.GDI32(00000000), ref: 008C785B
                                • DeleteObject.GDI32(00000000), ref: 008C786D
                                • DestroyWindow.USER32 ref: 008C787B
                                • GetDesktopWindow.USER32 ref: 008C7895
                                • GetWindowRect.USER32(00000000), ref: 008C789C
                                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 008C79DD
                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 008C79ED
                                • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008C7A35
                                • GetClientRect.USER32(00000000,?), ref: 008C7A41
                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 008C7A7B
                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008C7A9D
                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008C7AB0
                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008C7ABB
                                • GlobalLock.KERNEL32(00000000), ref: 008C7AC4
                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008C7AD3
                                • GlobalUnlock.KERNEL32(00000000), ref: 008C7ADC
                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008C7AE3
                                • GlobalFree.KERNEL32(00000000), ref: 008C7AEE
                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008C7B00
                                • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,008E2CAC,00000000), ref: 008C7B16
                                • GlobalFree.KERNEL32(00000000), ref: 008C7B26
                                • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 008C7B4C
                                • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 008C7B6B
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008C7B8D
                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 008C7D7A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                • String ID: $AutoIt v3$DISPLAY$static
                                • API String ID: 2211948467-2373415609
                                • Opcode ID: 15bc2794966ba137558fe31466ccedd05c1f6e383d176bc6895eff1f4aa4a89e
                                • Instruction ID: 289191b753c2898c7bfe152a2725a77c298cd68bd61053a7499cceab478c24a4
                                • Opcode Fuzzy Hash: 15bc2794966ba137558fe31466ccedd05c1f6e383d176bc6895eff1f4aa4a89e
                                • Instruction Fuzzy Hash: F4021971901115EFDB14DFA8DC89EAE7BB9FB48310F148269F916EB2A1C7349D01DB60
                                APIs
                                • CharUpperBuffW.USER32(?,?,008DF910), ref: 008D3627
                                • IsWindowVisible.USER32(?), ref: 008D364B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: BuffCharUpperVisibleWindow
                                • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                • API String ID: 4105515805-45149045
                                • Opcode ID: 25f8f0ce4573d540f4e249ac7b44f44df2e89bd39443618f55254b46a2be9152
                                • Instruction ID: 1180888cba1431ad13227866aad9179c28b38c2e42a1a3a7b6dc3561e73faa42
                                • Opcode Fuzzy Hash: 25f8f0ce4573d540f4e249ac7b44f44df2e89bd39443618f55254b46a2be9152
                                • Instruction Fuzzy Hash: 93D16B30204311DBCB14EF14C852A6EBBA1FF95754F148569F886DB7A3DB21EA0ACB53
                                APIs
                                • SetTextColor.GDI32(?,00000000), ref: 008DA630
                                • GetSysColorBrush.USER32(0000000F), ref: 008DA661
                                • GetSysColor.USER32(0000000F), ref: 008DA66D
                                • SetBkColor.GDI32(?,000000FF), ref: 008DA687
                                • SelectObject.GDI32(?,00000000), ref: 008DA696
                                • InflateRect.USER32(?,000000FF,000000FF), ref: 008DA6C1
                                • GetSysColor.USER32(00000010), ref: 008DA6C9
                                • CreateSolidBrush.GDI32(00000000), ref: 008DA6D0
                                • FrameRect.USER32(?,?,00000000), ref: 008DA6DF
                                • DeleteObject.GDI32(00000000), ref: 008DA6E6
                                • InflateRect.USER32(?,000000FE,000000FE), ref: 008DA731
                                • FillRect.USER32(?,?,00000000), ref: 008DA763
                                • GetWindowLongW.USER32(?,000000F0), ref: 008DA78E
                                  • Part of subcall function 008DA8CA: GetSysColor.USER32(00000012), ref: 008DA903
                                  • Part of subcall function 008DA8CA: SetTextColor.GDI32(?,?), ref: 008DA907
                                  • Part of subcall function 008DA8CA: GetSysColorBrush.USER32(0000000F), ref: 008DA91D
                                  • Part of subcall function 008DA8CA: GetSysColor.USER32(0000000F), ref: 008DA928
                                  • Part of subcall function 008DA8CA: GetSysColor.USER32(00000011), ref: 008DA945
                                  • Part of subcall function 008DA8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 008DA953
                                  • Part of subcall function 008DA8CA: SelectObject.GDI32(?,00000000), ref: 008DA964
                                  • Part of subcall function 008DA8CA: SetBkColor.GDI32(?,00000000), ref: 008DA96D
                                  • Part of subcall function 008DA8CA: SelectObject.GDI32(?,?), ref: 008DA97A
                                  • Part of subcall function 008DA8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 008DA999
                                  • Part of subcall function 008DA8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008DA9B0
                                  • Part of subcall function 008DA8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 008DA9C5
                                  • Part of subcall function 008DA8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 008DA9ED
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                • String ID:
                                • API String ID: 3521893082-0
                                • Opcode ID: dac33c3f2020893268fae2c9de7fe72ff71365ec7c906093074fdd12f8c54d09
                                • Instruction ID: 59d2ebead33c7e2f524942242c1fa91ba726566a805eef6731221e17f0290302
                                • Opcode Fuzzy Hash: dac33c3f2020893268fae2c9de7fe72ff71365ec7c906093074fdd12f8c54d09
                                • Instruction Fuzzy Hash: 67917E72009305EFCB119F64EC08A5B7BB9FF88321F144B2AFAA2D61A1D771D944DB52
                                APIs
                                • DestroyWindow.USER32(?,?,?), ref: 00852CA2
                                • DeleteObject.GDI32(00000000), ref: 00852CE8
                                • DeleteObject.GDI32(00000000), ref: 00852CF3
                                • DestroyIcon.USER32(00000000,?,?,?), ref: 00852CFE
                                • DestroyWindow.USER32(00000000,?,?,?), ref: 00852D09
                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 0088C43B
                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0088C474
                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0088C89D
                                  • Part of subcall function 00851B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00852036,?,00000000,?,?,?,?,008516CB,00000000,?), ref: 00851B9A
                                • SendMessageW.USER32(?,00001053), ref: 0088C8DA
                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0088C8F1
                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0088C907
                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0088C912
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                • String ID: 0
                                • API String ID: 464785882-4108050209
                                • Opcode ID: 2486c5b2e5bde8bb019aa9e3c06608becabbd7d50b47fd6410b945bc872234b2
                                • Instruction ID: 93dab84af8fab4c1591e898373ef79148bf569e6cee991feb9d1a00c261ab74a
                                • Opcode Fuzzy Hash: 2486c5b2e5bde8bb019aa9e3c06608becabbd7d50b47fd6410b945bc872234b2
                                • Instruction Fuzzy Hash: 4C129E30600201DFDB25EF28C884BA9BBE1FF05315F5445B9E996CB666CB31EC45DBA1
                                APIs
                                • DestroyWindow.USER32(00000000), ref: 008C74DE
                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 008C759D
                                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 008C75DB
                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 008C75ED
                                • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 008C7633
                                • GetClientRect.USER32(00000000,?), ref: 008C763F
                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 008C7683
                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 008C7692
                                • GetStockObject.GDI32(00000011), ref: 008C76A2
                                • SelectObject.GDI32(00000000,00000000), ref: 008C76A6
                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 008C76B6
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008C76BF
                                • DeleteDC.GDI32(00000000), ref: 008C76C8
                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 008C76F4
                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 008C770B
                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 008C7746
                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 008C775A
                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 008C776B
                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 008C779B
                                • GetStockObject.GDI32(00000011), ref: 008C77A6
                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 008C77B1
                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 008C77BB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                • API String ID: 2910397461-517079104
                                • Opcode ID: f558f17aa8b86f641e5de57a1701c9e397d31084d49a9ee6bc564c791454d657
                                • Instruction ID: f6b2b37fcffa70924fd25ecc6ff36c1aac6f73e8b685fc9571f4821383137c42
                                • Opcode Fuzzy Hash: f558f17aa8b86f641e5de57a1701c9e397d31084d49a9ee6bc564c791454d657
                                • Instruction Fuzzy Hash: 27A15E71A40615BFEB149BA8DC4AFAE7BB9FB48710F058215FA15E72E1C670AD00DB60
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 008BAD1E
                                • GetDriveTypeW.KERNEL32(?,008DFAC0,?,\\.\,008DF910), ref: 008BADFB
                                • SetErrorMode.KERNEL32(00000000,008DFAC0,?,\\.\,008DF910), ref: 008BAF59
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ErrorMode$DriveType
                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                • API String ID: 2907320926-4222207086
                                • Opcode ID: 36c863b46b4c0df254f2ead13185f9d36c80be34fcb60434c4b7d74fc155bece
                                • Instruction ID: f4b08b30684f8e388ff43fb6f4386e1d11808691c09e9e8e5523a7e6a1648560
                                • Opcode Fuzzy Hash: 36c863b46b4c0df254f2ead13185f9d36c80be34fcb60434c4b7d74fc155bece
                                • Instruction Fuzzy Hash: E8516DB0744209AECB08EB14D9528FE77A1FB887197244066F846E77D1DE319D09AB53
                                APIs
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 008D9AD2
                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 008D9B8B
                                • SendMessageW.USER32(?,00001102,00000002,?), ref: 008D9BA7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$Window
                                • String ID: 0$V
                                • API String ID: 2326795674-3648174478
                                • Opcode ID: 3e897462c54ab85585b108647e633945c532a10b2fabf49d675d403b9b69193e
                                • Instruction ID: ab89076d42609243a07d647b4bbbf07e3078689cd8549b6fc1bf949a113aec2d
                                • Opcode Fuzzy Hash: 3e897462c54ab85585b108647e633945c532a10b2fabf49d675d403b9b69193e
                                • Instruction Fuzzy Hash: F102BC31209201AFD725CF24C849BAABBE5FF89314F04862EF9D9D63A1CB74D944DB52
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __wcsnicmp
                                • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                • API String ID: 1038674560-86951937
                                • Opcode ID: e6bdfea484ac11b6ca6b5429dfe0b1a9a8f4f232756c2fcdcc2823a08c34bb94
                                • Instruction ID: e65669189f053de8e33258153c2e74e6f0cd5c8735959bac1d657dfc1fca2580
                                • Opcode Fuzzy Hash: e6bdfea484ac11b6ca6b5429dfe0b1a9a8f4f232756c2fcdcc2823a08c34bb94
                                • Instruction Fuzzy Hash: A18148B0600219AACB21BB24EC42FAF3768FF11755F444025FD05EB296FB60DE69D362
                                APIs
                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 008D8AC1
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008D8AD2
                                • CharNextW.USER32(0000014E), ref: 008D8B01
                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 008D8B42
                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 008D8B58
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008D8B69
                                • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 008D8B86
                                • SetWindowTextW.USER32(?,0000014E), ref: 008D8BD8
                                • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 008D8BEE
                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 008D8C1F
                                • _memset.LIBCMT ref: 008D8C44
                                • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 008D8C8D
                                • _memset.LIBCMT ref: 008D8CEC
                                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 008D8D16
                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 008D8D6E
                                • SendMessageW.USER32(?,0000133D,?,?), ref: 008D8E1B
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 008D8E3D
                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 008D8E87
                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 008D8EB4
                                • DrawMenuBar.USER32(?), ref: 008D8EC3
                                • SetWindowTextW.USER32(?,0000014E), ref: 008D8EEB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                • String ID: 0$V
                                • API String ID: 1073566785-3648174478
                                • Opcode ID: 8252bb122185e117a1d79a4ec3ef111be798245e1c3e332cd70a1815dede4c25
                                • Instruction ID: 4969f0e354924122ac315b4d196f794e463a35ba9eaaf73d34f642c2fa4ccee6
                                • Opcode Fuzzy Hash: 8252bb122185e117a1d79a4ec3ef111be798245e1c3e332cd70a1815dede4c25
                                • Instruction Fuzzy Hash: F9E14C71901218EBDB209F54CC84EEE7BB9FB09724F108257FA15EA291DB709A80DF61
                                APIs
                                • GetSysColor.USER32(00000012), ref: 008DA903
                                • SetTextColor.GDI32(?,?), ref: 008DA907
                                • GetSysColorBrush.USER32(0000000F), ref: 008DA91D
                                • GetSysColor.USER32(0000000F), ref: 008DA928
                                • CreateSolidBrush.GDI32(?), ref: 008DA92D
                                • GetSysColor.USER32(00000011), ref: 008DA945
                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 008DA953
                                • SelectObject.GDI32(?,00000000), ref: 008DA964
                                • SetBkColor.GDI32(?,00000000), ref: 008DA96D
                                • SelectObject.GDI32(?,?), ref: 008DA97A
                                • InflateRect.USER32(?,000000FF,000000FF), ref: 008DA999
                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008DA9B0
                                • GetWindowLongW.USER32(00000000,000000F0), ref: 008DA9C5
                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 008DA9ED
                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 008DAA14
                                • InflateRect.USER32(?,000000FD,000000FD), ref: 008DAA32
                                • DrawFocusRect.USER32(?,?), ref: 008DAA3D
                                • GetSysColor.USER32(00000011), ref: 008DAA4B
                                • SetTextColor.GDI32(?,00000000), ref: 008DAA53
                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 008DAA67
                                • SelectObject.GDI32(?,008DA5FA), ref: 008DAA7E
                                • DeleteObject.GDI32(?), ref: 008DAA89
                                • SelectObject.GDI32(?,?), ref: 008DAA8F
                                • DeleteObject.GDI32(?), ref: 008DAA94
                                • SetTextColor.GDI32(?,?), ref: 008DAA9A
                                • SetBkColor.GDI32(?,?), ref: 008DAAA4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                • String ID:
                                • API String ID: 1996641542-0
                                • Opcode ID: 090ba852c3eed2e75258fae663e2e5badd844ec2bcd7b62f4fc039a53c912858
                                • Instruction ID: 73da3886d5d80508d51772683faf53d3768fddd6af0c9f627988f91ccfeed1f6
                                • Opcode Fuzzy Hash: 090ba852c3eed2e75258fae663e2e5badd844ec2bcd7b62f4fc039a53c912858
                                • Instruction Fuzzy Hash: 0A513071901208FFDF119FA4DC48EAE7B79FB08320F254226FA16AB2A2D7759940DF50
                                APIs
                                • GetCursorPos.USER32(?), ref: 008D49CA
                                • GetDesktopWindow.USER32 ref: 008D49DF
                                • GetWindowRect.USER32(00000000), ref: 008D49E6
                                • GetWindowLongW.USER32(?,000000F0), ref: 008D4A48
                                • DestroyWindow.USER32(?), ref: 008D4A74
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 008D4A9D
                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 008D4ABB
                                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 008D4AE1
                                • SendMessageW.USER32(?,00000421,?,?), ref: 008D4AF6
                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 008D4B09
                                • IsWindowVisible.USER32(?), ref: 008D4B29
                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 008D4B44
                                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 008D4B58
                                • GetWindowRect.USER32(?,?), ref: 008D4B70
                                • MonitorFromPoint.USER32(?,?,00000002), ref: 008D4B96
                                • GetMonitorInfoW.USER32(00000000,?), ref: 008D4BB0
                                • CopyRect.USER32(?,?), ref: 008D4BC7
                                • SendMessageW.USER32(?,00000412,00000000), ref: 008D4C32
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                • String ID: ($0$tooltips_class32
                                • API String ID: 698492251-4156429822
                                • Opcode ID: 41547b58b3ce40c1c23673e87b4351ccf1a05397e66d813a25b9d555c97c525f
                                • Instruction ID: fad30d3d5bb1a0253b34743b7833df0395b989cd444b51457073184c92aa9160
                                • Opcode Fuzzy Hash: 41547b58b3ce40c1c23673e87b4351ccf1a05397e66d813a25b9d555c97c525f
                                • Instruction Fuzzy Hash: 82B15971604350AFDB04DF68D844B6ABBE4FF88314F008A1AF99ADB2A1D771EC05CB56
                                APIs
                                • GetFileVersionInfoSizeW.VERSION(?,?), ref: 008B44AC
                                • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 008B44D2
                                • _wcscpy.LIBCMT ref: 008B4500
                                • _wcscmp.LIBCMT ref: 008B450B
                                • _wcscat.LIBCMT ref: 008B4521
                                • _wcsstr.LIBCMT ref: 008B452C
                                • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 008B4548
                                • _wcscat.LIBCMT ref: 008B4591
                                • _wcscat.LIBCMT ref: 008B4598
                                • _wcsncpy.LIBCMT ref: 008B45C3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                • API String ID: 699586101-1459072770
                                • Opcode ID: c185bbf0e321a7d475a220d76966d0eec5484c999ea7ea9168d27b2d10974167
                                • Instruction ID: ec1a3b709f5fe6318f845764af29c2707af80b163d43c245fc3e8e834e734c3a
                                • Opcode Fuzzy Hash: c185bbf0e321a7d475a220d76966d0eec5484c999ea7ea9168d27b2d10974167
                                • Instruction Fuzzy Hash: B341D8326002147BDB10AA789C47EFF776CFF41714F04456AFA09E6283EA75DA0196A6
                                APIs
                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 008528BC
                                • GetSystemMetrics.USER32(00000007), ref: 008528C4
                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 008528EF
                                • GetSystemMetrics.USER32(00000008), ref: 008528F7
                                • GetSystemMetrics.USER32(00000004), ref: 0085291C
                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00852939
                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00852949
                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0085297C
                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00852990
                                • GetClientRect.USER32(00000000,000000FF), ref: 008529AE
                                • GetStockObject.GDI32(00000011), ref: 008529CA
                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 008529D5
                                  • Part of subcall function 00852344: GetCursorPos.USER32(?), ref: 00852357
                                  • Part of subcall function 00852344: ScreenToClient.USER32(009157B0,?), ref: 00852374
                                  • Part of subcall function 00852344: GetAsyncKeyState.USER32(00000001), ref: 00852399
                                  • Part of subcall function 00852344: GetAsyncKeyState.USER32(00000002), ref: 008523A7
                                • SetTimer.USER32(00000000,00000000,00000028,00851256), ref: 008529FC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                • String ID: AutoIt v3 GUI
                                • API String ID: 1458621304-248962490
                                • Opcode ID: 4d7f7a59722400d2546e6c927b9b99d0b584fedccf983402795c1d7c7b5f7024
                                • Instruction ID: 29b4f5e599d2159a9242958950731c3cb972738599d1df48e401da3c8da08cf5
                                • Opcode Fuzzy Hash: 4d7f7a59722400d2546e6c927b9b99d0b584fedccf983402795c1d7c7b5f7024
                                • Instruction Fuzzy Hash: 8DB17D71A0020ADFDB15DFA8DC85BED7BB5FB48315F118229FA16E7290DB74A840DB50
                                APIs
                                • GetClassNameW.USER32(?,?,00000100), ref: 008AA47A
                                • __swprintf.LIBCMT ref: 008AA51B
                                • _wcscmp.LIBCMT ref: 008AA52E
                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 008AA583
                                • _wcscmp.LIBCMT ref: 008AA5BF
                                • GetClassNameW.USER32(?,?,00000400), ref: 008AA5F6
                                • GetDlgCtrlID.USER32(?), ref: 008AA648
                                • GetWindowRect.USER32(?,?), ref: 008AA67E
                                • GetParent.USER32(?), ref: 008AA69C
                                • ScreenToClient.USER32(00000000), ref: 008AA6A3
                                • GetClassNameW.USER32(?,?,00000100), ref: 008AA71D
                                • _wcscmp.LIBCMT ref: 008AA731
                                • GetWindowTextW.USER32(?,?,00000400), ref: 008AA757
                                • _wcscmp.LIBCMT ref: 008AA76B
                                  • Part of subcall function 0087362C: _iswctype.LIBCMT ref: 00873634
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                • String ID: %s%u
                                • API String ID: 3744389584-679674701
                                • Opcode ID: 104f1952ae324832f9dbe1436dc4a8f6736e81ad53241065d2f0ebd6b0433f43
                                • Instruction ID: fd18c7f08040bf03cce9a3417c3d2bcfc373d519cbd56210c00994d03324f7c7
                                • Opcode Fuzzy Hash: 104f1952ae324832f9dbe1436dc4a8f6736e81ad53241065d2f0ebd6b0433f43
                                • Instruction Fuzzy Hash: 96A1F371204706AFE719DF64C884BAAB7E8FF55314F00862AF999D2990DB30E945CB92
                                APIs
                                • GetClassNameW.USER32(00000008,?,00000400), ref: 008AAF18
                                • _wcscmp.LIBCMT ref: 008AAF29
                                • GetWindowTextW.USER32(00000001,?,00000400), ref: 008AAF51
                                • CharUpperBuffW.USER32(?,00000000), ref: 008AAF6E
                                • _wcscmp.LIBCMT ref: 008AAF8C
                                • _wcsstr.LIBCMT ref: 008AAF9D
                                • GetClassNameW.USER32(00000018,?,00000400), ref: 008AAFD5
                                • _wcscmp.LIBCMT ref: 008AAFE5
                                • GetWindowTextW.USER32(00000002,?,00000400), ref: 008AB00C
                                • GetClassNameW.USER32(00000018,?,00000400), ref: 008AB055
                                • _wcscmp.LIBCMT ref: 008AB065
                                • GetClassNameW.USER32(00000010,?,00000400), ref: 008AB08D
                                • GetWindowRect.USER32(00000004,?), ref: 008AB0F6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                • String ID: @$ThumbnailClass
                                • API String ID: 1788623398-1539354611
                                • Opcode ID: bd734b416b9f0b129252559e8ebac4dc441db0c49c041c62ae61a73b70f31fff
                                • Instruction ID: 14466b479d117ece06bb7049cd90fc0f087048771270bb51092b03b972feb904
                                • Opcode Fuzzy Hash: bd734b416b9f0b129252559e8ebac4dc441db0c49c041c62ae61a73b70f31fff
                                • Instruction Fuzzy Hash: 4781B0711082059FEB08DF14C885FAA7BE8FF55314F04856AFD89CA496EB34DD89CB62
                                APIs
                                • _memset.LIBCMT ref: 008DA259
                                • DestroyWindow.USER32(?,?), ref: 008DA2D3
                                  • Part of subcall function 00857BCC: _memmove.LIBCMT ref: 00857C06
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 008DA34D
                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 008DA36F
                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 008DA382
                                • DestroyWindow.USER32(00000000), ref: 008DA3A4
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00850000,00000000), ref: 008DA3DB
                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 008DA3F4
                                • GetDesktopWindow.USER32 ref: 008DA40D
                                • GetWindowRect.USER32(00000000), ref: 008DA414
                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 008DA42C
                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 008DA444
                                  • Part of subcall function 008525DB: GetWindowLongW.USER32(?,000000EB), ref: 008525EC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                • String ID: 0$tooltips_class32$V
                                • API String ID: 1297703922-3097446078
                                • Opcode ID: 5091d2e7d9a7803bbed8268a1f2689b89d718d4f6b1b3d91dd9ffb58d2d6893d
                                • Instruction ID: e9fc3b0d9d6b0d058604e49f50539dcaed997716f4aa56a83a31b79f95af5b52
                                • Opcode Fuzzy Hash: 5091d2e7d9a7803bbed8268a1f2689b89d718d4f6b1b3d91dd9ffb58d2d6893d
                                • Instruction Fuzzy Hash: 0B717A70240205AFD729CF18C849FA67BE6FB88704F15461EF985C73A1DBB0E906DB56
                                APIs
                                  • Part of subcall function 00852612: GetWindowLongW.USER32(?,000000EB), ref: 00852623
                                • DragQueryPoint.SHELL32(?,?), ref: 008DC627
                                  • Part of subcall function 008DAB37: ClientToScreen.USER32(?,?), ref: 008DAB60
                                  • Part of subcall function 008DAB37: GetWindowRect.USER32(?,?), ref: 008DABD6
                                  • Part of subcall function 008DAB37: PtInRect.USER32(?,?,008DC014), ref: 008DABE6
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 008DC690
                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 008DC69B
                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 008DC6BE
                                • _wcscat.LIBCMT ref: 008DC6EE
                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 008DC705
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 008DC71E
                                • SendMessageW.USER32(?,000000B1,?,?), ref: 008DC735
                                • SendMessageW.USER32(?,000000B1,?,?), ref: 008DC757
                                • DragFinish.SHELL32(?), ref: 008DC75E
                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 008DC851
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$V
                                • API String ID: 169749273-1508676730
                                • Opcode ID: 20f55779068f1b57abcf2fccf7d7f59949cb844f8063dd81697d06f25ad2806a
                                • Instruction ID: d21c61ce37a0b7b47c2038731285b5f756fe547a3a071b12f3a4d35f6caa7471
                                • Opcode Fuzzy Hash: 20f55779068f1b57abcf2fccf7d7f59949cb844f8063dd81697d06f25ad2806a
                                • Instruction Fuzzy Hash: 50616C71508301AFC701DF68D885D9BBBE9FF98310F004A2EF595D62A1DB309A49CB52
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __wcsnicmp
                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                • API String ID: 1038674560-1810252412
                                • Opcode ID: 398c83c86423ee4465a198ec585ec8934fdb6c4def73e8a984ff6bde810aa017
                                • Instruction ID: 8e3a38815684441f2a6d95d963a9201cb560e182da44fa220d7c7d1f541e84f6
                                • Opcode Fuzzy Hash: 398c83c86423ee4465a198ec585ec8934fdb6c4def73e8a984ff6bde810aa017
                                • Instruction Fuzzy Hash: 9D31A631A48209AAEA18FA98DD03EAEB768FF11775F604429F806F18D5EF516F08C553
                                APIs
                                • LoadCursorW.USER32(00000000,00007F8A), ref: 008C5013
                                • LoadCursorW.USER32(00000000,00007F00), ref: 008C501E
                                • LoadCursorW.USER32(00000000,00007F03), ref: 008C5029
                                • LoadCursorW.USER32(00000000,00007F8B), ref: 008C5034
                                • LoadCursorW.USER32(00000000,00007F01), ref: 008C503F
                                • LoadCursorW.USER32(00000000,00007F81), ref: 008C504A
                                • LoadCursorW.USER32(00000000,00007F88), ref: 008C5055
                                • LoadCursorW.USER32(00000000,00007F80), ref: 008C5060
                                • LoadCursorW.USER32(00000000,00007F86), ref: 008C506B
                                • LoadCursorW.USER32(00000000,00007F83), ref: 008C5076
                                • LoadCursorW.USER32(00000000,00007F85), ref: 008C5081
                                • LoadCursorW.USER32(00000000,00007F82), ref: 008C508C
                                • LoadCursorW.USER32(00000000,00007F84), ref: 008C5097
                                • LoadCursorW.USER32(00000000,00007F04), ref: 008C50A2
                                • LoadCursorW.USER32(00000000,00007F02), ref: 008C50AD
