Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
test.exe

Overview

General Information

Sample name:test.exe
Analysis ID:1580606
MD5:57bd4f73690590693b5b921f29679410
SHA1:c2cb47bf602541043589e979f21c3d7c1698e3ac
SHA256:8a3de78cf177be4c37c1525becf05af336c1dc2a4d181cae79f6903754902efa
Tags:DarkCometexemalwaretrojanuser-Joker
Infos:

Detection

DarkComet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DarkComet
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to log keystrokes
Contains functionality to register a low level keyboard hook
Contains functionalty to change the wallpaper
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Disable Task Manager(disabletaskmgr)
Disables UAC (registry)
Disables the Windows task manager (taskmgr)
Disables windows user account control
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: New RUN Key Pointing to Suspicious Folder
Uses cmd line tools excessively to alter registry or file data
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to delete services
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality to upload files via FTP
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Enables driver privileges
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: CurrentVersion NT Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • test.exe (PID: 5740 cmdline: "C:\Users\user\Desktop\test.exe" MD5: 57BD4F73690590693B5B921F29679410)
    • cmd.exe (PID: 3840 cmdline: "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop\test.exe" +s +h MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • attrib.exe (PID: 5064 cmdline: attrib "C:\Users\user\Desktop\test.exe" +s +h MD5: 0E938DD280E83B1596EC6AA48729C2B0)
    • cmd.exe (PID: 6640 cmdline: "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop" +s +h MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • attrib.exe (PID: 2428 cmdline: attrib "C:\Users\user\Desktop" +s +h MD5: 0E938DD280E83B1596EC6AA48729C2B0)
    • ChromeCookie.exe (PID: 6484 cmdline: "C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe" MD5: 57BD4F73690590693B5B921F29679410)
      • iexplore.exe (PID: 2616 cmdline: "C:\Program Files (x86)\Internet Explorer\iexplore.exe" MD5: 6F0F06D6AB125A99E43335427066A4A1)
      • explorer.exe (PID: 5044 cmdline: "C:\Windows\explorer.exe" MD5: 662F4F92FDE3557E86D110526BB578D5)
      • notepad.exe (PID: 7172 cmdline: notepad MD5: E92D3A824A0578A50D2DD81B5060145F)
  • ChromeCookie.exe (PID: 7320 cmdline: "C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe" MD5: 57BD4F73690590693B5B921F29679410)
  • ChromeCookie.exe (PID: 7520 cmdline: "C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe" MD5: 57BD4F73690590693B5B921F29679410)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DarkCometDarkComet is one of the most famous RATs, developed by Jean-Pierre Lesueur in 2008. After being used in the Syrian civil war in 2011, Lesuer decided to stop developing the trojan. Indeed, DarkComet is able to enable control over a compromised system through use of a simple graphic user interface. Experts think that this user friendliness is the key of its mass success.
  • APT33
  • Lazarus Group
  • Operation C-Major
https://malpedia.caad.fkie.fraunhofer.de/details/win.darkcomet
{"MUTEX": "RO_MUTEX-8HU43EZ", "SID": "GoogleDebugger", "FWB": "1", "NETDATA": ["147.185.221.24:14161"], "GENCODE": "WN0BLB8aPxBw", "INSTALL": "1", "COMBOPATH": "10", "EDTPATH": "ChromeCookies\\ChromeCookie.exe", "KEYNAME": "GoogleDebugJ", "EDTDATE": "16/04/2007", "PERSINST": "1", "MELT": "0", "CHANGEDATE": "1", "DIRATTRIB": "6", "FILEATTRIB": "6", "SH3": "1", "SH6": "1", "CHIDEF": "1", "CHIDED": "1", "PERS": "1", "OFFLINEK": "1"}
SourceRuleDescriptionAuthorStrings
test.exeProjectM_DarkComet_1Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157Florian Roth
  • 0x15051:$x1: DarkO\_2
  • 0x3eaa6:$a1: AVICAP32.DLL
  • 0x4e7:$a2: IDispatch4
  • 0x33f6b:$a3: FLOOD/
  • 0x33def:$a4: T<-/HTTP://
  • 0x33820:$a5: infoes
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeProjectM_DarkComet_1Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157Florian Roth
  • 0x15051:$x1: DarkO\_2
  • 0x3eaa6:$a1: AVICAP32.DLL
  • 0x4e7:$a2: IDispatch4
  • 0x33f6b:$a3: FLOOD/
  • 0x33def:$a4: T<-/HTTP://
  • 0x33820:$a5: infoes
SourceRuleDescriptionAuthorStrings
0000000C.00000002.2137622893.00000000022FB000.00000004.00001000.00020000.00000000.sdmpDarkComet_2DarkCometJean-Philippe Teissier / @Jipe_
  • 0x438:$a: #BEGIN DARKCOMET DATA --
  • 0x7b8:$a: #BEGIN DARKCOMET DATA --
  • 0x5c1:$b: #EOF DARKCOMET DATA --
  • 0x941:$b: #EOF DARKCOMET DATA --
0000000E.00000002.2218818182.000000000232B000.00000004.00001000.00020000.00000000.sdmpDarkComet_2DarkCometJean-Philippe Teissier / @Jipe_
  • 0x438:$a: #BEGIN DARKCOMET DATA --
  • 0x7b8:$a: #BEGIN DARKCOMET DATA --
  • 0x5c1:$b: #EOF DARKCOMET DATA --
  • 0x941:$b: #EOF DARKCOMET DATA --
00000008.00000002.3265409763.0000000002381000.00000004.00001000.00020000.00000000.sdmpDarkComet_2DarkCometJean-Philippe Teissier / @Jipe_
  • 0xff8:$a: #BEGIN DARKCOMET DATA --
  • 0x1070:$a: #BEGIN DARKCOMET DATA --
  • 0xf30:$b: #EOF DARKCOMET DATA --
00000000.00000002.2021478489.000000000235B000.00000004.00001000.00020000.00000000.sdmpDarkComet_2DarkCometJean-Philippe Teissier / @Jipe_
  • 0x438:$a: #BEGIN DARKCOMET DATA --
  • 0x7b8:$a: #BEGIN DARKCOMET DATA --
  • 0x5c1:$b: #EOF DARKCOMET DATA --
  • 0x941:$b: #EOF DARKCOMET DATA --
00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    Click to see the 23 entries
    SourceRuleDescriptionAuthorStrings
    0.0.test.exe.400000.0.unpackProjectM_DarkComet_1Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157Florian Roth
    • 0x8cc51:$x1: DarkO\_2
    • 0xb66a6:$a1: AVICAP32.DLL
    • 0x4e7:$a2: IDispatch4
    • 0x780e7:$a2: IDispatch4
    • 0xabb6b:$a3: FLOOD/
    • 0xab9ef:$a4: T<-/HTTP://
    • 0xab420:$a5: infoes
    0.2.test.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
      0.2.test.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        0.2.test.exe.400000.0.unpackJoeSecurity_DarkCometRatYara detected DarkCometKevin Breen <kevin@techanarchy.net>
          0.2.test.exe.400000.0.unpackWindows_Trojan_Darkcomet_1df27bccunknownunknown
          • 0x839bc:$a1: BTRESULTHTTP Flood|Http Flood task finished!|
          • 0x7e32d:$a2: is now open!|
          • 0x7dc88:$a3: ActiveOnlineKeylogger
          • 0x7e38c:$a4: #BOT#RunPrompt
          • 0x7d434:$a5: GETMONITORS
          Click to see the 5 entries

          System Summary

          barindex
          Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\test.exe, ProcessId: 5740, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleDebugJ
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\test.exe, ProcessId: 5740, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleDebugJ
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\system32\userinit.exe,C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\test.exe, ProcessId: 5740, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-25T12:43:10.718325+010028095301A Network Trojan was detected192.168.2.549915147.185.221.2414161TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-25T12:41:18.326269+010028078211A Network Trojan was detected192.168.2.549704147.185.221.2414161TCP
          2024-12-25T12:41:40.575762+010028078211A Network Trojan was detected192.168.2.549711147.185.221.2414161TCP
          2024-12-25T12:42:02.794590+010028078211A Network Trojan was detected192.168.2.549761147.185.221.2414161TCP
          2024-12-25T12:42:25.013317+010028078211A Network Trojan was detected192.168.2.549814147.185.221.2414161TCP
          2024-12-25T12:42:47.326730+010028078211A Network Trojan was detected192.168.2.549864147.185.221.2414161TCP
          2024-12-25T12:43:10.718325+010028078211A Network Trojan was detected192.168.2.549915147.185.221.2414161TCP
          2024-12-25T12:43:11.732126+010028078211A Network Trojan was detected192.168.2.549964147.185.221.2414161TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: test.exeAvira: detected
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeAvira: detection malicious, Label: BDS/Backdoor.Gen
          Source: 0000000C.00000002.2137622893.00000000022FB000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: DarkComet {"MUTEX": "RO_MUTEX-8HU43EZ", "SID": "GoogleDebugger", "FWB": "1", "NETDATA": ["147.185.221.24:14161"], "GENCODE": "WN0BLB8aPxBw", "INSTALL": "1", "COMBOPATH": "10", "EDTPATH": "ChromeCookies\\ChromeCookie.exe", "KEYNAME": "GoogleDebugJ", "EDTDATE": "16/04/2007", "PERSINST": "1", "MELT": "0", "CHANGEDATE": "1", "DIRATTRIB": "6", "FILEATTRIB": "6", "SH3": "1", "SH6": "1", "CHIDEF": "1", "CHIDED": "1", "PERS": "1", "OFFLINEK": "1"}
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeReversingLabs: Detection: 97%
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeVirustotal: Detection: 94%Perma Link
          Source: test.exeVirustotal: Detection: 94%Perma Link
          Source: test.exeReversingLabs: Detection: 97%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeJoe Sandbox ML: detected
          Source: test.exeJoe Sandbox ML: detected
          Source: test.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0040A488 FindFirstFileA,GetLastError,0_2_0040A488
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00406A68 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_00406A68
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00480FEC FindFirstFileA,0_2_00480FEC
          Source: C:\Users\user\Desktop\test.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Users\user\Desktop\test.exeFile opened: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeJump to behavior
          Source: C:\Users\user\Desktop\test.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
          Source: C:\Users\user\Desktop\test.exeFile opened: C:\Users\user\AppData\Local\Temp\ChromeCookiesJump to behavior
          Source: C:\Users\user\Desktop\test.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Users\user\Desktop\test.exeFile opened: C:\Users\user\AppData\LocalJump to behavior

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2807821 - Severity 1 - ETPRO MALWARE DarkComet-RAT activity : 192.168.2.5:49704 -> 147.185.221.24:14161
          Source: Network trafficSuricata IDS: 2807821 - Severity 1 - ETPRO MALWARE DarkComet-RAT activity : 192.168.2.5:49711 -> 147.185.221.24:14161
          Source: Network trafficSuricata IDS: 2807821 - Severity 1 - ETPRO MALWARE DarkComet-RAT activity : 192.168.2.5:49761 -> 147.185.221.24:14161
          Source: Network trafficSuricata IDS: 2807821 - Severity 1 - ETPRO MALWARE DarkComet-RAT activity : 192.168.2.5:49915 -> 147.185.221.24:14161
          Source: Network trafficSuricata IDS: 2809530 - Severity 1 - ETPRO MALWARE Backdoor.Win32.DarkKomet Keep-Alive : 192.168.2.5:49915 -> 147.185.221.24:14161
          Source: Network trafficSuricata IDS: 2807821 - Severity 1 - ETPRO MALWARE DarkComet-RAT activity : 192.168.2.5:49814 -> 147.185.221.24:14161
          Source: Network trafficSuricata IDS: 2807821 - Severity 1 - ETPRO MALWARE DarkComet-RAT activity : 192.168.2.5:49964 -> 147.185.221.24:14161
          Source: Network trafficSuricata IDS: 2807821 - Severity 1 - ETPRO MALWARE DarkComet-RAT activity : 192.168.2.5:49864 -> 147.185.221.24:14161
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00473560 FtpPutFileA,0_2_00473560
          Source: global trafficTCP traffic: 192.168.2.5:49704 -> 147.185.221.24:14161
          Source: Joe Sandbox ViewIP Address: 147.185.221.24 147.185.221.24
          Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: unknownTCP traffic detected without corresponding DNS query: 147.185.221.24
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0048485C InternetOpenA,InternetOpenUrlA,HttpQueryInfoA,InternetReadFile,ShellExecuteA,InternetCloseHandle,0_2_0048485C

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: C:\Users\user\Desktop\test.exeCode function: [ESC]0_2_004818F8
          Source: C:\Users\user\Desktop\test.exeCode function: [F1]0_2_004818F8
          Source: C:\Users\user\Desktop\test.exeCode function: [F2]0_2_004818F8
          Source: C:\Users\user\Desktop\test.exeCode function: [DEL]0_2_004818F8
          Source: C:\Users\user\Desktop\test.exeCode function: [DEL]0_2_004818F8
          Source: C:\Users\user\Desktop\test.exeCode function: [INS]0_2_004818F8
          Source: C:\Users\user\Desktop\test.exeCode function: [SNAPSHOT]0_2_004818F8
          Source: C:\Users\user\Desktop\test.exeCode function: [LEFT]0_2_004818F8
          Source: C:\Users\user\Desktop\test.exeCode function: [RIGHT]0_2_004818F8
          Source: C:\Users\user\Desktop\test.exeCode function: [DOWN]0_2_004818F8
          Source: C:\Users\user\Desktop\test.exeCode function: [UP]0_2_004818F8
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004818F8 CallNextHookEx,CallNextHookEx,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyA,ToAscii,CallNextHookEx,0_2_004818F8
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00481ED8 SetWindowsHookExA 0000000D,Function_000818F8,00000000,000000000_2_00481ED8
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeJump to behavior
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0040838E OpenClipboard,0_2_0040838E
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004314A0 GlobalAlloc,GlobalLock,SetClipboardData,GlobalUnlock,0_2_004314A0
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0043181C SetClipboardData,SetClipboardData,0_2_0043181C
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004318A0 SetClipboardData,SetClipboardData,0_2_004318A0
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00428418 GetClipboardData,CopyEnhMetaFileA,GetEnhMetaFileHeader,0_2_00428418
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004554F4 GetMessagePos,GetKeyboardState,0_2_004554F4
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004818F8 CallNextHookEx,CallNextHookEx,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,MapVirtualKeyA,ToAscii,CallNextHookEx,0_2_004818F8
          Source: Yara matchFile source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTR

          Spam, unwanted Advertisements and Ransom Demands

          barindex
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0048BB34 SystemParametersInfoA,0_2_0048BB34
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00489E9C SystemParametersInfoA,0_2_00489E9C