                                • LoadCursorW.USER32(00000000,00007F89), ref: 008C50B8
                                • GetCursorInfo.USER32(?), ref: 008C50C8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Cursor$Load$Info
                                • String ID:
                                • API String ID: 2577412497-0
                                • Opcode ID: a2700fad3bfe2693a644989bba5ba15a8b8d0830fff979214aa3a5a29f71878c
                                • Instruction ID: ad56fe376ce7ab35eef53d9e2e0c4ae7b2a35da8a6307c604d65ecbd3df68168
                                • Opcode Fuzzy Hash: a2700fad3bfe2693a644989bba5ba15a8b8d0830fff979214aa3a5a29f71878c
                                • Instruction Fuzzy Hash: 353101B1D48319AADF109FB68C89DAFBFF8FB04750F50453AA54DE7280DA78A5408E91
                                APIs
                                • CharUpperBuffW.USER32(?,?), ref: 008D4424
                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 008D446F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: BuffCharMessageSendUpper
                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                • API String ID: 3974292440-4258414348
                                • Opcode ID: c7616bcd450e3be337f34e4289d4c43a7f309263a470f541e604daa9b2652848
                                • Instruction ID: 6c1ce33407f8596537172fa2f6a30cf2c947f0baad2cdb642297f3cbb2e81789
                                • Opcode Fuzzy Hash: c7616bcd450e3be337f34e4289d4c43a7f309263a470f541e604daa9b2652848
                                • Instruction Fuzzy Hash: CB917D702047119FDB04EF18C852A6EB7E1FF95754F048969F8969B7A2CB30ED49CB82
                                APIs
                                  • Part of subcall function 00852612: GetWindowLongW.USER32(?,000000EB), ref: 00852623
                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008DC1FC
                                • GetFocus.USER32 ref: 008DC20C
                                • GetDlgCtrlID.USER32(00000000), ref: 008DC217
                                • _memset.LIBCMT ref: 008DC342
                                • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 008DC36D
                                • GetMenuItemCount.USER32(?), ref: 008DC38D
                                • GetMenuItemID.USER32(?,00000000), ref: 008DC3A0
                                • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 008DC3D4
                                • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 008DC41C
                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 008DC454
                                • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 008DC489
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                • String ID: 0$V
                                • API String ID: 1296962147-3648174478
                                • Opcode ID: b24188159ca2d4f0ebd849f0995804d0f78afe0b861ba8accc95690c6c058a3c
                                • Instruction ID: c42a8a01ad93ba9011d73e89e72e22d398775f95b3b60969d7ecca849aab3e3b
                                • Opcode Fuzzy Hash: b24188159ca2d4f0ebd849f0995804d0f78afe0b861ba8accc95690c6c058a3c
                                • Instruction Fuzzy Hash: 45817B702093029FD714DF18D894AAABBE9FF88714F004A2EFA95D7391D730D905DB92
                                APIs
                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 008DB8B4
                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,008D91C2), ref: 008DB910
                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 008DB949
                                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 008DB98C
                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 008DB9C3
                                • FreeLibrary.KERNEL32(?), ref: 008DB9CF
                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 008DB9DF
                                • DestroyIcon.USER32(?,?,?,?,?,008D91C2), ref: 008DB9EE
                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 008DBA0B
                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 008DBA17
                                  • Part of subcall function 00872EFD: __wcsicmp_l.LIBCMT ref: 00872F86
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                • String ID: .dll$.exe$.icl
                                • API String ID: 1212759294-1154884017
                                • Opcode ID: 178407533eb770e80a3bff4c5965ee3cff702da8ac79faabb3f07d4c42079a77
                                • Instruction ID: 60a1d14a440d398535f6b6803706aef4186294f35a2c631c46fa0bb5eef1eba2
                                • Opcode Fuzzy Hash: 178407533eb770e80a3bff4c5965ee3cff702da8ac79faabb3f07d4c42079a77
                                • Instruction Fuzzy Hash: 8661C071900259FAEB14DF64CC41FBE7BA8FB08721F108616FA15D62D1EB749990EBA0
                                APIs
                                • GetLocalTime.KERNEL32(?), ref: 008BDCDC
                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 008BDCEC
                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 008BDCF8
                                • __wsplitpath.LIBCMT ref: 008BDD56
                                • _wcscat.LIBCMT ref: 008BDD6E
                                • _wcscat.LIBCMT ref: 008BDD80
                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 008BDD95
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 008BDDA9
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 008BDDDB
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 008BDDFC
                                • _wcscpy.LIBCMT ref: 008BDE08
                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 008BDE47
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                • String ID: *.*
                                • API String ID: 3566783562-438819550
                                • Opcode ID: dba28180bdab9eb6b003fd2cc5297b04ab8603f39ee4e5703ae0e14c643c559a
                                • Instruction ID: eef279c3cfbcdf29ca65ec917ad006225bc88e1b7abe1f857622a82a9b105e71
                                • Opcode Fuzzy Hash: dba28180bdab9eb6b003fd2cc5297b04ab8603f39ee4e5703ae0e14c643c559a
                                • Instruction Fuzzy Hash: 06615A72504305AFCB10EF24C8549AEB7E8FF89314F04892EE989C7351EB35E945CB92
                                APIs
                                  • Part of subcall function 00851B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00852036,?,00000000,?,?,?,?,008516CB,00000000,?), ref: 00851B9A
                                • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 008520D3
                                • KillTimer.USER32(-00000001,?,?,?,?,008516CB,00000000,?,?,00851AE2,?,?), ref: 0085216E
                                • DestroyAcceleratorTable.USER32(00000000), ref: 0088BCA6
                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,008516CB,00000000,?,?,00851AE2,?,?), ref: 0088BCD7
                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,008516CB,00000000,?,?,00851AE2,?,?), ref: 0088BCEE
                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,008516CB,00000000,?,?,00851AE2,?,?), ref: 0088BD0A
                                • DeleteObject.GDI32(00000000), ref: 0088BD1C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                • String ID: V
                                • API String ID: 641708696-4045069856
                                • Opcode ID: dd897bc60063296ca7be10f31d4b43f70f90c7c8d1dd516aec7be17445258b38
                                • Instruction ID: 10a2aed4ec40ffb0aff25b39e3b3299fc1239918e632a62420f222a981619d0a
                                • Opcode Fuzzy Hash: dd897bc60063296ca7be10f31d4b43f70f90c7c8d1dd516aec7be17445258b38
                                • Instruction Fuzzy Hash: EF619D31215E04DFCB35AF18D948B6AB7F2FF81316F118569E942CB9A1CB70A885EB41
                                APIs
                                  • Part of subcall function 00859837: __itow.LIBCMT ref: 00859862
                                  • Part of subcall function 00859837: __swprintf.LIBCMT ref: 008598AC
                                • CharLowerBuffW.USER32(?,?), ref: 008BA3CB
                                • GetDriveTypeW.KERNEL32 ref: 008BA418
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 008BA460
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 008BA497
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 008BA4C5
                                  • Part of subcall function 00857BCC: _memmove.LIBCMT ref: 00857C06
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                • API String ID: 2698844021-4113822522
                                • Opcode ID: 6180739115ac2cc9c93a95d09bd5625c76e4897614bb9bd20d625eea3a44bd1d
                                • Instruction ID: cca259b382749b503b84732c85ae18f324f3234657e7dd2ca5f4cdde510e3522
                                • Opcode Fuzzy Hash: 6180739115ac2cc9c93a95d09bd5625c76e4897614bb9bd20d625eea3a44bd1d
                                • Instruction Fuzzy Hash: C55128716043059FC704EF14D89186AB7E8FF98719F10896DF89A972A1DB31ED09CB52
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0088E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 008AF8DF
                                • LoadStringW.USER32(00000000,?,0088E029,00000001), ref: 008AF8E8
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                • GetModuleHandleW.KERNEL32(00000000,00915310,?,00000FFF,?,?,0088E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 008AF90A
                                • LoadStringW.USER32(00000000,?,0088E029,00000001), ref: 008AF90D
                                • __swprintf.LIBCMT ref: 008AF95D
                                • __swprintf.LIBCMT ref: 008AF96E
                                • _wprintf.LIBCMT ref: 008AFA17
                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 008AFA2E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                • API String ID: 984253442-2268648507
                                • Opcode ID: 9d1fe0eff581445a30c2701f26c9140ede4ff594217063aaa3950220decc3268
                                • Instruction ID: 51c4d6825be6bdf7c46df4ee52683c060c372b56d37349df97971b85245351cb
                                • Opcode Fuzzy Hash: 9d1fe0eff581445a30c2701f26c9140ede4ff594217063aaa3950220decc3268
                                • Instruction Fuzzy Hash: B2414D72904119AACF04FBE8ED86DEE7778FF15301F504065BA05F60A2EA356F09CA62
                                APIs
                                  • Part of subcall function 008525DB: GetWindowLongW.USER32(?,000000EB), ref: 008525EC
                                • GetSysColor.USER32(0000000F), ref: 008521D3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ColorLongWindow
                                • String ID: V
                                • API String ID: 259745315-4045069856
                                • Opcode ID: 6eea769ccc0089a2dad0477c5e5e9212baad5cd79d512d370c17990180570dbc
                                • Instruction ID: ee345a4896cf18c0b401ded546b06dcb7e22b242a40b15d143d066cb85b7c6b1
                                • Opcode Fuzzy Hash: 6eea769ccc0089a2dad0477c5e5e9212baad5cd79d512d370c17990180570dbc
                                • Instruction Fuzzy Hash: 60419E35101540DEDF215F28EC88BB97B65FB46322F1843A6FE66CA1E2CB318C46DB21
                                APIs
                                • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,008D9207,?,?), ref: 008DBA56
                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,008D9207,?,?,00000000,?), ref: 008DBA6D
                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,008D9207,?,?,00000000,?), ref: 008DBA78
                                • CloseHandle.KERNEL32(00000000,?,?,?,?,008D9207,?,?,00000000,?), ref: 008DBA85
                                • GlobalLock.KERNEL32(00000000), ref: 008DBA8E
                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,008D9207,?,?,00000000,?), ref: 008DBA9D
                                • GlobalUnlock.KERNEL32(00000000), ref: 008DBAA6
                                • CloseHandle.KERNEL32(00000000,?,?,?,?,008D9207,?,?,00000000,?), ref: 008DBAAD
                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,008D9207,?,?,00000000,?), ref: 008DBABE
                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,008E2CAC,?), ref: 008DBAD7
                                • GlobalFree.KERNEL32(00000000), ref: 008DBAE7
                                • GetObjectW.GDI32(00000000,00000018,?), ref: 008DBB0B
                                • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 008DBB36
                                • DeleteObject.GDI32(00000000), ref: 008DBB5E
                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 008DBB74
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                • String ID:
                                • API String ID: 3840717409-0
                                • Opcode ID: 3f094d11c76ab38579e9d6bd5b8b1133957670dedda7c2e30a82f9648a56f3da
                                • Instruction ID: cd43a3cfc88b63a7fd2cf4437b8ac8467c73825e9c50ed5fc6504cd931e5a6c8
                                • Opcode Fuzzy Hash: 3f094d11c76ab38579e9d6bd5b8b1133957670dedda7c2e30a82f9648a56f3da
                                • Instruction Fuzzy Hash: F0414C75501208EFDB119F65DC48EAA7BB8FF89721F11426AFA06D7261D7309E01DB20
                                APIs
                                • __wsplitpath.LIBCMT ref: 008BDA10
                                • _wcscat.LIBCMT ref: 008BDA28
                                • _wcscat.LIBCMT ref: 008BDA3A
                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 008BDA4F
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 008BDA63
                                • GetFileAttributesW.KERNEL32(?), ref: 008BDA7B
                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 008BDA95
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 008BDAA7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                • String ID: *.*
                                • API String ID: 34673085-438819550
                                • Opcode ID: 335c520ff32db23702861c1e3f37e911e0f02ccaff46da793c8e37ae5b7e33e6
                                • Instruction ID: 8c2bd50a81925135e20c3f481f2cd96d6058d7d9b793ed0b9d65c50309e2fceb
                                • Opcode Fuzzy Hash: 335c520ff32db23702861c1e3f37e911e0f02ccaff46da793c8e37ae5b7e33e6
                                • Instruction Fuzzy Hash: DC818171504345AFCB24EF68C8449AABBE4FF89354F18892EF889CB351E734D945CB52
                                APIs
                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 008D6FA5
                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 008D6FA8
                                • GetWindowLongW.USER32(?,000000F0), ref: 008D6FCC
                                • _memset.LIBCMT ref: 008D6FDD
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 008D6FEF
                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 008D7067
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$LongWindow_memset
                                • String ID: V
                                • API String ID: 830647256-4045069856
                                • Opcode ID: 61e333a89df74d69fdbab0efc1b5698798a6a11c1c540e0d5e3bd73938cf2c34
                                • Instruction ID: 10e4736f8d11b50d06cb0cddb4026a7555bc18e91949f73598e869b0213635c1
                                • Opcode Fuzzy Hash: 61e333a89df74d69fdbab0efc1b5698798a6a11c1c540e0d5e3bd73938cf2c34
                                • Instruction Fuzzy Hash: 19614871A00208AFDB11DFA8CC81EEE77B8FB49714F10429AFA15EB3A1D771A941DB50
                                APIs
                                • GetDC.USER32(00000000), ref: 008C738F
                                • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 008C739B
                                • CreateCompatibleDC.GDI32(?), ref: 008C73A7
                                • SelectObject.GDI32(00000000,?), ref: 008C73B4
                                • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 008C7408
                                • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 008C7444
                                • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 008C7468
                                • SelectObject.GDI32(00000006,?), ref: 008C7470
                                • DeleteObject.GDI32(?), ref: 008C7479
                                • DeleteDC.GDI32(00000006), ref: 008C7480
                                • ReleaseDC.USER32(00000000,?), ref: 008C748B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                • String ID: (
                                • API String ID: 2598888154-3887548279
                                • Opcode ID: bf2127df40e9107724916337a2fdc7ee73e11361db4e8f5082b50734fdc207ac
                                • Instruction ID: a5b7fa6a5b80b9d651a4f5d4f6269bc90fd14a5a35c5c5349e262646d4b88033
                                • Opcode Fuzzy Hash: bf2127df40e9107724916337a2fdc7ee73e11361db4e8f5082b50734fdc207ac
                                • Instruction Fuzzy Hash: 11512575904249EFCB15CFA8DC85EAEBBB9FF48310F14852EEA5AD7211C731A9409F50
                                APIs
                                  • Part of subcall function 00870957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00856B0C,?,00008000), ref: 00870973
                                  • Part of subcall function 00854750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00854743,?,?,008537AE,?), ref: 00854770
                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00856BAD
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00856CFA
                                  • Part of subcall function 0085586D: _wcscpy.LIBCMT ref: 008558A5
                                  • Part of subcall function 0087363D: _iswctype.LIBCMT ref: 00873645
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                • API String ID: 537147316-1018226102
                                • Opcode ID: ccab216574d95725318c142cc8038cda6a51bb9e6dbc90c130423a3641f969df
                                • Instruction ID: 23af2833413dddd6684c4f5816518c1b76f42a99e36dbf4239ab2050cc6c2f9b
                                • Opcode Fuzzy Hash: ccab216574d95725318c142cc8038cda6a51bb9e6dbc90c130423a3641f969df
                                • Instruction Fuzzy Hash: 4E0258311083409FC724EF28C8919AEBBE5FF95315F50492DF89AD72A2EA30D949CB53
                                APIs
                                • _memset.LIBCMT ref: 008B2D50
                                • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 008B2DDD
                                • GetMenuItemCount.USER32(00915890), ref: 008B2E66
                                • DeleteMenu.USER32(00915890,00000005,00000000,000000F5,?,?), ref: 008B2EF6
                                • DeleteMenu.USER32(00915890,00000004,00000000), ref: 008B2EFE
                                • DeleteMenu.USER32(00915890,00000006,00000000), ref: 008B2F06
                                • DeleteMenu.USER32(00915890,00000003,00000000), ref: 008B2F0E
                                • GetMenuItemCount.USER32(00915890), ref: 008B2F16
                                • SetMenuItemInfoW.USER32(00915890,00000004,00000000,00000030), ref: 008B2F4C
                                • GetCursorPos.USER32(?), ref: 008B2F56
                                • SetForegroundWindow.USER32(00000000), ref: 008B2F5F
                                • TrackPopupMenuEx.USER32(00915890,00000000,?,00000000,00000000,00000000), ref: 008B2F72
                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 008B2F7E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                • String ID:
                                • API String ID: 3993528054-0
                                • Opcode ID: 8f91e3446e5eb8946b1aaafc7c5985662654baaf297e0b3ae89ad43cffc94363
                                • Instruction ID: eebafb17bdfcffb812f2dfd6728c1fc957c0662e2bae75ebfadab032cbcbf7c9
                                • Opcode Fuzzy Hash: 8f91e3446e5eb8946b1aaafc7c5985662654baaf297e0b3ae89ad43cffc94363
                                • Instruction Fuzzy Hash: B071C370601209BBEB219F59DC45FEABF64FF04764F144216F625EA3E2C771A820DB91
                                APIs
                                  • Part of subcall function 00857BCC: _memmove.LIBCMT ref: 00857C06
                                • _memset.LIBCMT ref: 008A786B
                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 008A78A0
                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 008A78BC
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 008A78D8
                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 008A7902
                                • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 008A792A
                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 008A7935
                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 008A793A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                • API String ID: 1411258926-22481851
                                • Opcode ID: a4dca302eff7dbb97952e75590c27e702cd8cd929ede4a785f18ede01f2ed379
                                • Instruction ID: fdb81e43c7f7b7edcf9e6c68e4f38393a899e757786a239e328df563649f2d99
                                • Opcode Fuzzy Hash: a4dca302eff7dbb97952e75590c27e702cd8cd929ede4a785f18ede01f2ed379
                                • Instruction Fuzzy Hash: 64411972C1462DAADB11EBA8EC45DEEB7B8FF04351F44812AE905E31A1DB345E08DB91
                                APIs
                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,008CFDAD,?,?), ref: 008D0E31
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: BuffCharUpper
                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                • API String ID: 3964851224-909552448
                                • Opcode ID: dfcb6f8d827c9437efdb1c461627afde8fc99caf18baf4c8b9a3cd85cf48c59d
                                • Instruction ID: e5c1e4fb2e4e1c7cb40e544cac10d211ab80d282f92fe0d7b02d84ef177bc446
                                • Opcode Fuzzy Hash: dfcb6f8d827c9437efdb1c461627afde8fc99caf18baf4c8b9a3cd85cf48c59d
                                • Instruction Fuzzy Hash: 0B41667150031A8BCF20EF14E862AEE37A0FF11714F648516FC559B2A6DB30991ACBA1
                                APIs
                                • _memset.LIBCMT ref: 008D716A
                                • CreateMenu.USER32 ref: 008D7185
                                • SetMenu.USER32(?,00000000), ref: 008D7194
                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008D7221
                                • IsMenu.USER32(?), ref: 008D7237
                                • CreatePopupMenu.USER32 ref: 008D7241
                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 008D726E
                                • DrawMenuBar.USER32 ref: 008D7276
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                • String ID: 0$F$V
                                • API String ID: 176399719-3113831973
                                • Opcode ID: 6bad4e0333ac862c3b12a662b8088385d6d5505cd4c6f1159a17eb6bd733694b
                                • Instruction ID: 4f8d15fa238080b318864090bc2946b9177e819c9c180ce70ce8712d33107c15
                                • Opcode Fuzzy Hash: 6bad4e0333ac862c3b12a662b8088385d6d5505cd4c6f1159a17eb6bd733694b
                                • Instruction Fuzzy Hash: BB415874A01209EFDB20DF64E884E9A7BB5FF49310F15422AFA06E7361E731A910DF90
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0088E2A0,00000010,?,Bad directive syntax error,008DF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 008AF7C2
                                • LoadStringW.USER32(00000000,?,0088E2A0,00000010), ref: 008AF7C9
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                • _wprintf.LIBCMT ref: 008AF7FC
                                • __swprintf.LIBCMT ref: 008AF81E
                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 008AF88D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                • API String ID: 1506413516-4153970271
                                • Opcode ID: 45ee981c1907a8e65b07ce081017b65fbf6e17bdcb6c9843aa1901beb8a53f12
                                • Instruction ID: 54489e93afbc301ec9813c755f6bb0cc3003619d38de2a2018982e599ce4bc7f
                                • Opcode Fuzzy Hash: 45ee981c1907a8e65b07ce081017b65fbf6e17bdcb6c9843aa1901beb8a53f12
                                • Instruction Fuzzy Hash: 90218E31900219AFCF11AF94DC4AEEE7738FF28305F044466F915A60A2DA319A18DB52
                                APIs
                                  • Part of subcall function 00857BCC: _memmove.LIBCMT ref: 00857C06
                                  • Part of subcall function 00857924: _memmove.LIBCMT ref: 008579AD
                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 008B5330
                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 008B5346
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 008B5357
                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 008B5369
                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 008B537A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: SendString$_memmove
                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                • API String ID: 2279737902-1007645807
                                • Opcode ID: 2b9b23a5bdb561d0a174b0a725f6c9bce12d192054ab7692d1814308e3440763
                                • Instruction ID: a2621a7a09254012c206e81e7a85ae9f8c4ad9eb9efed4e53dfe673f41265661
                                • Opcode Fuzzy Hash: 2b9b23a5bdb561d0a174b0a725f6c9bce12d192054ab7692d1814308e3440763
                                • Instruction Fuzzy Hash: A2116061A501697DD720B665DC4ADFFAFBCFBD6B49F400429B851E22D1DEA00D08C5A1
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                • String ID: 0.0.0.0
                                • API String ID: 208665112-3771769585
                                • Opcode ID: 6fb82aeeac91d7f8171b5a5c17f2786cf214a0aed1d9b2b4b3c8ecf5c69c8854
                                • Instruction ID: a74406f9f4f3abbd37e1d1aaca6f5b7c487b1f1084eb18c87e89b8295b3caca0
                                • Opcode Fuzzy Hash: 6fb82aeeac91d7f8171b5a5c17f2786cf214a0aed1d9b2b4b3c8ecf5c69c8854
                                • Instruction Fuzzy Hash: D511D831500118AFCB20AB349C46EEA7BBCFB01715F044276F54AD6293EF71C981DA56
                                APIs
                                • timeGetTime.WINMM ref: 008B4F7A
                                  • Part of subcall function 0087049F: timeGetTime.WINMM(?,7608B400,00860E7B), ref: 008704A3
                                • Sleep.KERNEL32(0000000A), ref: 008B4FA6
                                • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 008B4FCA
                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 008B4FEC
                                • SetActiveWindow.USER32 ref: 008B500B
                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 008B5019
                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 008B5038
                                • Sleep.KERNEL32(000000FA), ref: 008B5043
                                • IsWindow.USER32 ref: 008B504F
                                • EndDialog.USER32(00000000), ref: 008B5060
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                • String ID: BUTTON
                                • API String ID: 1194449130-3405671355
                                • Opcode ID: cb0131455d41b0a9e5e3ca275e9f38ed40d2447b9be6914520b139237ddcaa50
                                • Instruction ID: e402ab5f7482719382e2d4590e06a325f7dbd5b3c985c8e89f27cd3573589fd9
                                • Opcode Fuzzy Hash: cb0131455d41b0a9e5e3ca275e9f38ed40d2447b9be6914520b139237ddcaa50
                                • Instruction Fuzzy Hash: 56219F7070AA05AFE7106F60EC89BA63B6AFB55745B049125F203C23B2DB718D01FA62
                                APIs
                                  • Part of subcall function 00859837: __itow.LIBCMT ref: 00859862
                                  • Part of subcall function 00859837: __swprintf.LIBCMT ref: 008598AC
                                • CoInitialize.OLE32(00000000), ref: 008BD5EA
                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 008BD67D
                                • SHGetDesktopFolder.SHELL32(?), ref: 008BD691
                                • CoCreateInstance.OLE32(008E2D7C,00000000,00000001,00908C1C,?), ref: 008BD6DD
                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 008BD74C
                                • CoTaskMemFree.OLE32(?,?), ref: 008BD7A4
                                • _memset.LIBCMT ref: 008BD7E1
                                • SHBrowseForFolderW.SHELL32(?), ref: 008BD81D
                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 008BD840
                                • CoTaskMemFree.OLE32(00000000), ref: 008BD847
                                • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 008BD87E
                                • CoUninitialize.OLE32(00000001,00000000), ref: 008BD880
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                • String ID:
                                • API String ID: 1246142700-0
                                • Opcode ID: 477c0545015457be2aafe038916ab25e8107c7b9f77678272036bc74ead850a1
                                • Instruction ID: 89094b50f20956650b8312be123969136b514e8b57eb6b9e1fa36fea0619ee35
                                • Opcode Fuzzy Hash: 477c0545015457be2aafe038916ab25e8107c7b9f77678272036bc74ead850a1
                                • Instruction Fuzzy Hash: 98B1FA75A00209EFDB04DFA8C884DAEBBB9FF49314B148469E90ADB361DB30ED45CB55
                                APIs
                                • GetDlgItem.USER32(?,00000001), ref: 008AC283
                                • GetWindowRect.USER32(00000000,?), ref: 008AC295
                                • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 008AC2F3
                                • GetDlgItem.USER32(?,00000002), ref: 008AC2FE
                                • GetWindowRect.USER32(00000000,?), ref: 008AC310
                                • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 008AC364
                                • GetDlgItem.USER32(?,000003E9), ref: 008AC372
                                • GetWindowRect.USER32(00000000,?), ref: 008AC383
                                • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 008AC3C6
                                • GetDlgItem.USER32(?,000003EA), ref: 008AC3D4
                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 008AC3F1
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 008AC3FE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$ItemMoveRect$Invalidate
                                • String ID:
                                • API String ID: 3096461208-0
                                • Opcode ID: 8165bf106e78cf99d4a7b117b77f7791d7ec8923c9b978df1a89a66ec9d317f5
                                • Instruction ID: 081544c0185a6bfb02c3bb5ade156e95c759f76173cb0c2c712acede2379d5c0
                                • Opcode Fuzzy Hash: 8165bf106e78cf99d4a7b117b77f7791d7ec8923c9b978df1a89a66ec9d317f5
                                • Instruction Fuzzy Hash: 45514071B00205AFDF18CFA9DD89AAEBBB6FB98310F14822DF616D7691D7709D008B10
                                APIs
                                • CharLowerBuffW.USER32(?,?,008DF910), ref: 008BA90B
                                • GetDriveTypeW.KERNEL32(00000061,009089A0,00000061), ref: 008BA9D5
                                • _wcscpy.LIBCMT ref: 008BA9FF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: BuffCharDriveLowerType_wcscpy
                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                • API String ID: 2820617543-1000479233
                                • Opcode ID: d86560506a4e6b9dff24365c4515ab3a90bbbe2f6c17314de91eb6d0d1bbd41a
                                • Instruction ID: 58c9da12cf8d9bdfba2e07c8863b8e5a059a6ce8465be96f6e4880c435e110c0
                                • Opcode Fuzzy Hash: d86560506a4e6b9dff24365c4515ab3a90bbbe2f6c17314de91eb6d0d1bbd41a
                                • Instruction Fuzzy Hash: 84517B315083119FC314EF18C892AAFBBA5FF84704F544829F9A6D72A2DB31D909CA53
                                APIs
                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 008D86FF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: InvalidateRect
                                • String ID: V
                                • API String ID: 634782764-4045069856
                                • Opcode ID: 25555398c3e452141a9d8e6e787762dc90e855f292fe8e0db2a31a5c3d587437
                                • Instruction ID: 90561f6d5c6d2c938351b783424dc6d63184c61a72b5b1c15395de86c2c2ff57
                                • Opcode Fuzzy Hash: 25555398c3e452141a9d8e6e787762dc90e855f292fe8e0db2a31a5c3d587437
                                • Instruction Fuzzy Hash: 17515F30600244EEDB209B289C89FAD7B65FB15764F604367FA51E63A1CF71E980DA51
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __i64tow__itow__swprintf
                                • String ID: %.15g$0x%p$False$True
                                • API String ID: 421087845-2263619337
                                • Opcode ID: 08caec5d0675d5fc13d4ed383980738071b078bbc128e0c738f3ab66f9634913
                                • Instruction ID: 7fd31431293278edc634a2dde00a9d13a213cb142d884011492cbdefa0666e50
                                • Opcode Fuzzy Hash: 08caec5d0675d5fc13d4ed383980738071b078bbc128e0c738f3ab66f9634913
                                • Instruction Fuzzy Hash: 7E41E771600209EFDB24EF78D841A7A77E8FF45304F24847EE989D7296EA31D9458B11
                                APIs
                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 008D755E
                                • CreateCompatibleDC.GDI32(00000000), ref: 008D7565
                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 008D7578
                                • SelectObject.GDI32(00000000,00000000), ref: 008D7580
                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 008D758B
                                • DeleteDC.GDI32(00000000), ref: 008D7594
                                • GetWindowLongW.USER32(?,000000EC), ref: 008D759E
                                • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 008D75B2
                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 008D75BE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                • String ID: static
                                • API String ID: 2559357485-2160076837
                                • Opcode ID: 6cacabb72d784911144957f15c0684b6536948cda4854ddd43aeddb1840594f9
                                • Instruction ID: 3082ae3d0e2b8490977ab606a9c8c674ef2e14b03407f88714117b9f9ad373ad
                                • Opcode Fuzzy Hash: 6cacabb72d784911144957f15c0684b6536948cda4854ddd43aeddb1840594f9
                                • Instruction Fuzzy Hash: 07315832105214ABDF129F64EC09FDA3B79FF09361F114326FA16E62A1D731D821EBA5
                                APIs
                                • _memset.LIBCMT ref: 00876E3E
                                  • Part of subcall function 00878B28: __getptd_noexit.LIBCMT ref: 00878B28
                                • __gmtime64_s.LIBCMT ref: 00876ED7
                                • __gmtime64_s.LIBCMT ref: 00876F0D
                                • __gmtime64_s.LIBCMT ref: 00876F2A
                                • __allrem.LIBCMT ref: 00876F80
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00876F9C
                                • __allrem.LIBCMT ref: 00876FB3
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00876FD1
                                • __allrem.LIBCMT ref: 00876FE8
                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00877006
                                • __invoke_watson.LIBCMT ref: 00877077
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                • String ID:
                                • API String ID: 384356119-0
                                • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                • Instruction ID: a8f051cc79a93378407dba7c1c86705d1f96d8972a59b9dae10ca6fd877b1736
                                • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                • Instruction Fuzzy Hash: C871E376A00F17ABD714AA6CDC41B5AB7A8FF04724F14C229F418E6285FB70DE508791
                                APIs
                                • _memset.LIBCMT ref: 008B2542
                                • GetMenuItemInfoW.USER32(00915890,000000FF,00000000,00000030), ref: 008B25A3
                                • SetMenuItemInfoW.USER32(00915890,00000004,00000000,00000030), ref: 008B25D9
                                • Sleep.KERNEL32(000001F4), ref: 008B25EB
                                • GetMenuItemCount.USER32(?), ref: 008B262F
                                • GetMenuItemID.USER32(?,00000000), ref: 008B264B
                                • GetMenuItemID.USER32(?,-00000001), ref: 008B2675
                                • GetMenuItemID.USER32(?,?), ref: 008B26BA
                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 008B2700
                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008B2714
                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008B2735
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                • String ID:
                                • API String ID: 4176008265-0
                                • Opcode ID: 1c87184a6ee75f061eaf28a4153ee28ecc18d4dad62e67f15ca512f425167ec2
                                • Instruction ID: 629e7fe99b2ecfb645d0e69c18aab6e8f20c24271b51e2ee47b2d02686e874f2
                                • Opcode Fuzzy Hash: 1c87184a6ee75f061eaf28a4153ee28ecc18d4dad62e67f15ca512f425167ec2
                                • Instruction Fuzzy Hash: 0F61AD7090024AAFDB21DFA8DC88DEE7BB8FB46308F144559E852E3361DB31AD05DB21
                                APIs
                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 008A6BBF
                                • SafeArrayAllocData.OLEAUT32(?), ref: 008A6C18
                                • VariantInit.OLEAUT32(?), ref: 008A6C2A
                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 008A6C4A
                                • VariantCopy.OLEAUT32(?,?), ref: 008A6C9D
                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 008A6CB1
                                • VariantClear.OLEAUT32(?), ref: 008A6CC6
                                • SafeArrayDestroyData.OLEAUT32(?), ref: 008A6CD3
                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 008A6CDC
                                • VariantClear.OLEAUT32(?), ref: 008A6CEE
                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 008A6CF9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                • String ID:
                                • API String ID: 2706829360-0
                                • Opcode ID: 6e73a8dedb753ee41e1fd10b29da803be7366c8738d39f4138aa64381fd8434f
                                • Instruction ID: 70c2d9c9c193fe4d786e8ea7cb8bb084ffa3212e06dbe8949c8c32c92e35df2f
                                • Opcode Fuzzy Hash: 6e73a8dedb753ee41e1fd10b29da803be7366c8738d39f4138aa64381fd8434f
                                • Instruction Fuzzy Hash: 27419231A00219EFDF00DF68C8449AEBBB9FF08350F048179E956E7261DB30A945CFA0
                                APIs
                                  • Part of subcall function 00852612: GetWindowLongW.USER32(?,000000EB), ref: 00852623
                                • GetSystemMetrics.USER32(0000000F), ref: 008DD47C
                                • GetSystemMetrics.USER32(0000000F), ref: 008DD49C
                                • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 008DD6D7
                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 008DD6F5
                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 008DD716
                                • ShowWindow.USER32(00000003,00000000), ref: 008DD735
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 008DD75A
                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 008DD77D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                • String ID: V
                                • API String ID: 1211466189-4045069856
                                • Opcode ID: 598bfe0eb4a49b31a967a6cf9adf10355e4e0e34669aa91e716c6643222eeb2d
                                • Instruction ID: 1608353c2bdf523599218c4b519e8735bce35018000df0e486167e6cfb0884a8
                                • Opcode Fuzzy Hash: 598bfe0eb4a49b31a967a6cf9adf10355e4e0e34669aa91e716c6643222eeb2d
                                • Instruction Fuzzy Hash: 7EB18871600229EFDF14CF68C985BAD7BB1FF04711F09C2AAED49DA295D734A950CB90
                                APIs
                                  • Part of subcall function 00859837: __itow.LIBCMT ref: 00859862
                                  • Part of subcall function 00859837: __swprintf.LIBCMT ref: 008598AC
                                • CoInitialize.OLE32 ref: 008C8403
                                • CoUninitialize.OLE32 ref: 008C840E
                                • CoCreateInstance.OLE32(?,00000000,00000017,008E2BEC,?), ref: 008C846E
                                • IIDFromString.OLE32(?,?), ref: 008C84E1
                                • VariantInit.OLEAUT32(?), ref: 008C857B
                                • VariantClear.OLEAUT32(?), ref: 008C85DC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                • API String ID: 834269672-1287834457
                                • Opcode ID: 08915c807cdc52e228ee35e9610fab66b60dc628e50870c4dc30547b5c363ad1
                                • Instruction ID: 0e599cedbffd3f6d57dbce253f6324a22a7511dd496bf87e58a090b86e3b4c71
                                • Opcode Fuzzy Hash: 08915c807cdc52e228ee35e9610fab66b60dc628e50870c4dc30547b5c363ad1
                                • Instruction Fuzzy Hash: 90614570648212DFC714DB24C848F6ABBE8FF89758F04451DF986DB291CB70E948CB96
                                APIs
                                • WSAStartup.WSOCK32(00000101,?), ref: 008C5793
                                • inet_addr.WSOCK32(?,?,?), ref: 008C57D8
                                • gethostbyname.WSOCK32(?), ref: 008C57E4
                                • IcmpCreateFile.IPHLPAPI ref: 008C57F2
                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 008C5862
                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 008C5878
                                • IcmpCloseHandle.IPHLPAPI(00000000), ref: 008C58ED
                                • WSACleanup.WSOCK32 ref: 008C58F3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                • String ID: Ping
                                • API String ID: 1028309954-2246546115
                                • Opcode ID: b5c97edb8adfdf269c51a676a72e3cb1d577dbc5fd645e429126748681ef9997
                                • Instruction ID: b58e95c144f124e8cd3e0633e45d2a20e915937d861778210618bae3ccb3633f
                                • Opcode Fuzzy Hash: b5c97edb8adfdf269c51a676a72e3cb1d577dbc5fd645e429126748681ef9997
                                • Instruction Fuzzy Hash: 9E515B316046009FDB11AF28DC45F6ABBF4FB48724F04892AF996DB2A1DB70E944DB42
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 008BB4D0
                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 008BB546
                                • GetLastError.KERNEL32 ref: 008BB550
                                • SetErrorMode.KERNEL32(00000000,READY), ref: 008BB5BD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Error$Mode$DiskFreeLastSpace
                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                • API String ID: 4194297153-14809454
                                • Opcode ID: 0ce66045b94779e3fcefd921eb7dee886c07fb28677da58a44ffc94a6ead7b17
                                • Instruction ID: 555b33702dc0e0414609b29b19c3883d32f3e916335527f064acf94b787bc654
                                • Opcode Fuzzy Hash: 0ce66045b94779e3fcefd921eb7dee886c07fb28677da58a44ffc94a6ead7b17
                                • Instruction Fuzzy Hash: F9317E75A00209DFCB20EB68C845AEEBBB4FF48315F144126E905D7392DBB0AA46CB52
                                APIs
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                  • Part of subcall function 008AAA99: GetClassNameW.USER32(?,?,000000FF), ref: 008AAABC
                                • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 008A9014
                                • GetDlgCtrlID.USER32 ref: 008A901F
                                • GetParent.USER32 ref: 008A903B
                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 008A903E
                                • GetDlgCtrlID.USER32(?), ref: 008A9047
                                • GetParent.USER32(?), ref: 008A9063
                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 008A9066
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                • String ID: ComboBox$ListBox
                                • API String ID: 1536045017-1403004172
                                • Opcode ID: f78b740f67cae01bea4831dceb21a68bef48b7e6ec74c134586479026f23ea85
                                • Instruction ID: 2850e1947930f119d23d81f3487e1b154f5d32a7f406960edf387127f3da0cef
                                • Opcode Fuzzy Hash: f78b740f67cae01bea4831dceb21a68bef48b7e6ec74c134586479026f23ea85
                                • Instruction Fuzzy Hash: 1B21C770A00108BFDF04ABA4DC85EFEBB74FF59320F104116F952976E2DB759819DA21
                                APIs
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                  • Part of subcall function 008AAA99: GetClassNameW.USER32(?,?,000000FF), ref: 008AAABC
                                • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 008A90FD
                                • GetDlgCtrlID.USER32 ref: 008A9108
                                • GetParent.USER32 ref: 008A9124
                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 008A9127
                                • GetDlgCtrlID.USER32(?), ref: 008A9130
                                • GetParent.USER32(?), ref: 008A914C
                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 008A914F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                • String ID: ComboBox$ListBox
                                • API String ID: 1536045017-1403004172
                                • Opcode ID: ddac01bd1de5844f1ff731b0fdb275f3002c71c285f2f3ac681d78c78e2fa56d
                                • Instruction ID: 532617cf810dcc647ef5b86e3c4c9d204c5d9c4a1a6c80cbd90b48ae55960c28
                                • Opcode Fuzzy Hash: ddac01bd1de5844f1ff731b0fdb275f3002c71c285f2f3ac681d78c78e2fa56d
                                • Instruction Fuzzy Hash: DE21D674A00108BBEF00ABA4DC85EFEBB74FF59310F004116F951D76E2EB799419DA21
                                APIs
                                • GetParent.USER32 ref: 008A916F
                                • GetClassNameW.USER32(00000000,?,00000100), ref: 008A9184
                                • _wcscmp.LIBCMT ref: 008A9196
                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 008A9211
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ClassMessageNameParentSend_wcscmp
                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                • API String ID: 1704125052-3381328864
                                • Opcode ID: a27685abf70a949d16a24cca46f2d78740923c9c5e1279c74bfd04f86c73ef4c
                                • Instruction ID: 2277d81df5b63da9a9e1d1e8249a602bdcbab857f01f28ca171f9b3f8c883b8d
                                • Opcode Fuzzy Hash: a27685abf70a949d16a24cca46f2d78740923c9c5e1279c74bfd04f86c73ef4c
                                • Instruction Fuzzy Hash: 11115C3764C317BDFA102628EC06EA7779CFF12334B200026F924E08D6FE61A8516591
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 008C88D7
                                • CoInitialize.OLE32(00000000), ref: 008C8904
                                • CoUninitialize.OLE32 ref: 008C890E
                                • GetRunningObjectTable.OLE32(00000000,?), ref: 008C8A0E
                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 008C8B3B
                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,008E2C0C), ref: 008C8B6F
                                • CoGetObject.OLE32(?,00000000,008E2C0C,?), ref: 008C8B92
                                • SetErrorMode.KERNEL32(00000000), ref: 008C8BA5
                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 008C8C25
                                • VariantClear.OLEAUT32(?), ref: 008C8C35
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                • String ID:
                                • API String ID: 2395222682-0
                                • Opcode ID: 93a88d41121d309eb8e1d3101031d883bed715d1713b91dc4ca8d5fcc2d14a92
                                • Instruction ID: 6782933526c343138be8250b6e41870af940d3ae3d1b9644857d01cbb4a09089
                                • Opcode Fuzzy Hash: 93a88d41121d309eb8e1d3101031d883bed715d1713b91dc4ca8d5fcc2d14a92
                                • Instruction Fuzzy Hash: F2C1E1B1608305EFD700DF68C884A2AB7E9FB89358F00496DF98ADB251DB71ED05CB52
                                APIs
                                • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 008B7A6C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ArraySafeVartype
                                • String ID:
                                • API String ID: 1725837607-0
                                • Opcode ID: 79bcd99579755b067f4adf478e0f8c59b528fad77549e21b6cd9a4f5152ef492
                                • Instruction ID: 1c5688124ba2f7bcf6a89e6b8726b0b51c67c458471e8d4c0c62006ddf3e4c4d
                                • Opcode Fuzzy Hash: 79bcd99579755b067f4adf478e0f8c59b528fad77549e21b6cd9a4f5152ef492
                                • Instruction Fuzzy Hash: A0B1697190421A9FDB10DFA8C894BFEBBB4FF89325F204429EA41E7391D734A941CB91
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 008B11F0
                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,008B0268,?,00000001), ref: 008B1204
                                • GetWindowThreadProcessId.USER32(00000000), ref: 008B120B
                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,008B0268,?,00000001), ref: 008B121A
                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 008B122C
                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,008B0268,?,00000001), ref: 008B1245
                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,008B0268,?,00000001), ref: 008B1257
                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,008B0268,?,00000001), ref: 008B129C
                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,008B0268,?,00000001), ref: 008B12B1
                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,008B0268,?,00000001), ref: 008B12BC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                • String ID:
                                • API String ID: 2156557900-0
                                • Opcode ID: 5a30c31971698a2c888225c770896fa2b7db9c8dea0e7c978a5137ff1da6e6ff
                                • Instruction ID: 13b83416f3c0a1e4c9185789e929b56c1751cb6734ed9331ded91fbd847b6a3c
                                • Opcode Fuzzy Hash: 5a30c31971698a2c888225c770896fa2b7db9c8dea0e7c978a5137ff1da6e6ff
                                • Instruction Fuzzy Hash: 42319C75B11204ABDF10DF54EC58BEA37AAFB55311F508226F901CB3A1D7709E40DB60
                                APIs
                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0085FAA6
                                • OleUninitialize.OLE32(?,00000000), ref: 0085FB45
                                • UnregisterHotKey.USER32(?), ref: 0085FC9C
                                • DestroyWindow.USER32(?), ref: 008945D6
                                • FreeLibrary.KERNEL32(?), ref: 0089463B
                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00894668
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                • String ID: close all
                                • API String ID: 469580280-3243417748
                                • Opcode ID: 18b25630b52de149ffcaa5cafe1b41aca3f7b24fde04247097a70e909c7669c6
                                • Instruction ID: c6888610fa51325c895735e07ca525fe70618cfc8f5587c739bd1df147b7a513
                                • Opcode Fuzzy Hash: 18b25630b52de149ffcaa5cafe1b41aca3f7b24fde04247097a70e909c7669c6
                                • Instruction Fuzzy Hash: C0A17970301216CFDB19EF18C894E69B760FF15715F1542ADEA0AEB262DB30AC1ACF52
                                APIs
                                • EnumChildWindows.USER32(?,008AA439), ref: 008AA377
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ChildEnumWindows
                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                • API String ID: 3555792229-1603158881
                                • Opcode ID: 44e1d415ae9a963db1ca6fea5643f71dbad72209a045726b20fde28ef21ba390
                                • Instruction ID: bfd9c624a1263e2fd59190fda31b0b96d33ec7045dde4b50870fe9cb5c8a2ad7
                                • Opcode Fuzzy Hash: 44e1d415ae9a963db1ca6fea5643f71dbad72209a045726b20fde28ef21ba390
                                • Instruction Fuzzy Hash: F991D730900605EAEB1CDFA4C442BEEFBB4FF05310F54C119D85AE3A91DB31A999DB92
                                APIs
                                • IsWindow.USER32(00EA56E0), ref: 008DB3EB
                                • IsWindowEnabled.USER32(00EA56E0), ref: 008DB3F7
                                • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 008DB4DB
                                • SendMessageW.USER32(00EA56E0,000000B0,?,?), ref: 008DB512
                                • IsDlgButtonChecked.USER32(?,?), ref: 008DB54F
                                • GetWindowLongW.USER32(00EA56E0,000000EC), ref: 008DB571
                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 008DB589
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                • String ID: V
                                • API String ID: 4072528602-4045069856
                                • Opcode ID: be4027c55beb9f9382cb1a631914e5673fe1cb65e71c687c0c1e490aa5320f21
                                • Instruction ID: 27a8093287b7b8544885e8e5d2d2cea3f05877117d534201d43d118cc8cab81b
                                • Opcode Fuzzy Hash: be4027c55beb9f9382cb1a631914e5673fe1cb65e71c687c0c1e490aa5320f21
                                • Instruction Fuzzy Hash: 3071AA34605204EFDB25DF64C894FAA7BBAFF49310F16825AEA42D73A2C731AC40DB54
                                APIs
                                • SetWindowLongW.USER32(?,000000EB), ref: 00852EAE
                                  • Part of subcall function 00851DB3: GetClientRect.USER32(?,?), ref: 00851DDC
                                  • Part of subcall function 00851DB3: GetWindowRect.USER32(?,?), ref: 00851E1D
                                  • Part of subcall function 00851DB3: ScreenToClient.USER32(?,?), ref: 00851E45
                                • GetDC.USER32 ref: 0088CD32
                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0088CD45
                                • SelectObject.GDI32(00000000,00000000), ref: 0088CD53
                                • SelectObject.GDI32(00000000,00000000), ref: 0088CD68
                                • ReleaseDC.USER32(?,00000000), ref: 0088CD70
                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0088CDFB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                • String ID: U
                                • API String ID: 4009187628-3372436214
                                • Opcode ID: 0f8d179c7a2c4750edd890f8dae76c8592e47f7c681df82a91865a7efde5433b
                                • Instruction ID: a37eb6183f0c4463fd8e862091b202f6bbab2d7322a387383f2cbdee1debbadc
                                • Opcode Fuzzy Hash: 0f8d179c7a2c4750edd890f8dae76c8592e47f7c681df82a91865a7efde5433b
                                • Instruction Fuzzy Hash: A271C031500209DFCF21AF64C885AEA7BB6FF49325F14827AED55DA2AAD7308C45DB60
                                APIs
                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 008C1A50
                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 008C1A7C
                                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 008C1ABE
                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 008C1AD3
                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 008C1AE0
                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 008C1B10
                                • InternetCloseHandle.WININET(00000000), ref: 008C1B57
                                  • Part of subcall function 008C2483: GetLastError.KERNEL32(?,?,008C1817,00000000,00000000,00000001), ref: 008C2498
                                  • Part of subcall function 008C2483: SetEvent.KERNEL32(?,?,008C1817,00000000,00000000,00000001), ref: 008C24AD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                • String ID:
                                • API String ID: 2603140658-3916222277
                                • Opcode ID: 79313ddce6a8a11681713aa53a570a5dece0c6adab3bc20a35c5159dac8c68ff
                                • Instruction ID: fb27571dcb93a4d7e6eceb7f7abd0d9cc9204c927f1f3d59d47322de0264e6bd
                                • Opcode Fuzzy Hash: 79313ddce6a8a11681713aa53a570a5dece0c6adab3bc20a35c5159dac8c68ff
                                • Instruction Fuzzy Hash: 57414CB1501218BFEB119F54CC89FFA7BACFB09354F04812AFA05DA182E770DE449BA5
                                APIs
                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 008D62EC
                                • GetWindowLongW.USER32(00EA56E0,000000F0), ref: 008D631F
                                • GetWindowLongW.USER32(00EA56E0,000000F0), ref: 008D6354
                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 008D6386
                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 008D63B0
                                • GetWindowLongW.USER32(00000000,000000F0), ref: 008D63C1
                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 008D63DB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: LongWindow$MessageSend
                                • String ID: V
                                • API String ID: 2178440468-4045069856
                                • Opcode ID: 8589204f423523cfcc64c6a96af374a1f88d83c640092f71f58cedf8c13cb0b0
                                • Instruction ID: 210250e176fd3722a865b2c4b230f9081905e4b638bed571bdaf95aac13ce622
                                • Opcode Fuzzy Hash: 8589204f423523cfcc64c6a96af374a1f88d83c640092f71f58cedf8c13cb0b0
                                • Instruction Fuzzy Hash: 3B31FF30644259EFDB24CF58EC84F5837E1FB5A714F1A42AAF601CB3B2DB61A850EB51
                                APIs
                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,008DF910), ref: 008C8D28
                                • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,008DF910), ref: 008C8D5C
                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 008C8ED6
                                • SysFreeString.OLEAUT32(?), ref: 008C8F00
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                • String ID:
                                • API String ID: 560350794-0
                                • Opcode ID: e90a0b9ad910bf8d24f08414d29e411a1a7133b258a8efd92b4c008ce291f2e5
                                • Instruction ID: 604db926e57fa8be32fddaaebc1a4f7aac56f8edf9697007719da74d1e1d1834
                                • Opcode Fuzzy Hash: e90a0b9ad910bf8d24f08414d29e411a1a7133b258a8efd92b4c008ce291f2e5
                                • Instruction Fuzzy Hash: FBF10471A00209EFDB14DF94C888EAEB7B9FF49315F108598E906EB251DB31EE45CB61
                                APIs
                                • _memset.LIBCMT ref: 008CF6B5
                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 008CF848
                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 008CF86C
                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 008CF8AC
                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 008CF8CE
                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 008CFA4A
                                • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 008CFA7C
                                • CloseHandle.KERNEL32(?), ref: 008CFAAB
                                • CloseHandle.KERNEL32(?), ref: 008CFB22
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                • String ID:
                                • API String ID: 4090791747-0
                                • Opcode ID: 9cb19790dea9749e5f6c77dee0da20e62774f2cbf0621ca6aa8c28b8ee8e4df1
                                • Instruction ID: 66a648b548e2042c23c7eaa9da38f4c72b25f4947f7ff2451e4b87e42a89dc12
                                • Opcode Fuzzy Hash: 9cb19790dea9749e5f6c77dee0da20e62774f2cbf0621ca6aa8c28b8ee8e4df1
                                • Instruction Fuzzy Hash: B0E17C316042509FDB14EF28C891B6ABBE2FF85314F14856DF999DB2A2DB30DC45CB52
                                APIs
                                  • Part of subcall function 008B466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,008B3697,?), ref: 008B468B
                                  • Part of subcall function 008B466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,008B3697,?), ref: 008B46A4
                                  • Part of subcall function 008B4A31: GetFileAttributesW.KERNEL32(?,008B370B), ref: 008B4A32
                                • lstrcmpiW.KERNEL32(?,?), ref: 008B4D40
                                • _wcscmp.LIBCMT ref: 008B4D5A
                                • MoveFileW.KERNEL32(?,?), ref: 008B4D75
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                • String ID:
                                • API String ID: 793581249-0
                                • Opcode ID: b089cc6d56ccf9d5ac69acdc63ce493ee2cb896ee03cd29271ab638fe932aec1
                                • Instruction ID: ba108f62e9627b30479b2ce7e78c5bfa6b280284412a8de6d797a26f9f352b78
                                • Opcode Fuzzy Hash: b089cc6d56ccf9d5ac69acdc63ce493ee2cb896ee03cd29271ab638fe932aec1
                                • Instruction Fuzzy Hash: 0A5140B20083459BC724DB64D8919DFB7ECFF85350F40592EB689D3252EE34A688C767
                                APIs
                                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0088C2F7
                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0088C319
                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0088C331
                                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0088C34F
                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0088C370
                                • DestroyIcon.USER32(00000000), ref: 0088C37F
                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0088C39C
                                • DestroyIcon.USER32(?), ref: 0088C3AB
                                  • Part of subcall function 008DA4AF: DeleteObject.GDI32(00000000), ref: 008DA4E8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                • String ID:
                                • API String ID: 2819616528-0
                                • Opcode ID: e436b9740de80baab5f2a308d4738f4c8ff75e230fb0086c31aef1fd0dd326d9
                                • Instruction ID: 34b88af27b918a2fbf5f25b90f9d2710c6cc947c0d9baae54f37d596bedfa5ce
                                • Opcode Fuzzy Hash: e436b9740de80baab5f2a308d4738f4c8ff75e230fb0086c31aef1fd0dd326d9
                                • Instruction Fuzzy Hash: 9F517B70600209EFDB20EF64CC45BAA3BA5FB55321F108629F902D72A0DB70ED51EB61
                                APIs
                                  • Part of subcall function 008AA82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 008AA84C
                                  • Part of subcall function 008AA82C: GetCurrentThreadId.KERNEL32 ref: 008AA853
                                  • Part of subcall function 008AA82C: AttachThreadInput.USER32(00000000,?,008A9683,?,00000001), ref: 008AA85A
                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 008A968E
                                • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 008A96AB
                                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 008A96AE
                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 008A96B7
                                • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 008A96D5
                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 008A96D8
                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 008A96E1
                                • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 008A96F8
                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 008A96FB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                • String ID:
                                • API String ID: 2014098862-0
                                • Opcode ID: 3890428c6e21b872f700042cc1d57cbe0a0cd8efa152c5a20deeff43ece8bc80
                                • Instruction ID: 9f8116171423565d29e18c737e3202a5da3bbc5298526cfe8119b5c7b751c0fe
                                • Opcode Fuzzy Hash: 3890428c6e21b872f700042cc1d57cbe0a0cd8efa152c5a20deeff43ece8bc80
                                • Instruction Fuzzy Hash: 3A11E1B1910218FEFB116F64DC89F6A3B2DFB4D761F100526F345AB4A1CAF25C10EAA4
                                APIs
                                • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,008A853C,00000B00,?,?), ref: 008A892A
                                • HeapAlloc.KERNEL32(00000000,?,008A853C,00000B00,?,?), ref: 008A8931
                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,008A853C,00000B00,?,?), ref: 008A8946
                                • GetCurrentProcess.KERNEL32(?,00000000,?,008A853C,00000B00,?,?), ref: 008A894E
                                • DuplicateHandle.KERNEL32(00000000,?,008A853C,00000B00,?,?), ref: 008A8951
                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,008A853C,00000B00,?,?), ref: 008A8961
                                • GetCurrentProcess.KERNEL32(008A853C,00000000,?,008A853C,00000B00,?,?), ref: 008A8969
                                • DuplicateHandle.KERNEL32(00000000,?,008A853C,00000B00,?,?), ref: 008A896C
                                • CreateThread.KERNEL32(00000000,00000000,008A8992,00000000,00000000,00000000), ref: 008A8986
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                • String ID:
                                • API String ID: 1957940570-0
                                • Opcode ID: a080fb564f7f439af3e2e516f08b2e85c3d12b6d2b8b0e721a2c2f14a084413d
                                • Instruction ID: 98c6c765066ed12143460a0182dfc383bb8fc374c334e41f59145095a4533b5a
                                • Opcode Fuzzy Hash: a080fb564f7f439af3e2e516f08b2e85c3d12b6d2b8b0e721a2c2f14a084413d
                                • Instruction Fuzzy Hash: 8A01AC75241304FFEA11ABA5DC49F673B6CFB89711F448521FB05DB1A1CA7498009A20
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID: NULL Pointer assignment$Not an Object type
                                • API String ID: 0-572801152
                                • Opcode ID: c114e2ba272b961ba2b0b28c522f1a1a678b7556f2d60d04e6960d19c64dcecc
                                • Instruction ID: 542c377a29cc6e14b027bb0492cc566417b16289606b29393b3e7caadeff94b7
                                • Opcode Fuzzy Hash: c114e2ba272b961ba2b0b28c522f1a1a678b7556f2d60d04e6960d19c64dcecc
                                • Instruction Fuzzy Hash: 1BC17F71A0021AABDF10DFA8D888FAEB7B5FB58314F1584ADE945E7281E770DD41CB90
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Variant$ClearInit$_memset
                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                • API String ID: 2862541840-625585964
                                • Opcode ID: dabe601315682f824588fc8a79f16fc4a9944f4eb9e1d65d86eda7fc3f9bc8a6
                                • Instruction ID: 8d3ac9ed3a99c544cad67c8dd88c2d44b4040921d54dcc236868e6c29f8fdc41
                                • Opcode Fuzzy Hash: dabe601315682f824588fc8a79f16fc4a9944f4eb9e1d65d86eda7fc3f9bc8a6
                                • Instruction Fuzzy Hash: 85915B71A00219ABDB24DFA5C848FAEBBB8FF45714F10819DE595EB280D770D945CBA0
                                APIs
                                  • Part of subcall function 008A710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,008A7044,80070057,?,?,?,008A7455), ref: 008A7127
                                  • Part of subcall function 008A710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,008A7044,80070057,?,?), ref: 008A7142
                                  • Part of subcall function 008A710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,008A7044,80070057,?,?), ref: 008A7150
                                  • Part of subcall function 008A710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,008A7044,80070057,?), ref: 008A7160
                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 008C9806
                                • _memset.LIBCMT ref: 008C9813
                                • _memset.LIBCMT ref: 008C9956
                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 008C9982
                                • CoTaskMemFree.OLE32(?), ref: 008C998D
                                Strings
                                • NULL Pointer assignment, xrefs: 008C99DB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                • String ID: NULL Pointer assignment
                                • API String ID: 1300414916-2785691316
                                • Opcode ID: cfea020fdd1cdd381f966bb84b74d7259480bfe169e1345945b3d21d67a59154
                                • Instruction ID: 0102c2c5702fd927e780e9b64a2977d58027064344f3afcee6c17989658546a7
                                • Opcode Fuzzy Hash: cfea020fdd1cdd381f966bb84b74d7259480bfe169e1345945b3d21d67a59154
                                • Instruction Fuzzy Hash: 8F910571D00229EBDB10DFA5DC45EDEBBB9FF08310F20416AE519E7291DB719A44CBA1
                                APIs
                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 008D6E24
                                • SendMessageW.USER32(?,00001036,00000000,?), ref: 008D6E38
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 008D6E52
                                • _wcscat.LIBCMT ref: 008D6EAD
                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 008D6EC4
                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 008D6EF2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$Window_wcscat
                                • String ID: SysListView32
                                • API String ID: 307300125-78025650
                                • Opcode ID: 91b2b5c1dddbf4af52c244162ee04949c0beda7e74073c766c29d7c3d27355b0
                                • Instruction ID: 10a1028b099e9f5a22c8adb78cda06d51cac14c28a61a9707b9bd61ceb610c8c
                                • Opcode Fuzzy Hash: 91b2b5c1dddbf4af52c244162ee04949c0beda7e74073c766c29d7c3d27355b0
                                • Instruction Fuzzy Hash: 3841B270A0030CAFEB219F64CC85BEA77A9FF08350F10462AF585E7292E6729D94CB50
                                APIs
                                  • Part of subcall function 008B3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 008B3C7A
                                  • Part of subcall function 008B3C55: Process32FirstW.KERNEL32(00000000,?), ref: 008B3C88
                                  • Part of subcall function 008B3C55: CloseHandle.KERNEL32(00000000), ref: 008B3D52
                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 008CE9A4
                                • GetLastError.KERNEL32 ref: 008CE9B7
                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 008CE9E6
                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 008CEA63
                                • GetLastError.KERNEL32(00000000), ref: 008CEA6E
                                • CloseHandle.KERNEL32(00000000), ref: 008CEAA3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                • String ID: SeDebugPrivilege
                                • API String ID: 2533919879-2896544425
                                • Opcode ID: f752a25b394ddaea3077490ec647e015e8237de5b7b8887f24c11f38664ed365
                                • Instruction ID: 80577ee6dbde3fb138ca6c4cc79c7333117b977d37a99edbf537f16d6940c6a4
                                • Opcode Fuzzy Hash: f752a25b394ddaea3077490ec647e015e8237de5b7b8887f24c11f38664ed365
                                • Instruction Fuzzy Hash: 144178712002109FDB15EF28C896F6ABBA5FF51314F088419FA469B2D2DB75E908CF96
                                APIs
                                • _memset.LIBCMT ref: 008D72AA
                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008D7351
                                • IsMenu.USER32(?), ref: 008D7369
                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 008D73B1
                                • DrawMenuBar.USER32 ref: 008D73C4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Menu$Item$DrawInfoInsert_memset
                                • String ID: 0$V
                                • API String ID: 3866635326-3648174478
                                • Opcode ID: 9f5d0c6206c51150a2c21cadef38e35f892f9c52be0d94f3f0d0ffb41dcb6f86
                                • Instruction ID: 9bb8af165d6784143b8b9954e4d0b20aa65b7e333af06c3591277371e2c859f7
                                • Opcode Fuzzy Hash: 9f5d0c6206c51150a2c21cadef38e35f892f9c52be0d94f3f0d0ffb41dcb6f86
                                • Instruction Fuzzy Hash: 30411575A04208EFDB24DF54D884A9ABBF8FB08314F54866AFD15EB350E730AD50EB60
                                APIs
                                • LoadIconW.USER32(00000000,00007F03), ref: 008B3033
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: IconLoad
                                • String ID: blank$info$question$stop$warning
                                • API String ID: 2457776203-404129466
                                • Opcode ID: bf3749cba288d677eb6471904825bbda24884c84b1a9582c9a2a95e8b505beda
                                • Instruction ID: e3d8f7c0a8c71b8331e65e3c885adfaa51aee3d5b3023cc9aedc596796ab95be
                                • Opcode Fuzzy Hash: bf3749cba288d677eb6471904825bbda24884c84b1a9582c9a2a95e8b505beda
                                • Instruction Fuzzy Hash: AD112E3238C786BED7146A19DC82CEB779CFF19364B10406AF904E63C2DB70AF4255A5
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 008B4312
                                • LoadStringW.USER32(00000000), ref: 008B4319
                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 008B432F
                                • LoadStringW.USER32(00000000), ref: 008B4336
                                • _wprintf.LIBCMT ref: 008B435C
                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 008B437A
                                Strings
                                • %s (%d) : ==> %s: %s %s, xrefs: 008B4357
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: HandleLoadModuleString$Message_wprintf
                                • String ID: %s (%d) : ==> %s: %s %s
                                • API String ID: 3648134473-3128320259
                                • Opcode ID: 049d9b8b93608aee34e68e517ba00ef9664a50815386125aa93e41f54cce6db0
                                • Instruction ID: 981655118d53215883bae3bbcd8122dd604312dd8c9ccb7ad50332ac749558d3
                                • Opcode Fuzzy Hash: 049d9b8b93608aee34e68e517ba00ef9664a50815386125aa93e41f54cce6db0
                                • Instruction Fuzzy Hash: 390186F290120CBFE71197A4DD89EF7776CFB08700F0046A2B74AE2152EA749E855B71
                                APIs
                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0088C1C7,00000004,00000000,00000000,00000000), ref: 00852ACF
                                • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0088C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00852B17
                                • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0088C1C7,00000004,00000000,00000000,00000000), ref: 0088C21A
                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0088C1C7,00000004,00000000,00000000,00000000), ref: 0088C286
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ShowWindow
                                • String ID:
                                • API String ID: 1268545403-0
                                • Opcode ID: 1d32b74aaa162e7126bb324a24cd5a2570cd6397194368533dcf495afa9e9167
                                • Instruction ID: 09c258b570bfbe41cf55ee43c1d5867870606af1c99f5122e2d05c0de1c7e46c
                                • Opcode Fuzzy Hash: 1d32b74aaa162e7126bb324a24cd5a2570cd6397194368533dcf495afa9e9167
                                • Instruction Fuzzy Hash: A2411B30204684DACB379B289C88B6E7B92FB87316F548519E947C25A1CF31984DD721
                                APIs
                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 008B70DD
                                  • Part of subcall function 00870DB6: std::exception::exception.LIBCMT ref: 00870DEC
                                  • Part of subcall function 00870DB6: __CxxThrowException@8.LIBCMT ref: 00870E01
                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 008B7114
                                • EnterCriticalSection.KERNEL32(?), ref: 008B7130
                                • _memmove.LIBCMT ref: 008B717E
                                • _memmove.LIBCMT ref: 008B719B
                                • LeaveCriticalSection.KERNEL32(?), ref: 008B71AA
                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 008B71BF
                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 008B71DE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                • String ID:
                                • API String ID: 256516436-0
                                • Opcode ID: 661b986ee4bb60751240d2024d2599c8be5fe49cf8a399a2138f6fa0f04b1d1f
                                • Instruction ID: 21329bc5bfa071f922c9d050bd22208a75ad355b0f51e39cf9067abe5e0a0db4
                                • Opcode Fuzzy Hash: 661b986ee4bb60751240d2024d2599c8be5fe49cf8a399a2138f6fa0f04b1d1f
                                • Instruction Fuzzy Hash: 82314D32900205EBCB10DFA8DC85AAABB78FF45710F1481A6F904DA256DB30DA54DB61
                                APIs
                                • DeleteObject.GDI32(00000000), ref: 008D61EB
                                • GetDC.USER32(00000000), ref: 008D61F3
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008D61FE
                                • ReleaseDC.USER32(00000000,00000000), ref: 008D620A
                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 008D6246
                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 008D6257
                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,008D902A,?,?,000000FF,00000000,?,000000FF,?), ref: 008D6291
                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 008D62B1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                • String ID:
                                • API String ID: 3864802216-0
                                • Opcode ID: e5fd0148fc0e9c41b0844500728002e8b59d41403dbb5d17a4eb2272bbc5f127
                                • Instruction ID: a043ecfb33a351c93234051045c18f93f8a295d166b08130e99db66c46c5ba7b
                                • Opcode Fuzzy Hash: e5fd0148fc0e9c41b0844500728002e8b59d41403dbb5d17a4eb2272bbc5f127
                                • Instruction Fuzzy Hash: 7D31AB72201214BFEF108F10DC8AFEA3BA9FF49720F044166FE09DA292D6759C51CB60
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memcmp
                                • String ID:
                                • API String ID: 2931989736-0
                                • Opcode ID: 80006e7830af93720ebde0bb3cb528ea17b399294d19c579e822a6e73112d72b
                                • Instruction ID: 5c5960d0509c839e1381a234447d33ed6901be5a3191b2ca81d5c27f0609ef0e
                                • Opcode Fuzzy Hash: 80006e7830af93720ebde0bb3cb528ea17b399294d19c579e822a6e73112d72b
                                • Instruction Fuzzy Hash: DA2195716016597BB704661A9D82FBB735DFF13368F048010FD08D6E87EB58DE1182B6
                                APIs
                                  • Part of subcall function 00859837: __itow.LIBCMT ref: 00859862
                                  • Part of subcall function 00859837: __swprintf.LIBCMT ref: 008598AC
                                  • Part of subcall function 0086FC86: _wcscpy.LIBCMT ref: 0086FCA9
                                • _wcstok.LIBCMT ref: 008BEC94
                                • _wcscpy.LIBCMT ref: 008BED23
                                • _memset.LIBCMT ref: 008BED56
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                • String ID: X
                                • API String ID: 774024439-3081909835
                                • Opcode ID: 323eccdc603e046d6d67e04ce6f9f9aca82044119623e8fa6c41141540697841
                                • Instruction ID: db90a65fc2de9479ec7a1e4c736edfeff156bd3493651f4fa2f0e6a0d59d0dab
                                • Opcode Fuzzy Hash: 323eccdc603e046d6d67e04ce6f9f9aca82044119623e8fa6c41141540697841
                                • Instruction Fuzzy Hash: 94C13B715086019FC764EF28D851A9AB7E4FF85315F14892DF899D73A2DB30E849CB83
                                APIs
                                • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 008C6C00
                                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 008C6C21
                                • WSAGetLastError.WSOCK32(00000000), ref: 008C6C34
                                • htons.WSOCK32(?,?,?,00000000,?), ref: 008C6CEA
                                • inet_ntoa.WSOCK32(?), ref: 008C6CA7
                                  • Part of subcall function 008AA7E9: _strlen.LIBCMT ref: 008AA7F3
                                  • Part of subcall function 008AA7E9: _memmove.LIBCMT ref: 008AA815
                                • _strlen.LIBCMT ref: 008C6D44
                                • _memmove.LIBCMT ref: 008C6DAD
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                • String ID:
                                • API String ID: 3619996494-0
                                • Opcode ID: 226ee750ad79d3ed10dcc673eaebd78898e458b39043fc52a9700dbe6bffb254
                                • Instruction ID: 3b184d32b26df757f2ba0a0694d1a3c4b5e85b6a38d2b30bbad35141417516ff
                                • Opcode Fuzzy Hash: 226ee750ad79d3ed10dcc673eaebd78898e458b39043fc52a9700dbe6bffb254
                                • Instruction Fuzzy Hash: 6A818F71204200ABD710EB28DC91F6AB7B8FF84724F14492DF956DB2A2EA71DD05CB52
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ab721bfce9cf81da822366b518e4a44c5008c4564829085bba2c1a72756a9d6f
                                • Instruction ID: 1a4d81e42ddb4159a59e1806b7122a0a1d3a180acf637d75cd1e4df42ac8125f
                                • Opcode Fuzzy Hash: ab721bfce9cf81da822366b518e4a44c5008c4564829085bba2c1a72756a9d6f
                                • Instruction Fuzzy Hash: B9715930900109EFCF04DF98CC89ABEBB7AFF85315F148259F915EA251D734AA55CBA4
                                APIs
                                • _memset.LIBCMT ref: 008CF448
                                • _memset.LIBCMT ref: 008CF511
                                • ShellExecuteExW.SHELL32(?), ref: 008CF556
                                  • Part of subcall function 00859837: __itow.LIBCMT ref: 00859862
                                  • Part of subcall function 00859837: __swprintf.LIBCMT ref: 008598AC
                                  • Part of subcall function 0086FC86: _wcscpy.LIBCMT ref: 0086FCA9
                                • GetProcessId.KERNEL32(00000000), ref: 008CF5CD
                                • CloseHandle.KERNEL32(00000000), ref: 008CF5FC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                • String ID: @
                                • API String ID: 3522835683-2766056989
                                • Opcode ID: 9277d23f487f3140703d3e56299b06a25dc07f1d151001e7f8d0b03d12f07ebc
                                • Instruction ID: b25544568baf91e1af7055aea7dd6cc8fc92d63ad1a4122bcd2541822ac177f8
                                • Opcode Fuzzy Hash: 9277d23f487f3140703d3e56299b06a25dc07f1d151001e7f8d0b03d12f07ebc
                                • Instruction Fuzzy Hash: B061AA75A00619DFCB04DF68C881AAEBBB5FF48310F148069E95AEB352CB30ED41CB85
                                APIs
                                • GetParent.USER32(?), ref: 008B0F8C
                                • GetKeyboardState.USER32(?), ref: 008B0FA1
                                • SetKeyboardState.USER32(?), ref: 008B1002
                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 008B1030
                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 008B104F
                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 008B1095
                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 008B10B8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessagePost$KeyboardState$Parent
                                • String ID:
                                • API String ID: 87235514-0
                                • Opcode ID: b6446dbf6b8942377526555418caa4542ece0a206cb2324155fab4689554b0fe
                                • Instruction ID: d71e94a8e7f69516ad778502197fc499999085e0c32934e7f80428e2a43c600c
                                • Opcode Fuzzy Hash: b6446dbf6b8942377526555418caa4542ece0a206cb2324155fab4689554b0fe
                                • Instruction Fuzzy Hash: 5951F260604AD539FF3252388C29BF7BFA9BB06304F488589E1D5C9AC3C694DCC9DB51
                                APIs
                                • GetParent.USER32(00000000), ref: 008B0DA5
                                • GetKeyboardState.USER32(?), ref: 008B0DBA
                                • SetKeyboardState.USER32(?), ref: 008B0E1B
                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 008B0E47
                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 008B0E64
                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 008B0EA8
                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 008B0EC9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessagePost$KeyboardState$Parent
                                • String ID:
                                • API String ID: 87235514-0
                                • Opcode ID: be9b708d8e01ab6d9dd715228b294277ec9bad6ac98b9ce34166005a28f3f427
                                • Instruction ID: 80f7ada5d7f41d0e3923cbcfc294cbe81b73ea3965d6f26735a0c611984eda4e
                                • Opcode Fuzzy Hash: be9b708d8e01ab6d9dd715228b294277ec9bad6ac98b9ce34166005a28f3f427
                                • Instruction Fuzzy Hash: 3F51E3A05446D53DFB3283648855BFB7FA9FB06300F088989E1D5CAAC2D795EC88EB51
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _wcsncpy$LocalTime
                                • String ID:
                                • API String ID: 2945705084-0
                                • Opcode ID: 5a2f4e209cb6b9bdbec44055128529745361fbf5659c9f9e93fae99739dbd3fe
                                • Instruction ID: 6bc5a3e29b9354fe924a3e933c27540c3ffcec6caef5a2a25f498d3289d7a47d
                                • Opcode Fuzzy Hash: 5a2f4e209cb6b9bdbec44055128529745361fbf5659c9f9e93fae99739dbd3fe
                                • Instruction Fuzzy Hash: 4A41A365C11618B6CB11EBB88C86ACFB7B8FF05310F50C956E518E3225EB34E245C7AB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID: V
                                • API String ID: 0-4045069856
                                • Opcode ID: cf1c35118a0bdaee12e9342f0a0e9b98b14ed83843d4edc1451ad890bd803488
                                • Instruction ID: 38d10a20de4cea7dd9a2233e03d057a935f1344ab99a58612d9ea1ab5b388b1b
                                • Opcode Fuzzy Hash: cf1c35118a0bdaee12e9342f0a0e9b98b14ed83843d4edc1451ad890bd803488
                                • Instruction Fuzzy Hash: FC419235905504EBDB189B28CC88FA9BBA4FB09320F254366F917E73E1C7309D41EA51
                                APIs
                                  • Part of subcall function 008B466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,008B3697,?), ref: 008B468B
                                  • Part of subcall function 008B466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,008B3697,?), ref: 008B46A4
                                • lstrcmpiW.KERNEL32(?,?), ref: 008B36B7
                                • _wcscmp.LIBCMT ref: 008B36D3
                                • MoveFileW.KERNEL32(?,?), ref: 008B36EB
                                • _wcscat.LIBCMT ref: 008B3733
                                • SHFileOperationW.SHELL32(?), ref: 008B379F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                • String ID: \*.*
                                • API String ID: 1377345388-1173974218
                                • Opcode ID: a7c49be30184d89bc24a5edabb8517f8ce05dc9a77d4409030be7576a7f2d9aa
                                • Instruction ID: 0c1cf1a98c435537b7596132e5f55723439e004342710bd7aecf0098fadd3aa2
                                • Opcode Fuzzy Hash: a7c49be30184d89bc24a5edabb8517f8ce05dc9a77d4409030be7576a7f2d9aa
                                • Instruction Fuzzy Hash: 37417E71508344AEC751EF68D4429EFB7E8FF89380F00193EB49AC3251EA34D689C756
                                APIs
                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 008D0FD4
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 008D0FFE
                                • FreeLibrary.KERNEL32(00000000), ref: 008D10B5
                                  • Part of subcall function 008D0FA5: RegCloseKey.ADVAPI32(?), ref: 008D101B
                                  • Part of subcall function 008D0FA5: FreeLibrary.KERNEL32(?), ref: 008D106D
                                  • Part of subcall function 008D0FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 008D1090
                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 008D1058
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: EnumFreeLibrary$CloseDeleteOpen
                                • String ID:
                                • API String ID: 395352322-0
                                • Opcode ID: fc29dbbbf1c9efd43fa9ff51797238fa3d87a3607bf50257b0ec10670c567c24
                                • Instruction ID: 0ed4b84aa44db63863683cfe1776a4740dbd049e45ee1c196e48c7c2396a633e
                                • Opcode Fuzzy Hash: fc29dbbbf1c9efd43fa9ff51797238fa3d87a3607bf50257b0ec10670c567c24
                                • Instruction Fuzzy Hash: 5D31EC71901509BFDF159B94DC89AFFB7BCFF08300F10426AE512E2251DB749E859AA1
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 008ADB2E
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 008ADB54
                                • SysAllocString.OLEAUT32(00000000), ref: 008ADB57
                                • SysAllocString.OLEAUT32(?), ref: 008ADB75
                                • SysFreeString.OLEAUT32(?), ref: 008ADB7E
                                • StringFromGUID2.OLE32(?,?,00000028), ref: 008ADBA3
                                • SysAllocString.OLEAUT32(?), ref: 008ADBB1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                • String ID:
                                • API String ID: 3761583154-0
                                • Opcode ID: 4c166bbf70e82176dcd8e96c1381d3731167aa8db53c37a3d3096cf16e287856
                                • Instruction ID: 58cb8527339b6590e0212954343ec35d57d56f84e8872cc8c81852e34ac864f0
                                • Opcode Fuzzy Hash: 4c166bbf70e82176dcd8e96c1381d3731167aa8db53c37a3d3096cf16e287856
                                • Instruction Fuzzy Hash: DD219132601219AFAF109FA8DC84CBB73ACFB09370B018126FE16DB651D6709C4297A4
                                APIs
                                  • Part of subcall function 008C7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 008C7DB6
                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 008C61C6
                                • WSAGetLastError.WSOCK32(00000000), ref: 008C61D5
                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 008C620E
                                • connect.WSOCK32(00000000,?,00000010), ref: 008C6217
                                • WSAGetLastError.WSOCK32 ref: 008C6221
                                • closesocket.WSOCK32(00000000), ref: 008C624A
                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 008C6263
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                • String ID:
                                • API String ID: 910771015-0
                                • Opcode ID: fea9e587b5b7b46e1adc43e9b8d6b83811b97be9bc86e6a434c828622cd42d35
                                • Instruction ID: bb22a53e70d325a037a94179e60c12f2e97b7f62b05b8b15defacbdc169a2b9b
                                • Opcode Fuzzy Hash: fea9e587b5b7b46e1adc43e9b8d6b83811b97be9bc86e6a434c828622cd42d35
                                • Instruction Fuzzy Hash: D2316131600118ABEB10AF64CC85FB97BB9FF45765F04413AFD06E7292DB70ED149AA2
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __wcsnicmp
                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                • API String ID: 1038674560-2734436370
                                • Opcode ID: 3a4acef41a82aea530cea2ef784d0575a9f6880329495212a4b25b1680b40f07
                                • Instruction ID: 01988341428ba959e1fb6c71f12a94a77640abd95a8be910f09f5f994568bde1
                                • Opcode Fuzzy Hash: 3a4acef41a82aea530cea2ef784d0575a9f6880329495212a4b25b1680b40f07
                                • Instruction Fuzzy Hash: F521347220455166E220AA78AC02EA773DCFF67354F108439FA8AC65A2FB549D81D396
                                APIs
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 008ADC09
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 008ADC2F
                                • SysAllocString.OLEAUT32(00000000), ref: 008ADC32
                                • SysAllocString.OLEAUT32 ref: 008ADC53
                                • SysFreeString.OLEAUT32 ref: 008ADC5C
                                • StringFromGUID2.OLE32(?,?,00000028), ref: 008ADC76
                                • SysAllocString.OLEAUT32(?), ref: 008ADC84
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                • String ID:
                                • API String ID: 3761583154-0
                                • Opcode ID: df78d1a482d1ed9867349ca0f514ec42ffdccdb73b3dba4db842ee20e25dd011
                                • Instruction ID: a16998ed8ebac4cebcbdd7350c6b567c7c2c838d3c6a7845d9b419b2e408572c
                                • Opcode Fuzzy Hash: df78d1a482d1ed9867349ca0f514ec42ffdccdb73b3dba4db842ee20e25dd011
                                • Instruction Fuzzy Hash: 59214776605204AFAB10DFA8DC88DAB77ECFB09370B50C126FA16CB661DA74DC41D764
                                APIs
                                  • Part of subcall function 00851D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00851D73
                                  • Part of subcall function 00851D35: GetStockObject.GDI32(00000011), ref: 00851D87
                                  • Part of subcall function 00851D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00851D91
                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 008D7632
                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 008D763F
                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 008D764A
                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 008D7659
                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 008D7665
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$CreateObjectStockWindow
                                • String ID: Msctls_Progress32
                                • API String ID: 1025951953-3636473452
                                • Opcode ID: 108baa21d70b94b014aee4359c848d151c6a88397b3954133c643b739ea63c58
                                • Instruction ID: d2bbe0f789e83f597d9ae496af6c2a2582856a8dc84e96ef3a4561aae159129b
                                • Opcode Fuzzy Hash: 108baa21d70b94b014aee4359c848d151c6a88397b3954133c643b739ea63c58
                                • Instruction Fuzzy Hash: 5C1190B2110219BFEF118F64DC85EE77F6DFF087A8F014215BA04A21A0DA72DC21DBA4
                                APIs
                                • __init_pointers.LIBCMT ref: 00879AE6
                                  • Part of subcall function 00873187: EncodePointer.KERNEL32(00000000), ref: 0087318A
                                  • Part of subcall function 00873187: __initp_misc_winsig.LIBCMT ref: 008731A5
                                  • Part of subcall function 00873187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00879EA0
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00879EB4
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00879EC7
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00879EDA
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00879EED
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00879F00
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00879F13
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00879F26
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00879F39
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00879F4C
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00879F5F