          System Summary

          barindex
          Source: test.exe, type: SAMPLEMatched rule: Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157 Author: Florian Roth
          Source: 0.0.test.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157 Author: Florian Roth
          Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
          Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
          Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 Author: unknown
          Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet Author: ditekSHen
          Source: 0000000C.00000002.2137622893.00000000022FB000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
          Source: 0000000E.00000002.2218818182.000000000232B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
          Source: 00000008.00000002.3265409763.0000000002381000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
          Source: 00000000.00000002.2021478489.000000000235B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
          Source: 00000008.00000002.3265409763.000000000237A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
          Source: 00000008.00000002.3265409763.00000000022D3000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157 Author: Florian Roth
          Source: 0000000C.00000002.2137622893.0000000002351000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
          Source: 00000000.00000002.2021478489.00000000023B1000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
          Source: 0000000E.00000002.2218818182.0000000002381000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
          Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
          Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
          Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
          Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTRMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
          Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTRMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTRMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
          Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTRMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
          Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTRMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTRMatched rule: DarkComet_4 Author: unknown
          Source: Process Memory Space: ChromeCookie.exe PID: 6484, type: MEMORYSTRMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
          Source: Process Memory Space: ChromeCookie.exe PID: 7320, type: MEMORYSTRMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
          Source: Process Memory Space: ChromeCookie.exe PID: 7520, type: MEMORYSTRMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe, type: DROPPEDMatched rule: Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157 Author: Florian Roth
          Source: Yara matchFile source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTR
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00445844 NtdllDefWindowProc_A,0_2_00445844
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00446070 SetActiveWindow,ShowWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,0_2_00446070
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004389B4 GetSubMenu,SaveDC,RestoreDC,SaveDC,RestoreDC,NtdllDefWindowProc_A,0_2_004389B4
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00430B10 NtdllDefWindowProc_A,0_2_00430B10
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004556F4 SetWindowPos,NtdllDefWindowProc_A,GetCapture,0_2_004556F4
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00463F64 NtdllDefWindowProc_A,0_2_00463F64
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00473F34 CreateProcessA,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,TerminateProcess,0_2_00473F34
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00445F90 SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,0_2_00445F90
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004715B0 OpenSCManagerA,OpenServiceA,DeleteService,CloseServiceHandle,CloseServiceHandle,0_2_004715B0
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0048A070 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,0_2_0048A070
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004023700_2_00402370
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004064C00_2_004064C0
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0043E6440_2_0043E644
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004389B40_2_004389B4
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0045EC780_2_0045EC78
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0046ADBC0_2_0046ADBC
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0046797C0_2_0046797C
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00469B900_2_00469B90
          Source: C:\Users\user\Desktop\test.exeProcess token adjusted: Load DriverJump to behavior
          Source: C:\Users\user\Desktop\test.exeProcess token adjusted: SecurityJump to behavior
          Source: C:\Users\user\Desktop\test.exeCode function: String function: 00407B10 appears 139 times
          Source: C:\Users\user\Desktop\test.exeCode function: String function: 00407B08 appears 33 times
          Source: C:\Users\user\Desktop\test.exeCode function: String function: 004218E4 appears 86 times
          Source: C:\Users\user\Desktop\test.exeCode function: String function: 00405584 appears 60 times
          Source: C:\Users\user\Desktop\test.exeCode function: String function: 00405530 appears 82 times
          Source: C:\Users\user\Desktop\test.exeCode function: String function: 004055C8 appears 36 times
          Source: C:\Users\user\Desktop\test.exeCode function: String function: 00405864 appears 33 times
          Source: test.exeStatic PE information: Resource name: RT_GROUP_CURSOR type: x86 executable (TV)
          Source: ChromeCookie.exe.0.drStatic PE information: Resource name: RT_GROUP_CURSOR type: x86 executable (TV)
          Source: test.exe, 00000000.00000002.2018776898.00000000007F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileName$zZ vs test.exe
          Source: test.exe, 00000000.00000003.2017332967.00000000007EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFileName$zZ vs test.exe
          Source: test.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
          Source: test.exe, type: SAMPLEMatched rule: ProjectM_DarkComet_1 date = 2016-03-26, author = Florian Roth, description = Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157, reference = http://researchcenter.paloaltonetworks.com/2016/03/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe/, license = https://creativecommons.org/licenses/by-nc/4.0/, hash = cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157
          Source: 0.0.test.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: ProjectM_DarkComet_1 date = 2016-03-26, author = Florian Roth, description = Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157, reference = http://researchcenter.paloaltonetworks.com/2016/03/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe/, license = https://creativecommons.org/licenses/by-nc/4.0/, hash = cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157
          Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
          Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
          Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
          Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
          Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
          Source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DarkComet author = ditekSHen, description = Detects DarkComet
          Source: 0000000C.00000002.2137622893.00000000022FB000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
          Source: 0000000E.00000002.2218818182.000000000232B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
          Source: 00000008.00000002.3265409763.0000000002381000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
          Source: 00000000.00000002.2021478489.000000000235B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
          Source: 00000008.00000002.3265409763.000000000237A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
          Source: 00000008.00000002.3265409763.00000000022D3000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ProjectM_DarkComet_1 date = 2016-03-26, author = Florian Roth, description = Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157, reference = http://researchcenter.paloaltonetworks.com/2016/03/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe/, license = https://creativecommons.org/licenses/by-nc/4.0/, hash = cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157
          Source: 0000000C.00000002.2137622893.0000000002351000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
          Source: 00000000.00000002.2021478489.00000000023B1000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
          Source: 0000000E.00000002.2218818182.0000000002381000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
          Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
          Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
          Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
          Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
          Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
          Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTRMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
          Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTRMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
          Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTRMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
          Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTRMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
          Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTRMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
          Source: Process Memory Space: test.exe PID: 5740, type: MEMORYSTRMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
          Source: Process Memory Space: ChromeCookie.exe PID: 6484, type: MEMORYSTRMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
          Source: Process Memory Space: ChromeCookie.exe PID: 7320, type: MEMORYSTRMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
          Source: Process Memory Space: ChromeCookie.exe PID: 7520, type: MEMORYSTRMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe, type: DROPPEDMatched rule: ProjectM_DarkComet_1 date = 2016-03-26, author = Florian Roth, description = Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157, reference = http://researchcenter.paloaltonetworks.com/2016/03/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe/, license = https://creativecommons.org/licenses/by-nc/4.0/, hash = cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157
          Source: test.exeStatic PE information: Section: UPX1 ZLIB complexity 0.9918507543103449
          Source: ChromeCookie.exe.0.drStatic PE information: Section: UPX1 ZLIB complexity 0.9918507543103449
          Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@21/2@0/1
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00425A70 GetLastError,FormatMessageA,0_2_00425A70
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0048AEA8 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,GetLastError,0_2_0048AEA8
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0048A070 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,0_2_0048A070
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0040A746 GetDiskFreeSpaceA,0_2_0040A746
          Source: C:\Users\user\Desktop\test.exeCode function: OpenSCManagerA,CreateServiceA,CloseServiceHandle,CloseServiceHandle,0_2_00471850
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0042C11C CoCreateInstance,0_2_0042C11C
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0048DDE0 FindResourceA,LoadResource,SizeofResource,LockResource,FreeResource,0_2_0048DDE0
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004714B8 OpenSCManagerA,OpenServiceA,StartServiceA,ControlService,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,0_2_004714B8
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeFile created: C:\Users\user\AppData\Roaming\dclogsJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5728:120:WilError_03
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMutant created: \Sessions\1\BaseNamedObjects\RO_MUTEX-8HU43EZ
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6984:120:WilError_03
          Source: C:\Windows\SysWOW64\notepad.exeMutant created: \Sessions\1\BaseNamedObjects\DCPERSFWBP
          Source: C:\Users\user\Desktop\test.exeFile created: C:\Users\user\AppData\Local\Temp\ChromeCookiesJump to behavior
          Source: Yara matchFile source: 0.2.test.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeProcess created: C:\Windows\explorer.exe
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeProcess created: C:\Windows\explorer.exeJump to behavior
          Source: C:\Users\user\Desktop\test.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\Desktop\test.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\test.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: test.exeVirustotal: Detection: 94%
          Source: test.exeReversingLabs: Detection: 97%
          Source: C:\Users\user\Desktop\test.exeFile read: C:\Users\user\Desktop\test.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\test.exe "C:\Users\user\Desktop\test.exe"
          Source: C:\Users\user\Desktop\test.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop\test.exe" +s +h
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\test.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop" +s +h
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop\test.exe" +s +h
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop" +s +h
          Source: C:\Users\user\Desktop\test.exeProcess created: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe "C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe"
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe"
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeProcess created: C:\Windows\SysWOW64\notepad.exe notepad
          Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe "C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe"
          Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe "C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe"
          Source: C:\Users\user\Desktop\test.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop\test.exe" +s +hJump to behavior
          Source: C:\Users\user\Desktop\test.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop" +s +hJump to behavior
          Source: C:\Users\user\Desktop\test.exeProcess created: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe "C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe" Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop\test.exe" +s +hJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop" +s +hJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeProcess created: C:\Windows\SysWOW64\notepad.exe notepadJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: msacm32.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: winmmbase.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: winmmbase.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: twext.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: policymanager.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: msvcp110_win.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: ntshrui.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: cscapi.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: shacct.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: starttiledata.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: acppage.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: msi.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: aepic.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: idstore.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: samlib.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: wlidprov.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeSection loaded: provsvc.dllJump to behavior
          Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dllJump to behavior
          Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dllJump to behavior
          Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dllJump to behavior
          Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: msacm32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: winmmbase.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: winmmbase.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\notepad.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\notepad.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\notepad.exeSection loaded: mrmcorer.dllJump to behavior
          Source: C:\Windows\SysWOW64\notepad.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\notepad.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\notepad.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Windows\SysWOW64\notepad.exeSection loaded: efswrt.dllJump to behavior
          Source: C:\Windows\SysWOW64\notepad.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\notepad.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\SysWOW64\notepad.exeSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\notepad.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: msacm32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: winmmbase.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: winmmbase.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: msacm32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: winmmbase.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: winmmbase.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\test.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00474208 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00474208
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004186D4 push ecx; mov dword ptr [esp], edx0_2_004186D9
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0048F0AC push 0048F125h; ret 0_2_0048F11D
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0048F6D4 push 0048F761h; ret 0_2_0048F759
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00482058 push 004820C2h; ret 0_2_004820BA
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0045E078 push 0045E0DEh; ret 0_2_0045E0D6
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004220E0 push ecx; mov dword ptr [esp], ecx0_2_004220E1
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004660F8 push 00466130h; ret 0_2_00466128
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0042E138 push 0042E170h; ret 0_2_0042E168
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004741C8 push 00474206h; ret 0_2_004741FE
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004041DC push eax; ret 0_2_00404218
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0046224C push 00462284h; ret 0_2_0046227C
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00464228 push ecx; mov dword ptr [esp], edx0_2_00464229
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004482C4 push 0044832Eh; ret 0_2_00448326
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0041632A push 004163A2h; ret 0_2_0041639A
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0041632C push 004163A2h; ret 0_2_0041639A
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0048E3AC push 0048E3DCh; ret 0_2_0048E3D4
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0046E3A0 push 0046E3EDh; ret 0_2_0046E3E5
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004204E4 push ecx; mov dword ptr [esp], edx0_2_004204E9
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004086CC push 0040870Eh; ret 0_2_00408706
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0044A74C push ecx; mov dword ptr [esp], edx0_2_0044A750
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004107FC push 00410828h; ret 0_2_00410820
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0042E8B8 push 0042E8E4h; ret 0_2_0042E8DC
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00430910 push 00430970h; ret 0_2_00430968
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00422924 push 00422967h; ret 0_2_0042295F
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00418930 push ecx; mov dword ptr [esp], edx0_2_00418935
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0044A9F0 push ecx; mov dword ptr [esp], edx0_2_0044A9F4
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0045E988 push 0045E9B4h; ret 0_2_0045E9AC
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00418A50 push ecx; mov dword ptr [esp], edx0_2_00418A55
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00460A20 push 00460A53h; ret 0_2_00460A4B
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00432AD0 push 00432B1Ch; ret 0_2_00432B14
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00418A94 push ecx; mov dword ptr [esp], edx0_2_00418A99
          Source: initial sampleStatic PE information: section name: UPX0
          Source: initial sampleStatic PE information: section name: UPX1
          Source: initial sampleStatic PE information: section name: UPX0
          Source: initial sampleStatic PE information: section name: UPX1

          Persistence and Installation Behavior

          barindex
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
          Source: C:\Users\user\Desktop\test.exeFile created: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\test.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon UserInitJump to behavior
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004714B8 OpenSCManagerA,OpenServiceA,StartServiceA,ControlService,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,0_2_004714B8
          Source: C:\Users\user\Desktop\test.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run GoogleDebugJJump to behavior
          Source: C:\Users\user\Desktop\test.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run GoogleDebugJJump to behavior
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0042E370 IsIconic,GetWindowPlacement,GetWindowRect,0_2_0042E370
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00458910 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,0_2_00458910
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_004576CC IsIconic,GetCapture,0_2_004576CC
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0043B75C IsIconic,0_2_0043B75C
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0043B7D8 GetWindowLongA,IsIconic,IsWindowVisible,ShowWindow,SetWindowLongA,SetWindowLongA,ShowWindow,ShowWindow,0_2_0043B7D8
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00457FD4 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,0_2_00457FD4
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00460AC0 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00460AC0
          Source: C:\Users\user\Desktop\test.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\test.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,0_2_00444A7C
          Source: C:\Users\user\Desktop\test.exeCode function: OpenSCManagerA,EnumServicesStatusA,CloseServiceHandle,0_2_00471640
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeWindow / User API: threadDelayed 7944Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeWindow / User API: threadDelayed 1874Jump to behavior
          Source: C:\Windows\SysWOW64\notepad.exeWindow / User API: threadDelayed 5005Jump to behavior
          Source: C:\Windows\SysWOW64\notepad.exeWindow / User API: threadDelayed 4991Jump to behavior
          Source: C:\Users\user\Desktop\test.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-45687
          Source: C:\Users\user\Desktop\test.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-45738
          Source: C:\Users\user\Desktop\test.exeAPI coverage: 4.8 %
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe TID: 5064Thread sleep time: -79440000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe TID: 5064Thread sleep time: -18740000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\notepad.exe TID: 7180Thread sleep time: -2502500s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\notepad.exe TID: 7180Thread sleep time: -2495500s >= -30000sJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\notepad.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0040A488 FindFirstFileA,GetLastError,0_2_0040A488
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00406A68 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_00406A68
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00480FEC FindFirstFileA,0_2_00480FEC
          Source: C:\Users\user\Desktop\test.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Users\user\Desktop\test.exeFile opened: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeJump to behavior
          Source: C:\Users\user\Desktop\test.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
          Source: C:\Users\user\Desktop\test.exeFile opened: C:\Users\user\AppData\Local\Temp\ChromeCookiesJump to behavior
          Source: C:\Users\user\Desktop\test.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Users\user\Desktop\test.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
          Source: ChromeCookie.exe, 0000000E.00000002.2218550477.000000000067F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllv
          Source: ChromeCookie.exe, 00000008.00000002.3264845097.000000000066E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllx
          Source: ChromeCookie.exe, 00000008.00000002.3264845097.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\ z
          Source: ChromeCookie.exe, 0000000C.00000002.2137375880.000000000060F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllE
          Source: test.exe, 00000000.00000002.2018563596.000000000075E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00474208 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00474208
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00466038 FreeLibrary,VirtualFree,GetProcessHeap,HeapFree,0_2_00466038
          Source: C:\Users\user\Desktop\test.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeProcess token adjusted: DebugJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 500000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 510000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 520000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 530000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 540000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 550000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 560000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 570000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 580000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 590000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 5A0000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 5B0000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 5C0000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 7B0000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 5D0000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 5E0000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 600000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 610000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory allocated: C:\Windows\SysWOW64\notepad.exe base: 620000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00473F34 CreateProcessA,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,TerminateProcess,0_2_00473F34
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeThread created: C:\Windows\SysWOW64\notepad.exe EIP: 620000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 500000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 510000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 520000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 530000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 540000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 550000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 560000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 570000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 580000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 590000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 5A0000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 5B0000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 5C0000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 7B0000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 5D0000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 5E0000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 600000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 610000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeMemory written: C:\Windows\SysWOW64\notepad.exe base: 620000Jump to behavior
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0048A218 ShellExecuteEx,0_2_0048A218
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0048B42C keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,0_2_0048B42C
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0048851C socket,htons,inet_addr,gethostbyname,connect,mouse_event,shutdown,closesocket,0_2_0048851C
          Source: C:\Users\user\Desktop\test.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop\test.exe" +s +hJump to behavior
          Source: C:\Users\user\Desktop\test.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop" +s +hJump to behavior
          Source: C:\Users\user\Desktop\test.exeProcess created: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe "C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe" Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop\test.exe" +s +hJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib "C:\Users\user\Desktop" +s +hJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe"Jump to behavior
          Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Shell_traywndTrayNotifyWndTrayClockWClassjh<
          Source: ChromeCookie.exe, 00000008.00000002.3265409763.000000000237A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: test.exe, test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Shell_TrayWnd
          Source: test.exe, test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Progman
          Source: ChromeCookie.exe, 00000008.00000002.3265409763.000000000237A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Managerect`
          Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Shell_TrayWndjjh
          Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Progmanjhh
          Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Shell_traywndTrayNotifyWndjh
          Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ProgmanU
          Source: ChromeCookie.exe, 00000008.00000002.3265409763.000000000237A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager`
          Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Shell_traywndTrayNotifyWndTrayClockWClassjh
          Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ButtonShell_TrayWndj
          Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Shell_traywndReBarWindow32jh
          Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Shell_traywndReBarWindow32jhD
          Source: test.exe, test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Shell_traywnd
          Source: test.exe, 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Shell_TrayWndPjjh
          Source: C:\Users\user\Desktop\test.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,0_2_00406C2C
          Source: C:\Users\user\Desktop\test.exeCode function: GetLocaleInfoA,0_2_0048CEEC
          Source: C:\Users\user\Desktop\test.exeCode function: GetLocaleInfoA,0_2_0040D334
          Source: C:\Users\user\Desktop\test.exeCode function: GetLocaleInfoA,0_2_0040D380
          Source: C:\Users\user\Desktop\test.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0040BCC4 GetLocalTime,0_2_0040BCC4
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0048CE74 GetUserNameA,0_2_0048CE74
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_0048F6D4 GetVersion,0_2_0048F6D4

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeRegistry value created: DisableTaskMgr 1Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUAJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exeKey value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUAJump to behavior
          Source: C:\Users\user\Desktop\test.exeCode function: 0_2_00486E2C socket,htons,bind,listen,accept,LocalAlloc,CreateThread,CloseHandle,Sleep,RtlExitUserThread,0_2_00486E2C
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
          Native API
          1
          LSASS Driver
          1
          Exploitation for Privilege Escalation
          4
          Disable or Modify Tools
          521
          Input Capture
          1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          1
          Ingress Tool Transfer
          1
          Exfiltration Over Alternative Protocol
          1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts1
          Command and Scripting Interpreter
          1
          DLL Side-Loading
          1
          LSASS Driver
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory1
          Account Discovery
          Remote Desktop Protocol521
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Bluetooth1
          Defacement
          Email AddressesDNS ServerDomain Accounts12
          Service Execution
          12
          Windows Service
          1
          DLL Side-Loading
          21
          Obfuscated Files or Information
          Security Account Manager1
          System Service Discovery
          SMB/Windows Admin Shares3
          Clipboard Data
          1
          Non-Standard Port
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCron11
          Registry Run Keys / Startup Folder
          1
          Access Token Manipulation
          11
          Software Packing
          NTDS3
          File and Directory Discovery
          Distributed Component Object ModelInput Capture1
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
          Windows Service
          1
          DLL Side-Loading
          LSA Secrets24
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
          Process Injection
          1
          Masquerading
          Cached Domain Credentials121
          Security Software Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items11
          Registry Run Keys / Startup Folder
          1
          Virtualization/Sandbox Evasion
          DCSync1
          Virtualization/Sandbox Evasion
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Access Token Manipulation
          Proc Filesystem1
          Process Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
          Process Injection
          /etc/passwd and /etc/shadow11
          Application Window Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
          System Owner/User Discovery
          Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 1580606 Sample: test.exe Startdate: 25/12/2024 Architecture: WINDOWS Score: 100 53 Suricata IDS alerts for network traffic 2->53 55 Found malware configuration 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 6 other signatures 2->59 7 test.exe 1 4 2->7         started        11 ChromeCookie.exe 2 2->11         started        13 ChromeCookie.exe 2->13         started        process3 file4 37 C:\Users\user\AppData\...\ChromeCookie.exe, PE32 7->37 dropped 39 C:\Users\...\ChromeCookie.exe:Zone.Identifier, ASCII 7->39 dropped 61 Creates an undocumented autostart registry key 7->61 63 Contains functionalty to change the wallpaper 7->63 65 Contains functionality to capture and log keystrokes 7->65 67 3 other signatures 7->67 15 ChromeCookie.exe 2 2 7->15         started        19 cmd.exe 1 7->19         started        21 cmd.exe 1 7->21         started        signatures5 process6 dnsIp7 41 147.185.221.24, 14161, 49704, 49711 SALSGIVERUS United States 15->41 43 Antivirus detection for dropped file 15->43 45 Multi AV Scanner detection for dropped file 15->45 47 Machine Learning detection for dropped file 15->47 51 8 other signatures 15->51 23 notepad.exe 5 15->23         started        25 iexplore.exe 15->25         started        27 explorer.exe 15->27         started        49 Uses cmd line tools excessively to alter registry or file data 19->49 29 conhost.exe 19->29         started        31 attrib.exe 1 19->31         started        33 conhost.exe 21->33         started        35 attrib.exe 1 21->35         started        signatures8 process9

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          test.exe94%VirustotalBrowse
          test.exe97%ReversingLabsWin32.Backdoor.Breut
          test.exe100%AviraBDS/Backdoor.Gen
          test.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe100%AviraBDS/Backdoor.Gen
          C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe97%ReversingLabsWin32.Backdoor.Breut
          C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe94%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          147.185.221.24
          unknownUnited States
          12087SALSGIVERUStrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1580606
          Start date and time:2024-12-25 12:40:09 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 5s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:16
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:test.exe
          Detection:MAL
          Classification:mal100.rans.troj.spyw.evad.winEXE@21/2@0/1
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 82%
          • Number of executed functions: 52
          • Number of non-executed functions: 248
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
          • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.63
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          06:40:56API Interceptor479180x Sleep call for process: ChromeCookie.exe modified
          06:41:29API Interceptor1368632x Sleep call for process: notepad.exe modified
          12:41:00AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run GoogleDebugJ C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe
          12:41:09AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run GoogleDebugJ C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          147.185.221.24L363rVr7oL.exeGet hashmaliciousNjratBrowse
            horrify's Modx Menu v1.exeGet hashmaliciousXWormBrowse
              fvbhdyuJYi.exeGet hashmaliciousXWormBrowse
                8DiSW8IPEF.exeGet hashmaliciousXWormBrowse
                  KJhsNv2RcI.exeGet hashmaliciousXWormBrowse
                    PjGz899RZV.exeGet hashmaliciousXWormBrowse
                      ehxF3rusxJ.exeGet hashmaliciousXWormBrowse
                        Client-built-Playit.exeGet hashmaliciousQuasarBrowse
                          file.exeGet hashmaliciousScreenConnect Tool, Amadey, RHADAMANTHYS, XWorm, XmrigBrowse
                            72OWK7wBVH.exeGet hashmaliciousXWormBrowse
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              SALSGIVERUSL363rVr7oL.exeGet hashmaliciousNjratBrowse
                              • 147.185.221.24
                              WO.exeGet hashmaliciousMetasploitBrowse
                              • 147.185.221.23
                              reddit.exeGet hashmaliciousMetasploitBrowse
                              • 147.185.221.23
                              loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                              • 147.176.119.110
                              horrify's Modx Menu v1.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.24
                              fvbhdyuJYi.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.24
                              8DiSW8IPEF.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.24
                              twE44mm07j.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.18
                              YgJ5inWPQO.exeGet hashmaliciousAsyncRAT, XWormBrowse
                              • 147.185.221.18
                              dr2YKJiGH9.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.23
                              No context
                              No context
                              Process:C:\Users\user\Desktop\test.exe
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                              Category:dropped
                              Size (bytes):257536
                              Entropy (8bit):7.898203540516242
                              Encrypted:false
                              SSDEEP:6144:ZcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37:ZcW7KEZlPzCy37
                              MD5:57BD4F73690590693B5B921F29679410
                              SHA1:C2CB47BF602541043589E979F21C3D7C1698E3AC
                              SHA-256:8A3DE78CF177BE4C37C1525BECF05AF336C1DC2A4D181CAE79F6903754902EFA
                              SHA-512:00B543644058A93F1C0A13E4D40B1C4E76F9581325F1773D79983761CA6903643E5A44717E7785B27A8FAC2A6609C19032E3F412D3339E9CC5DC697791890318
                              Malicious:true
                              Yara Hits:
                              • Rule: ProjectM_DarkComet_1, Description: Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157, Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe, Author: Florian Roth
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              • Antivirus: ReversingLabs, Detection: 97%
                              • Antivirus: Virustotal, Detection: 94%, Browse
                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......O.........................p...W.......`....@..........................p...................@...........................j.......`.......................................................Y......................................................UPX0.....p..............................UPX1................................@....rsrc........`......................@..............................................................................................................................................................................................................................................................................................................................................................................3.07.UPX!....
                              Process:C:\Users\user\Desktop\test.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:modified
                              Size (bytes):26
                              Entropy (8bit):3.95006375643621
                              Encrypted:false
                              SSDEEP:3:ggPYV:rPYV
                              MD5:187F488E27DB4AF347237FE461A079AD
                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                              Malicious:true
                              Preview:[ZoneTransfer]....ZoneId=0
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                              Entropy (8bit):7.898203540516242
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.37%
                              • UPX compressed Win32 Executable (30571/9) 0.30%
                              • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                              • Win16/32 Executable Delphi generic (2074/23) 0.02%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              File name:test.exe
                              File size:257'536 bytes
                              MD5:57bd4f73690590693b5b921f29679410
                              SHA1:c2cb47bf602541043589e979f21c3d7c1698e3ac
                              SHA256:8a3de78cf177be4c37c1525becf05af336c1dc2a4d181cae79f6903754902efa
                              SHA512:00b543644058a93f1c0a13e4d40b1c4e76f9581325f1773d79983761ca6903643e5a44717e7785b27a8fac2a6609c19032e3f412d3339e9cc5dc697791890318
                              SSDEEP:6144:ZcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37:ZcW7KEZlPzCy37
                              TLSH:3B4423A57BC6DC43EAFDAEBC060C0F14570523DF2EEE82919F2543483296A87275762D
                              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0x4b57e0
                              Entrypoint Section:UPX1
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                              DLL Characteristics:
                              Time Stamp:0x4FD0CFF9 [Thu Jun 7 15:59:53 2012 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:a38ad86d74cafc45094a5085e33419e4
                              Instruction
                              pushad
                              mov esi, 00478000h
                              lea edi, dword ptr [esi-00077000h]
                              mov dword ptr [edi+000907B8h], 932E023Ah
                              push edi
                              or ebp, FFFFFFFFh
                              jmp 00007FA4AC81A9E0h
                              nop
                              nop
                              nop
                              nop
                              mov al, byte ptr [esi]
                              inc esi
                              mov byte ptr [edi], al
                              inc edi
                              add ebx, ebx
                              jne 00007FA4AC81A9D9h
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              jc 00007FA4AC81A9BFh
                              mov eax, 00000001h
                              add ebx, ebx
                              jne 00007FA4AC81A9D9h
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              adc eax, eax
                              add ebx, ebx
                              jnc 00007FA4AC81A9DDh
                              jne 00007FA4AC81A9FAh
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              jc 00007FA4AC81A9F1h
                              dec eax
                              add ebx, ebx
                              jne 00007FA4AC81A9D9h
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              adc eax, eax
                              jmp 00007FA4AC81A9A6h
                              add ebx, ebx
                              jne 00007FA4AC81A9D9h
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              adc ecx, ecx
                              jmp 00007FA4AC81AA24h
                              xor ecx, ecx
                              sub eax, 03h
                              jc 00007FA4AC81A9E3h
                              shl eax, 08h
                              mov al, byte ptr [esi]
                              inc esi
                              xor eax, FFFFFFFFh
                              je 00007FA4AC81AA47h
                              sar eax, 1
                              mov ebp, eax
                              jmp 00007FA4AC81A9DDh
                              add ebx, ebx
                              jne 00007FA4AC81A9D9h
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              jc 00007FA4AC81A99Eh
                              inc ecx
                              add ebx, ebx
                              jne 00007FA4AC81A9D9h
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              jc 00007FA4AC81A990h
                              add ebx, ebx
                              jne 00007FA4AC81A9D9h
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              adc ecx, ecx
                              add ebx, ebx
                              jnc 00007FA4AC81A9C1h
                              jne 00007FA4AC81A9DBh
                              mov ebx, dword ptr [esi]
                              sub esi, FFFFFFFCh
                              adc ebx, ebx
                              jnc 00007FA4AC81A9B6h
                              add ecx, 02h
                              cmp ebp, 00000000h
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xb6a180x4e8.rsrc
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xb60000xa18.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0xb59980x18UPX1
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              UPX00x10000x770000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              UPX10x780000x3e0000x3da00a5931a585df7d292cd214ef56a59100dFalse0.9918507543103449data7.925168796285708IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0xb60000x10000x1000a9331e2596ae371f82b68047208f3badFalse0.287841796875data2.914169796889494IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_CURSOR0xad6bc0x134dataEnglishUnited States1.0357142857142858
                              RT_CURSOR0xad7f00x134dataEnglishUnited States1.0357142857142858
                              RT_CURSOR0xad9240x134dataEnglishUnited States1.0357142857142858
                              RT_CURSOR0xada580x134dataEnglishUnited States1.0357142857142858
                              RT_CURSOR0xadb8c0x134dataEnglishUnited States1.0357142857142858
                              RT_CURSOR0xadcc00x134dataEnglishUnited States1.0357142857142858
                              RT_CURSOR0xaddf40x134dataEnglishUnited States1.0357142857142858
                              RT_STRING0xadf280x20cdata1.0209923664122138
                              RT_STRING0xae1340x3fcOpenPGP Public Key1.0107843137254902
                              RT_STRING0xae5300xa8data1.0654761904761905
                              RT_STRING0xae5d80x140data1.034375
                              RT_STRING0xae7180x478data1.0096153846153846
                              RT_STRING0xaeb900x330data1.0134803921568627
                              RT_STRING0xaeec00x36cdata1.0125570776255708
                              RT_STRING0xaf22c0x3f0data1.0109126984126984
                              RT_STRING0xaf61c0xccdata1.053921568627451
                              RT_STRING0xaf6e80xb0OpenPGP Secret Key1.0625
                              RT_STRING0xaf7980x2acdata1.0160818713450293
                              RT_STRING0xafa440x3b8data1.0115546218487395
                              RT_STRING0xafdfc0x354data1.0129107981220657
                              RT_STRING0xb01500x2f0data1.014627659574468
                              RT_RCDATA0xb04400x33edata1.0132530120481928
                              RT_RCDATA0xb07800x10data1.5
                              RT_RCDATA0xb07900x7f4data1.0054027504911591
                              RT_GROUP_CURSOR0xb0f840x14dataEnglishUnited States1.45
                              RT_GROUP_CURSOR0xb0f980x14dataEnglishUnited States1.4
                              RT_GROUP_CURSOR0xb0fac0x14dataEnglishUnited States1.4
                              RT_GROUP_CURSOR0xb0fc00x14x86 executable (TV)EnglishUnited States1.4
                              RT_GROUP_CURSOR0xb0fd40x14dataEnglishUnited States1.45
                              RT_GROUP_CURSOR0xb0fe80x14dataEnglishUnited States1.45
                              RT_GROUP_CURSOR0xb0ffc0x14dataEnglishUnited States1.4
                              RT_VERSION0xb66c00x358dataFrenchFrance0.06074766355140187
                              DLLImport
                              KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
                              advapi32.dllIsValidSid
                              AVICAP32.DLLcapGetDriverDescriptionA
                              comctl32.dllImageList_Add
                              gdi32.dllSaveDC
                              gdiplus.dllGdipFree
                              msacm32.dllacmStreamSize
                              netapi32.dllNetbios
                              ntdllNtUnmapViewOfSection
                              ntdll.dllNtQuerySystemInformation
                              ole32.dllIsEqualGUID
                              oleaut32.dllVariantCopy
                              shell32.dllShellExecuteA
                              SHFolder.dllSHGetFolderPathA
                              URLMON.DLLURLDownloadToFileA
                              user32.dllGetDC
                              version.dllVerQueryValueA
                              wininet.dllFtpPutFileA
                              winmm.dllwaveInOpen
                              WS2_32.DLLWSAIoctl
                              wsock32.dllsend
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              FrenchFrance
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2024-12-25T12:41:18.326269+01002807821ETPRO MALWARE DarkComet-RAT activity1192.168.2.549704147.185.221.2414161TCP
                              2024-12-25T12:41:40.575762+01002807821ETPRO MALWARE DarkComet-RAT activity1192.168.2.549711147.185.221.2414161TCP
                              2024-12-25T12:42:02.794590+01002807821ETPRO MALWARE DarkComet-RAT activity1192.168.2.549761147.185.221.2414161TCP
                              2024-12-25T12:42:25.013317+01002807821ETPRO MALWARE DarkComet-RAT activity1192.168.2.549814147.185.221.2414161TCP
                              2024-12-25T12:42:47.326730+01002807821ETPRO MALWARE DarkComet-RAT activity1192.168.2.549864147.185.221.2414161TCP
                              2024-12-25T12:43:10.718325+01002807821ETPRO MALWARE DarkComet-RAT activity1192.168.2.549915147.185.221.2414161TCP
                              2024-12-25T12:43:10.718325+01002809530ETPRO MALWARE Backdoor.Win32.DarkKomet Keep-Alive1192.168.2.549915147.185.221.2414161TCP
                              2024-12-25T12:43:11.732126+01002807821ETPRO MALWARE DarkComet-RAT activity1192.168.2.549964147.185.221.2414161TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 25, 2024 12:40:57.670963049 CET4970414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:40:57.990794897 CET1416149704147.185.221.24192.168.2.5
                              Dec 25, 2024 12:40:57.991064072 CET4970414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:41:18.326268911 CET4970414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:41:18.445960045 CET1416149704147.185.221.24192.168.2.5
                              Dec 25, 2024 12:41:19.903337002 CET1416149704147.185.221.24192.168.2.5
                              Dec 25, 2024 12:41:19.904939890 CET4970414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:41:19.949736118 CET4970414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:41:20.087220907 CET1416149704147.185.221.24192.168.2.5
                              Dec 25, 2024 12:41:20.154897928 CET4971114161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:41:20.274462938 CET1416149711147.185.221.24192.168.2.5
                              Dec 25, 2024 12:41:20.274550915 CET4971114161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:41:40.575762033 CET4971114161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:41:40.695271015 CET1416149711147.185.221.24192.168.2.5
                              Dec 25, 2024 12:41:42.154242039 CET1416149711147.185.221.24192.168.2.5
                              Dec 25, 2024 12:41:42.154326916 CET4971114161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:41:42.154370070 CET4971114161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:41:42.273829937 CET1416149711147.185.221.24192.168.2.5
                              Dec 25, 2024 12:41:42.357266903 CET4976114161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:41:42.476826906 CET1416149761147.185.221.24192.168.2.5
                              Dec 25, 2024 12:41:42.476947069 CET4976114161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:02.794589996 CET4976114161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:02.914216042 CET1416149761147.185.221.24192.168.2.5
                              Dec 25, 2024 12:42:04.378124952 CET1416149761147.185.221.24192.168.2.5
                              Dec 25, 2024 12:42:04.378516912 CET4976114161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:04.378556967 CET4976114161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:04.498048067 CET1416149761147.185.221.24192.168.2.5
                              Dec 25, 2024 12:42:04.591844082 CET4981414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:04.711663008 CET1416149814147.185.221.24192.168.2.5
                              Dec 25, 2024 12:42:04.711766005 CET4981414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:25.013317108 CET4981414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:25.132854939 CET1416149814147.185.221.24192.168.2.5
                              Dec 25, 2024 12:42:26.628588915 CET1416149814147.185.221.24192.168.2.5
                              Dec 25, 2024 12:42:26.628743887 CET4981414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:26.628743887 CET4981414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:26.748316050 CET1416149814147.185.221.24192.168.2.5
                              Dec 25, 2024 12:42:26.841609955 CET4986414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:26.961236000 CET1416149864147.185.221.24192.168.2.5
                              Dec 25, 2024 12:42:26.961333990 CET4986414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:47.326730013 CET4986414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:47.446425915 CET1416149864147.185.221.24192.168.2.5
                              Dec 25, 2024 12:42:48.864032030 CET1416149864147.185.221.24192.168.2.5
                              Dec 25, 2024 12:42:48.864239931 CET4986414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:48.864326000 CET4986414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:48.983865976 CET1416149864147.185.221.24192.168.2.5
                              Dec 25, 2024 12:42:49.076055050 CET4991514161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:42:49.197236061 CET1416149915147.185.221.24192.168.2.5
                              Dec 25, 2024 12:42:49.198751926 CET4991514161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:43:10.718324900 CET4991514161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:43:10.839147091 CET1416149915147.185.221.24192.168.2.5
                              Dec 25, 2024 12:43:11.099551916 CET1416149915147.185.221.24192.168.2.5
                              Dec 25, 2024 12:43:11.099801064 CET4991514161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:43:11.099853039 CET4991514161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:43:11.219440937 CET1416149915147.185.221.24192.168.2.5
                              Dec 25, 2024 12:43:11.310405016 CET4996414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:43:11.430341005 CET1416149964147.185.221.24192.168.2.5
                              Dec 25, 2024 12:43:11.430444002 CET4996414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:43:11.732125998 CET4996414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:43:11.732125998 CET4996414161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:43:11.851784945 CET1416149964147.185.221.24192.168.2.5
                              Dec 25, 2024 12:43:11.895205021 CET1416149964147.185.221.24192.168.2.5
                              Dec 25, 2024 12:43:11.935373068 CET4996614161192.168.2.5147.185.221.24
                              Dec 25, 2024 12:43:12.055082083 CET1416149966147.185.221.24192.168.2.5
                              Dec 25, 2024 12:43:12.055183887 CET4996614161192.168.2.5147.185.221.24