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00879F72
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00879F85
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00879F98
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00879FAB
                                  • Part of subcall function 00873187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00879FBE
                                • __mtinitlocks.LIBCMT ref: 00879AEB
                                • __mtterm.LIBCMT ref: 00879AF4
                                  • Part of subcall function 00879B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00879AF9,00877CD0,0090A0B8,00000014), ref: 00879C56
                                  • Part of subcall function 00879B5C: _free.LIBCMT ref: 00879C5D
                                  • Part of subcall function 00879B5C: DeleteCriticalSection.KERNEL32(0090EC00,?,?,00879AF9,00877CD0,0090A0B8,00000014), ref: 00879C7F
                                • __calloc_crt.LIBCMT ref: 00879B19
                                • __initptd.LIBCMT ref: 00879B3B
                                • GetCurrentThreadId.KERNEL32 ref: 00879B42
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                • String ID:
                                • API String ID: 3567560977-0
                                • Opcode ID: 00ccdba3d808e427297d0156a441c311d8ff4aece2da5cf6aae8cd63524d72ad
                                • Instruction ID: 3a9bbd45b25d40e9bfc30c68b1de1477f2328a5414f63c241f42ca2aa2dd38e3
                                • Opcode Fuzzy Hash: 00ccdba3d808e427297d0156a441c311d8ff4aece2da5cf6aae8cd63524d72ad
                                • Instruction Fuzzy Hash: 15F0623251A7219AE634B67C7C07A4A3B91FF02730B20CA19F4ECC51DAEE20C4414562
                                APIs
                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00873F85), ref: 00874085
                                • GetProcAddress.KERNEL32(00000000), ref: 0087408C
                                • EncodePointer.KERNEL32(00000000), ref: 00874097
                                • DecodePointer.KERNEL32(00873F85), ref: 008740B2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                • String ID: RoUninitialize$combase.dll
                                • API String ID: 3489934621-2819208100
                                • Opcode ID: f2da23d9c6d666e142199f92e199f1ab7e5563bc2437036e69fb5f3a47d918f0
                                • Instruction ID: bf105f64b691e4f32c5c62268720268b4d594ca849dfbe15795eadd6892302d8
                                • Opcode Fuzzy Hash: f2da23d9c6d666e142199f92e199f1ab7e5563bc2437036e69fb5f3a47d918f0
                                • Instruction Fuzzy Hash: 5CE09A7079A204ABEA519F61ED09B453BB5F704742F10C135F212E12A1CBB68604EB14
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memmove$__itow__swprintf
                                • String ID:
                                • API String ID: 3253778849-0
                                • Opcode ID: 01f6861b9c9f464f3e444165d26c031541feffe0c99e54a007fe9ecc55138285
                                • Instruction ID: 51c61ce9215d53adc1c0b2194168b2c04b924ec32f135de761c00fb29a1bc326
                                • Opcode Fuzzy Hash: 01f6861b9c9f464f3e444165d26c031541feffe0c99e54a007fe9ecc55138285
                                • Instruction Fuzzy Hash: 71616C3150065A9BDF11EF68CC81AFE37A5FF15308F044529FC59EB292EA38E919CB52
                                APIs
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                  • Part of subcall function 008D0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,008CFDAD,?,?), ref: 008D0E31
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008D02BD
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 008D02FD
                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 008D0320
                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 008D0349
                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 008D038C
                                • RegCloseKey.ADVAPI32(00000000), ref: 008D0399
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                • String ID:
                                • API String ID: 4046560759-0
                                • Opcode ID: b933aed2e8f017fcd4a017447364344e27433f049f4c0686e9755c21ba2e0118
                                • Instruction ID: e8a53f27bbdd8a6a8f29d4f373f59b6c77c99755a378db5620939e90e2fa67a0
                                • Opcode Fuzzy Hash: b933aed2e8f017fcd4a017447364344e27433f049f4c0686e9755c21ba2e0118
                                • Instruction Fuzzy Hash: D5514A31108204AFC715EF68D845E6ABBE9FF85314F044A1EF955C72A2DB31E909DF52
                                APIs
                                • GetMenu.USER32(?), ref: 008D57FB
                                • GetMenuItemCount.USER32(00000000), ref: 008D5832
                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 008D585A
                                • GetMenuItemID.USER32(?,?), ref: 008D58C9
                                • GetSubMenu.USER32(?,?), ref: 008D58D7
                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 008D5928
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Menu$Item$CountMessagePostString
                                • String ID:
                                • API String ID: 650687236-0
                                • Opcode ID: 265bfbe1fdcea9600a79809e058563ebf6f915eea3ea74c036451a00ecf49327
                                • Instruction ID: e497df9df3dc772d6e99a15fcce186ad37a9a8dfc3f606604570eb3e70f94d42
                                • Opcode Fuzzy Hash: 265bfbe1fdcea9600a79809e058563ebf6f915eea3ea74c036451a00ecf49327
                                • Instruction Fuzzy Hash: 12515C35E01619EFCF11EF68C845AAEBBB5FF48320F144166E946EB351CB30AE419B91
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 008AEF06
                                • VariantClear.OLEAUT32(00000013), ref: 008AEF78
                                • VariantClear.OLEAUT32(00000000), ref: 008AEFD3
                                • _memmove.LIBCMT ref: 008AEFFD
                                • VariantClear.OLEAUT32(?), ref: 008AF04A
                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 008AF078
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Variant$Clear$ChangeInitType_memmove
                                • String ID:
                                • API String ID: 1101466143-0
                                • Opcode ID: 3e780a4594cf0a2853ce64730aedc20622b7683da60297a7a8c2fe7d15454d52
                                • Instruction ID: 12a75e0d4b27c86ae8682a7f0e482b88f8977f3f1f1c42d22f44f9b1efb0a554
                                • Opcode Fuzzy Hash: 3e780a4594cf0a2853ce64730aedc20622b7683da60297a7a8c2fe7d15454d52
                                • Instruction Fuzzy Hash: C0516D75A00209DFDB14CF58C880AAAB7F9FF4D314B15856AEA59DB302E734E911CF90
                                APIs
                                • _memset.LIBCMT ref: 008B2258
                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008B22A3
                                • IsMenu.USER32(00000000), ref: 008B22C3
                                • CreatePopupMenu.USER32 ref: 008B22F7
                                • GetMenuItemCount.USER32(000000FF), ref: 008B2355
                                • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 008B2386
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                • String ID:
                                • API String ID: 3311875123-0
                                • Opcode ID: 1d099d0be71f1fafd8ac2f1d69949bb783007a3ac33b7f088eabd2da712f3c0e
                                • Instruction ID: ee0090eb37fd4fb062f1e63b7773404106c870463e849fead7b160837e15da11
                                • Opcode Fuzzy Hash: 1d099d0be71f1fafd8ac2f1d69949bb783007a3ac33b7f088eabd2da712f3c0e
                                • Instruction Fuzzy Hash: 11517970601209DBDF21CF68D888BEEBBF5FF49318F14426AE811E63A1D3749945CB51
                                APIs
                                  • Part of subcall function 00852612: GetWindowLongW.USER32(?,000000EB), ref: 00852623
                                • BeginPaint.USER32(?,?,?,?,?,?), ref: 0085179A
                                • GetWindowRect.USER32(?,?), ref: 008517FE
                                • ScreenToClient.USER32(?,?), ref: 0085181B
                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0085182C
                                • EndPaint.USER32(?,?), ref: 00851876
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                • String ID:
                                • API String ID: 1827037458-0
                                • Opcode ID: 61088be963d482ec34b200c6f852825e0b25f4236207ca8cf28314cc1b2b9e30
                                • Instruction ID: 76acec082ce44d672aec9cb01cfc134a56fd05a055aa83983e7ef88321355683
                                • Opcode Fuzzy Hash: 61088be963d482ec34b200c6f852825e0b25f4236207ca8cf28314cc1b2b9e30
                                • Instruction Fuzzy Hash: 2E41A330204301DFDB11DF28CC88FAA7BE8FB59725F044679F965C61A1C7309849DB62
                                APIs
                                • ShowWindow.USER32(009157B0,00000000,00EA56E0,?,?,009157B0,?,008DB5A8,?,?), ref: 008DB712
                                • EnableWindow.USER32(00000000,00000000), ref: 008DB736
                                • ShowWindow.USER32(009157B0,00000000,00EA56E0,?,?,009157B0,?,008DB5A8,?,?), ref: 008DB796
                                • ShowWindow.USER32(00000000,00000004,?,008DB5A8,?,?), ref: 008DB7A8
                                • EnableWindow.USER32(00000000,00000001), ref: 008DB7CC
                                • SendMessageW.USER32(?,0000130C,?,00000000), ref: 008DB7EF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$Show$Enable$MessageSend
                                • String ID:
                                • API String ID: 642888154-0
                                • Opcode ID: 3b07865a7d363dd92de69a2607ca56a80d6a2a2774db833a489d6d332adef84f
                                • Instruction ID: 26fe1fbf1e70074e4953c5e17c20ecbecdbb9ff97c693a8d59cf175816101b22
                                • Opcode Fuzzy Hash: 3b07865a7d363dd92de69a2607ca56a80d6a2a2774db833a489d6d332adef84f
                                • Instruction Fuzzy Hash: C3414F34601240EFDB26CF24C499B947BE1FB45310F1982BAFA59CF7A2CB31A856CB51
                                APIs
                                • GetForegroundWindow.USER32(?,?,?,?,?,?,008C4E41,?,?,00000000,00000001), ref: 008C70AC
                                  • Part of subcall function 008C39A0: GetWindowRect.USER32(?,?), ref: 008C39B3
                                • GetDesktopWindow.USER32 ref: 008C70D6
                                • GetWindowRect.USER32(00000000), ref: 008C70DD
                                • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 008C710F
                                  • Part of subcall function 008B5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 008B52BC
                                • GetCursorPos.USER32(?), ref: 008C713B
                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 008C7199
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                • String ID:
                                • API String ID: 4137160315-0
                                • Opcode ID: 38847d4b0d00d44d9559309d422a4eaf22e76817bd7b9609087ba4bb5e42245b
                                • Instruction ID: 75fb17717981029618293a706ace1a433d4044ec3f39ccaddffa8f3f4f95faab
                                • Opcode Fuzzy Hash: 38847d4b0d00d44d9559309d422a4eaf22e76817bd7b9609087ba4bb5e42245b
                                • Instruction Fuzzy Hash: EB31A172509305ABD720DF14D849F9BB7A9FB88314F040A1AF585D7192D670EA09CB92
                                APIs
                                  • Part of subcall function 008A80A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 008A80C0
                                  • Part of subcall function 008A80A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 008A80CA
                                  • Part of subcall function 008A80A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 008A80D9
                                  • Part of subcall function 008A80A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 008A80E0
                                  • Part of subcall function 008A80A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 008A80F6
                                • GetLengthSid.ADVAPI32(?,00000000,008A842F), ref: 008A88CA
                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 008A88D6
                                • HeapAlloc.KERNEL32(00000000), ref: 008A88DD
                                • CopySid.ADVAPI32(00000000,00000000,?), ref: 008A88F6
                                • GetProcessHeap.KERNEL32(00000000,00000000,008A842F), ref: 008A890A
                                • HeapFree.KERNEL32(00000000), ref: 008A8911
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                • String ID:
                                • API String ID: 3008561057-0
                                • Opcode ID: ab018b18fb4092290db1d4db5ac18b7ac57f8cd385a969571a411afb8f05087d
                                • Instruction ID: 8915fe1b5c82eb2f85b03622a6280a1b723abbb723386c9541f0cda58b3a07a5
                                • Opcode Fuzzy Hash: ab018b18fb4092290db1d4db5ac18b7ac57f8cd385a969571a411afb8f05087d
                                • Instruction Fuzzy Hash: E1119D71502609EFEB119BA4DC09BBF7B78FB46315F148129E946D7211CB369E00DB60
                                APIs
                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 008A85E2
                                • OpenProcessToken.ADVAPI32(00000000), ref: 008A85E9
                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 008A85F8
                                • CloseHandle.KERNEL32(00000004), ref: 008A8603
                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 008A8632
                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 008A8646
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                • String ID:
                                • API String ID: 1413079979-0
                                • Opcode ID: 65fa62c3b833b1c5fccdfc222631b225245ad8afd5ec16e09f829b3e99e9d8ff
                                • Instruction ID: 0192fa2a673fb4a68a7170b00449d835d156e6f70b83a9d194883793020a5fd6
                                • Opcode Fuzzy Hash: 65fa62c3b833b1c5fccdfc222631b225245ad8afd5ec16e09f829b3e99e9d8ff
                                • Instruction Fuzzy Hash: 811147B2501249EBEF018FA4DD49BDE7BA9FB09304F044165FE05A2161C7728D60AB60
                                APIs
                                • GetDC.USER32(00000000), ref: 008AB7B5
                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 008AB7C6
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008AB7CD
                                • ReleaseDC.USER32(00000000,00000000), ref: 008AB7D5
                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 008AB7EC
                                • MulDiv.KERNEL32(000009EC,?,?), ref: 008AB7FE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CapsDevice$Release
                                • String ID:
                                • API String ID: 1035833867-0
                                • Opcode ID: 30b63df2565bd4e02d08e4059ed4c2c8a68c8766050c066941916a67c7fa7351
                                • Instruction ID: 6068e707c20d6c8237e8016e049445725979cea876690546635d6f445f6eaba0
                                • Opcode Fuzzy Hash: 30b63df2565bd4e02d08e4059ed4c2c8a68c8766050c066941916a67c7fa7351
                                • Instruction Fuzzy Hash: EC018475E41209BBEF109BA69C45A5EBFB8FB49321F004176FB04E7292D6709D00DF91
                                APIs
                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00870193
                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 0087019B
                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 008701A6
                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 008701B1
                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 008701B9
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 008701C1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Virtual
                                • String ID:
                                • API String ID: 4278518827-0
                                • Opcode ID: e6dc9aef6fba723b5cee0569cad049c983060c4cce4245b8ad143183140e7372
                                • Instruction ID: 2578ddced1a79dcde0586775ecfd0dee3cbc79ba4df353366c9997eb46c2f68a
                                • Opcode Fuzzy Hash: e6dc9aef6fba723b5cee0569cad049c983060c4cce4245b8ad143183140e7372
                                • Instruction Fuzzy Hash: 09016CB09027597DE3008F5A8C85B52FFA8FF19354F00411BA15C47942C7F5A864CBE5
                                APIs
                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 008B53F9
                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 008B540F
                                • GetWindowThreadProcessId.USER32(?,?), ref: 008B541E
                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008B542D
                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008B5437
                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 008B543E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                • String ID:
                                • API String ID: 839392675-0
                                • Opcode ID: 0c3a5fff194b1edfb39e09768983dad28b4eba9d04163878a051f32f3e2be973
                                • Instruction ID: 8e7c8cd54b0e5ad75b9ff03692b1050209211177e95a097a4a7b7d746cd0bcc1
                                • Opcode Fuzzy Hash: 0c3a5fff194b1edfb39e09768983dad28b4eba9d04163878a051f32f3e2be973
                                • Instruction Fuzzy Hash: 93F09631142158BBD7215B52EC0DEEF7B7CFFC6B11F00026AFB06D1152D7A05A0196B5
                                APIs
                                • InterlockedExchange.KERNEL32(?,?), ref: 008B7243
                                • EnterCriticalSection.KERNEL32(?,?,00860EE4,?,?), ref: 008B7254
                                • TerminateThread.KERNEL32(00000000,000001F6,?,00860EE4,?,?), ref: 008B7261
                                • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00860EE4,?,?), ref: 008B726E
                                  • Part of subcall function 008B6C35: CloseHandle.KERNEL32(00000000,?,008B727B,?,00860EE4,?,?), ref: 008B6C3F
                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 008B7281
                                • LeaveCriticalSection.KERNEL32(?,?,00860EE4,?,?), ref: 008B7288
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                • String ID:
                                • API String ID: 3495660284-0
                                • Opcode ID: 4baceb9e318b70c2cac9d3c13e145c6dbb26df42a28611d6e38b27d96671faf0
                                • Instruction ID: c71a99a7f0c3e39e8daddd9e36615f903add9d4d5ae512821e44e7a9b045f3b7
                                • Opcode Fuzzy Hash: 4baceb9e318b70c2cac9d3c13e145c6dbb26df42a28611d6e38b27d96671faf0
                                • Instruction Fuzzy Hash: 34F05E36542612EBE7122B64ED4CADA772AFF45702F100632F643911A2DB765911EB50
                                APIs
                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 008A899D
                                • UnloadUserProfile.USERENV(?,?), ref: 008A89A9
                                • CloseHandle.KERNEL32(?), ref: 008A89B2
                                • CloseHandle.KERNEL32(?), ref: 008A89BA
                                • GetProcessHeap.KERNEL32(00000000,?), ref: 008A89C3
                                • HeapFree.KERNEL32(00000000), ref: 008A89CA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                • String ID:
                                • API String ID: 146765662-0
                                • Opcode ID: 9823be373548c0403793c9027be8b1ad28563680430e5e877177c55325539abf
                                • Instruction ID: 1d1b1fea625485bb056a9350453c1ac94b9be9c861d86997a019a1e6f892ef20
                                • Opcode Fuzzy Hash: 9823be373548c0403793c9027be8b1ad28563680430e5e877177c55325539abf
                                • Instruction Fuzzy Hash: DEE0C236105001FBDA022FE5EC0C94ABB69FB89322B108332F31A81271CB329420EB50
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 008C8613
                                • CharUpperBuffW.USER32(?,?), ref: 008C8722
                                • VariantClear.OLEAUT32(?), ref: 008C889A
                                  • Part of subcall function 008B7562: VariantInit.OLEAUT32(00000000), ref: 008B75A2
                                  • Part of subcall function 008B7562: VariantCopy.OLEAUT32(00000000,?), ref: 008B75AB
                                  • Part of subcall function 008B7562: VariantClear.OLEAUT32(00000000), ref: 008B75B7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Variant$ClearInit$BuffCharCopyUpper
                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                • API String ID: 4237274167-1221869570
                                • Opcode ID: b9bb0c6eaa2621c610c85c93093cc7985ad78aa8040f542921fe3d6fed62c61f
                                • Instruction ID: 324dbbfc3b9d449e438262367f79dbfc8e30e880ec1013c2955a4423d683b686
                                • Opcode Fuzzy Hash: b9bb0c6eaa2621c610c85c93093cc7985ad78aa8040f542921fe3d6fed62c61f
                                • Instruction Fuzzy Hash: A0910471608305DFC710DF28C485A5ABBF4FB89714F14896EF89ACB261DB31E949CB92
                                APIs
                                  • Part of subcall function 0086FC86: _wcscpy.LIBCMT ref: 0086FCA9
                                • _memset.LIBCMT ref: 008B2B87
                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 008B2BB6
                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 008B2C69
                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 008B2C97
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ItemMenu$Info$Default_memset_wcscpy
                                • String ID: 0
                                • API String ID: 4152858687-4108050209
                                • Opcode ID: da122d6b94ce696755b2942634cd51a69b961b926a23193ced407164b832f5b1
                                • Instruction ID: 0f2e2e68150f15f1eb08b53af5ec151362df46a28b68a80147af78a629a84996
                                • Opcode Fuzzy Hash: da122d6b94ce696755b2942634cd51a69b961b926a23193ced407164b832f5b1
                                • Instruction Fuzzy Hash: F751DD716083019BD7249F28D855AAFBBE8FF99320F044A2DF895D7291DB70CD44DB92
                                APIs
                                • GetWindowRect.USER32(00EAE560,?), ref: 008D9863
                                • ScreenToClient.USER32(00000002,00000002), ref: 008D9896
                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 008D9903
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$ClientMoveRectScreen
                                • String ID: V
                                • API String ID: 3880355969-4045069856
                                • Opcode ID: fd865b0a01c1427b65ee0782ccde276e19ef1e7580537282f7b8d23ec9e69aaf
                                • Instruction ID: a7693764a07a6ac6398ad544b5328ac1e66a66e9fb6a1c4568911eeda2e217bf
                                • Opcode Fuzzy Hash: fd865b0a01c1427b65ee0782ccde276e19ef1e7580537282f7b8d23ec9e69aaf
                                • Instruction Fuzzy Hash: 26512B34A00209EFCB10CF68D894AAE7BB5FF55760F15826AF995DB3A0D730AD41DB90
                                APIs
                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 008AD5D4
                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 008AD60A
                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 008AD61B
                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 008AD69D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ErrorMode$AddressCreateInstanceProc
                                • String ID: DllGetClassObject
                                • API String ID: 753597075-1075368562
                                • Opcode ID: 0d43ac71f610bf4da1b2ec1c95ab3545dd2da2a5cc5fae9b734b13fbe0b0cb95
                                • Instruction ID: 85d6d6069a90316fc27edf400e84a5b8c31fc87f6aaf60dc5ac9a46ba6127eaf
                                • Opcode Fuzzy Hash: 0d43ac71f610bf4da1b2ec1c95ab3545dd2da2a5cc5fae9b734b13fbe0b0cb95
                                • Instruction Fuzzy Hash: 23418EB1600305EFEB05CF54C884A9ABBB9FF56314F1581A9AD0ADFA06D7B1D944CBE0
                                APIs
                                • _memset.LIBCMT ref: 008B27C0
                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 008B27DC
                                • DeleteMenu.USER32(?,00000007,00000000), ref: 008B2822
                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00915890,00000000), ref: 008B286B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Menu$Delete$InfoItem_memset
                                • String ID: 0
                                • API String ID: 1173514356-4108050209
                                • Opcode ID: 88799cb7d58119ac9d32e8c129245b8da40494b64c78ecc51f676deede540ab4
                                • Instruction ID: 0370034fc01e8b2c4d45f0087c54e0a6cf7e0c62a3c88a67651fb9449fd8e7e1
                                • Opcode Fuzzy Hash: 88799cb7d58119ac9d32e8c129245b8da40494b64c78ecc51f676deede540ab4
                                • Instruction Fuzzy Hash: 4E416B702043419FDB20DF28D844B9ABBE8FF85314F144A2EE9A6D7392D734A905CB52
                                APIs
                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008D88DE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: InvalidateRect
                                • String ID: V
                                • API String ID: 634782764-4045069856
                                • Opcode ID: 63eb6ccba9754c7cf980036cd5b28f753a7f728197c5b473ea83f97a6e0d2481
                                • Instruction ID: a8c3ae3814289782e23ff6874d204fd34641e49d3d97d3b12340b126c57a5c3d
                                • Opcode Fuzzy Hash: 63eb6ccba9754c7cf980036cd5b28f753a7f728197c5b473ea83f97a6e0d2481
                                • Instruction Fuzzy Hash: 45319234605108FFEB209A58DC55FBC7BA5FB05360FA44323FA91E63A1CA71E940E752
                                APIs
                                • ClientToScreen.USER32(?,?), ref: 008DAB60
                                • GetWindowRect.USER32(?,?), ref: 008DABD6
                                • PtInRect.USER32(?,?,008DC014), ref: 008DABE6
                                • MessageBeep.USER32(00000000), ref: 008DAC57
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Rect$BeepClientMessageScreenWindow
                                • String ID: V
                                • API String ID: 1352109105-4045069856
                                • Opcode ID: 15603e7d6e9034ff66400fc2b9bddd349d3c59bfb3e17eae7e49e7c628f91947
                                • Instruction ID: 6840c0a173c5ca99a97c6e531f4c5a085c9427b63329b5170829dfc3119d65fe
                                • Opcode Fuzzy Hash: 15603e7d6e9034ff66400fc2b9bddd349d3c59bfb3e17eae7e49e7c628f91947
                                • Instruction Fuzzy Hash: 5541BF30610109DFCB19CF58D884BA97BF5FF49320F2982AAE915DB361C731E841DB92
                                APIs
                                • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 008CD7C5
                                  • Part of subcall function 0085784B: _memmove.LIBCMT ref: 00857899
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: BuffCharLower_memmove
                                • String ID: cdecl$none$stdcall$winapi
                                • API String ID: 3425801089-567219261
                                • Opcode ID: c203e5d92d31bd11015257409a3cefcf373016a3876cbfb6097be4437e8ef6c3
                                • Instruction ID: cf758910db13895cf93ce4347de4a00610f3424806bf6e050beb0311efb149d0
                                • Opcode Fuzzy Hash: c203e5d92d31bd11015257409a3cefcf373016a3876cbfb6097be4437e8ef6c3
                                • Instruction Fuzzy Hash: 9F318C71904319AFCF10EF58C851AAEB7B5FF04720B108A39E829D76E1DB71E905CB80
                                APIs
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                  • Part of subcall function 008AAA99: GetClassNameW.USER32(?,?,000000FF), ref: 008AAABC
                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 008A8F14
                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 008A8F27
                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 008A8F57
                                  • Part of subcall function 00857BCC: _memmove.LIBCMT ref: 00857C06
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$_memmove$ClassName
                                • String ID: ComboBox$ListBox
                                • API String ID: 365058703-1403004172
                                • Opcode ID: e3e7e67e5ae7703ab956bbb2ed6bcd259c1c1b59ea8000b7391fdbe36a76cba4
                                • Instruction ID: 8bde98623d259a892967f6c5ee29f39523b847ef8a48e204b09fc84336e00e3c
                                • Opcode Fuzzy Hash: e3e7e67e5ae7703ab956bbb2ed6bcd259c1c1b59ea8000b7391fdbe36a76cba4
                                • Instruction Fuzzy Hash: BE21F271A00109BEEB14ABB49C85DFEBB69FF06320F048619F825E76E1DF395809D621
                                APIs
                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 008D7C4A
                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 008D7C58
                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 008D7C5F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$DestroyWindow
                                • String ID: msctls_updown32$V
                                • API String ID: 4014797782-1590291244
                                • Opcode ID: 021d4b7a1195efac7770d763a0815468802194297f802d6ea1af2a0224d84c22
                                • Instruction ID: 36acef72c112841f05bb05ecef6124ba79695b3c198c18790a49852fad080816
                                • Opcode Fuzzy Hash: 021d4b7a1195efac7770d763a0815468802194297f802d6ea1af2a0224d84c22
                                • Instruction Fuzzy Hash: D3216BB1214208AFDB10DF28DCC1DAA37ECFB5A364B15415AFA01DB3A1DB31EC01DA61
                                APIs
                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 008C184C
                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 008C1872
                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 008C18A2
                                • InternetCloseHandle.WININET(00000000), ref: 008C18E9
                                  • Part of subcall function 008C2483: GetLastError.KERNEL32(?,?,008C1817,00000000,00000000,00000001), ref: 008C2498
                                  • Part of subcall function 008C2483: SetEvent.KERNEL32(?,?,008C1817,00000000,00000000,00000001), ref: 008C24AD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                • String ID:
                                • API String ID: 3113390036-3916222277
                                • Opcode ID: a7d5bcbb18fd530ab298abc5a1447fb913cb82b11891deee15d9df4192d0fd96
                                • Instruction ID: 4d8a53bc8996293079d58b72ecd2fbf816277ea144a54b73df1f5ffe004be682
                                • Opcode Fuzzy Hash: a7d5bcbb18fd530ab298abc5a1447fb913cb82b11891deee15d9df4192d0fd96
                                • Instruction Fuzzy Hash: C7219AB1504208BFEB11AB648CC9FBB77BDFB49744F10412EF906E2241EA30CD04A7A1
                                APIs
                                  • Part of subcall function 00852612: GetWindowLongW.USER32(?,000000EB), ref: 00852623
                                • GetCursorPos.USER32(?), ref: 008DC4D2
                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0088B9AB,?,?,?,?,?), ref: 008DC4E7
                                • GetCursorPos.USER32(?), ref: 008DC534
                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0088B9AB,?,?,?), ref: 008DC56E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                • String ID: V
                                • API String ID: 2864067406-4045069856
                                • Opcode ID: fc67d378db98b688c27c3e7b7519701d2be02a41d731215b2220558f51f70524
                                • Instruction ID: b7855407f1ab3e152d47d14395630939ecad2b442b869258007652316f4a2f4b
                                • Opcode Fuzzy Hash: fc67d378db98b688c27c3e7b7519701d2be02a41d731215b2220558f51f70524