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:06:40:55
                              Start date:25/12/2024
                              Path:C:\Users\user\Desktop\test.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\test.exe"
                              Imagebase:0x400000
                              File size:257'536 bytes
                              MD5 hash:57BD4F73690590693B5B921F29679410
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:Borland Delphi
                              Yara matches:
                              • Rule: DarkComet_2, Description: DarkComet, Source: 00000000.00000002.2021478489.000000000235B000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: DarkComet_2, Description: DarkComet, Source: 00000000.00000002.2021478489.00000000023B1000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                              • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: unknown
                              • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: botherder https://github.com/botherder
                              • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                              • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: unknown
                              Reputation:low
                              Has exited:true

                              Target ID:1
                              Start time:06:40:56
                              Start date:25/12/2024
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop\test.exe" +s +h
                              Imagebase:0x790000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:2
                              Start time:06:40:56
                              Start date:25/12/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6d64d0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:3
                              Start time:06:40:56
                              Start date:25/12/2024
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\user\Desktop" +s +h
                              Imagebase:0x790000
                              File size:236'544 bytes
                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:4
                              Start time:06:40:56
                              Start date:25/12/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6d64d0000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:false

                              Target ID:5
                              Start time:06:40:56
                              Start date:25/12/2024
                              Path:C:\Windows\SysWOW64\attrib.exe
                              Wow64 process (32bit):true
                              Commandline:attrib "C:\Users\user\Desktop\test.exe" +s +h
                              Imagebase:0xd60000
                              File size:19'456 bytes
                              MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:7
                              Start time:06:40:56
                              Start date:25/12/2024
                              Path:C:\Windows\SysWOW64\attrib.exe
                              Wow64 process (32bit):true
                              Commandline:attrib "C:\Users\user\Desktop" +s +h
                              Imagebase:0xd60000
                              File size:19'456 bytes
                              MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:8
                              Start time:06:40:56
                              Start date:25/12/2024
                              Path:C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe"
                              Imagebase:0x400000
                              File size:257'536 bytes
                              MD5 hash:57BD4F73690590693B5B921F29679410
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:Borland Delphi
                              Yara matches:
                              • Rule: DarkComet_2, Description: DarkComet, Source: 00000008.00000002.3265409763.0000000002381000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                              • Rule: DarkComet_2, Description: DarkComet, Source: 00000008.00000002.3265409763.000000000237A000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                              • Rule: ProjectM_DarkComet_1, Description: Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157, Source: 00000008.00000002.3265409763.00000000022D3000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                              • Rule: ProjectM_DarkComet_1, Description: Detects ProjectM Malware - file cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157, Source: C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe, Author: Florian Roth
                              Antivirus matches:
                              • Detection: 100%, Avira
                              • Detection: 100%, Joe Sandbox ML
                              • Detection: 97%, ReversingLabs
                              • Detection: 94%, Virustotal, Browse
                              Reputation:low
                              Has exited:false

                              Target ID:9
                              Start time:06:40:56
                              Start date:25/12/2024
                              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                              Imagebase:0x900000
                              File size:828'368 bytes
                              MD5 hash:6F0F06D6AB125A99E43335427066A4A1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:10
                              Start time:06:40:56
                              Start date:25/12/2024
                              Path:C:\Windows\explorer.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\explorer.exe"
                              Imagebase:0x7ff674740000
                              File size:5'141'208 bytes
                              MD5 hash:662F4F92FDE3557E86D110526BB578D5
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:11
                              Start time:06:40:56
                              Start date:25/12/2024
                              Path:C:\Windows\SysWOW64\notepad.exe
                              Wow64 process (32bit):true
                              Commandline:notepad
                              Imagebase:0x970000
                              File size:165'888 bytes
                              MD5 hash:E92D3A824A0578A50D2DD81B5060145F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:false

                              Target ID:12
                              Start time:06:41:09
                              Start date:25/12/2024
                              Path:C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe"
                              Imagebase:0x400000
                              File size:257'536 bytes
                              MD5 hash:57BD4F73690590693B5B921F29679410
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:Borland Delphi
                              Yara matches:
                              • Rule: DarkComet_2, Description: DarkComet, Source: 0000000C.00000002.2137622893.00000000022FB000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                              • Rule: DarkComet_2, Description: DarkComet, Source: 0000000C.00000002.2137622893.0000000002351000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                              Has exited:true

                              Target ID:14
                              Start time:06:41:17
                              Start date:25/12/2024
                              Path:C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\AppData\Local\Temp\ChromeCookies\ChromeCookie.exe"
                              Imagebase:0x400000
                              File size:257'536 bytes
                              MD5 hash:57BD4F73690590693B5B921F29679410
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:Borland Delphi
                              Yara matches:
                              • Rule: DarkComet_2, Description: DarkComet, Source: 0000000E.00000002.2218818182.000000000232B000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                              • Rule: DarkComet_2, Description: DarkComet, Source: 0000000E.00000002.2218818182.0000000002381000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:2.9%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:7.4%
                                Total number of Nodes:938
                                Total number of Limit Nodes:56
                                execution_graph 45440 485248 45441 48525f 45440->45441 45461 421708 45441->45461 45443 48528c 45465 4217a0 45443->45465 45451 4852d6 45452 4852ff 45451->45452 45453 4852e5 45451->45453 45510 405818 45452->45510 45509 4058e0 11 API calls 45453->45509 45456 4852fd 45524 422008 45456->45524 45458 485319 45528 405554 45458->45528 45462 42170f 45461->45462 45532 4216c4 45462->45532 45464 421726 45464->45443 45466 4217c7 45465->45466 45467 4217ad 45465->45467 45471 4218e4 45466->45471 45468 4217b3 RegCloseKey 45467->45468 45469 4217bd 45467->45469 45468->45469 45536 421770 45469->45536 45555 4055c8 45471->45555 45473 421930 45476 421941 45473->45476 45478 42196b 45473->45478 45474 421910 45474->45473 45559 405a84 11 API calls 45474->45559 45477 42195d RegOpenKeyExA 45476->45477 45482 42199d 45477->45482 45479 421991 RegCreateKeyExA 45478->45479 45479->45482 45480 4219d3 45483 405530 11 API calls 45480->45483 45481 4219c6 45561 4217cc 13 API calls 45481->45561 45482->45480 45482->45481 45560 4058e0 11 API calls 45482->45560 45486 4219e8 45483->45486 45487 422068 45486->45487 45562 421fb8 45487->45562 45490 422082 45565 405620 45490->45565 45491 4220d1 45493 405530 11 API calls 45491->45493 45495 4220c6 45493->45495 45494 42208d 45570 4221f0 45494->45570 45502 405a44 45495->45502 45497 4220a5 45498 4220c8 45497->45498 45500 4220b1 45497->45500 45585 42162c 42 API calls 45498->45585 45576 405c6c 45500->45576 45503 405a76 45502->45503 45505 405a49 45502->45505 45504 405530 11 API calls 45503->45504 45506 405a6c 45504->45506 45505->45503 45507 405a5d 45505->45507 45506->45451 45508 405620 11 API calls 45507->45508 45508->45506 45511 40585d 45510->45511 45512 40581c 45510->45512 45511->45456 45513 405584 45512->45513 45514 405826 45512->45514 45515 405598 45513->45515 45521 4055f4 11 API calls 45513->45521 45514->45511 45517 405852 45514->45517 45518 40583b 45514->45518 45516 4055c6 45515->45516 45522 402f1c 11 API calls 45515->45522 45516->45456 45520 405c6c 11 API calls 45517->45520 45519 405c6c 11 API calls 45518->45519 45523 405840 45519->45523 45520->45523 45521->45515 45522->45516 45523->45456 45525 422018 45524->45525 45609 422188 45525->45609 45527 422033 45527->45458 45530 40555a 45528->45530 45529 405580 45530->45529 45531 402f1c 11 API calls 45530->45531 45531->45530 45533 4216ca 45532->45533 45534 4217a0 14 API calls 45533->45534 45535 4216e2 45534->45535 45535->45464 45537 42177a 45536->45537 45538 42179c 45536->45538 45539 421780 RegFlushKey 45537->45539 45540 421786 RegCloseKey 45537->45540 45538->45466 45539->45540 45542 405530 45540->45542 45543 405551 45542->45543 45544 405536 45542->45544 45543->45538 45544->45543 45546 402f1c 45544->45546 45547 402f2a 45546->45547 45548 402f20 45546->45548 45547->45543 45548->45547 45549 403029 45548->45549 45553 407688 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 45548->45553 45554 402ff8 7 API calls 45549->45554 45552 40304a 45552->45543 45553->45549 45554->45552 45556 4055cc 45555->45556 45557 4055f0 45556->45557 45558 402f1c 11 API calls 45556->45558 45557->45474 45558->45557 45559->45473 45561->45480 45586 421f68 45562->45586 45564 421fcc 45564->45490 45564->45491 45590 4055f4 45565->45590 45567 405630 45568 405530 11 API calls 45567->45568 45569 405648 45568->45569 45569->45494 45605 4059dc 45570->45605 45573 422224 45607 40dbf4 42 API calls 45573->45607 45574 422243 45574->45497 45577 405c79 45576->45577 45584 405ca9 45576->45584 45579 405ca2 45577->45579 45581 405c85 45577->45581 45578 405530 11 API calls 45580 405c93 45578->45580 45582 4055f4 11 API calls 45579->45582 45580->45495 45608 402f34 11 API calls 45581->45608 45582->45584 45584->45578 45585->45495 45587 421f81 45586->45587 45588 421f95 RegQueryValueExA 45587->45588 45589 421fac 45588->45589 45589->45564 45591 4055f8 45590->45591 45592 40561c 45590->45592 45595 402f00 45591->45595 45592->45567 45594 405605 45594->45567 45596 402f17 45595->45596 45599 402f04 45595->45599 45596->45594 45597 402f0e 45597->45594 45598 403029 45604 402ff8 7 API calls 45598->45604 45599->45597 45599->45598 45603 407688 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 45599->45603 45602 40304a 45602->45594 45603->45598 45604->45602 45606 4059e0 RegQueryValueExA 45605->45606 45606->45573 45606->45574 45607->45574 45608->45580 45610 4221a1 45609->45610 45611 4221b5 RegSetValueExA 45610->45611 45612 4221c3 45611->45612 45613 4221e2 45611->45613 45615 40dbf4 42 API calls 45612->45615 45613->45527 45615->45613 45616 48c308 45617 48c31f 45616->45617 45624 40a16c 45617->45624 45621 48c369 45633 40a3ac DosDateTimeToFileTime 45621->45633 45625 40a180 45624->45625 45626 40a1bf 45624->45626 45625->45626 45627 40a1b9 CreateFileA 45625->45627 45628 40d218 45626->45628 45627->45626 45638 40d24c 45628->45638 45631 40d244 45631->45621 45634 40a3d2 LocalFileTimeToFileTime 45633->45634 45635 40a3f5 GetLastError 45633->45635 45634->45635 45636 40a3e3 SetFileTime 45634->45636 45637 40a3fc CloseHandle 45635->45637 45636->45635 45636->45637 45646 40cc64 45638->45646 45643 40d227 45643->45631 45645 40976c 42 API calls 45643->45645 45644 40d27a 45644->45643 45680 40d1e0 12 API calls 45644->45680 45645->45631 45647 40ccb0 45646->45647 45648 40ccc2 45647->45648 45649 40ccf6 45647->45649 45681 40cb6c CharNextA 45648->45681 45684 40e8cc CompareStringA 45649->45684 45652 40cccb 45653 405a44 11 API calls 45652->45653 45654 40ccde 45653->45654 45682 409b7c 11 API calls 45654->45682 45656 40cce9 45683 40cbb4 CompareStringA 45656->45683 45657 40cec8 45659 405554 11 API calls 45657->45659 45660 40cf7d 45659->45660 45661 405530 11 API calls 45660->45661 45662 40cf85 45661->45662 45662->45644 45679 40cfb0 12 API calls 45662->45679 45663 40ccf1 45663->45657 45664 40ce44 45663->45664 45667 40cd72 45663->45667 45687 40bd48 GetLocalTime 45664->45687 45666 40ce0e 45673 40cdfe 45666->45673 45667->45657 45668 40ce03 45667->45668 45669 40cdf5 45667->45669 45670 40ce09 45668->45670 45668->45673 45685 40cc08 GetLocalTime 45669->45685 45686 40bd48 GetLocalTime 45670->45686 45673->45657 45674 40cebf 45673->45674 45678 40cecf 45673->45678 45688 40cb6c CharNextA 45674->45688 45676 409b18 CompareStringA 45676->45678 45677 405a44 11 API calls 45677->45678 45678->45657 45678->45676 45678->45677 45679->45644 45680->45643 45681->45652 45682->45656 45683->45663 45684->45663 45685->45673 45686->45666 45687->45666 45688->45657 45689 48f888 45690 48f890 45689->45690 45690->45690 45731 4076d4 GetModuleHandleA 45690->45731 45706 48f92a 45791 4058e0 11 API calls 45706->45791 45732 407707 45731->45732 45792 4051dc 45732->45792 45735 48afe8 45736 402f00 11 API calls 45735->45736 45737 48b00e GetCurrentProcess OpenProcessToken 45736->45737 45738 48b02c GetTokenInformation 45737->45738 45739 48b025 Sleep 45737->45739 45740 48b04c 45738->45740 45741 48b045 Sleep 45738->45741 45739->45738 45742 402f00 11 API calls 45740->45742 45741->45740 45743 48b056 45742->45743 45744 402f00 11 API calls 45743->45744 45749 48b062 45744->45749 45745 48b0c7 45746 402f1c 11 API calls 45745->45746 45748 48b0ce 45746->45748 45747 48b074 LookupPrivilegeNameA LookupPrivilegeDisplayNameA 45747->45749 45750 402f1c 11 API calls 45748->45750 45749->45745 45749->45747 46229 48aea8 45749->46229 45751 48b0d6 45750->45751 45753 402f1c 11 API calls 45751->45753 45754 48b0dd 45753->45754 45755 405530 11 API calls 45754->45755 45756 48b0f2 45755->45756 45757 48deec 45756->45757 45758 48def7 45757->45758 46241 48bf2c 45758->46241 45761 405584 11 API calls 45762 48df24 45761->45762 45763 405530 11 API calls 45762->45763 45764 48df39 45763->45764 45765 48df60 45764->45765 45766 48df7c 45765->45766 46249 48dde0 45766->46249 45770 48dfa0 45771 48dfc6 45770->45771 46259 405864 45770->46259 45773 405554 11 API calls 45771->45773 45775 48dfe0 45773->45775 45774 48dfb9 46274 4616b4 15 API calls 45774->46274 45777 405584 45775->45777 45778 405588 45777->45778 45781 405598 45777->45781 45780 4055f4 11 API calls 45778->45780 45778->45781 45779 4055c6 45783 40f234 GetModuleFileNameA 45779->45783 45780->45781 45781->45779 45782 402f1c 11 API calls 45781->45782 45782->45779 45784 405620 11 API calls 45783->45784 45785 40f25b 45784->45785 45786 40a5a0 45785->45786 45787 40a5b3 45786->45787 45788 405a44 11 API calls 45787->45788 45789 40a5c4 45788->45789 45790 4735e8 11 API calls 45789->45790 45790->45706 45793 40520f 45792->45793 45796 405174 45793->45796 45797 4051b7 CoInitialize 45796->45797 45798 405184 45796->45798 45797->45735 45798->45797 45803 48f0ac 45798->45803 45819 48f6d4 45798->45819 45833 4069c8 45798->45833 45837 4016f8 45798->45837 45804 48f110 45803->45804 45805 48f0c6 45803->45805 45804->45798 45841 40521c 45805->45841 45807 48f0f2 45845 40e1f8 45807->45845 45808 48f0d0 45808->45807 45809 405584 11 API calls 45808->45809 45809->45807 45815 48f106 45855 40f4ac GetModuleHandleA 45815->45855 45820 48f74c 45819->45820 45821 48f6ee GetVersion 45819->45821 45820->45798 45972 45dae0 GetCurrentProcessId 45821->45972 45825 48f712 46004 419174 44 API calls 45825->46004 45827 48f71c 46005 419120 44 API calls 45827->46005 45829 48f72c 46006 419120 44 API calls 45829->46006 45831 48f73c 46007 419120 44 API calls 45831->46007 45834 4069d8 GetModuleFileNameA 45833->45834 45836 4069f4 45833->45836 46208 406c2c GetModuleFileNameA RegOpenKeyExA 45834->46208 45836->45798 46227 40168c 45837->46227 45839 401700 VirtualAlloc 45840 401717 45839->45840 45840->45798 45842 405228 45841->45842 45844 40523d 45842->45844 45932 407550 45842->45932 45844->45808 45939 40dbb8 45845->45939 45847 40e20a 45848 40dbb8 42 API calls 45847->45848 45849 40e221 45848->45849 45850 406eac 45849->45850 45851 402f00 11 API calls 45850->45851 45852 406eb9 45851->45852 45853 40e314 GetVersionExA 45852->45853 45854 40e32b 45853->45854 45854->45815 45856 40f4cd 45855->45856 45857 40f4bd GetProcAddress 45855->45857 45858 40ebcc 45856->45858 45857->45856 45859 40ebd4 45858->45859 45859->45859 45943 40eb08 GetThreadLocale 45859->45943 45863 40ebf4 45864 40ec02 GetThreadLocale 45863->45864 45952 40d5c0 17 API calls 45863->45952 45953 40d334 12 API calls 45864->45953 45867 40ec1b 45868 405584 11 API calls 45867->45868 45869 40ec28 45868->45869 45954 40d334 12 API calls 45869->45954 45871 40ec3d 45955 40d334 12 API calls 45871->45955 45873 40ec61 45956 40d380 GetLocaleInfoA 45873->45956 45875 40ec7e 45957 40d380 GetLocaleInfoA 45875->45957 45877 40ec91 45958 40d334 12 API calls 45877->45958 45879 40ecab 45959 40d380 GetLocaleInfoA 45879->45959 45881 40ecc8 45960 40d334 12 API calls 45881->45960 45883 40ece2 45961 40d670 14 API calls 45883->45961 45885 40eced 45886 405584 11 API calls 45885->45886 45887 40ecfa 45886->45887 45962 40d334 12 API calls 45887->45962 45889 40ed0f 45963 40d670 14 API calls 45889->45963 45891 40ed1a 45892 405584 11 API calls 45891->45892 45893 40ed27 45892->45893 45964 40d380 GetLocaleInfoA 45893->45964 45895 40ed35 45965 40d334 12 API calls 45895->45965 45897 40ed4f 45898 405584 11 API calls 45897->45898 45899 40ed5c 45898->45899 45966 40d334 12 API calls 45899->45966 45901 40ed71 45902 405584 11 API calls 45901->45902 45903 40ed7e 45902->45903 45904 405530 11 API calls 45903->45904 45905 40ed86 45904->45905 45906 405530 11 API calls 45905->45906 45907 40ed8e 45906->45907 45967 40d334 12 API calls 45907->45967 45909 40eda3 45910 40edc0 45909->45910 45911 40edb1 45909->45911 45913 4055c8 11 API calls 45910->45913 45912 4055c8 11 API calls 45911->45912 45914 40edbe 45912->45914 45913->45914 45968 40d334 12 API calls 45914->45968 45916 40ede2 45917 40ee20 45916->45917 45969 40d334 12 API calls 45916->45969 45970 4058e0 11 API calls 45917->45970 45920 40ee05 45925 40ee22 45920->45925 45926 40ee13 45920->45926 45929 4055c8 11 API calls 45925->45929 45928 4055c8 11 API calls 45926->45928 45928->45917 45929->45917 45933 407561 45932->45933 45934 407592 45932->45934 45933->45934 45938 406a10 30 API calls 45933->45938 45934->45842 45936 407581 LoadStringA 45937 405620 11 API calls 45936->45937 45937->45934 45938->45936 45940 40dbbf 45939->45940 45941 407550 42 API calls 45940->45941 45942 40dbd7 45941->45942 45942->45847 45944 40eb33 45943->45944 45945 40eb7b GetSystemMetrics 45944->45945 45946 40eb75 45944->45946 45947 40eb8a GetSystemMetrics 45945->45947 45946->45947 45948 40eba3 45947->45948 45949 40eb9d 45947->45949 45951 40d3e8 44 API calls 45948->45951 45971 40eaac GetCPInfo 45949->45971 45951->45863 45952->45864 45953->45867 45954->45871 45955->45873 45956->45875 45957->45877 45958->45879 45959->45881 45960->45883 45961->45885 45962->45889 45963->45891 45964->45895 45965->45897 45966->45901 45967->45909 45968->45916 45969->45920 45971->45948 46008 40af98 45972->46008 45975 405584 11 API calls 45976 45db29 45975->45976 45977 45db33 GlobalAddAtomA GetCurrentThreadId 45976->45977 45978 40af98 42 API calls 45977->45978 45979 45db6d 45978->45979 45980 405584 11 API calls 45979->45980 45981 45db7a 45980->45981 45982 45db84 GlobalAddAtomA 45981->45982 45983 4059dc 45982->45983 45984 45db9a RegisterClipboardFormatA 45983->45984 46011 419ab0 45984->46011 45986 45dbb1 46015 45d6e8 45986->46015 45988 45dbbb 46023 45d494 45988->46023 45990 45dbc7 46027 443b58 45990->46027 45992 45dbda 46044 444d60 45992->46044 45994 45dbf0 46060 419260 44 API calls 45994->46060 45996 45dc1a GetModuleHandleA 45997 45dc3a 45996->45997 45998 45dc2a GetProcAddress 45996->45998 45999 405530 11 API calls 45997->45999 45998->45997 46000 45dc4f 45999->46000 46001 405530 11 API calls 46000->46001 46002 45dc57 46001->46002 46003 4190d4 44 API calls 46002->46003 46003->45825 46004->45827 46005->45829 46006->45831 46007->45820 46061 40afac 46008->46061 46012 419ab6 46011->46012 46013 419acb RtlInitializeCriticalSection 46012->46013 46014 419ae0 46013->46014 46014->45986 46016 45d855 46015->46016 46017 45d6fc SetErrorMode 46015->46017 46016->45988 46018 45d720 GetModuleHandleA GetProcAddress 46017->46018 46019 45d73c 46017->46019 46018->46019 46020 45d837 SetErrorMode 46019->46020 46021 45d749 LoadLibraryA 46019->46021 46020->45988 46021->46020 46022 45d765 10 API calls 46021->46022 46022->46020 46024 45d49a 46023->46024 46076 45d684 46024->46076 46026 45d508 46026->45990 46028 443b62 46027->46028 46089 41ffc4 46028->46089 46030 443b78 46093 443f14 LoadCursorA 46030->46093 46033 443bb1 46034 443bed 73A0A570 46033->46034 46035 443c01 46034->46035 46098 424528 46035->46098 46037 443c2f 46038 424528 13 API calls 46037->46038 46039 443c41 46038->46039 46040 424528 13 API calls 46039->46040 46041 443c53 46040->46041 46102 444344 46041->46102 46043 443c60 46043->45992 46045 444d6f 46044->46045 46046 41ffc4 42 API calls 46045->46046 46047 444d85 46046->46047 46048 444e42 LoadIconA 46047->46048 46142 42b29c 46048->46142 46050 444e65 GetModuleFileNameA OemToCharA 46051 444eae 46050->46051 46052 444ed4 CharNextA CharLowerA 46051->46052 46053 444efc 46052->46053 46149 421140 GetClassInfoA 46053->46149 46056 444f25 46181 44724c 11 API calls 46056->46181 46059 444f47 46059->45994 46060->45996 46062 40afd2 46061->46062 46065 40b005 46062->46065 46074 40aba0 42 API calls 46062->46074 46064 40b06f 46066 405620 11 API calls 46064->46066 46065->46064 46073 40b022 46065->46073 46067 40afa7 46066->46067 46067->45975 46068 40b063 46070 405c6c 11 API calls 46068->46070 46069 405530 11 API calls 46069->46073 46070->46067 46071 405c6c 11 API calls 46071->46073 46073->46068 46073->46069 46073->46071 46075 40aba0 42 API calls 46073->46075 46074->46065 46075->46073 46077 45d693 46076->46077 46078 45d68c 46076->46078 46081 45d6a0 46077->46081 46082 45d6a9 46077->46082 46079 45d6cf SendMessageA 46078->46079 46080 45d6be SystemParametersInfoA 46078->46080 46085 45d691 46078->46085 46079->46085 46080->46085 46087 45d614 6 API calls 46081->46087 46088 45d5e4 SystemParametersInfoA 46082->46088 46085->46026 46086 45d6b0 46086->46026 46087->46085 46088->46086 46090 41ffcb 46089->46090 46091 41fff0 46090->46091 46120 420180 42 API calls 46090->46120 46091->46030 46094 443f33 46093->46094 46095 443f4c LoadCursorA 46094->46095 46097 443b9b GetKeyboardLayout 46094->46097 46121 443fd0 46095->46121 46097->46033 46099 42452e 46098->46099 46124 423a34 46099->46124 46101 424550 46101->46037 46103 44435d 46102->46103 46104 44438f SystemParametersInfoA 46103->46104 46105 4443a2 CreateFontIndirectA 46104->46105 46106 4443ba GetStockObject 46104->46106 46134 424978 46105->46134 46107 424978 16 API calls 46106->46107 46110 4443ce SystemParametersInfoA 46107->46110 46111 444422 46110->46111 46112 4443ee CreateFontIndirectA 46110->46112 46139 424a5c 16 API calls 46111->46139 46113 424978 16 API calls 46112->46113 46115 444407 CreateFontIndirectA 46113->46115 46117 424978 16 API calls 46115->46117 46116 444432 GetStockObject 46118 424978 16 API calls 46116->46118 46119 444420 46117->46119 46118->46119 46119->46043 46120->46091 46122 402f00 11 API calls 46121->46122 46123 443fe3 46122->46123 46123->46094 46125 423a4f 46124->46125 46132 423a1c RtlEnterCriticalSection 46125->46132 46127 423a59 46128 402f00 11 API calls 46127->46128 46130 423ab6 46127->46130 46128->46130 46133 423a28 RtlLeaveCriticalSection 46130->46133 46131 423b07 46131->46101 46132->46127 46133->46131 46140 424468 GetObjectA 46134->46140 46136 42498a 46141 4246ac 15 API calls 46136->46141 46138 424993 46138->46110 46139->46116 46140->46136 46141->46138 46143 42b2b4 46142->46143 46144 42b320 46143->46144 46145 42b2b8 GetIconInfo 46143->46145 46144->46050 46145->46144 46146 42b2c6 GetObjectA 46145->46146 46147 42b2e7 46146->46147 46148 42b2f9 DeleteObject DeleteObject 46146->46148 46147->46148 46148->46050 46150 421170 46149->46150 46151 42117e UnregisterClassA 46150->46151 46152 42118f RegisterClassA 46150->46152 46153 421199 46150->46153 46151->46152 46152->46153 46182 40857c 46153->46182 46155 4211c7 46156 4211e4 46155->46156 46186 421084 46155->46186 46156->46056 46159 4450b4 46156->46159 46158 4211db SetWindowLongA 46158->46156 46160 4450dd 46159->46160 46161 44523a 46159->46161 46160->46161 46164 421084 VirtualAlloc 46160->46164 46162 405530 11 API calls 46161->46162 46163 44524f 46162->46163 46163->46056 46165 4450f6 GetClassInfoA 46164->46165 46166 44511c RegisterClassA 46165->46166 46171 445151 46165->46171 46167 445135 46166->46167 46166->46171 46168 407550 42 API calls 46167->46168 46169 445142 46168->46169 46195 40dafc 11 API calls 46169->46195 46172 40857c CreateWindowExA 46171->46172 46173 4451ae SetWindowLongA 46172->46173 46174 4451d1 46173->46174 46175 4451fc GetSystemMenu DeleteMenu DeleteMenu 46173->46175 46190 445f74 46174->46190 46175->46161 46177 44522d DeleteMenu 46175->46177 46177->46161 46179 445f74 46 API calls 46180 4451f0 SetClassLongA 46179->46180 46180->46175 46181->46059 46189 403418 46182->46189 46184 40858f CreateWindowExA 46185 4085c9 46184->46185 46185->46155 46187 421094 VirtualAlloc 46186->46187 46188 4210c2 46186->46188 46187->46188 46188->46158 46189->46184 46196 42b008 46190->46196 46193 445f83 LoadIconA 46194 4451d8 SendMessageA 46193->46194 46194->46179 46195->46171 46199 42b044 46196->46199 46200 42b012 46199->46200 46201 42b054 46199->46201 46200->46193 46200->46194 46201->46200 46202 41b940 42 API calls 46201->46202 46203 42b073 46202->46203 46203->46200 46204 42b080 46203->46204 46205 42b08d 46203->46205 46207 425a04 42 API calls 46204->46207 46206 426564 45 API calls 46205->46206 46206->46200 46207->46200 46209 406caf 46208->46209 46210 406c6f RegOpenKeyExA 46208->46210 46226 406a68 12 API calls 46209->46226 46210->46209 46212 406c8d RegOpenKeyExA 46210->46212 46212->46209 46214 406d38 lstrcpyn GetThreadLocale GetLocaleInfoA 46212->46214 46213 406cd4 RegQueryValueExA 46215 406cf4 RegQueryValueExA 46213->46215 46216 406d12 RegCloseKey 46213->46216 46217 406e52 46214->46217 46218 406d6f 46214->46218 46215->46216 46216->45836 46217->45836 46218->46217 46220 406d7f lstrlen 46218->46220 46221 406d97 46220->46221 46221->46217 46222 406de4 46221->46222 46223 406dbc lstrcpyn LoadLibraryExA 46221->46223 46222->46217 46224 406dee lstrcpyn LoadLibraryExA 46222->46224 46223->46222 46224->46217 46225 406e20 lstrcpyn LoadLibraryExA 46224->46225 46225->46217 46226->46213 46228 40162c 46227->46228 46228->45839 46230 48aebe 46229->46230 46231 48aee8 46230->46231 46232 48aef5 GetCurrentProcess OpenProcessToken 46230->46232 46235 405530 11 API calls 46231->46235 46233 48af9a GetLastError 46232->46233 46234 48af12 46232->46234 46233->46231 46237 48af2c LookupPrivilegeValueA 46234->46237 46236 48afd5 46235->46236 46236->45749 46238 48af38 AdjustTokenPrivileges 46237->46238 46239 48af7c CloseHandle 46237->46239 46238->46239 46239->45749 46242 48bf40 46241->46242 46242->46242 46245 409d70 46242->46245 46246 409d80 46245->46246 46247 405620 11 API calls 46246->46247 46248 409d88 46247->46248 46248->45761 46250 48ddfb 46249->46250 46251 48de17 FindResourceA LoadResource SizeofResource LockResource 46250->46251 46252 405620 11 API calls 46251->46252 46253 48de46 46252->46253 46254 405584 11 API calls 46253->46254 46255 48de50 FreeResource 46254->46255 46256 405554 11 API calls 46255->46256 46257 48de70 46256->46257 46258 409b7c 11 API calls 46257->46258 46258->45770 46260 405868 46259->46260 46261 4058cb 46259->46261 46262 405870 46260->46262 46263 405584 46260->46263 46262->46261 46264 40587f 46262->46264 46266 405584 11 API calls 46262->46266 46267 4055f4 11 API calls 46263->46267 46268 405598 46263->46268 46264->46261 46269 4055f4 11 API calls 46264->46269 46265 4055c6 46265->45774 46266->46264 46267->46268 46268->46265 46270 402f1c 11 API calls 46268->46270 46271 40589b 46269->46271 46270->46265 46272 405584 11 API calls 46271->46272 46273 4058c7 46272->46273 46273->45774 46274->45771 46275 472924 46276 472936 46275->46276 46277 47294d SetFileAttributesA 46276->46277 46278 405530 11 API calls 46277->46278 46279 472968 46278->46279 46280 48e340 46281 48e353 46280->46281 46285 4735e8 11 API calls 46281->46285 46286 485150 46281->46286 46285->46281 46287 485167 46286->46287 46288 48516f RegOpenKeyA 46287->46288 46289 4851a5 46288->46289 46290 4851c1 RegSetValueExA RegCloseKey 46289->46290 46291 4851ef 46290->46291 46292 405554 11 API calls 46291->46292 46293 485209 Sleep 46292->46293 46293->46281 46294 46d36c 46295 46d382 46294->46295 46296 405864 11 API calls 46295->46296 46297 46d3a4 46296->46297 46298 46d3ac ShellExecuteA 46297->46298 46299 405554 11 API calls 46298->46299 46300 46d3d8 46299->46300 46301 473b6c 46302 40f234 12 API calls 46301->46302 46303 473b94 46302->46303 46320 4097dc 46303->46320 46308 4097dc 11 API calls 46309 473bb6 46308->46309 46310 473bed 46309->46310 46311 40f234 12 API calls 46309->46311 46312 405554 11 API calls 46310->46312 46313 473bcb 46311->46313 46315 473c14 46312->46315 46314 4097dc 11 API calls 46313->46314 46316 473bd6 46314->46316 46331 473b04 12 API calls 46316->46331 46318 473be2 46319 4097dc 11 API calls 46318->46319 46319->46310 46321 4097e9 46320->46321 46323 4097f7 46320->46323 46322 405c6c 11 API calls 46321->46322 46321->46323 46322->46323 46324 473a88 46323->46324 46332 473a40 74601370 46324->46332 46326 473aab 46327 405864 11 API calls 46326->46327 46328 473aba 46327->46328 46329 405530 11 API calls 46328->46329 46330 473acf 46329->46330 46330->46308 46331->46318 46333 473a76 46332->46333 46335 473a66 46332->46335 46334 405530 11 API calls 46333->46334 46334->46335 46335->46326 46336 48b724 GetCurrentHwProfileA 46337 48b77f 46336->46337 46340 48b7e2 46336->46340 46338 489bb0 12 API calls 46337->46338 46339 48b78a 46338->46339 46341 40a5d4 11 API calls 46339->46341 46342 405a44 11 API calls 46340->46342 46343 48b79b 46341->46343 46344 48b815 46342->46344 46345 405818 11 API calls 46343->46345 46364 489bb0 46344->46364 46347 48b7ab 46345->46347 46349 48c91c 43 API calls 46347->46349 46351 48b7bb 46349->46351 46400 4058e0 11 API calls 46351->46400 46354 405818 11 API calls 46355 48b841 46354->46355 46389 48c91c 46355->46389 46365 405c6c 11 API calls 46364->46365 46366 489bd6 46365->46366 46367 489bea GetTempPathA 46366->46367 46368 405c6c 11 API calls 46367->46368 46369 489bfb 46368->46369 46370 405a44 11 API calls 46369->46370 46371 489c1a 46370->46371 46372 489c29 46371->46372 46373 489c3a 46371->46373 46374 405864 11 API calls 46372->46374 46375 405584 11 API calls 46373->46375 46376 489c38 46374->46376 46375->46376 46377 405554 11 API calls 46376->46377 46378 489c5e 46377->46378 46379 40a5d4 46378->46379 46380 40a5e4 46379->46380 46381 40a611 46380->46381 46382 40a5fd 46380->46382 46385 40a67e 46381->46385 46387 40a63e 46381->46387 46383 405a44 11 API calls 46382->46383 46384 40a60f 46383->46384 46384->46354 46385->46384 46386 405530 11 API calls 46385->46386 46386->46384 46388 405a44 11 API calls 46387->46388 46388->46384 46390 48c935 46389->46390 46391 48c973 GetVolumeInformationA 46390->46391 46392 48c97d 46391->46392 46393 48c990 46391->46393 46394 48c981 46392->46394 46395 48c992 46392->46395 46397 405530 11 API calls 46393->46397 46402 409e5c 11 API calls 46394->46402 46396 40af98 42 API calls 46395->46396 46396->46393 46399 48b851 46397->46399 46401 4058e0 11 API calls 46399->46401 46402->46393 46403 48c0a4 46404 48c0bb 46403->46404 46405 421708 14 API calls 46404->46405 46406 48c0f0 46405->46406 46407 4217a0 14 API calls 46406->46407 46408 48c0fe 46407->46408 46409 4218e4 15 API calls 46408->46409 46410 48c10c 46409->46410 46422 42230c 46410->46422 46413 48c11c 46427 421808 46413->46427 46414 48c132 46416 4218e4 15 API calls 46414->46416 46418 48c140 46416->46418 46417 48c128 46420 405554 11 API calls 46417->46420 46419 422008 43 API calls 46418->46419 46419->46417 46421 48c189 46420->46421 46439 422274 46422->46439 46425 422354 46425->46413 46425->46414 46426 42234e RegCloseKey 46426->46425 46428 4055c8 11 API calls 46427->46428 46429 421837 46428->46429 46431 421857 46429->46431 46448 405a84 11 API calls 46429->46448 46432 42187e RegCreateKeyExA 46431->46432 46433 42189a 46432->46433 46434 42188f RegCloseKey 46432->46434 46449 40dbf4 42 API calls 46433->46449 46435 4218b9 46434->46435 46437 405530 11 API calls 46435->46437 46438 4218d3 46437->46438 46438->46417 46440 4055c8 11 API calls 46439->46440 46441 42229d 46440->46441 46443 4222bd 46441->46443 46447 405a84 11 API calls 46441->46447 46444 4222de RegOpenKeyExA 46443->46444 46445 405530 11 API calls 46444->46445 46446 4222f9 46445->46446 46446->46425 46446->46426 46447->46443 46448->46431 46449->46435 46450 472974 46451 47298d 46450->46451 46452 40a5a0 11 API calls 46451->46452 46453 4729a7 46452->46453 46454 4729af SetFileAttributesA 46453->46454 46455 405554 11 API calls 46454->46455 46456 4729cf 46455->46456 46457 4186d4 46458 41870e 46457->46458 46460 4186e5 46457->46460 46460->46458 46462 419898 46460->46462 46466 404544 46460->46466 46463 4198a2 46462->46463 46464 4198b6 46463->46464 46472 419824 42 API calls 46463->46472 46464->46460 46467 404573 46466->46467 46468 4045a2 CompareStringA 46467->46468 46469 4045c2 46468->46469 46470 405530 11 API calls 46469->46470 46471 4045ca 46470->46471 46471->46460 46472->46464 46473 45f5f8 46485 40a26c 46473->46485 46475 45f60d 46476 45f636 CreateFileA 46475->46476 46477 45f71f 46475->46477 46476->46477 46478 45f649 CreateFileMappingA 46476->46478 46479 45f677 MapViewOfFile 46478->46479 46480 45f701 CloseHandle 46478->46480 46481 45f6e3 CloseHandle 46479->46481 46482 45f69f GetFileSize 46479->46482 46489 45eb54 46482->46489 46484 45f6c5 UnmapViewOfFile 46486 4059dc 46485->46486 46487 40a276 GetFileAttributesA 46486->46487 46488 40a281 46487->46488 46488->46475 46489->46484 46490 42105c 46493 4458cc 46490->46493 46491 421072 46494 445934 46493->46494 46500 445902 46493->46500 46586 445780 46494->46586 46496 44593f 46498 4459f6 46496->46498 46499 44594f 46496->46499 46497 419898 42 API calls 46497->46500 46501 445a4c 46498->46501 46502 4459fd 46498->46502 46503 445955 46499->46503 46504 445e7a 46499->46504 46500->46494 46500->46497 46507 445923 46500->46507 46512 445e94 46501->46512 46513 445a59 46501->46513 46522 4459da 46501->46522 46505 445a03 46502->46505 46540 445cf1 46502->46540 46503->46507 46510 4459df 46503->46510 46511 4459b9 46503->46511 46503->46522 46607 446a88 12 API calls 46504->46607 46508 445a33 46505->46508 46509 445a0a 46505->46509 46507->46491 46516 445e03 GetLastActivePopup 46508->46516 46517 445a3e 46508->46517 46514 445a10 46509->46514 46515 445d8a 46509->46515 46525 445f1e 46510->46525 46526 4459e8 46510->46526 46523 445b70 46511->46523 46524 4459bf 46511->46524 46518 445eb5 46512->46518 46519 445e9d 46512->46519 46520 445a64 46513->46520 46521 445e3c 46513->46521 46528 445a17 46514->46528 46529 445a8e 46514->46529 46515->46507 46576 445dcf IsWindowEnabled 46515->46576 46516->46507 46517->46522 46532 445ccf 46517->46532 46609 4466b8 43 API calls 46518->46609 46608 44665c 12 API calls 46519->46608 46520->46504 46520->46522 46605 43b75c IsIconic 46521->46605 46522->46507 46593 445844 NtdllDefWindowProc_A 46522->46593 46598 445844 NtdllDefWindowProc_A 46523->46598 46535 445b27 46524->46535 46536 4459c8 46524->46536 46612 445844 NtdllDefWindowProc_A 46525->46612 46526->46522 46537 445b3c 46526->46537 46528->46522 46542 445c57 SendMessageA 46528->46542 46544 445aa0 46529->46544 46545 445aa9 46529->46545 46602 44641c IsWindowEnabled 46532->46602 46597 445844 NtdllDefWindowProc_A 46535->46597 46547 4459d1 46536->46547 46548 445c83 46536->46548 46541 445f74 46 API calls 46537->46541 46539 445e47 46539->46507 46549 445e4f GetFocus 46539->46549 46540->46507 46557 445d17 IsWindowEnabled 46540->46557 46541->46507 46542->46507 46543 445b76 46550 445bb5 46543->46550 46551 445b93 46543->46551 46552 445ab6 46544->46552 46561 445aa7 46544->46561 46594 445f90 68 API calls 46545->46594 46547->46522 46554 445ef8 46547->46554 46548->46507 46567 445c90 46548->46567 46549->46507 46556 445e60 46549->46556 46600 445430 46 API calls 46550->46600 46599 445490 43 API calls 46551->46599 46595 446070 67 API calls 46552->46595 46560 45d684 9 API calls 46554->46560 46606 43ba80 GetCurrentThreadId 46556->46606 46557->46507 46564 445d25 46557->46564 46568 445f0a 46560->46568 46596 445844 NtdllDefWindowProc_A 46561->46596 46575 445d2c IsWindowVisible 46564->46575 46565 445b9b PostMessageA 46565->46507 46566 445bbd PostMessageA 46566->46507 46601 405388 7 API calls 46567->46601 46610 4457d8 11 API calls 46568->46610 46569 445abe 46569->46507 46571 445e67 46571->46507 46574 445e6f SetFocus 46571->46574 46574->46507 46575->46507 46578 445d3a GetFocus 46575->46578 46576->46507 46579 445dd9 46576->46579 46577 445f15 46611 445844 NtdllDefWindowProc_A 46577->46611 46603 4585f8 46578->46603 46579->46507 46584 445dec SetFocus 46579->46584 46582 445d4f SetFocus 46604 451b4c 46582->46604 46584->46507 46585 445d6e SetFocus 46585->46507 46587 445793 46586->46587 46588 4457bd 46587->46588 46589 4457ad 46587->46589 46590 44579e SetThreadLocale 46587->46590 46588->46496 46589->46588 46592 444344 24 API calls 46589->46592 46591 40ebcc 57 API calls 46590->46591 46591->46589 46592->46588 46593->46507 46594->46507 46595->46569 46596->46507 46597->46507 46598->46543 46599->46565 46600->46566 46602->46507 46603->46582 46604->46585 46605->46539 46606->46571 46607->46569 46608->46569 46609->46569 46610->46577 46611->46507 46612->46507 46613 42b47c MulDiv 46614 42b4b8 46613->46614 46615 42b4ce 46613->46615 46654 42b438 73A0A570 SelectObject GetTextMetricsA 46614->46654 46617 4216c4 14 API calls 46615->46617 46619 42b4da 46617->46619 46618 42b4bd 46618->46615 46621 4055c8 11 API calls 46618->46621 46620 4217a0 14 API calls 46619->46620 46622 42b4f8 46620->46622 46621->46615 46629 421a08 46622->46629 46625 42b521 46626 422068 44 API calls 46627 42b519 46626->46627 46628 421770 13 API calls 46627->46628 46628->46625 46630 4055c8 11 API calls 46629->46630 46631 421a32 46630->46631 46633 421a52 46631->46633 46655 405a84 11 API calls 46631->46655 46634 421a80 RegOpenKeyExA 46633->46634 46635 421a92 46634->46635 46636 421ad0 46634->46636 46637 421abe 46635->46637 46656 4058e0 11 API calls 46635->46656 46641 421af0 RegOpenKeyExA 46636->46641 46657 4217cc 13 API calls 46637->46657 46640 421acb 46643 405530 11 API calls 46640->46643 46642 421b02 46641->46642 46648 421b3d 46641->46648 46644 421b2e 46642->46644 46658 4058e0 11 API calls 46642->46658 46645 421bb8 46643->46645 46659 4217cc 13 API calls 46644->46659 46645->46625 46645->46626 46649 421b5b RegOpenKeyExA 46648->46649 46649->46640 46650 421b6d 46649->46650 46651 421b96 46650->46651 46660 4058e0 11 API calls 46650->46660 46661 4217cc 13 API calls 46651->46661 46654->46618 46655->46633 46657->46640 46659->46640 46661->46640