                                • Instruction Fuzzy Hash: DF319135610418EFCB25CF98D858EEA7BB5FB49310F0442AAF905CB361CB31AD50EBA4
                                APIs
                                  • Part of subcall function 00851D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00851D73
                                  • Part of subcall function 00851D35: GetStockObject.GDI32(00000011), ref: 00851D87
                                  • Part of subcall function 00851D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00851D91
                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 008D6461
                                • LoadLibraryW.KERNEL32(?), ref: 008D6468
                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 008D647D
                                • DestroyWindow.USER32(?), ref: 008D6485
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                • String ID: SysAnimate32
                                • API String ID: 4146253029-1011021900
                                • Opcode ID: be6b023ed93edcf63f7ee5f9f14e685a6ed39cbf2bff1571b8705bdfd43a9327
                                • Instruction ID: 7c0e6a877b8dd9410caf72adebaae83687a545139c8ebf75b5ef3503287fe3f5
                                • Opcode Fuzzy Hash: be6b023ed93edcf63f7ee5f9f14e685a6ed39cbf2bff1571b8705bdfd43a9327
                                • Instruction Fuzzy Hash: 26215B71200209AFEF104F64DC84EBB77AAFB59378F10872AFA50D2291E771DC61A764
                                APIs
                                • GetStdHandle.KERNEL32(0000000C), ref: 008B6DBC
                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 008B6DEF
                                • GetStdHandle.KERNEL32(0000000C), ref: 008B6E01
                                • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 008B6E3B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CreateHandle$FilePipe
                                • String ID: nul
                                • API String ID: 4209266947-2873401336
                                • Opcode ID: 7ca8cb18d69d737cf029ee3a4b7b221719854ed372502a6763251b743711fff1
                                • Instruction ID: dc71ddee926f03fbdd473a6d78f14b38cc884ea65053f4a4594c047ce0183031
                                • Opcode Fuzzy Hash: 7ca8cb18d69d737cf029ee3a4b7b221719854ed372502a6763251b743711fff1
                                • Instruction Fuzzy Hash: C621907460020AABDB209F29DC04ADA7BF4FF44720F244A29FDA1D73D0EB7599649B50
                                APIs
                                • GetStdHandle.KERNEL32(000000F6), ref: 008B6E89
                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 008B6EBB
                                • GetStdHandle.KERNEL32(000000F6), ref: 008B6ECC
                                • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 008B6F06
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CreateHandle$FilePipe
                                • String ID: nul
                                • API String ID: 4209266947-2873401336
                                • Opcode ID: 2ad0fa0076e3331231ab2249a2ffec3fce0c2450451b05c19be3f01029f9d994
                                • Instruction ID: ddd342e483b2a8f62cd53141cae321697e875144eac8154b01cb101f548a8eab
                                • Opcode Fuzzy Hash: 2ad0fa0076e3331231ab2249a2ffec3fce0c2450451b05c19be3f01029f9d994
                                • Instruction Fuzzy Hash: 53215E796003059BDB209F69DC04AEA77A8FF45724F300A1AF9A1D73D0EB74E9618B61
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 008BAC54
                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 008BACA8
                                • __swprintf.LIBCMT ref: 008BACC1
                                • SetErrorMode.KERNEL32(00000000,00000001,00000000,008DF910), ref: 008BACFF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ErrorMode$InformationVolume__swprintf
                                • String ID: %lu
                                • API String ID: 3164766367-685833217
                                • Opcode ID: c32df718d4ca972b76ee13ee4cc468556035371b167fc0da91ba75fc8de96966
                                • Instruction ID: 3785ab2b1e2fd7cab3c503c6c4bccad34d48892c9313a0ca1b54cbfdc52cc327
                                • Opcode Fuzzy Hash: c32df718d4ca972b76ee13ee4cc468556035371b167fc0da91ba75fc8de96966
                                • Instruction Fuzzy Hash: 75216070A00109AFCB10EF69CD45DEE7BB8FF49715B004069F909EB352DA31EA45DB22
                                APIs
                                • CharUpperBuffW.USER32(?,?), ref: 008B1B19
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: BuffCharUpper
                                • String ID: APPEND$EXISTS$KEYS$REMOVE
                                • API String ID: 3964851224-769500911
                                • Opcode ID: 2f09ab4eaba10166ef95599ebeba24eb10a97fc7771911c92c38c96bec5e16a3
                                • Instruction ID: d4e9bcd66e34561a0d2996b0fdc16822c6d1dd1fc66f4e824ac23e0765e883fc
                                • Opcode Fuzzy Hash: 2f09ab4eaba10166ef95599ebeba24eb10a97fc7771911c92c38c96bec5e16a3
                                • Instruction Fuzzy Hash: 34113C709002189FCF00EF58D8668EEF7B4FF25704F5084A5E855EB6A6EB329906CF51
                                APIs
                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 008CEC07
                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 008CEC37
                                • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 008CED6A
                                • CloseHandle.KERNEL32(?), ref: 008CEDEB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                • String ID:
                                • API String ID: 2364364464-0
                                • Opcode ID: 8c21a8d2e59fccb27de62ce91c81773b653a0810742eca707804b6aa17eb80f2
                                • Instruction ID: b7274f99ec3bfe6f57c1e118109dc1aca21130c0594214388252d8a5d0b80d99
                                • Opcode Fuzzy Hash: 8c21a8d2e59fccb27de62ce91c81773b653a0810742eca707804b6aa17eb80f2
                                • Instruction Fuzzy Hash: 3B812C716007109FD760EF28C886F2AB7E5FF44721F14892DF99ADB292D7B0AD448B52
                                APIs
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                  • Part of subcall function 008D0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,008CFDAD,?,?), ref: 008D0E31
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008D00FD
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 008D013C
                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 008D0183
                                • RegCloseKey.ADVAPI32(?,?), ref: 008D01AF
                                • RegCloseKey.ADVAPI32(00000000), ref: 008D01BC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                • String ID:
                                • API String ID: 3440857362-0
                                • Opcode ID: 8585c87933182f07ddc4b5e8d7d777bb3b70a1cd0f0a1de3cc83d75c813499d8
                                • Instruction ID: 4178bb09fcad25ceb2ce2b553feb6c1ac1ee98461958131e4875518ed586102b
                                • Opcode Fuzzy Hash: 8585c87933182f07ddc4b5e8d7d777bb3b70a1cd0f0a1de3cc83d75c813499d8
                                • Instruction Fuzzy Hash: 35512D71204204AFD714EF68D881F6AB7E9FF84314F44491EF996C72A2DB31E905CB52
                                APIs
                                  • Part of subcall function 00859837: __itow.LIBCMT ref: 00859862
                                  • Part of subcall function 00859837: __swprintf.LIBCMT ref: 008598AC
                                • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 008CD927
                                • GetProcAddress.KERNEL32(00000000,?), ref: 008CD9AA
                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 008CD9C6
                                • GetProcAddress.KERNEL32(00000000,?), ref: 008CDA07
                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 008CDA21
                                  • Part of subcall function 00855A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,008B7896,?,?,00000000), ref: 00855A2C
                                  • Part of subcall function 00855A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,008B7896,?,?,00000000,?,?), ref: 00855A50
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                • String ID:
                                • API String ID: 327935632-0
                                • Opcode ID: 6c6074cf411f5e575f17412f6f67831f68b9049a175c65812acf9a2e15db992d
                                • Instruction ID: e18ab74a6526518d1e9235e26b9f1b99dd29b0a44c309aba7a1b96ebf4bfe618
                                • Opcode Fuzzy Hash: 6c6074cf411f5e575f17412f6f67831f68b9049a175c65812acf9a2e15db992d
                                • Instruction Fuzzy Hash: 0F51F675A00219DFCB00EFA8C4949A9BBF4FF09324B148169E95AEB212D730ED49CB51
                                APIs
                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 008BE61F
                                • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 008BE648
                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 008BE687
                                  • Part of subcall function 00859837: __itow.LIBCMT ref: 00859862
                                  • Part of subcall function 00859837: __swprintf.LIBCMT ref: 008598AC
                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 008BE6AC
                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 008BE6B4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                • String ID:
                                • API String ID: 1389676194-0
                                • Opcode ID: da406a80871cddb1a6611282804988acd54cdb1e6065601c7173b103d9d4cf0e
                                • Instruction ID: a43d915e889ea9e1e068b23c9999a0d329177db1d87e4e707424070eceeeded8
                                • Opcode Fuzzy Hash: da406a80871cddb1a6611282804988acd54cdb1e6065601c7173b103d9d4cf0e
                                • Instruction Fuzzy Hash: 8C510635A00605DFCB01EF68C981AAABBF5FF09315B1480A9E849EB362CB31ED55DF51
                                APIs
                                • GetCursorPos.USER32(?), ref: 00852357
                                • ScreenToClient.USER32(009157B0,?), ref: 00852374
                                • GetAsyncKeyState.USER32(00000001), ref: 00852399
                                • GetAsyncKeyState.USER32(00000002), ref: 008523A7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: AsyncState$ClientCursorScreen
                                • String ID:
                                • API String ID: 4210589936-0
                                • Opcode ID: 6a09e59e916ea841a91d202d2b5101512afa2a84ad580a0001df2a670f06dd99
                                • Instruction ID: 6bf12091d60d435ab812884885f4111fb302cd92793f2921930a8fb3d9455cc1
                                • Opcode Fuzzy Hash: 6a09e59e916ea841a91d202d2b5101512afa2a84ad580a0001df2a670f06dd99
                                • Instruction Fuzzy Hash: 1B418135604109FBCF259F68C844AE9BB74FB06365F20435AF829D22A1CB349D54DFA1
                                APIs
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008A63E7
                                • TranslateAcceleratorW.USER32(?,?,?), ref: 008A6433
                                • TranslateMessage.USER32(?), ref: 008A645C
                                • DispatchMessageW.USER32(?), ref: 008A6466
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008A6475
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Message$PeekTranslate$AcceleratorDispatch
                                • String ID:
                                • API String ID: 2108273632-0
                                • Opcode ID: 27da604325fe938ec530524858310b666ca1baf849b62e157e1a173b5437e098
                                • Instruction ID: 9a7c59fe6b7aa42cd3cd0fd1748d8bb2c4e78eae794cbb253c4971366905ed0f
                                • Opcode Fuzzy Hash: 27da604325fe938ec530524858310b666ca1baf849b62e157e1a173b5437e098
                                • Instruction Fuzzy Hash: DB310531A06606EFEB20CF70DC44BF67BE8FB06300F194165E521C29A5F73594A9EB64
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 008A8A30
                                • PostMessageW.USER32(?,00000201,00000001), ref: 008A8ADA
                                • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 008A8AE2
                                • PostMessageW.USER32(?,00000202,00000000), ref: 008A8AF0
                                • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 008A8AF8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessagePostSleep$RectWindow
                                • String ID:
                                • API String ID: 3382505437-0
                                • Opcode ID: 3e862b4057d0b297d3fffbd74f6be05f3fa40e42843f117693cc80f8a2ca93ed
                                • Instruction ID: db885dac6197d65a2d48ac3c7f9224fe09d357f50bd4e3065c7ae46054d73f0f
                                • Opcode Fuzzy Hash: 3e862b4057d0b297d3fffbd74f6be05f3fa40e42843f117693cc80f8a2ca93ed
                                • Instruction Fuzzy Hash: C531E071500229EFEF14CFA8D94CA9E3BB5FB05315F10822AF925E65D1C7B0A910DBA1
                                APIs
                                • IsWindowVisible.USER32(?), ref: 008AB204
                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 008AB221
                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 008AB259
                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 008AB27F
                                • _wcsstr.LIBCMT ref: 008AB289
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                • String ID:
                                • API String ID: 3902887630-0
                                • Opcode ID: 415dd6688248b28b6ac045188e823b2d4ae5a8b0bdf55ceebc9844c27a6c73f9
                                • Instruction ID: 1111822000699b46f40871f1f291fe61d885ba098be08cb92c8343e728f5140c
                                • Opcode Fuzzy Hash: 415dd6688248b28b6ac045188e823b2d4ae5a8b0bdf55ceebc9844c27a6c73f9
                                • Instruction Fuzzy Hash: BA21F832205204BAFB155B799C45F7F7F98FF46720F00813AF909DA592EB61DC40A661
                                APIs
                                  • Part of subcall function 00852612: GetWindowLongW.USER32(?,000000EB), ref: 00852623
                                • GetWindowLongW.USER32(?,000000F0), ref: 008DB192
                                • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 008DB1B7
                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 008DB1CF
                                • GetSystemMetrics.USER32(00000004), ref: 008DB1F8
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,008C0E90,00000000), ref: 008DB216
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$Long$MetricsSystem
                                • String ID:
                                • API String ID: 2294984445-0
                                • Opcode ID: 97999cc0b48d97c5ba986f83dfaeef8be762fcf3751a349ebaed6f546f833bfb
                                • Instruction ID: 2d6eb9f4c6c8e53d9114eb7efea47c193983bb640799ae5249859a3d96117669
                                • Opcode Fuzzy Hash: 97999cc0b48d97c5ba986f83dfaeef8be762fcf3751a349ebaed6f546f833bfb
                                • Instruction Fuzzy Hash: CF219F72A14655EFCB109F38DC44A6A3BA4FB05361F16472AF932D72E0E7309810DB90
                                APIs
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 008A9320
                                  • Part of subcall function 00857BCC: _memmove.LIBCMT ref: 00857C06
                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 008A9352
                                • __itow.LIBCMT ref: 008A936A
                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 008A9392
                                • __itow.LIBCMT ref: 008A93A3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$__itow$_memmove
                                • String ID:
                                • API String ID: 2983881199-0
                                • Opcode ID: b90779aa8f547fefa711e9412e5fd42b76a3eb5398d5ff68ea4870a8011d3289
                                • Instruction ID: 3ff2cfdb4c4276fff2c41b0c517983952713891135fc907af97e7f1cb25aba52
                                • Opcode Fuzzy Hash: b90779aa8f547fefa711e9412e5fd42b76a3eb5398d5ff68ea4870a8011d3289
                                • Instruction Fuzzy Hash: 2F21F531705208ABEF109A649C89EAE7BBCFB5A720F049025FE85D73C1D6B0CD459793
                                APIs
                                • IsWindow.USER32(00000000), ref: 008C5A6E
                                • GetForegroundWindow.USER32 ref: 008C5A85
                                • GetDC.USER32(00000000), ref: 008C5AC1
                                • GetPixel.GDI32(00000000,?,00000003), ref: 008C5ACD
                                • ReleaseDC.USER32(00000000,00000003), ref: 008C5B08
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$ForegroundPixelRelease
                                • String ID:
                                • API String ID: 4156661090-0
                                • Opcode ID: 02817b18385fd3487af9b59213cdc58a928473243d971501e8948033a6a2d79f
                                • Instruction ID: 2920560fad459f72275b15e07c0d84924f91ea02e1f765904f91ef49d26d7087
                                • Opcode Fuzzy Hash: 02817b18385fd3487af9b59213cdc58a928473243d971501e8948033a6a2d79f
                                • Instruction Fuzzy Hash: 9F218E35A01114AFDB00EF69D884A9ABBF9FF48310F14C179E94AD7762CA30ED45DB91
                                APIs
                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0085134D
                                • SelectObject.GDI32(?,00000000), ref: 0085135C
                                • BeginPath.GDI32(?), ref: 00851373
                                • SelectObject.GDI32(?,00000000), ref: 0085139C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ObjectSelect$BeginCreatePath
                                • String ID:
                                • API String ID: 3225163088-0
                                • Opcode ID: 9493ab3873ebd630ec6f95f8b9ffc7ea3a0c866d648649e29e0267765f066822
                                • Instruction ID: 278395fa60e775b4999119927f9d2394f5767aa4f8768c2721cb78356e50a436
                                • Opcode Fuzzy Hash: 9493ab3873ebd630ec6f95f8b9ffc7ea3a0c866d648649e29e0267765f066822
                                • Instruction Fuzzy Hash: EC21AF30915A08EFDF10DF29DC087E97BA8FB40322F5682A6F811D62B1D7749895EF90
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memcmp
                                • String ID:
                                • API String ID: 2931989736-0
                                • Opcode ID: bcdd9dd174739764ce9029ce789bec1bfb60075a9e0172b062efa409b78831b8
                                • Instruction ID: 1db5227bdc43e085c5c969a39dc22b49d3cf7e106334b8aad3f4974c001f4268
                                • Opcode Fuzzy Hash: bcdd9dd174739764ce9029ce789bec1bfb60075a9e0172b062efa409b78831b8
                                • Instruction Fuzzy Hash: 9201C0712001097AE7046B1A9D82FBBA31DFF133A8F048020FE09D7B47EB54EE1092A5
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 008B4ABA
                                • __beginthreadex.LIBCMT ref: 008B4AD8
                                • MessageBoxW.USER32(?,?,?,?), ref: 008B4AED
                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 008B4B03
                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 008B4B0A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                • String ID:
                                • API String ID: 3824534824-0
                                • Opcode ID: cb87b6bf8a2b3a032839472c58c3b59c3027ae808d266adc7de7ab4ba3c12f46
                                • Instruction ID: 6200263dd586b4f142ccf31084771c2ba9ad072083261cc269efbba022bcc3eb
                                • Opcode Fuzzy Hash: cb87b6bf8a2b3a032839472c58c3b59c3027ae808d266adc7de7ab4ba3c12f46
                                • Instruction Fuzzy Hash: 6B114872A09208BFCB018FA8AC05ADF7FACFB84320F158366F925D3352D670C90097A0
                                APIs
                                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 008A821E
                                • GetLastError.KERNEL32(?,008A7CE2,?,?,?), ref: 008A8228
                                • GetProcessHeap.KERNEL32(00000008,?,?,008A7CE2,?,?,?), ref: 008A8237
                                • HeapAlloc.KERNEL32(00000000,?,008A7CE2,?,?,?), ref: 008A823E
                                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 008A8255
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                • String ID:
                                • API String ID: 842720411-0
                                • Opcode ID: 6bda8aa00375050e9f04e485b5f7147b3d01f73ec0fa971831bfbff4346a06f4
                                • Instruction ID: 3a11dc85eb9c6d79b10e1fc9a0acdf7dd2ad9077ad9e3ca316de8e49a0683180
                                • Opcode Fuzzy Hash: 6bda8aa00375050e9f04e485b5f7147b3d01f73ec0fa971831bfbff4346a06f4
                                • Instruction Fuzzy Hash: 78016D71201204FFEB204FA5EC48D6B7BACFF8A755B50053AF90AC2220DA318D00DA70
                                APIs
                                • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,008A7044,80070057,?,?,?,008A7455), ref: 008A7127
                                • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,008A7044,80070057,?,?), ref: 008A7142
                                • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,008A7044,80070057,?,?), ref: 008A7150
                                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,008A7044,80070057,?), ref: 008A7160
                                • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,008A7044,80070057,?,?), ref: 008A716C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                • String ID:
                                • API String ID: 3897988419-0
                                • Opcode ID: 0c43ab50ad9cffedd8ec89b3338898655049224ca15820fa5ae3c5176a475f3c
                                • Instruction ID: fdcb7adb101ed88e46243e6c357e87f0f31a62322a9f729631d1c07fb52a6912
                                • Opcode Fuzzy Hash: 0c43ab50ad9cffedd8ec89b3338898655049224ca15820fa5ae3c5176a475f3c
                                • Instruction Fuzzy Hash: 8D017C72602208ABEB114F64DC44BAE7BEDFB49792F144179FE05D2221E731DD40BBA0
                                APIs
                                • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 008B5260
                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 008B526E
                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 008B5276
                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 008B5280
                                • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 008B52BC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                • String ID:
                                • API String ID: 2833360925-0
                                • Opcode ID: 017918b63b94ff3749e237bd8a286fee4f177de23f3ce6ffe0ad59c5ca1d5e1b
                                • Instruction ID: 65dae9cdb3dbbd917bed803c3f6970d914b48604fd1073d67612c49b28181c36
                                • Opcode Fuzzy Hash: 017918b63b94ff3749e237bd8a286fee4f177de23f3ce6ffe0ad59c5ca1d5e1b
                                • Instruction Fuzzy Hash: F2012931D02A1DDBCF00EFE8E949AEDBB78FB09711F400156EA42F2241CB705554D7A1
                                APIs
                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 008A8121
                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 008A812B
                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 008A813A
                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 008A8141
                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 008A8157
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                • String ID:
                                • API String ID: 44706859-0
                                • Opcode ID: d0458cb45ec8b217d00ff072616611acb945388692c7f2ebc11da793be6a3b87
                                • Instruction ID: 19c0f859f161d8359b1c24fe6485e7a326882d526becdea170f3b6f02d547ced
                                • Opcode Fuzzy Hash: d0458cb45ec8b217d00ff072616611acb945388692c7f2ebc11da793be6a3b87
                                • Instruction Fuzzy Hash: D5F04F71201304EFEB120FA5EC88E673BACFF4A754F040136FA86C6151DB619D41EA70
                                APIs
                                • GetDlgItem.USER32(?,000003E9), ref: 008AC1F7
                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 008AC20E
                                • MessageBeep.USER32(00000000), ref: 008AC226
                                • KillTimer.USER32(?,0000040A), ref: 008AC242
                                • EndDialog.USER32(?,00000001), ref: 008AC25C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                • String ID:
                                • API String ID: 3741023627-0
                                • Opcode ID: 6d81acae7e3a58e6011b564ab0a5af6872250b81da5ad63fe8999e52c0327e1a
                                • Instruction ID: 6092be29336c89cf747b7213265779a6da99d84108cafc7e8570450ecdf0d1f0
                                • Opcode Fuzzy Hash: 6d81acae7e3a58e6011b564ab0a5af6872250b81da5ad63fe8999e52c0327e1a
                                • Instruction Fuzzy Hash: CB01A230404308ABFB205B64ED4EF9677B8FF11B06F00466AB653E18E1DBE0A9449B90
                                APIs
                                • EndPath.GDI32(?), ref: 008513BF
                                • StrokeAndFillPath.GDI32(?,?,0088B888,00000000,?), ref: 008513DB
                                • SelectObject.GDI32(?,00000000), ref: 008513EE
                                • DeleteObject.GDI32 ref: 00851401
                                • StrokePath.GDI32(?), ref: 0085141C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                • String ID:
                                • API String ID: 2625713937-0
                                • Opcode ID: 1f1f6f2340b0b609ec6548410f44cde6833b4355c35778e0c978c1f0acb61b6d
                                • Instruction ID: 505d455724178589acfe31de00b162d687e47e36d63cf0077e9582083f49b12b
                                • Opcode Fuzzy Hash: 1f1f6f2340b0b609ec6548410f44cde6833b4355c35778e0c978c1f0acb61b6d
                                • Instruction Fuzzy Hash: 9AF03C30119B08EBDB115F2AEC4C7983FA5F740366F4AC365E92A890F2C7344999EF10
                                APIs
                                  • Part of subcall function 00870DB6: std::exception::exception.LIBCMT ref: 00870DEC
                                  • Part of subcall function 00870DB6: __CxxThrowException@8.LIBCMT ref: 00870E01
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                  • Part of subcall function 00857A51: _memmove.LIBCMT ref: 00857AAB
                                • __swprintf.LIBCMT ref: 00862ECD
                                Strings
                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00862D66
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                • API String ID: 1943609520-557222456
                                • Opcode ID: e034847a3e4b71a02e1692c4d3ddcbd1db36d50599449b31f72242ec02eab499
                                • Instruction ID: 9399db5172aede7795e67bfbec3af0306d5b3fe6892a87f77140e0a69ab11218
                                • Opcode Fuzzy Hash: e034847a3e4b71a02e1692c4d3ddcbd1db36d50599449b31f72242ec02eab499
                                • Instruction Fuzzy Hash: 62918C711086059FCB14EF28D895C6EBBA8FF85311F04496DF885DB2A2EA30ED48CB53
                                APIs
                                  • Part of subcall function 00854750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00854743,?,?,008537AE,?), ref: 00854770
                                • CoInitialize.OLE32(00000000), ref: 008BB9BB
                                • CoCreateInstance.OLE32(008E2D6C,00000000,00000001,008E2BDC,?), ref: 008BB9D4
                                • CoUninitialize.OLE32 ref: 008BB9F1
                                  • Part of subcall function 00859837: __itow.LIBCMT ref: 00859862
                                  • Part of subcall function 00859837: __swprintf.LIBCMT ref: 008598AC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                • String ID: .lnk
                                • API String ID: 2126378814-24824748
                                • Opcode ID: 7076201049dda32957f105bd62a3ef7ec43e0ba6dea53fe6c568463b5f914923
                                • Instruction ID: 5bc79b30b56382afdf2fbb0bfd7274a2b4d5fb59ee90f62a92a471beee02f797
                                • Opcode Fuzzy Hash: 7076201049dda32957f105bd62a3ef7ec43e0ba6dea53fe6c568463b5f914923
                                • Instruction Fuzzy Hash: 8DA135756042059FC700DF18C894D6ABBE5FF89324F148998F899DB3A2CB71ED49CB92
                                APIs
                                • __startOneArgErrorHandling.LIBCMT ref: 008750AD
                                  • Part of subcall function 008800F0: __87except.LIBCMT ref: 0088012B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ErrorHandling__87except__start
                                • String ID: pow
                                • API String ID: 2905807303-2276729525
                                • Opcode ID: e894573b2b00e567edfa771afcc54cfca5d2c79640e9d6897325b2474fcc7d38
                                • Instruction ID: ef658c9b5637905908ce43289bad71648cb7c57dda536b04b69982b6b7a5bc95
                                • Opcode Fuzzy Hash: e894573b2b00e567edfa771afcc54cfca5d2c79640e9d6897325b2474fcc7d38
                                • Instruction Fuzzy Hash: B3514721A0CA0686DB51B728C84536E3B94FB41710F30CD59E4D9CA2ADEFB4CDD89F92
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memset$_memmove
                                • String ID: ERCP
                                • API String ID: 2532777613-1384759551
                                • Opcode ID: 2e69c6768edeb7b2557c1e93e67a29fa9dd4aa06bd9401b4b3ddcf90441c1388
                                • Instruction ID: 9ffb6ccdcf35b20bbc22ccdb3b0e43bf611a94308b9234ddc7f9dab63043657f
                                • Opcode Fuzzy Hash: 2e69c6768edeb7b2557c1e93e67a29fa9dd4aa06bd9401b4b3ddcf90441c1388
                                • Instruction Fuzzy Hash: E351AF71900349DFDB24CFA5C981BAABBE4FF44314F20856EE94ACB291E770EA54CB41
                                APIs
                                  • Part of subcall function 008B14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008A9296,?,?,00000034,00000800,?,00000034), ref: 008B14E6
                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 008A983F
                                  • Part of subcall function 008B1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008A92C5,?,?,00000800,?,00001073,00000000,?,?), ref: 008B14B1
                                  • Part of subcall function 008B13DE: GetWindowThreadProcessId.USER32(?,?), ref: 008B1409
                                  • Part of subcall function 008B13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,008A925A,00000034,?,?,00001004,00000000,00000000), ref: 008B1419
                                  • Part of subcall function 008B13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,008A925A,00000034,?,?,00001004,00000000,00000000), ref: 008B142F
                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 008A98AC
                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 008A98F9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                • String ID: @
                                • API String ID: 4150878124-2766056989
                                • Opcode ID: 19fa263714da4713f905aa99e9f433c4ba5255bcd6ffb276481e1995020cfd49
                                • Instruction ID: ba8e4fcf579ff2bc4aa7e706846fd4a914fd783979889697e1cf18d53f4f29f2
                                • Opcode Fuzzy Hash: 19fa263714da4713f905aa99e9f433c4ba5255bcd6ffb276481e1995020cfd49
                                • Instruction Fuzzy Hash: 0A414F76901218BFDF10DFA4CC95ADEBBB8FB0A300F004199FA45B7291DA716E45CBA1
                                APIs
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,008DF910,00000000,?,?,?,?), ref: 008D79DF
                                • GetWindowLongW.USER32 ref: 008D79FC
                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008D7A0C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$Long
                                • String ID: SysTreeView32
                                • API String ID: 847901565-1698111956
                                • Opcode ID: aa655f705e857b9479dc8d380b7e4f54d733b3c699161f83ea45e5b9f8929c92
                                • Instruction ID: a295d88bc35008ca87504710f39b4866fafb31744f6ac0797971dc7ca6505b78
                                • Opcode Fuzzy Hash: aa655f705e857b9479dc8d380b7e4f54d733b3c699161f83ea45e5b9f8929c92
                                • Instruction Fuzzy Hash: 0431DE32204606AFDB118F38DC41BEA7BA9FB49334F244726F975E22E1E734E9519B50
                                APIs
                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 008D7B61
                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 008D7B76
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: '$V
                                • API String ID: 3850602802-299079222
                                • Opcode ID: 183d007c19e72c2b4076e11aefe6c5f1e3053e47c262723f16aea7746ded9120
                                • Instruction ID: 67cf718b9ae166eaa0c97db52efd9aee2c51b53199d58de35601539b9af73644
                                • Opcode Fuzzy Hash: 183d007c19e72c2b4076e11aefe6c5f1e3053e47c262723f16aea7746ded9120
                                • Instruction Fuzzy Hash: 04410774A0521A9FDB14CF68C881BEEBBB5FB08314F11426AE905EB391E770A951CF90
                                APIs
                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 008D7461
                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 008D7475
                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 008D7499
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$Window
                                • String ID: SysMonthCal32
                                • API String ID: 2326795674-1439706946
                                • Opcode ID: 5595ac5692887bd473d07661d7692fef6894f27a0a84a780b5f2e562cb5cefb8
                                • Instruction ID: daee14dd93d1f44fc6901fe42ce331b267191813af63d6500b5035f86efbf9a0
                                • Opcode Fuzzy Hash: 5595ac5692887bd473d07661d7692fef6894f27a0a84a780b5f2e562cb5cefb8
                                • Instruction Fuzzy Hash: 1B219132500218AFDF128F54CC46FEA3B7AFB48724F110215FE15AB2D0EA75AC51DBA0
                                APIs
                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 008D6D3B
                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 008D6D4B
                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 008D6D70
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$MoveWindow
                                • String ID: Listbox
                                • API String ID: 3315199576-2633736733
                                • Opcode ID: aa0646ac99696bda622add6838dfca31d21317e9175e32bff11efd81eb72205f
                                • Instruction ID: db116e841587efbe0bed633d9f146943e9fb769048d40f49f11a130c63778fcb
                                • Opcode Fuzzy Hash: aa0646ac99696bda622add6838dfca31d21317e9175e32bff11efd81eb72205f
                                • Instruction Fuzzy Hash: B021D03261111CBFDF118F54DC45EAB3BBAFF89760F018225FA41DB2A0DA719C619BA0
                                APIs
                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 008D7772
                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 008D7787
                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 008D7794
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: msctls_trackbar32
                                • API String ID: 3850602802-1010561917
                                • Opcode ID: 6da21b1dc161080eac3c02eb3f048dd6f079db402e08d585339713cb605f2ea5
                                • Instruction ID: a454275bd1796f50e1f05eab50f36eb97ffb944c88b0e73e8d1c9fe9ea232708
                                • Opcode Fuzzy Hash: 6da21b1dc161080eac3c02eb3f048dd6f079db402e08d585339713cb605f2ea5
                                • Instruction Fuzzy Hash: BC11E372244208BEEF205F65CC05FEB77A9FF88B64F124629FA45E61D0D672E811DB20
                                APIs
                                • GetForegroundWindow.USER32(?,009157B0,008DD809,000000FC,?,00000000,00000000,?,?,?,0088B969,?,?,?,?,?), ref: 008DACD1
                                • GetFocus.USER32 ref: 008DACD9
                                  • Part of subcall function 00852612: GetWindowLongW.USER32(?,000000EB), ref: 00852623
                                  • Part of subcall function 008525DB: GetWindowLongW.USER32(?,000000EB), ref: 008525EC
                                • SendMessageW.USER32(00EAE560,000000B0,000001BC,000001C0), ref: 008DAD4B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$Long$FocusForegroundMessageSend
                                • String ID: V
                                • API String ID: 3601265619-4045069856
                                • Opcode ID: c94d3bb56497f88ec9438755e7608ce89753affd8e842e3a760d65f0165781c6
                                • Instruction ID: fa0a052c164f389dece86915713145a9978e65d42a3ad16db97e8f553462901e
                                • Opcode Fuzzy Hash: c94d3bb56497f88ec9438755e7608ce89753affd8e842e3a760d65f0165781c6
                                • Instruction Fuzzy Hash: B80144312025009FC7159B28D898AA577E6FB8A321B29436AE516C77F1DB31AC46CB51
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00854BD0,?,00854DEF,?,009152F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00854C11
                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00854C23
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                • API String ID: 2574300362-3689287502
                                • Opcode ID: b887d4a433579d1f0256fdfa42aa4f0a26e0bca9c2d1775fbcb674464ba0a8a7
                                • Instruction ID: 0b970d2f9312974fcb46ee2a1b532b87ef4d6614e924a1c5cfe6a0cd670ee76a
                                • Opcode Fuzzy Hash: b887d4a433579d1f0256fdfa42aa4f0a26e0bca9c2d1775fbcb674464ba0a8a7
                                • Instruction Fuzzy Hash: 29D08230502713CFCB20AB71C808206BBE5FF09356B01883AA892C22A1E6B0C880CA10
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00854B83,?), ref: 00854C44
                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00854C56
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                • API String ID: 2574300362-1355242751
                                • Opcode ID: 8ea5416b07ba16756464acbd3b936e8dd0afca57321b591a29d3a46825fb04fb
                                • Instruction ID: 5478bdb476d85c71f5ba3ee0f7f4cde86d9955bd122fa6ee042d51523e011094
                                • Opcode Fuzzy Hash: 8ea5416b07ba16756464acbd3b936e8dd0afca57321b591a29d3a46825fb04fb
                                • Instruction Fuzzy Hash: 53D0C730501713CFCB208F32C80824A73E4FF0035AB11883BAAA2C62A9E770C8C0CA10
                                APIs
                                • LoadLibraryA.KERNEL32(advapi32.dll,?,008D1039), ref: 008D0DF5
                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 008D0E07
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: RegDeleteKeyExW$advapi32.dll
                                • API String ID: 2574300362-4033151799
                                • Opcode ID: f83abc4de3488b0da38ac78ab97c9d01d42570463dda1472bf3c5133bb50446e
                                • Instruction ID: ac3cf1f1ffef8cbbb503d4ff4c34fe718f0f3ae39712cd08475fc60f1fbf91cf
                                • Opcode Fuzzy Hash: f83abc4de3488b0da38ac78ab97c9d01d42570463dda1472bf3c5133bb50446e
                                • Instruction Fuzzy Hash: 8DD0E270510722CFDB219B76C80868A77E9BF44356F158D2EA996D2292E6B0D8908A51
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,00000001,008C8CF4,?,008DF910), ref: 008C90EE
                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 008C9100
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: GetModuleHandleExW$kernel32.dll
                                • API String ID: 2574300362-199464113
                                • Opcode ID: 561eb218f59403d90999bfa98e8e45edd753efc92adc8ed6f1d58f41f4b9379b
                                • Instruction ID: 2e88cc9bd597c4c2994e0e62a0cd0bc2d2bebc8bb1ed4a4f9f99e667124f801c
                                • Opcode Fuzzy Hash: 561eb218f59403d90999bfa98e8e45edd753efc92adc8ed6f1d58f41f4b9379b
                                • Instruction Fuzzy Hash: BFD0E234610713CFDB209B31E81DA0677E5BF05391B1A89BFE6D6D6690EA78C8809A90
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: LocalTime__swprintf
                                • String ID: %.3d$WIN_XPe
                                • API String ID: 2070861257-2409531811
                                • Opcode ID: 9a52668d9c24145549b5723f2067a8cf539cce937693d939e96eaa77fa0446d6
                                • Instruction ID: 87212d8722a070626737208c9cefcdc7f3f36e01213f09d63f1c0795cf027009
                                • Opcode Fuzzy Hash: 9a52668d9c24145549b5723f2067a8cf539cce937693d939e96eaa77fa0446d6
                                • Instruction Fuzzy Hash: 65D0127180D10FFECF40A7D0988C8B9737CF718709F580552B506D2085E2218754EA21
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 89117ea2bfd3d2fc0a6cb66ffb7cc69991828f794ab20a2d0571b4e32a81d8fc
                                • Instruction ID: 0e48d2626f63d2072b53bf7f2c469ac851887e73718e904cc8ad768ee6154148
                                • Opcode Fuzzy Hash: 89117ea2bfd3d2fc0a6cb66ffb7cc69991828f794ab20a2d0571b4e32a81d8fc
                                • Instruction Fuzzy Hash: 45C16E74A0421AEFDB14CFA4C884EAEBBB5FF49304B158598E806EB751D730DD81EB90
                                APIs
                                • CharLowerBuffW.USER32(?,?), ref: 008CE0BE
                                • CharLowerBuffW.USER32(?,?), ref: 008CE101
                                  • Part of subcall function 008CD7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 008CD7C5
                                • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 008CE301
                                • _memmove.LIBCMT ref: 008CE314
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: BuffCharLower$AllocVirtual_memmove
                                • String ID:
                                • API String ID: 3659485706-0
                                • Opcode ID: 145d130fb813b6e246736611ab55f921730612d07b4eb7af2ada37b3e672d8cd
                                • Instruction ID: e0ff5119ed6f301511ffc7a777afc39634f557156203817d4fd0cad9361c914f
                                • Opcode Fuzzy Hash: 145d130fb813b6e246736611ab55f921730612d07b4eb7af2ada37b3e672d8cd
                                • Instruction Fuzzy Hash: 52C1F371A083019FC714DF28C481A6ABBE4FF89718F14896EF999DB351D731E946CB82
                                APIs
                                • CoInitialize.OLE32(00000000), ref: 008C80C3
                                • CoUninitialize.OLE32 ref: 008C80CE
                                  • Part of subcall function 008AD56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 008AD5D4
                                • VariantInit.OLEAUT32(?), ref: 008C80D9
                                • VariantClear.OLEAUT32(?), ref: 008C83AA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                • String ID:
                                • API String ID: 780911581-0
                                • Opcode ID: 20edd43c05354e77e6b21d061b490599d37eee58de070799014a8494995ba8af
                                • Instruction ID: 3e1dff296976647285a0399d894db2a5dc7b520aa7e230d5f84997a56a790db0
                                • Opcode Fuzzy Hash: 20edd43c05354e77e6b21d061b490599d37eee58de070799014a8494995ba8af
                                • Instruction Fuzzy Hash: 18A1F135604701DFDB10DF68C885B2AB7E4FB89724F184459E99ADB3A1CB30E905CB82
                                APIs
                                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,008E2C7C,?), ref: 008A76EA
                                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,008E2C7C,?), ref: 008A7702
                                • CLSIDFromProgID.OLE32(?,?,00000000,008DFB80,000000FF,?,00000000,00000800,00000000,?,008E2C7C,?), ref: 008A7727
                                • _memcmp.LIBCMT ref: 008A7748
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: FromProg$FreeTask_memcmp
                                • String ID:
                                • API String ID: 314563124-0
                                • Opcode ID: 651756e2ec6bd3a3a39bab3af2fbd5d8eb9baa9f3773d08dc6bb5ca746b37330
                                • Instruction ID: 5a5300ced450d757a62a1db96aa437fae74a23012c1fcd1a6de74268e894691d
                                • Opcode Fuzzy Hash: 651756e2ec6bd3a3a39bab3af2fbd5d8eb9baa9f3773d08dc6bb5ca746b37330
                                • Instruction Fuzzy Hash: B4811D75A00109EFDB04DFA8C984EEEB7B9FF89315F204558E506EB250DB71AE06DB60
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Variant$AllocClearCopyInitString
                                • String ID:
                                • API String ID: 2808897238-0
                                • Opcode ID: 1ac52f62e58daad7ca537d3dee1d09073e8db6bd2493d4d3b1b2a6f1baa9db8c
                                • Instruction ID: 7cc25f2078da8887abd56633ae04512667e914586064092473080fac0ea208c1
                                • Opcode Fuzzy Hash: 1ac52f62e58daad7ca537d3dee1d09073e8db6bd2493d4d3b1b2a6f1baa9db8c
                                • Instruction Fuzzy Hash: 0E51F874700305DAEB209F69C491A2AB7E5FF56314F28D81FE586D7A95FB34E850C702
                                APIs
                                • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 008A9AD2
                                • __itow.LIBCMT ref: 008A9B03
                                  • Part of subcall function 008A9D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 008A9DBE
                                • SendMessageW.USER32(?,0000110A,00000001,?), ref: 008A9B6C
                                • __itow.LIBCMT ref: 008A9BC3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend$__itow
                                • String ID:
                                • API String ID: 3379773720-0
                                • Opcode ID: 0376426c8686b9a9c02cc51d877df3021a933a8baf13ea7b9de94bfe6cf2e0b8
                                • Instruction ID: b0e0d93699568124f1de93103c2bf6eead1b59e343dbb3cf3a842fcdf524815f
                                • Opcode Fuzzy Hash: 0376426c8686b9a9c02cc51d877df3021a933a8baf13ea7b9de94bfe6cf2e0b8
                                • Instruction Fuzzy Hash: 2D41BF70A04218ABEF11EF58D845BEE7BB9FF45721F004029F945E3291DB709E49CBA2
                                APIs
                                • socket.WSOCK32(00000002,00000002,00000011), ref: 008C69D1
                                • WSAGetLastError.WSOCK32(00000000), ref: 008C69E1
                                  • Part of subcall function 00859837: __itow.LIBCMT ref: 00859862
                                  • Part of subcall function 00859837: __swprintf.LIBCMT ref: 008598AC
                                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 008C6A45
                                • WSAGetLastError.WSOCK32(00000000), ref: 008C6A51
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ErrorLast$__itow__swprintfsocket
                                • String ID:
                                • API String ID: 2214342067-0
                                • Opcode ID: aad16fb686806e0a61da3e07c8f500083ab9bccb486ea73f3bd990c6e4435911
                                • Instruction ID: 61bb46e14c9284e5853610f058bde5e62c161cf42d63b1c683f0a9611f967970
                                • Opcode Fuzzy Hash: aad16fb686806e0a61da3e07c8f500083ab9bccb486ea73f3bd990c6e4435911
                                • Instruction Fuzzy Hash: 0C418175640210AFEB50AF28CC86F2A77E4FF04B14F048529FE59EF2D2DAB09D048B52
                                APIs
                                • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,008DF910), ref: 008C64A7
                                • _strlen.LIBCMT ref: 008C64D9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _strlen
                                • String ID:
                                • API String ID: 4218353326-0
                                • Opcode ID: 71bdddd87124171a967cf07215c3adc035a2daa5f600d3b4a5e0e602b41c4328
                                • Instruction ID: 52d8c9556687705e2411220f186a6bdebc94b011e09eeda05d98372e6298fece
                                • Opcode Fuzzy Hash: 71bdddd87124171a967cf07215c3adc035a2daa5f600d3b4a5e0e602b41c4328
                                • Instruction Fuzzy Hash: 1E418271900114ABCB14EBA8DC95FAEB7B9FF04310F248169F91AD7296EB30ED14CB52
                                APIs
                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 008BB89E
                                • GetLastError.KERNEL32(?,00000000), ref: 008BB8C4
                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 008BB8E9
                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 008BB915
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CreateHardLink$DeleteErrorFileLast
                                • String ID:
                                • API String ID: 3321077145-0
                                • Opcode ID: 19edec5b182ccc80c5d7820adc71e3f8a59aa0e5b307d67502d72e4b26383832
                                • Instruction ID: 90ad31b77cba40fbaeb796f20df365494ad5b4cba8664f20d42defd89afe572d
                                • Opcode Fuzzy Hash: 19edec5b182ccc80c5d7820adc71e3f8a59aa0e5b307d67502d72e4b26383832
                                • Instruction Fuzzy Hash: EB41F935600910DFCB11EF19C485A59BBE1FF49310F198099ED8A9B362CB70FD05DB92
                                APIs
                                • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 008B0B27
                                • SetKeyboardState.USER32(00000080,?,00000001), ref: 008B0B43
                                • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 008B0BA9
                                • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 008B0BFB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: KeyboardState$InputMessagePostSend
                                • String ID:
                                • API String ID: 432972143-0
                                • Opcode ID: f3c46a8f21885bb5e88aceb8b8d99b3b079e69a5d62b9ebe48eee6825dcf07e0
                                • Instruction ID: d5faefa71ca806e51e4f4c962cf8e80acc5075921500e5a159f08e78fa2d2e8b
                                • Opcode Fuzzy Hash: f3c46a8f21885bb5e88aceb8b8d99b3b079e69a5d62b9ebe48eee6825dcf07e0
                                • Instruction Fuzzy Hash: D5313530D40618AEFB308B698C05BFBBBA9FB45338F08435AE591D22E2C77489449B52
                                APIs
                                • GetKeyboardState.USER32(?,7608C0D0,?,00008000), ref: 008B0C66
                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 008B0C82
                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 008B0CE1
                                • SendInput.USER32(00000001,?,0000001C,7608C0D0,?,00008000), ref: 008B0D33
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: KeyboardState$InputMessagePostSend
                                • String ID:
                                • API String ID: 432972143-0
                                • Opcode ID: 8b82d90599451ee13acbae1008e5d6ead3a7c3cfc1e9262c48a2f09dc99872db
                                • Instruction ID: f705d0a1a741a57cd21807dce92152c13115c0173bc9a1821610a58ffa830cb6
                                • Opcode Fuzzy Hash: 8b82d90599451ee13acbae1008e5d6ead3a7c3cfc1e9262c48a2f09dc99872db
                                • Instruction Fuzzy Hash: F531463094021C6EFF308B698824BFFBF66FB45320F18431BE591D22D2C73599459B52
                                APIs
                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 008861FB
                                • __isleadbyte_l.LIBCMT ref: 00886229
                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00886257
                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0088628D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                • String ID:
                                • API String ID: 3058430110-0
                                • Opcode ID: a76c9d4e9d1098800298bd3003a0495e2f5b76cef0540ca34a3bfdcdfdfca6c3
                                • Instruction ID: aa12b2fbeba4a045cc699ff06a6ad462761610ffc6d7f8ae04ed39e4e52a2855
                                • Opcode Fuzzy Hash: a76c9d4e9d1098800298bd3003a0495e2f5b76cef0540ca34a3bfdcdfdfca6c3
                                • Instruction Fuzzy Hash: CC31D231600246EFDF22AF68CC48BAA7BA9FF41320F154169E824D7191E730E960D750
                                APIs
                                • GetForegroundWindow.USER32 ref: 008D4F02
                                  • Part of subcall function 008B3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 008B365B
                                  • Part of subcall function 008B3641: GetCurrentThreadId.KERNEL32 ref: 008B3662
                                  • Part of subcall function 008B3641: AttachThreadInput.USER32(00000000,?,008B5005), ref: 008B3669
                                • GetCaretPos.USER32(?), ref: 008D4F13
                                • ClientToScreen.USER32(00000000,?), ref: 008D4F4E
                                • GetForegroundWindow.USER32 ref: 008D4F54
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                • String ID:
                                • API String ID: 2759813231-0
                                • Opcode ID: a718a1d92c3a3a101b113ab622c209eddc4a05034ad3f3c7e4449f31bfa7658c
                                • Instruction ID: a4533c880849f9da77547580dc55b1c361c2ad283cf4d87af273a50b724516a2
                                • Opcode Fuzzy Hash: a718a1d92c3a3a101b113ab622c209eddc4a05034ad3f3c7e4449f31bfa7658c
                                • Instruction Fuzzy Hash: DF312D71D00108AFDB00EFA9C8859EFB7F9FF99300F10416AE855E7241DB719E058BA1
                                APIs
                                  • Part of subcall function 008A810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 008A8121
                                  • Part of subcall function 008A810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 008A812B
                                  • Part of subcall function 008A810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 008A813A
                                  • Part of subcall function 008A810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 008A8141
                                  • Part of subcall function 008A810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 008A8157
                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 008A86A3
                                • _memcmp.LIBCMT ref: 008A86C6
                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008A86FC
                                • HeapFree.KERNEL32(00000000), ref: 008A8703
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                • String ID:
                                • API String ID: 1592001646-0
                                • Opcode ID: 2657961c42743efd20950869dbf70b97401f20b46dcc9066d038cc3d713f68eb
                                • Instruction ID: 13a1a4827fd041ffad9c84de8e9c25fdf48e9e556c3d585ca9ae06fcf3160d6f
                                • Opcode Fuzzy Hash: 2657961c42743efd20950869dbf70b97401f20b46dcc9066d038cc3d713f68eb
                                • Instruction Fuzzy Hash: B3215771E41108EFEB10DFA8CA49BAEB7B8FF56305F158059E445EB241DB70AE05DBA0
                                APIs
                                • __setmode.LIBCMT ref: 008709AE
                                  • Part of subcall function 00855A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,008B7896,?,?,00000000), ref: 00855A2C
                                  • Part of subcall function 00855A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,008B7896,?,?,00000000,?,?), ref: 00855A50
                                • _fprintf.LIBCMT ref: 008709E5
                                • OutputDebugStringW.KERNEL32(?), ref: 008A5DBB
                                  • Part of subcall function 00874AAA: _flsall.LIBCMT ref: 00874AC3
                                • __setmode.LIBCMT ref: 00870A1A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                • String ID:
                                • API String ID: 521402451-0
                                • Opcode ID: 9964691f762e83307b105874c0cd21b614edc53060652e0192b46405faf893b4
                                • Instruction ID: 930133274974ea369ebf7f8aae4b514e5489febf07c053d1e120369f8fef6f76
                                • Opcode Fuzzy Hash: 9964691f762e83307b105874c0cd21b614edc53060652e0192b46405faf893b4
                                • Instruction Fuzzy Hash: 2D113D31504518AFDB04B3BC9C469FEB768FF46321F148165F509D7192EF3098459797
                                APIs
                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 008C17A3
                                  • Part of subcall function 008C182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 008C184C
                                  • Part of subcall function 008C182D: InternetCloseHandle.WININET(00000000), ref: 008C18E9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Internet$CloseConnectHandleOpen
                                • String ID:
                                • API String ID: 1463438336-0
                                • Opcode ID: e906f3630ad119017635f2a429679cbbb8be8bfd292088534cd75120f46ad9d0
                                • Instruction ID: 0258df2fa0afe64124f54dfc61c137263f1442c1dc012481de15147232b9ca8c
                                • Opcode Fuzzy Hash: e906f3630ad119017635f2a429679cbbb8be8bfd292088534cd75120f46ad9d0
                                • Instruction Fuzzy Hash: 8621FF31204605BFEF128F608C84FBABBB9FF4A711F10412EFA05D6652DB31D810A7A0
                                APIs
                                • GetFileAttributesW.KERNEL32(?,008DFAC0), ref: 008B3A64
                                • GetLastError.KERNEL32 ref: 008B3A73
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 008B3A82
                                • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,008DFAC0), ref: 008B3ADF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CreateDirectory$AttributesErrorFileLast
                                • String ID:
                                • API String ID: 2267087916-0
                                • Opcode ID: f358c76b87bcfd9c45739853eb07ff3d85142d4448a4221943fd3b41eac37cbd
                                • Instruction ID: b544186201968551238d4097043dfc3378c002f66bf2f693a3aee3ad947ffa2e
                                • Opcode Fuzzy Hash: f358c76b87bcfd9c45739853eb07ff3d85142d4448a4221943fd3b41eac37cbd
                                • Instruction Fuzzy Hash: 662194745086159F8700EF28D8818AA7BE4FF55368F245A1AF4AAC73A2D7319E49CB42
                                APIs
                                  • Part of subcall function 008AF0BC: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,008ADCD3,?,?,?,008AEAC6,00000000,000000EF,00000119,?,?), ref: 008AF0CB
                                  • Part of subcall function 008AF0BC: lstrcpyW.KERNEL32(00000000,?,?,008ADCD3,?,?,?,008AEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 008AF0F1
                                  • Part of subcall function 008AF0BC: lstrcmpiW.KERNEL32(00000000,?,008ADCD3,?,?,?,008AEAC6,00000000,000000EF,00000119,?,?), ref: 008AF122
                                • lstrlenW.KERNEL32(?,00000002,?,?,?,?,008AEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 008ADCEC
                                • lstrcpyW.KERNEL32(00000000,?,?,008AEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 008ADD12
                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,008AEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 008ADD46
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: lstrcmpilstrcpylstrlen
                                • String ID: cdecl
                                • API String ID: 4031866154-3896280584
                                • Opcode ID: 8417cff34f9bbff529433f3ee01295d0b21fd03d2c6b7ef1458eecfa68865005
                                • Instruction ID: 3c92a8a15c7cf314637aa94ecb689f1f9350b40ce7716117f9af6c907fc3ea4e
                                • Opcode Fuzzy Hash: 8417cff34f9bbff529433f3ee01295d0b21fd03d2c6b7ef1458eecfa68865005
                                • Instruction Fuzzy Hash: C211D03A200305EFEB259F74C845D7A77A8FF46310B40812AF906CB6A1EB71D841DB91
                                APIs
                                • _free.LIBCMT ref: 00885101
                                  • Part of subcall function 0087571C: __FF_MSGBANNER.LIBCMT ref: 00875733
                                  • Part of subcall function 0087571C: __NMSG_WRITE.LIBCMT ref: 0087573A
                                  • Part of subcall function 0087571C: RtlAllocateHeap.NTDLL(00E90000,00000000,00000001,00000000,?,?,?,00870DD3,?), ref: 0087575F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: AllocateHeap_free
                                • String ID:
                                • API String ID: 614378929-0
                                • Opcode ID: ffe6892d8bd7dd35563be01b2ecbcdffb6d20b93ea6192c14f2eef99572282b2
                                • Instruction ID: c8714fce08e191beadc0919d71b42e075eaed7594cf92cbc60bd838c5134db69
                                • Opcode Fuzzy Hash: ffe6892d8bd7dd35563be01b2ecbcdffb6d20b93ea6192c14f2eef99572282b2
                                • Instruction Fuzzy Hash: 60119E76A05A15AACB313F78AC4DB5E3B98FF043A1B10852AF909DA255DF30C940A792
                                APIs
                                  • Part of subcall function 00855A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,008B7896,?,?,00000000), ref: 00855A2C
                                  • Part of subcall function 00855A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,008B7896,?,?,00000000,?,?), ref: 00855A50
                                • gethostbyname.WSOCK32(?,?,?), ref: 008C6399
                                • WSAGetLastError.WSOCK32(00000000), ref: 008C63A4
                                • _memmove.LIBCMT ref: 008C63D1
                                • inet_ntoa.WSOCK32(?), ref: 008C63DC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                • String ID:
                                • API String ID: 1504782959-0
                                • Opcode ID: 29e4c1cccf7de467289f45a4117dbec2962df420c3d10159916f35b21f9429a1
                                • Instruction ID: 7f87e67610d04ea303cd75e0c0478a29e8a678f18537151b9769f5f6cdf91fe7
                                • Opcode Fuzzy Hash: 29e4c1cccf7de467289f45a4117dbec2962df420c3d10159916f35b21f9429a1
                                • Instruction Fuzzy Hash: C2111F71500109AFCB05EBA8DD96DAE7BB9FF04311B144179F906E7262DB30DE18DB62
                                APIs
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 008A8B61
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 008A8B73
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 008A8B89
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 008A8BA4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 3a4555547afccd992a9e44b2f2f9cf725adb90629d2f65c29e955ae4f730ddcb
                                • Instruction ID: fe3ae0acaf51a92e5e5ecb0a61adb76c7323535d25560025a8b73a2a75a8a1a7
                                • Opcode Fuzzy Hash: 3a4555547afccd992a9e44b2f2f9cf725adb90629d2f65c29e955ae4f730ddcb
                                • Instruction Fuzzy Hash: 55111C79901218FFEB11DF95CC85F9DBB74FB49710F204195EA00B7290DA716E11DBA4
                                APIs
                                  • Part of subcall function 00852612: GetWindowLongW.USER32(?,000000EB), ref: 00852623
                                • DefDlgProcW.USER32(?,00000020,?), ref: 008512D8
                                • GetClientRect.USER32(?,?), ref: 0088B5FB
                                • GetCursorPos.USER32(?), ref: 0088B605
                                • ScreenToClient.USER32(?,?), ref: 0088B610
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Client$CursorLongProcRectScreenWindow
                                • String ID:
                                • API String ID: 4127811313-0
                                • Opcode ID: 3e1cc7599c06c285299052bca16cf84440f8c95471d47a72a8008e6a1da07e06
                                • Instruction ID: 37822fefd4d9224e39aaae78d1358e267eee440871bec28a02b82529afcca9d4
                                • Opcode Fuzzy Hash: 3e1cc7599c06c285299052bca16cf84440f8c95471d47a72a8008e6a1da07e06
                                • Instruction Fuzzy Hash: F1111635601019FFCF10EF98D889AEE7BB8FB05306F504556EA02E7241C730AA55DBA6