                                Control-flow Graph

                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 00406C48
                                • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00406C66
                                • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00406C84
                                • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 00406CA2
                                • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,00406D31,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 00406CEB
                                • RegQueryValueExA.ADVAPI32(?,00406E98,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,00406D31,?,80000001), ref: 00406D09
                                • RegCloseKey.ADVAPI32(?,00406D38,00000000,00000000,00000005,00000000,00406D31,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00406D2B
                                • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 00406D48
                                • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 00406D55
                                • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 00406D5B
                                • lstrlen.KERNEL32(00000000), ref: 00406D86
                                • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 00406DCD
                                • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00406DDD
                                • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 00406E05
                                • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00406E15
                                • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00406E3B
                                • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00406E4B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                • String ID: .$Software\Borland\Delphi\Locales$Software\Borland\Locales
                                • API String ID: 1759228003-3917250287
                                • Opcode ID: 94ea5a7645543b784b85917594646716072f6a36af782de090db3c5bc8994513
                                • Instruction ID: 0791cc663e9e3f03257ec30459fd5a506504409c9953da17e558a2b9a1f5220e
                                • Opcode Fuzzy Hash: 94ea5a7645543b784b85917594646716072f6a36af782de090db3c5bc8994513
                                • Instruction Fuzzy Hash: D0516275A0031C7EFB21E6A4CC46FEF76AC9B04744F5100B7BA05F61C2D6789A548B68

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 513 48aea8-48aee6 call 4059cc 516 48aee8-48aef0 513->516 517 48aef5-48af0c GetCurrentProcess OpenProcessToken 513->517 518 48afc0-48afd5 call 405530 516->518 519 48af9a-48afad GetLastError 517->519 520 48af12-48af36 call 4059dc LookupPrivilegeValueA 517->520 519->518 525 48af38-48af42 520->525 526 48af7c-48af92 CloseHandle 520->526 527 48af4f-48af51 525->527 528 48af44 525->528 529 48af54-48af77 AdjustTokenPrivileges 527->529 528->529 530 48af46-48af4d 528->530 529->526 530->529
                                APIs
                                • GetCurrentProcess.KERNEL32(00000028,?,00000000,0048AFAF,?,00000000,0048AFD6), ref: 0048AEFF
                                • OpenProcessToken.ADVAPI32(00000000,00000028,?,00000000,0048AFAF,?,00000000,0048AFD6), ref: 0048AF05
                                • LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 0048AF2F
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000010,?,?,00000000,00000000,?,00000000,0048AF93,?,00000000,00000028,?,00000000), ref: 0048AF77
                                • CloseHandle.KERNEL32(?,0048AF9A,00000000,0048AF93,?,00000000,00000028,?,00000000,0048AFAF,?,00000000,0048AFD6), ref: 0048AF8D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                                • String ID:
                                • API String ID: 3038321057-0
                                • Opcode ID: 586cd32b4f829490d7bdc1f83c6a9d589776fc218804ee8c8e98b50f9624b6ec
                                • Instruction ID: f27b56eae406db6a86ffc6d2388615f6d5ab0a83f32bae61da12d7da3f97915c
                                • Opcode Fuzzy Hash: 586cd32b4f829490d7bdc1f83c6a9d589776fc218804ee8c8e98b50f9624b6ec
                                • Instruction Fuzzy Hash: 0D31CD71908204AEFB02EB65DC02AAF77FDEB49704F514877F604E2580D7BC5910C72A

                                Control-flow Graph

                                APIs
                                • FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 0048DE1A
                                • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,0000000A,00000000,0048DE71), ref: 0048DE24
                                • SizeofResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,0000000A,00000000,0048DE71), ref: 0048DE2E
                                • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0000000A,00000000,0048DE71), ref: 0048DE36
                                • FreeResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0000000A,00000000,0048DE71), ref: 0048DE51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Resource$FindFreeLoadLockSizeof
                                • String ID:
                                • API String ID: 4159136517-0
                                • Opcode ID: 330c4b42ba5b275b599114ee44931eceb03e62696c017da7dd77a7b239deaad5
                                • Instruction ID: 40824acdeb4c668ed84c2e309baa483db7f9e82a47f3d8707da4bd9c696a7e82
                                • Opcode Fuzzy Hash: 330c4b42ba5b275b599114ee44931eceb03e62696c017da7dd77a7b239deaad5
                                • Instruction Fuzzy Hash: 96019670B087047FE705B7668C92B6F76ACDB45714F50447AB804F72C2DA785E0185A9
                                APIs
                                • GetVersion.KERNEL32(00000000,0048F75A), ref: 0048F6EE
                                  • Part of subcall function 0045DAE0: GetCurrentProcessId.KERNEL32(?,00000000,0045DC58), ref: 0045DB01
                                  • Part of subcall function 0045DAE0: GlobalAddAtomA.KERNEL32(00000000), ref: 0045DB34
                                  • Part of subcall function 0045DAE0: GetCurrentThreadId.KERNEL32 ref: 0045DB4F
                                  • Part of subcall function 0045DAE0: GlobalAddAtomA.KERNEL32(00000000), ref: 0045DB85
                                  • Part of subcall function 0045DAE0: RegisterClipboardFormatA.USER32(00000000), ref: 0045DB9B
                                  • Part of subcall function 0045DAE0: GetModuleHandleA.KERNEL32(USER32,00000000,00000000,?,?,00000000,0045DC58), ref: 0045DC1F
                                  • Part of subcall function 0045DAE0: GetProcAddress.KERNEL32(00000000,AnimateWindow), ref: 0045DC30
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AtomCurrentGlobal$AddressClipboardFormatHandleModuleProcProcessRegisterThreadVersion
                                • String ID:
                                • API String ID: 3775504709-0
                                • Opcode ID: 1a6ca772e665be0d5e2147fce052cbccd5c6586128211161abdec0926dca869e
                                • Instruction ID: 5dfe81b55c574a427b98dbe66f5d6a9d533f93086e21499d56a6489fb626f44d
                                • Opcode Fuzzy Hash: 1a6ca772e665be0d5e2147fce052cbccd5c6586128211161abdec0926dca869e
                                • Instruction Fuzzy Hash: 2DF01D382052469FEB15FB2AFCA685B37A5F747B04365453AE90083672CA3DAC81CF4D
                                APIs
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 0044586E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: NtdllProc_Window
                                • String ID:
                                • API String ID: 4255912815-0
                                • Opcode ID: e7547670c3529c1ec234d97f517d145bc95432ad10ab0304b8c8c35a46a1a0af
                                • Instruction ID: 8d43881d36beb9ca30850cefc944607bdbfa04bbe24ebecfb5ada86ebc02f145
                                • Opcode Fuzzy Hash: e7547670c3529c1ec234d97f517d145bc95432ad10ab0304b8c8c35a46a1a0af
                                • Instruction Fuzzy Hash: 55F0C579205608AFCB40DF9DC688D4AFBE8BB4C264B058195F988CB321C634FD808F90

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 25 4458cc-445900 26 445934-445949 call 445780 25->26 27 445902-445903 25->27 32 4459f6-4459fb 26->32 33 44594f 26->33 28 445905-445921 call 419898 27->28 56 445930-445932 28->56 57 445923-44592b 28->57 35 445a4c-445a51 32->35 36 4459fd 32->36 37 445955-445958 33->37 38 445e7a-445e8f call 446a88 33->38 45 445a72-445a77 35->45 46 445a53 35->46 39 445cf1-445cf9 36->39 40 445a03-445a08 36->40 41 4459b4-4459b7 37->41 42 44595a 37->42 60 445f4d-445f55 38->60 39->60 61 445cff-445d0a call 4585f8 39->61 49 445a33-445a38 40->49 50 445a0a 40->50 53 4459df-4459e2 41->53 54 4459b9 41->54 51 445960-445963 42->51 52 445c9f-445ca9 42->52 47 445ecd-445ed4 45->47 48 445a7d-445a83 45->48 58 445e94-445e9b 46->58 59 445a59-445a5e 46->59 71 445ed6-445ee5 47->71 72 445ee7-445ef6 47->72 73 445cae-445cca call 447c6c 48->73 74 445a89 48->74 64 445e03-445e1f GetLastActivePopup 49->64 65 445a3e-445a41 49->65 62 445a10-445a15 50->62 63 445d8a-445d95 50->63 75 445f46-445f47 call 445844 51->75 76 445969 51->76 52->60 79 445f1e-445f2f call 4449c4 call 445844 53->79 80 4459e8-4459eb 53->80 77 445b70-445b91 call 445844 54->77 78 4459bf-4459c2 54->78 56->26 56->28 66 445f6c-445f72 57->66 67 445eb5-445ec8 call 4466b8 58->67 68 445e9d-445eb0 call 44665c 58->68 69 445a64-445a67 59->69 70 445e3c-445e49 call 43b75c 59->70 60->66 61->60 104 445d10-445d1f call 4585f8 IsWindowEnabled 61->104 84 445a17-445a1d 62->84 85 445a8e-445a9e 62->85 91 445d97-445d9d 63->91 92 445da9-445db2 63->92 64->60 98 445e25-445e37 64->98 88 445a47 65->88 89 445ccf-445cdc call 44641c 65->89 67->60 68->60 69->38 94 445a6d 69->94 70->60 122 445e4f-445e5a GetFocus 70->122 71->60 72->60 73->60 74->75 108 445f4c 75->108 76->41 127 445bb5-445bd2 call 445430 PostMessageA 77->127 128 445b93-445bb0 call 445490 PostMessageA 77->128 96 445b27-445b37 call 445844 78->96 97 4459c8-4459cb 78->97 79->60 100 4459f1 80->100 101 445b3c-445b4a call 445f74 80->101 106 445c57-445c7e SendMessageA 84->106 107 445a23-445a28 84->107 114 445aa0-445aa5 85->114 115 445aa9-445ab1 call 445f90 85->115 88->75 89->60 150 445ce2-445cec 89->150 91->92 111 445db4-445dc0 call 44821c 92->111 112 445df7-445dfe 92->112 94->75 96->60 118 4459d1-4459d4 97->118 119 445c83-445c8a 97->119 98->60 100->75 101->60 104->60 154 445d25-445d34 call 4585f8 IsWindowVisible 104->154 106->60 125 445f31-445f3b call 432228 call 43238c 107->125 126 445a2e 107->126 108->60 111->112 158 445dc2-445dd7 call 4585f8 IsWindowEnabled 111->158 112->60 131 445ab6-445abe call 446070 114->131 132 445aa7-445aca call 445844 114->132 115->60 135 445ef8-445f1c call 45d684 call 4457d8 call 445844 118->135 136 4459da 118->136 119->60 129 445c90-445c9a call 40f320 call 405388 119->129 122->60 140 445e60-445e69 call 43ba80 122->140 125->60 126->75 127->60 128->60 129->60 131->60 132->60 135->60 136->75 140->60 170 445e6f-445e75 SetFocus 140->170 150->60 154->60 175 445d3a-445d85 GetFocus call 4585f8 SetFocus call 451b4c SetFocus 154->175 158->112 176 445dd9-445dea call 4585f8 158->176 170->60 175->60 176->112 184 445dec-445df2 SetFocus 176->184 184->112
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e887bd4f1dfaa7686a9bcd8d1f279d96a173f6335af05e048c1ae5566ea5a7b6
                                • Instruction ID: 5d41e5e6e978f13ffba52ebebe76b2d2211e2989e7cd194b6ee29f4bff662562
                                • Opcode Fuzzy Hash: e887bd4f1dfaa7686a9bcd8d1f279d96a173f6335af05e048c1ae5566ea5a7b6
                                • Instruction Fuzzy Hash: 0BE16235600A04EFEF10DB69C986A5EB7B1AF15314F2441ABE805DB353DB38EE45DB0A

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 00421084: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040), ref: 004210A2
                                • GetClassInfoA.USER32(00400000,00444D50,?), ref: 00445113
                                • RegisterClassA.USER32(004925FC), ref: 0044512B
                                  • Part of subcall function 00407550: LoadStringA.USER32(00000000,0000FF91,?,00001000), ref: 00407582
                                • SetWindowLongA.USER32(?,000000FC,?), ref: 004451C2
                                • SendMessageA.USER32(?,00000080,00000001,00000000), ref: 004451E4
                                • SetClassLongA.USER32(?,000000F2,00000000), ref: 004451F7
                                • GetSystemMenu.USER32(?,00000000,?,000000FC,?), ref: 00445202
                                • DeleteMenu.USER32(00000000,0000F030,00000000,?,00000000,?,000000FC,?), ref: 00445211
                                • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,?,00000000,?,000000FC,?), ref: 0044521E
                                • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,?,00000000,?,000000FC,?), ref: 00445235
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Menu$ClassDelete$Long$AllocInfoLoadMessageRegisterSendStringSystemVirtualWindow
                                • String ID: LPI$PMD
                                • API String ID: 2103932818-807424164
                                • Opcode ID: a795f8368c72bf9755699305abd7a5f4cfd762d93ac83f927319b92138bcea53
                                • Instruction ID: 45774ccd7fe4bbee92ba76f83e27da9187e70a830207dbb7965792a263479547
                                • Opcode Fuzzy Hash: a795f8368c72bf9755699305abd7a5f4cfd762d93ac83f927319b92138bcea53
                                • Instruction Fuzzy Hash: FA4165707446006FEB11EB79DD81F6633A8BB58708F54457BF940EB2D2DAB8AC448B6C

                                Control-flow Graph

                                APIs
                                • GetCurrentProcessId.KERNEL32(?,00000000,0045DC58), ref: 0045DB01
                                • GlobalAddAtomA.KERNEL32(00000000), ref: 0045DB34
                                • GetCurrentThreadId.KERNEL32 ref: 0045DB4F
                                • GlobalAddAtomA.KERNEL32(00000000), ref: 0045DB85
                                • RegisterClipboardFormatA.USER32(00000000), ref: 0045DB9B
                                  • Part of subcall function 00419AB0: RtlInitializeCriticalSection.NTDLL(004174C8), ref: 00419ACF
                                  • Part of subcall function 0045D6E8: SetErrorMode.KERNEL32(00008000), ref: 0045D701
                                  • Part of subcall function 0045D6E8: GetModuleHandleA.KERNEL32(USER32,00000000,0045D84E,?,00008000), ref: 0045D725
                                  • Part of subcall function 0045D6E8: GetProcAddress.KERNEL32(00000000,WINNLSEnableIME), ref: 0045D732
                                  • Part of subcall function 0045D6E8: LoadLibraryA.KERNEL32(imm32.dll,00000000,0045D84E,?,00008000), ref: 0045D74E
                                  • Part of subcall function 0045D6E8: GetProcAddress.KERNEL32(00000000,ImmGetContext), ref: 0045D770
                                  • Part of subcall function 0045D6E8: GetProcAddress.KERNEL32(00000000,ImmReleaseContext), ref: 0045D785
                                  • Part of subcall function 0045D6E8: GetProcAddress.KERNEL32(00000000,ImmGetConversionStatus), ref: 0045D79A
                                  • Part of subcall function 0045D6E8: GetProcAddress.KERNEL32(00000000,ImmSetConversionStatus), ref: 0045D7AF
                                  • Part of subcall function 0045D6E8: GetProcAddress.KERNEL32(00000000,ImmSetOpenStatus), ref: 0045D7C4
                                  • Part of subcall function 0045D6E8: GetProcAddress.KERNEL32(00000000,ImmSetCompositionWindow), ref: 0045D7D9
                                  • Part of subcall function 0045D6E8: GetProcAddress.KERNEL32(00000000,ImmSetCompositionFontA), ref: 0045D7EE
                                  • Part of subcall function 0045D6E8: GetProcAddress.KERNEL32(00000000,ImmGetCompositionStringA), ref: 0045D803
                                  • Part of subcall function 0045D6E8: GetProcAddress.KERNEL32(00000000,ImmIsIME), ref: 0045D818
                                  • Part of subcall function 0045D6E8: GetProcAddress.KERNEL32(00000000,ImmNotifyIME), ref: 0045D82D
                                  • Part of subcall function 0045D6E8: SetErrorMode.KERNEL32(?,0045D855,00008000), ref: 0045D848
                                  • Part of subcall function 00443B58: GetKeyboardLayout.USER32(00000000), ref: 00443B9D
                                  • Part of subcall function 00443B58: 73A0A570.USER32(00000000,00000000), ref: 00443BF2
                                  • Part of subcall function 00444D60: LoadIconA.USER32(00400000,MAINICON), ref: 00444E57
                                  • Part of subcall function 00444D60: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON), ref: 00444E89
                                  • Part of subcall function 00444D60: OemToCharA.USER32(?,?), ref: 00444E9C
                                  • Part of subcall function 00444D60: CharNextA.USER32(?,00400000,?,00000100,00400000,MAINICON), ref: 00444EDB
                                  • Part of subcall function 00444D60: CharLowerA.USER32(00000000,?,00400000,?,00000100,00400000,MAINICON), ref: 00444EE1
                                • GetModuleHandleA.KERNEL32(USER32,00000000,00000000,?,?,00000000,0045DC58), ref: 0045DC1F
                                • GetProcAddress.KERNEL32(00000000,AnimateWindow), ref: 0045DC30
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$CharModule$AtomCurrentErrorGlobalHandleLoadMode$A570ClipboardCriticalFileFormatIconInitializeKeyboardLayoutLibraryLowerNameNextProcessRegisterSectionThread
                                • String ID: AnimateWindow$ControlOfs%.8X%.8X$Delphi%.8X$USER32
                                • API String ID: 1424775178-1126952177
                                • Opcode ID: ffb51e500db148972dbc7beb344726cd61151559649c8c2c6e7fcfafe53c6a46
                                • Instruction ID: 6f53dff375a4883d2d831e657bded5a36ce5427faee736874cb8f4f836a9cbe8
                                • Opcode Fuzzy Hash: ffb51e500db148972dbc7beb344726cd61151559649c8c2c6e7fcfafe53c6a46
                                • Instruction Fuzzy Hash: FB412C70A042459FCB01EFB9DC82A9E77F5EB55308B50443BE805E7392DB78A904CB9D

                                Control-flow Graph

                                APIs
                                • LoadIconA.USER32(00400000,MAINICON), ref: 00444E57
                                • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON), ref: 00444E89
                                • OemToCharA.USER32(?,?), ref: 00444E9C
                                • CharNextA.USER32(?,00400000,?,00000100,00400000,MAINICON), ref: 00444EDB
                                • CharLowerA.USER32(00000000,?,00400000,?,00000100,00400000,MAINICON), ref: 00444EE1
                                  • Part of subcall function 004450B4: GetClassInfoA.USER32(00400000,00444D50,?), ref: 00445113
                                  • Part of subcall function 004450B4: RegisterClassA.USER32(004925FC), ref: 0044512B
                                  • Part of subcall function 004450B4: SetWindowLongA.USER32(?,000000FC,?), ref: 004451C2
                                  • Part of subcall function 004450B4: SendMessageA.USER32(?,00000080,00000001,00000000), ref: 004451E4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Char$Class$FileIconInfoLoadLongLowerMessageModuleNameNextRegisterSendWindow
                                • String ID: 08B$0PI$8PI$MAINICON$\tA
                                • API String ID: 2763768735-4242882941
                                • Opcode ID: 77cd31dde7a254b12dcbd14e884636f65d8ee8cfd0de4363eb70654305326d13
                                • Instruction ID: 06aa92317af97af354310108114fc43928138ba0e5fc63c50b1d0a67c31c050c
                                • Opcode Fuzzy Hash: 77cd31dde7a254b12dcbd14e884636f65d8ee8cfd0de4363eb70654305326d13
                                • Instruction Fuzzy Hash: AC519370A042449FDB00DF79D885B867BE4AF55308F0484BAE848CF397D7BE9948CB69

                                Control-flow Graph

                                APIs
                                • GetThreadLocale.KERNEL32(00000000,0040EE97,?,?,00000000,00000000), ref: 0040EC02
                                  • Part of subcall function 0040D334: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0040D352
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Locale$InfoThread
                                • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                                • API String ID: 4232894706-2493093252
                                • Opcode ID: 97c7d496bb53be2e2f1e8ccab3a885c64af014bd89a797615cdadca924b25190
                                • Instruction ID: aaeb9d40802ec5ae2508282512743e540ede4d173f4b74b0285699a3e9fdf19b
                                • Opcode Fuzzy Hash: 97c7d496bb53be2e2f1e8ccab3a885c64af014bd89a797615cdadca924b25190
                                • Instruction Fuzzy Hash: A8614030A142499BDB04FBA6DC41A9F76A6DB88344F50983BF501BB2C6CA3CDD198B5D

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 0040A26C: GetFileAttributesA.KERNEL32(00000000,?,0045F60D), ref: 0040A277
                                • CreateFileA.KERNEL32(00000000,80000000,00000003,00000000,00000003,08000080,00000000), ref: 0045F637
                                • CreateFileMappingA.KERNEL32(000000FF,00000000,00000002,00000000,00000000,00000000), ref: 0045F665
                                • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000,0045F6FA,?,00000000,0045F718,?,00000000,80000000,00000003,00000000,00000003), ref: 0045F691
                                • GetFileSize.KERNEL32(000000FF,00000000,00000000,0045F6DC,?,00000000,00000004,00000000,00000000,00000000,00000000,0045F6FA,?,00000000,0045F718), ref: 0045F6B3
                                • UnmapViewOfFile.KERNEL32(00000000,0045F6E3,0045F6DC,?,00000000,00000004,00000000,00000000,00000000,00000000,0045F6FA,?,00000000,0045F718,?,00000000), ref: 0045F6D6
                                • CloseHandle.KERNEL32(00000000,0045F701,00000000,00000000,00000000,0045F6FA,?,00000000,0045F718,?,00000000,80000000,00000003,00000000,00000003,08000080), ref: 0045F6F4
                                • CloseHandle.KERNEL32(000000FF,0045F71F,00000000,80000000,00000003,00000000,00000003,08000080,00000000), ref: 0045F712
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseCreateHandleView$AttributesMappingSizeUnmap
                                • String ID:
                                • API String ID: 167332613-0
                                • Opcode ID: b5eac0610075032de7a2513c2e8b1ccfa55d8627e30672ccf82c01737deb6b57
                                • Instruction ID: d9c6f71f691b19bcb4ee1194854831e90a332a8fa662ee832f42c67c2bd9428c
                                • Opcode Fuzzy Hash: b5eac0610075032de7a2513c2e8b1ccfa55d8627e30672ccf82c01737deb6b57
                                • Instruction Fuzzy Hash: 15310A70B44304BFEB11DBA5CC12F9E77A8EB49715F60047AF900B76C2D6B96908CB59