                                APIs
                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,008AFCED,?,008B0D40,?,00008000), ref: 008B115F
                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,008AFCED,?,008B0D40,?,00008000), ref: 008B1184
                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,008AFCED,?,008B0D40,?,00008000), ref: 008B118E
                                • Sleep.KERNEL32(?,?,?,?,?,?,?,008AFCED,?,008B0D40,?,00008000), ref: 008B11C1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CounterPerformanceQuerySleep
                                • String ID:
                                • API String ID: 2875609808-0
                                • Opcode ID: 4d572aa0431b5953ca54c861bd8cf5586224e8db663625c6e81fe4f16622c945
                                • Instruction ID: 8a0a11e9d7ad18123412eff5f69c87cfa2f981ccb70f41cb183571156a61ec56
                                • Opcode Fuzzy Hash: 4d572aa0431b5953ca54c861bd8cf5586224e8db663625c6e81fe4f16622c945
                                • Instruction Fuzzy Hash: F5117C31C0151DEBCF009FA8D858AEEBB78FF09711F404156EA45FA241CB309554DBA5
                                APIs
                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 008AD84D
                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 008AD864
                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 008AD879
                                • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 008AD897
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Type$Register$FileLoadModuleNameUser
                                • String ID:
                                • API String ID: 1352324309-0
                                • Opcode ID: be47d27817da569953b26ef618871c151f3d905a0c0981996ce1d8b51e1d6acc
                                • Instruction ID: ee21761ae08feffde1d781dab72c696870c56fe689130d8c6c3bab602555547d
                                • Opcode Fuzzy Hash: be47d27817da569953b26ef618871c151f3d905a0c0981996ce1d8b51e1d6acc
                                • Instruction Fuzzy Hash: E8118E71602309DBF3208F50DC08F97BBBCFB01B00F10897AAA17C6851D7B8E509ABA1
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                • String ID:
                                • API String ID: 3016257755-0
                                • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                • Instruction ID: bd706b9b218ec539ccc5ca0e706d6a53f509a6ff9ce1fedd6eb895edc81a99c1
                                • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                • Instruction Fuzzy Hash: F0014B7244854EBBCF266E88CC41CEE3F72FB28355B688415FA1898031D236C9B1AB81
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 008DB2E4
                                • ScreenToClient.USER32(?,?), ref: 008DB2FC
                                • ScreenToClient.USER32(?,?), ref: 008DB320
                                • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 008DB33B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ClientRectScreen$InvalidateWindow
                                • String ID:
                                • API String ID: 357397906-0
                                • Opcode ID: d0cf3aadddc54672f252c95aa8a87d35e0e601b51ea29bc149f74b0aa84d6b7d
                                • Instruction ID: e5f5bc16bcb0b849871f9e2bd519f79a90e0d9930ef0f379e12c6808e02e44da
                                • Opcode Fuzzy Hash: d0cf3aadddc54672f252c95aa8a87d35e0e601b51ea29bc149f74b0aa84d6b7d
                                • Instruction Fuzzy Hash: 3E1143B9D00209EFDB41CFA9D8849EEBBF9FB18310F108166E915E3720D735AA559F50
                                APIs
                                • _memset.LIBCMT ref: 008DB644
                                • _memset.LIBCMT ref: 008DB653
                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00916F20,00916F64), ref: 008DB682
                                • CloseHandle.KERNEL32 ref: 008DB694
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _memset$CloseCreateHandleProcess
                                • String ID:
                                • API String ID: 3277943733-0
                                • Opcode ID: 6f724e06134d3317a7303cdfecab5b03dd0a5cfc6ceea2d19c09e572155818e3
                                • Instruction ID: 20160f0000ad293d25a37ca5274fb2fff10c75a04b735c09f59cdd8de644b8bd
                                • Opcode Fuzzy Hash: 6f724e06134d3317a7303cdfecab5b03dd0a5cfc6ceea2d19c09e572155818e3
                                • Instruction Fuzzy Hash: B7F05EB2A55304BAE2202765BC06FFB3F9DFB08395F408021BA09E53A2D7718C01D7A9
                                APIs
                                • EnterCriticalSection.KERNEL32(?), ref: 008B6BE6
                                  • Part of subcall function 008B76C4: _memset.LIBCMT ref: 008B76F9
                                • _memmove.LIBCMT ref: 008B6C09
                                • _memset.LIBCMT ref: 008B6C16
                                • LeaveCriticalSection.KERNEL32(?), ref: 008B6C26
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CriticalSection_memset$EnterLeave_memmove
                                • String ID:
                                • API String ID: 48991266-0
                                • Opcode ID: e684028a61dbe2f6dd8ffb5b600c19956d1b2d7a2a9bb0551af26fff6fd73590
                                • Instruction ID: 404021f7d51869b510654ab52bb4a9ceea58c5787cb74ae52959e94c65c59e6d
                                • Opcode Fuzzy Hash: e684028a61dbe2f6dd8ffb5b600c19956d1b2d7a2a9bb0551af26fff6fd73590
                                • Instruction Fuzzy Hash: 21F05E3A200200ABCF016F59DC85A8ABF29FF45321F04C061FE099E22BCB31E911DBB5
                                APIs
                                • GetSysColor.USER32(00000008), ref: 00852231
                                • SetTextColor.GDI32(?,000000FF), ref: 0085223B
                                • SetBkMode.GDI32(?,00000001), ref: 00852250
                                • GetStockObject.GDI32(00000005), ref: 00852258
                                • GetWindowDC.USER32(?,00000000), ref: 0088BE83
                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0088BE90
                                • GetPixel.GDI32(00000000,?,00000000), ref: 0088BEA9
                                • GetPixel.GDI32(00000000,00000000,?), ref: 0088BEC2
                                • GetPixel.GDI32(00000000,?,?), ref: 0088BEE2
                                • ReleaseDC.USER32(?,00000000), ref: 0088BEED
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                • String ID:
                                • API String ID: 1946975507-0
                                • Opcode ID: 17a70b822d8f522d801d05a2766ec6fa1fd7142500ddf23bd4c8a57bae556b45
                                • Instruction ID: 505c8985398371830779ce4a6a76352b7404cf79c0df56f7d499f44831730e0c
                                • Opcode Fuzzy Hash: 17a70b822d8f522d801d05a2766ec6fa1fd7142500ddf23bd4c8a57bae556b45
                                • Instruction Fuzzy Hash: 14E03932144244AADF225FA4FC0D7D83B20FB45332F048367FB6A880E287714980EB12
                                APIs
                                • GetCurrentThread.KERNEL32 ref: 008A871B
                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,008A82E6), ref: 008A8722
                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,008A82E6), ref: 008A872F
                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,008A82E6), ref: 008A8736
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CurrentOpenProcessThreadToken
                                • String ID:
                                • API String ID: 3974789173-0
                                • Opcode ID: ae22ce3e3dc81a2e3407c9d0a94be78e05ab1e13148532d5476f8f129e688ca2
                                • Instruction ID: 1cad5c310ae1152a773718d1cfef18be136adccd3e3674b8f7384a5fb2cb913d
                                • Opcode Fuzzy Hash: ae22ce3e3dc81a2e3407c9d0a94be78e05ab1e13148532d5476f8f129e688ca2
                                • Instruction Fuzzy Hash: 8DE08636612211DBE7205FF15D0CB5A3BACFF51792F158829B346CA041DB348841D760
                                APIs
                                • OleSetContainedObject.OLE32(?,00000001), ref: 008AB4BE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ContainedObject
                                • String ID: AutoIt3GUI$Container
                                • API String ID: 3565006973-3941886329
                                • Opcode ID: db6ea5fed574b24a5940a0e07f91f809d609b319f71e7cdedc23d898cf1f463f
                                • Instruction ID: c7e30f920cdb0ff9958fe3856689db45a0a6ed7caaec4004c34548faa79c343b
                                • Opcode Fuzzy Hash: db6ea5fed574b24a5940a0e07f91f809d609b319f71e7cdedc23d898cf1f463f
                                • Instruction Fuzzy Hash: 49913A70600701EFEB24DF68C884A6ABBE5FF49714F24856DE94ACB792DB71E841CB50
                                APIs
                                  • Part of subcall function 0086FC86: _wcscpy.LIBCMT ref: 0086FCA9
                                  • Part of subcall function 00859837: __itow.LIBCMT ref: 00859862
                                  • Part of subcall function 00859837: __swprintf.LIBCMT ref: 008598AC
                                • __wcsnicmp.LIBCMT ref: 008BB02D
                                • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 008BB0F6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                • String ID: LPT
                                • API String ID: 3222508074-1350329615
                                • Opcode ID: fce3cdb2cdaee06aed6d5d0031cb91239b06294b4c4df4aa7b101325f597d828
                                • Instruction ID: 333b981b907b45d3159440a1fc699d1671b27bf26472b1dd747a553dff862270
                                • Opcode Fuzzy Hash: fce3cdb2cdaee06aed6d5d0031cb91239b06294b4c4df4aa7b101325f597d828
                                • Instruction Fuzzy Hash: F3614B75A00619AFCB14EF98C891EEEB7B4FB08310F144069F956EB391D770AE85CB51
                                APIs
                                • Sleep.KERNEL32(00000000), ref: 00862968
                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 00862981
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: GlobalMemorySleepStatus
                                • String ID: @
                                • API String ID: 2783356886-2766056989
                                • Opcode ID: 786581014ac68a904b32e4101bee689ad675264d683bca9955027a8b972183ff
                                • Instruction ID: 20b98a87368ae3bc628486b7e8eda1c7cf777e0ae3f7a13ecbcf9d0481cc035f
                                • Opcode Fuzzy Hash: 786581014ac68a904b32e4101bee689ad675264d683bca9955027a8b972183ff
                                • Instruction Fuzzy Hash: 465144725087449BD320AF24D886BABBBE8FB85341F41885EF6D9811A1DB70852CCB67
                                APIs
                                  • Part of subcall function 00854F0B: __fread_nolock.LIBCMT ref: 00854F29
                                • _wcscmp.LIBCMT ref: 008B9824
                                • _wcscmp.LIBCMT ref: 008B9837
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: _wcscmp$__fread_nolock
                                • String ID: FILE
                                • API String ID: 4029003684-3121273764
                                • Opcode ID: 3cb2d1b539b05470d460cb90e104cb5b24319dbed3ba5765fdb6c6e14916bb75
                                • Instruction ID: 4a49c39d11fe11d3eaf5a8dac122463c3ff7fe5352e2060b62e1420bba4e0777
                                • Opcode Fuzzy Hash: 3cb2d1b539b05470d460cb90e104cb5b24319dbed3ba5765fdb6c6e14916bb75
                                • Instruction Fuzzy Hash: 1541C971A00209BADF209EA8CC45FEFBBBDFF85714F004479FA45E7281DA7199458B61
                                APIs
                                • _memset.LIBCMT ref: 008C259E
                                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 008C25D4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CrackInternet_memset
                                • String ID: |
                                • API String ID: 1413715105-2343686810
                                • Opcode ID: b6bc13fb4a345665add9aba31487ee9c4593fb738364669a21f4e832dfb2073c
                                • Instruction ID: e5c20f348c4923b3a6f5f94fd985da862e4b350d8bd5a648e18ba230013e726d
                                • Opcode Fuzzy Hash: b6bc13fb4a345665add9aba31487ee9c4593fb738364669a21f4e832dfb2073c
                                • Instruction Fuzzy Hash: BF310771800119EBCF11EFA8DC85EEEBFB9FF18310F104069FD15A6162EA319A56DB61
                                APIs
                                • DestroyWindow.USER32(?,?,?,?), ref: 008D6B17
                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 008D6B53
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$DestroyMove
                                • String ID: static
                                • API String ID: 2139405536-2160076837
                                • Opcode ID: 9f8cfd22192038dfd49dac55e0ee137224e6142084e8fb28133ea6fdb2fd53f6
                                • Instruction ID: fe4da53e62c23d3b5a74f3764a03c6ec6c58f6cc17b964b275de88a8cd2a6e4f
                                • Opcode Fuzzy Hash: 9f8cfd22192038dfd49dac55e0ee137224e6142084e8fb28133ea6fdb2fd53f6
                                • Instruction Fuzzy Hash: 33317071200608AEDB109F68CC41BFB77B9FF48760F10861AF9A5D7290DB35AC51D760
                                APIs
                                • _memset.LIBCMT ref: 008B2911
                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 008B294C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: InfoItemMenu_memset
                                • String ID: 0
                                • API String ID: 2223754486-4108050209
                                • Opcode ID: 6afb2ef1689dbd72cd7a4d066448bc244c23834ce4725eaa276c120273c9e845
                                • Instruction ID: f7b0d5768893b93babacd7112f9494439b063f43f063b1873077ea1420b19b49
                                • Opcode Fuzzy Hash: 6afb2ef1689dbd72cd7a4d066448bc244c23834ce4725eaa276c120273c9e845
                                • Instruction Fuzzy Hash: BF31C131A003099BEB25CF58D885FEEBFB8FF45354F144069E989E62A1D7709941CB52
                                APIs
                                • __snwprintf.LIBCMT ref: 008C3A66
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: __snwprintf_memmove
                                • String ID: , $$AUTOITCALLVARIABLE%d
                                • API String ID: 3506404897-2584243854
                                • Opcode ID: 953c5d038141e916c9b06144e55af7de42202d626ed2629be815432373a8ac9a
                                • Instruction ID: 892c90e27c68b2192e76e50dc34e2e8c9622fde536bbe2a2c3b11ac51e7b225a
                                • Opcode Fuzzy Hash: 953c5d038141e916c9b06144e55af7de42202d626ed2629be815432373a8ac9a
                                • Instruction Fuzzy Hash: AC218E31700629AECF10EF68DC82EAE77B5FF44300F008459E985EB181DA30EA56CB66
                                APIs
                                  • Part of subcall function 00852612: GetWindowLongW.USER32(?,000000EB), ref: 00852623
                                  • Part of subcall function 008525DB: GetWindowLongW.USER32(?,000000EB), ref: 008525EC
                                • GetParent.USER32(?), ref: 0088B7BA
                                • DefDlgProcW.USER32(?,00000133,?,?,?,?,?,?,?,?,008519B3,?,?,?,00000006,?), ref: 0088B834
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: LongWindow$ParentProc
                                • String ID: V
                                • API String ID: 2181805148-4045069856
                                • Opcode ID: 6fc749ee2fcbb94efe375cd7371d230f9e05c12c81ccc260cdd41eb6c3773c23
                                • Instruction ID: 549c5955e7b4f885d462f2d08722a4c36b57d6b60ddbebef0e2c66544259bf01
                                • Opcode Fuzzy Hash: 6fc749ee2fcbb94efe375cd7371d230f9e05c12c81ccc260cdd41eb6c3773c23
                                • Instruction Fuzzy Hash: 9C219534201508AFCF209B2CC889EA93BE6FF8E321F554250F9259B2F6C7315E55DB50
                                APIs
                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 008D6761
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008D676C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: Combobox
                                • API String ID: 3850602802-2096851135
                                • Opcode ID: cffedd779694798541315922fec4436bd4bf8fcf815509963b2261a33377d038
                                • Instruction ID: 7f75b95c9c6bac352cf844c0e5c74783090267d033d60d70989a2866c5e3742f
                                • Opcode Fuzzy Hash: cffedd779694798541315922fec4436bd4bf8fcf815509963b2261a33377d038
                                • Instruction Fuzzy Hash: E7115E7530020CAFEF119E54DC81EAB376AFB983A8F11432AF914D7291E6759C6197A0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID: V
                                • API String ID: 0-4045069856
                                • Opcode ID: 6b321841c151f5657fa8f141b0c9ab36c32f3eb8a8cbe45bf491a78d29ba1ca1
                                • Instruction ID: 11ec029d88bfcee6062d2c8fa9926042b42c12475f7b813e3fb8511b7c9d4e75
                                • Opcode Fuzzy Hash: 6b321841c151f5657fa8f141b0c9ab36c32f3eb8a8cbe45bf491a78d29ba1ca1
                                • Instruction Fuzzy Hash: 9E217F35224208BFEB108F59CC45FFA37A4FB09324F404266FA96DB2E1D671E950EB60
                                APIs
                                  • Part of subcall function 00851D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00851D73
                                  • Part of subcall function 00851D35: GetStockObject.GDI32(00000011), ref: 00851D87
                                  • Part of subcall function 00851D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00851D91
                                • GetWindowRect.USER32(00000000,?), ref: 008D6C71
                                • GetSysColor.USER32(00000012), ref: 008D6C8B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                • String ID: static
                                • API String ID: 1983116058-2160076837
                                • Opcode ID: 14d0fa61a4874e0d2b842ad91d7e745c10dd64062721f602f2250d39c7f17f93
                                • Instruction ID: a3ad28dfd2b453ac32083ee361a127716c783c25b407a85ce40b96673800db1e
                                • Opcode Fuzzy Hash: 14d0fa61a4874e0d2b842ad91d7e745c10dd64062721f602f2250d39c7f17f93
                                • Instruction Fuzzy Hash: 21212972620209AFDF04DFA8DC45EEA7BB8FB08315F01462AFD95D2251E735E860DB60
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CreateMenuPopup
                                • String ID: V
                                • API String ID: 3826294624-4045069856
                                • Opcode ID: 4b4c0c01c20df59395d8f10d2965635211ebfdf6f6269b85c547c29906a0af10
                                • Instruction ID: 3fdb501234f4c58c273e1dd788b32fa50a7ced8bd922cdfc759eaae7d4b877a2
                                • Opcode Fuzzy Hash: 4b4c0c01c20df59395d8f10d2965635211ebfdf6f6269b85c547c29906a0af10
                                • Instruction Fuzzy Hash: B8213B7860060DDFCB20DF28C444BD677E1FB89324F49866AE85A8B391E731AC66DF51
                                APIs
                                • GetWindowTextLengthW.USER32(00000000), ref: 008D69A2
                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 008D69B1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: LengthMessageSendTextWindow
                                • String ID: edit
                                • API String ID: 2978978980-2167791130
                                • Opcode ID: f8ece0d3a9fb1aaf4bb04b3393c8ecd49a4e7836366fe68e69cebaae7b24f99e
                                • Instruction ID: c862ef6c9efc5e7fa547a0db13ac725ad1731bebffd7397bf6858ace1e30d52a
                                • Opcode Fuzzy Hash: f8ece0d3a9fb1aaf4bb04b3393c8ecd49a4e7836366fe68e69cebaae7b24f99e
                                • Instruction Fuzzy Hash: 19119D71100108BBEB108E749C50AEB3B69FB05378F514726F9A1D62E0D731DC60A760
                                APIs
                                • _memset.LIBCMT ref: 008B2A22
                                • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 008B2A41
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: InfoItemMenu_memset
                                • String ID: 0
                                • API String ID: 2223754486-4108050209
                                • Opcode ID: be01220f1fa28a2b90b2cf843926ce7dab0e27f982f6d02ea8b1192d1271dcb4
                                • Instruction ID: bdfb60a17da0ab5a85b978f64dafa4d910cef4591d489f8f8772db3451b7d19c
                                • Opcode Fuzzy Hash: be01220f1fa28a2b90b2cf843926ce7dab0e27f982f6d02ea8b1192d1271dcb4
                                • Instruction Fuzzy Hash: D511D332A05128EBCB31EA5CDC44BDA77B9FB85314F055121E955E73A0D730AD0AC792
                                APIs
                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 008C222C
                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 008C2255
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Internet$OpenOption
                                • String ID: <local>
                                • API String ID: 942729171-4266983199
                                • Opcode ID: cbeeab8b53e3ee2f39c4acb84aa2f0b3e2a498b76917a2bc9ef8a0a157a8fdb9
                                • Instruction ID: 0b728dace8a36985084d57613f45ddff9b0bbe8b111a7a2e81fd299c73e3e1ce
                                • Opcode Fuzzy Hash: cbeeab8b53e3ee2f39c4acb84aa2f0b3e2a498b76917a2bc9ef8a0a157a8fdb9
                                • Instruction Fuzzy Hash: 2C11A070641225BADB258F558C84FFBFBB8FF16765F10822EFA5586080D270A990D6F0
                                APIs
                                • SendMessageW.USER32(?,?,?,?), ref: 008D8530
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: V
                                • API String ID: 3850602802-4045069856
                                • Opcode ID: e84eb4212505584cb05181fbfef8390b874709fabb4b327e9035f097bb662281
                                • Instruction ID: 8d88f05439351df3bebd668f3aa62516f4e65cfd3fcefa504dbe704b7b8ad9ff
                                • Opcode Fuzzy Hash: e84eb4212505584cb05181fbfef8390b874709fabb4b327e9035f097bb662281
                                • Instruction Fuzzy Hash: 7221C475600209EFCB15CF98E841CEA7BB5FB4C350B014295FD06E7360DA31AD61DB90
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID:
                                • String ID: V
                                • API String ID: 0-4045069856
                                • Opcode ID: 078ba1faba5bf765e479c51def6cf61515c7a49195b8d6edc92ac8576e87ff4c
                                • Instruction ID: b98349ad60719459c7b0829ac1168da8bf2aa176cea2b1da53f98d39b4261511
                                • Opcode Fuzzy Hash: 078ba1faba5bf765e479c51def6cf61515c7a49195b8d6edc92ac8576e87ff4c
                                • Instruction Fuzzy Hash: 4F111934604604EFCB209F28D841A957BE6FB99320F158269EA699B3A0C771ED45DF90
                                APIs
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                  • Part of subcall function 008AAA99: GetClassNameW.USER32(?,?,000000FF), ref: 008AAABC
                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 008A8E73
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ClassMessageNameSend_memmove
                                • String ID: ComboBox$ListBox
                                • API String ID: 372448540-1403004172
                                • Opcode ID: 873c6740d0787c6dab8361d734da68334db2828db8b6dbca1e4458246e0de9b3
                                • Instruction ID: 47539cb14911d44bf50cebccd2bedbf69a9b51e617bfe7f6022c7146985ab87a
                                • Opcode Fuzzy Hash: 873c6740d0787c6dab8361d734da68334db2828db8b6dbca1e4458246e0de9b3
                                • Instruction Fuzzy Hash: 0001F5B1A01228EBDB14EBA8CC518FE7768FF02320B004A19FC21E76E1DE35681CC661
                                APIs
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                  • Part of subcall function 008AAA99: GetClassNameW.USER32(?,?,000000FF), ref: 008AAABC
                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 008A8D6B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ClassMessageNameSend_memmove
                                • String ID: ComboBox$ListBox
                                • API String ID: 372448540-1403004172
                                • Opcode ID: c3d65f50d0d8169434595a913cc40a08b4fe953f45434fc2bfb168481e5429b0
                                • Instruction ID: db28d47d850e8ca896977dc78c9014731973b98f4596b6227ee4b564ea1e5032
                                • Opcode Fuzzy Hash: c3d65f50d0d8169434595a913cc40a08b4fe953f45434fc2bfb168481e5429b0
                                • Instruction Fuzzy Hash: 3401D4B1A41108ABEB14EBE4C956AFE77A8EF16310F104019BC02A7AE1DE155E0CD272
                                APIs
                                  • Part of subcall function 00857DE1: _memmove.LIBCMT ref: 00857E22
                                  • Part of subcall function 008AAA99: GetClassNameW.USER32(?,?,000000FF), ref: 008AAABC
                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 008A8DEE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ClassMessageNameSend_memmove
                                • String ID: ComboBox$ListBox
                                • API String ID: 372448540-1403004172
                                • Opcode ID: b8c041688c3e5f2a9fec0f8ff7c27350afaf6a69fd3c2cb26041454d9a16b384
                                • Instruction ID: 1877ba746dc73ca704f3069676d51bc5a4a8a1b2f2b51598ed346404837cbbff
                                • Opcode Fuzzy Hash: b8c041688c3e5f2a9fec0f8ff7c27350afaf6a69fd3c2cb26041454d9a16b384
                                • Instruction Fuzzy Hash: CB01A7B1A41109ABEB15E6A8D956AFE77A8EF12310F108015BC05F7AD2DE155E0CD272
                                APIs
                                  • Part of subcall function 00852612: GetWindowLongW.USER32(?,000000EB), ref: 00852623
                                • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,0088B93A,?,?,?), ref: 008DC5F1
                                  • Part of subcall function 008525DB: GetWindowLongW.USER32(?,000000EB), ref: 008525EC
                                • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 008DC5D7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: LongWindow$MessageProcSend
                                • String ID: V
                                • API String ID: 982171247-4045069856
                                • Opcode ID: c83156ec239b9e6393fc9345ac6503ed2c62acf321b4c4d990b460fb8acff069
                                • Instruction ID: 91b04711e299197e2aedbada950b69452aeca640fcd2b39c04a0c5003db30610
                                • Opcode Fuzzy Hash: c83156ec239b9e6393fc9345ac6503ed2c62acf321b4c4d990b460fb8acff069
                                • Instruction Fuzzy Hash: 2D01D831201205EBCB255F18EC44E6A3BB6FF85364F154766FA529B3E1CF31A841EB51
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: ClassName_wcscmp
                                • String ID: #32770
                                • API String ID: 2292705959-463685578
                                • Opcode ID: 8bc1518a1e0bfd652694d4a5470c9d06ed817e2e6d2613a74c9ef71f4fff4f4c
                                • Instruction ID: a9132e9df063882f5b38acb69d82f4841d63879f55d0b1fbde529cf6f92d00de
                                • Opcode Fuzzy Hash: 8bc1518a1e0bfd652694d4a5470c9d06ed817e2e6d2613a74c9ef71f4fff4f4c
                                • Instruction Fuzzy Hash: EDE09232A042282AD7209A99AC4AAE7FBACFB85B60F000167FD44D3151D9709A45C7E1
                                APIs
                                  • Part of subcall function 0088B314: _memset.LIBCMT ref: 0088B321
                                  • Part of subcall function 00870940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0088B2F0,?,?,?,0085100A), ref: 00870945
                                • IsDebuggerPresent.KERNEL32(?,?,?,0085100A), ref: 0088B2F4
                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0085100A), ref: 0088B303
                                Strings
                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0088B2FE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                • API String ID: 3158253471-631824599
                                • Opcode ID: 93cca50f7e23bcc1737b1365a19df60ae55272114816115e1606bfa1cd54cd6c
                                • Instruction ID: 655d7dfc61198441d8b85ff1df90b46e147f6ff37c2f60d2bff854a65ba39908
                                • Opcode Fuzzy Hash: 93cca50f7e23bcc1737b1365a19df60ae55272114816115e1606bfa1cd54cd6c
                                • Instruction Fuzzy Hash: 35E06D70200701CBD760EF68D8043467BE4FF40304F118A2DEA56C7352E7B4D408CBA1
                                APIs
                                • GetSystemDirectoryW.KERNEL32(?), ref: 00891775
                                  • Part of subcall function 008CBFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,0089195E,?), ref: 008CBFFE
                                  • Part of subcall function 008CBFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 008CC010
                                • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0089196D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                • String ID: WIN_XPe
                                • API String ID: 582185067-3257408948
                                • Opcode ID: 6abd4401ca41fce89c08ec6a1c0868f929c8aeb04ca4ef78c0efe00d2ef20f2e
                                • Instruction ID: 19aee2d081846bd9632f465c56befb1cba3c6635849beccfcea18daa91075fc8
                                • Opcode Fuzzy Hash: 6abd4401ca41fce89c08ec6a1c0868f929c8aeb04ca4ef78c0efe00d2ef20f2e
                                • Instruction Fuzzy Hash: 62F0AC7081510AEFDF15EB95C988AEC77F8FB18305F580099E102E2595D7714F44DF61
                                APIs
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 008D59AE
                                • PostMessageW.USER32(00000000), ref: 008D59B5
                                  • Part of subcall function 008B5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 008B52BC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: FindMessagePostSleepWindow
                                • String ID: Shell_TrayWnd
                                • API String ID: 529655941-2988720461
                                • Opcode ID: 5602e9069cea72308efc52860a04d30312e3e05bbde1ae5c18c94290dcc166f5
                                • Instruction ID: 724c765ebb84bdeed8e4ff92f2adee06d628b297c4e23946796af520d9ae48a5
                                • Opcode Fuzzy Hash: 5602e9069cea72308efc52860a04d30312e3e05bbde1ae5c18c94290dcc166f5
                                • Instruction Fuzzy Hash: BCD0C9313823117AEAA4BB70AC0BFD76724BB54B50F040926B346EA1D1C9E0A800CA58
                                APIs
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 008D596E
                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 008D5981
                                  • Part of subcall function 008B5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 008B52BC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1499514941.0000000000851000.00000020.00000001.01000000.00000003.sdmp, Offset: 00850000, based on PE: true
                                • Associated: 00000000.00000002.1499494684.0000000000850000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.00000000008DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499570304.0000000000904000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499634116.000000000090E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1499689476.0000000000917000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_850000_R55-RFQ.jbxd
                                Similarity
                                • API ID: FindMessagePostSleepWindow
                                • String ID: Shell_TrayWnd
                                • API String ID: 529655941-2988720461
                                • Opcode ID: a7cedb48ef5c3cdb9354bd9a28f56dc1d88ca7c467650d314a18a5da9fb2ee35
                                • Instruction ID: 0ce270d97d3f6aee6871b2c5bb6f80fabc8efd044654717f9c64c4afbebe3ecf
                                • Opcode Fuzzy Hash: a7cedb48ef5c3cdb9354bd9a28f56dc1d88ca7c467650d314a18a5da9fb2ee35
                                • Instruction Fuzzy Hash: 80D0C935385311BAEAA4BB70AC1BFD76B24BB50B50F040926B34AAA1D1C9E09800CA54