                                Control-flow Graph

                                APIs
                                • GetCurrentProcess.KERNEL32(00000028,?,00000000,0048B0F3), ref: 0048B016
                                • OpenProcessToken.ADVAPI32(00000000,00000028,?,00000000,0048B0F3), ref: 0048B01C
                                • Sleep.KERNEL32(00000001,00000000,00000028,?,00000000,0048B0F3), ref: 0048B027
                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,00000320,?,00000000,00000028,?,00000000,0048B0F3), ref: 0048B03C
                                • Sleep.KERNEL32(00000001,?,TokenIntegrityLevel,00000000,00000320,?,00000000,00000028,?,00000000,0048B0F3), ref: 0048B047
                                • LookupPrivilegeNameA.ADVAPI32(00000000,00000004,00000000,000000FF), ref: 0048B094
                                • LookupPrivilegeDisplayNameA.ADVAPI32(00000000,00000000,?,000000FF,?), ref: 0048B0A8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: LookupNamePrivilegeProcessSleepToken$CurrentDisplayInformationOpen
                                • String ID:
                                • API String ID: 1061088034-0
                                • Opcode ID: 21e2fa693b77e1687dd1e63adc00faec3f2a514a54548c721fb9981da1c068fc
                                • Instruction ID: 7c8d2886aa7ef519a2b7c923d08911df63507ab73f508915f19d2e4a7a9e0dd2
                                • Opcode Fuzzy Hash: 21e2fa693b77e1687dd1e63adc00faec3f2a514a54548c721fb9981da1c068fc
                                • Instruction Fuzzy Hash: 04312171A4420AAFDB11FBA58C45BAF76BCEB04748F40443AB510F72C2D77D990587A9

                                Control-flow Graph

                                APIs
                                • SystemParametersInfoA.USER32(0000001F,0000003C,?,00000000), ref: 00444399
                                • CreateFontIndirectA.GDI32(?), ref: 004443A6
                                • GetStockObject.GDI32(0000000D), ref: 004443BC
                                  • Part of subcall function 00424A5C: MulDiv.KERNEL32(00000000,?,00000048), ref: 00424A69
                                • SystemParametersInfoA.USER32(00000029,00000000,00000154,00000000), ref: 004443E5
                                • CreateFontIndirectA.GDI32(?), ref: 004443F5
                                • CreateFontIndirectA.GDI32(?), ref: 0044440E
                                • GetStockObject.GDI32(0000000D), ref: 00444434
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFontIndirect$InfoObjectParametersStockSystem
                                • String ID:
                                • API String ID: 2891467149-0
                                • Opcode ID: 73c0bd8e7eba965e0eed61374b502eb59efd9f208b8da5e283795ebf1aa8dac0
                                • Instruction ID: b1c09ccfec85a5ba36baee35f792ea941e583b01de7403cfe65684905621fe73
                                • Opcode Fuzzy Hash: 73c0bd8e7eba965e0eed61374b502eb59efd9f208b8da5e283795ebf1aa8dac0
                                • Instruction Fuzzy Hash: BF31A6707442049BEB50EB79DC82B9A73E4BB84304F4480BBB948DB296DE7C9C45CB2D

                                Control-flow Graph

                                APIs
                                • CoInitialize.OLE32(00000000), ref: 0048F8B5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Initialize
                                • String ID: .dcp$DCDATA$GENCODE$MPI$NETDATA
                                • API String ID: 2538663250-3060965071
                                • Opcode ID: c8d23b0a707152b339a570303755190e6830791e8e8d29d6a416c3cd974e37fe
                                • Instruction ID: b08631961c5cd19e193c3a866378085dc4ec355b107417d0119518117b8188ee
                                • Opcode Fuzzy Hash: c8d23b0a707152b339a570303755190e6830791e8e8d29d6a416c3cd974e37fe
                                • Instruction Fuzzy Hash: 3B415E30A00205AFDF00FFA5D881A9E77B5EB98708F10893AF800BB295D779AD15CB59

                                Control-flow Graph

                                APIs
                                • RegOpenKeyA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,?), ref: 00485199
                                • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,?,00000000,004851DE,?,00000000,0048520A), ref: 004851C6
                                • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,?,00000000,004851DE,?,00000000,0048520A), ref: 004851CF
                                Strings
                                • Software\Microsoft\Windows\CurrentVersion\Run, xrefs: 0048518F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenValue
                                • String ID: Software\Microsoft\Windows\CurrentVersion\Run
                                • API String ID: 779948276-1428018034
                                • Opcode ID: a9a44120790dd27ed231a7a141495d9def3d41c41f358777dd71e94df13e925a
                                • Instruction ID: 1700025a89521513581c772896e48f0ca3f8c3b0a114657fab2bfa2817695fa9
                                • Opcode Fuzzy Hash: a9a44120790dd27ed231a7a141495d9def3d41c41f358777dd71e94df13e925a
                                • Instruction Fuzzy Hash: 23118971A14604FFE701FB95CC92E5FBBBCDB08714F5144B6F504E2581D6386D008A68

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 556 42b47c-42b4b6 MulDiv 557 42b4b8-42b4bf call 42b438 556->557 558 42b4ce-42b500 call 4216c4 call 4217a0 call 421a08 556->558 557->558 563 42b4c1-42b4c9 call 4055c8 557->563 568 42b505-42b507 558->568 563->558 569 42b521-42b536 call 404650 568->569 570 42b509-42b51c call 422068 call 421770 568->570 570->569
                                APIs
                                • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0042B4A2
                                  • Part of subcall function 0042B438: 73A0A570.USER32(00000000), ref: 0042B441
                                  • Part of subcall function 0042B438: SelectObject.GDI32(00000000,058A00B4), ref: 0042B453
                                  • Part of subcall function 0042B438: GetTextMetricsA.GDI32(00000000), ref: 0042B45E
                                Strings
                                • SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes, xrefs: 0042B4F8
                                • Tahoma, xrefs: 0042B4C4
                                • MS Shell Dlg 2, xrefs: 0042B50C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: A570MetricsObjectSelectText
                                • String ID: MS Shell Dlg 2$SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes$Tahoma
                                • API String ID: 2329979789-1011973972
                                • Opcode ID: ff75d22deb57d8c69c22a3c40202624ec17a0e5eff89a5d65fc7e5ca5ae1e0f8
                                • Instruction ID: 2baebb24881f48a3b3c6291d9e922c7faec78eca70ad76c405db218042662dfc
                                • Opcode Fuzzy Hash: ff75d22deb57d8c69c22a3c40202624ec17a0e5eff89a5d65fc7e5ca5ae1e0f8
                                • Instruction Fuzzy Hash: 05118E30700254AFC711EF65E84295DB7E5EB5A708FD144BAE400AB6A1D739AD41CB5C

                                Control-flow Graph

                                APIs
                                • ShellExecuteA.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0046D3B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExecuteShell
                                • String ID: /k $cmd.exe$open
                                • API String ID: 587946157-2943618638
                                • Opcode ID: 9eae86065d0d93ebf250c3bbcf9c14ea5c5197c6d3b9a0c92b6e8e4b1917c459
                                • Instruction ID: b348eb8f8a4a7142209e6b7ca6197fd20041c88382e3d2082d80296213269b31
                                • Opcode Fuzzy Hash: 9eae86065d0d93ebf250c3bbcf9c14ea5c5197c6d3b9a0c92b6e8e4b1917c459
                                • Instruction Fuzzy Hash: ABF04F70F50708ABD714EA66CC52B5EBBA8DB44710F604077A804A27D1EA785A40892A
                                APIs
                                • GetClassInfoA.USER32(00400000,00421130,?), ref: 00421161
                                • UnregisterClassA.USER32(00421130,00400000), ref: 0042118A
                                • RegisterClassA.USER32(00491B50), ref: 00421194
                                • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 004211DF
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Class$InfoLongRegisterUnregisterWindow
                                • String ID:
                                • API String ID: 4025006896-0
                                • Opcode ID: dec3ee531a7ce402010801fe59b78d5cfa3083ca5ed5f45e72ed571559e40154
                                • Instruction ID: 110623671df19a8c119f7efad29f938b40404c1e1935042c7fba86dbaf329099
                                • Opcode Fuzzy Hash: dec3ee531a7ce402010801fe59b78d5cfa3083ca5ed5f45e72ed571559e40154
                                • Instruction Fuzzy Hash: 290161717441056BCB10EBA8AE81FAA3799E76C314F10423BFA54E73F1DA39A950875C
                                APIs
                                • DosDateTimeToFileTime.KERNEL32(?,?,?), ref: 0040A3C9
                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0040A3DA
                                • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?), ref: 0040A3EC
                                • GetLastError.KERNEL32(?,00000000,00000000,?,?,?), ref: 0040A3F5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Time$File$DateErrorLastLocal
                                • String ID:
                                • API String ID: 4098483309-0
                                • Opcode ID: 849e055ad73741d85f8b77c6e24adce14b30157ec6a4943e75ef51e4ddc398e9
                                • Instruction ID: 983d5f7c44628d8c784d5738126cf8fd5eabf3f31e4c252f5fb34eef9e9ed5dd
                                • Opcode Fuzzy Hash: 849e055ad73741d85f8b77c6e24adce14b30157ec6a4943e75ef51e4ddc398e9
                                • Instruction Fuzzy Hash: 74F01D62E1420C6AEB10DAE64D41BEFB3EC9B08244F100177BE04F2181F638AE4493AA
                                APIs
                                • GetKeyboardLayout.USER32(00000000), ref: 00443B9D
                                • 73A0A570.USER32(00000000,00000000), ref: 00443BF2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: A570KeyboardLayout
                                • String ID: \tA
                                • API String ID: 3858012219-3496985394
                                • Opcode ID: b60e4b735bba11c956e67c73bfda407d4b4f4db3c39a7610973aeb9c4602713a
                                • Instruction ID: 29537f1638e64609c9d649e3370045f7d653eb268bb0a8d821b114b3e0fef75c
                                • Opcode Fuzzy Hash: b60e4b735bba11c956e67c73bfda407d4b4f4db3c39a7610973aeb9c4602713a
                                • Instruction Fuzzy Hash: 7631FDB06042409FD740EF69E8C1B497BE0BB45359F44D57BF948DF3A2DB7AA8048B58
                                APIs
                                • RegCreateKeyExA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,000F003F,00000000,?,?,00000000,004218D4), ref: 0042187F
                                • RegCloseKey.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,000F003F,00000000,?,?,00000000,004218D4), ref: 00421893
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreate
                                • String ID: ddA
                                • API String ID: 2932200918-2966775115
                                • Opcode ID: 7f559e4a633603bdb811d58f77d66e659ed0bd7154da353762090d466b1b411f
                                • Instruction ID: cfad480237e28ed3f51aa3fa484e42dbb6bdc5b5e79649963ce829f546b57270
                                • Opcode Fuzzy Hash: 7f559e4a633603bdb811d58f77d66e659ed0bd7154da353762090d466b1b411f
                                • Instruction Fuzzy Hash: 5E216231B00208AFD710EBA5DC92BAF77E8DB54344F90407AF500E72D1DA78AE049759
                                APIs
                                • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,?,?,00000000,00421BB9), ref: 00421A81
                                • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00000000,?,?,00000000,00421BB9), ref: 00421AF1
                                • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00000000,00000000,00000000,?), ref: 00421B5C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Open
                                • String ID:
                                • API String ID: 71445658-0
                                • Opcode ID: 741013630ea307d4dee4a794fb5e03e928169802d1f4b30187e73d0d7af1e6fa
                                • Instruction ID: 62117f3e2099be30002a1187e1ac258d047a2b04edd82fdc1cf163ad4c72df03
                                • Opcode Fuzzy Hash: 741013630ea307d4dee4a794fb5e03e928169802d1f4b30187e73d0d7af1e6fa
                                • Instruction Fuzzy Hash: FD41A330F00618AFDB11EB65D841B9FB7FAEB54344FA0447AA804E32A1D778AF05DB48
                                APIs
                                • GetThreadLocale.KERNEL32 ref: 0040EB2A
                                • GetSystemMetrics.USER32(0000004A), ref: 0040EB7D
                                • GetSystemMetrics.USER32(0000002A), ref: 0040EB8C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: MetricsSystem$LocaleThread
                                • String ID:
                                • API String ID: 2159509485-0
                                • Opcode ID: 1aa49e37dacbf832dff8b917a021a9d23a2060c9d10b56b725361bdc9b6fbadb
                                • Instruction ID: 88fff8dd8369656633ad9e12758364492816d2b05fbde46ddfe4393e26846003
                                • Opcode Fuzzy Hash: 1aa49e37dacbf832dff8b917a021a9d23a2060c9d10b56b725361bdc9b6fbadb
                                • Instruction Fuzzy Hash: DB0148316007128AD320EA679441763BAE8DB41365F08C87FE8CAA72D1DB3CA851C75A
                                APIs
                                • GetVolumeInformationA.KERNEL32(00000000,00000000,00000104,?,?,?,00000000,00000104,00000000,0048C9CD,?,00000000,0048C9FA), ref: 0048C974
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: InformationVolume
                                • String ID: %.4x:%.4x
                                • API String ID: 2039140958-3532927987
                                • Opcode ID: dc07c9e469255b99c7459551e62b454771a897901b312345c20d514864062379
                                • Instruction ID: 64ba49aa807a29c7c7eb02e727126ae6cdba678ede47bc6f0b89cebbca66f9c3
                                • Opcode Fuzzy Hash: dc07c9e469255b99c7459551e62b454771a897901b312345c20d514864062379
                                • Instruction Fuzzy Hash: 772160B1A04208AEDB01EB95C891BEEBBF8EB49704F5044B6F544E2280E6795E00DB74
                                APIs
                                • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,?,?,?,?), ref: 0042221B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: QueryValue
                                • String ID: ldA
                                • API String ID: 3660427363-3200660723
                                • Opcode ID: 6573f74c1f9223d1a56143eaa92d6225a22fb892ff99ef68d3a97bed3f73a81d
                                • Instruction ID: 6d5f433d44f6d15f34e9e764ddc2f2ce11a8bdb33e462f041f710034e25ba14c
                                • Opcode Fuzzy Hash: 6573f74c1f9223d1a56143eaa92d6225a22fb892ff99ef68d3a97bed3f73a81d
                                • Instruction Fuzzy Hash: BE017C76A00208AFD700DA99DC81E9FB7ACAB58324F4081BBF904D7291D6349E0487A9
                                APIs
                                • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 004221BA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Value
                                • String ID: tdA
                                • API String ID: 3702945584-2901657147
                                • Opcode ID: 213107e27835ce7d087e0b0684be10673b617f4d20ad99c5d2e5d6d07da5e035
                                • Instruction ID: c0fde491dc406c808480cd6262d93edf6f5e19d59013018c1d6ea7df797640af
                                • Opcode Fuzzy Hash: 213107e27835ce7d087e0b0684be10673b617f4d20ad99c5d2e5d6d07da5e035
                                • Instruction Fuzzy Hash: 72F08171A001087BD700EA9ADC81EAFBBEC9F58224F044166BA18D7291D6389D01C7A4
                                APIs
                                • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,?,?,00000000,004219E9), ref: 0042195E
                                • RegCreateKeyExA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,004219E9), ref: 00421992
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateOpen
                                • String ID:
                                • API String ID: 436179556-0
                                • Opcode ID: 531d20957de1e832fb120bf5cb0d5285924e0ead67cdf493a5ff5e192394c714
                                • Instruction ID: 32a54d32d6eaeb6dc7cecc1fb34dd1f5fee2941a4ab35b4e6e971bf75e2f9f36
                                • Opcode Fuzzy Hash: 531d20957de1e832fb120bf5cb0d5285924e0ead67cdf493a5ff5e192394c714
                                • Instruction Fuzzy Hash: 8131A171B00658BFDB11EBA5D852B9FB7F9EB58304F90447AB400E32A1D778AE04CB58
                                APIs
                                • LoadCursorA.USER32(00000000,00007F00), ref: 00443F21
                                • LoadCursorA.USER32(00000000,00000000), ref: 00443F50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CursorLoad
                                • String ID:
                                • API String ID: 3238433803-0
                                • Opcode ID: 87701c6066a5e896434b7b70d042fb88e9644d8fd2c4faa6378f975c0d0750f7
                                • Instruction ID: f734e92d0488aed2b2b3a7793f3cdc645a992b91f45aeb0379925902a8e886eb
                                • Opcode Fuzzy Hash: 87701c6066a5e896434b7b70d042fb88e9644d8fd2c4faa6378f975c0d0750f7
                                • Instruction Fuzzy Hash: 65F0AE21F0430527A610597D5CD193E7264DBE1F36B60037BF93AD72D1CB395D454259
                                APIs
                                • RegFlushKey.ADVAPI32(00000000,?,004217DC,?,?,00000000,004219D3,?,00000000,00000000,00000000,?,?,00000000,004219E9), ref: 00421781
                                • RegCloseKey.ADVAPI32(00000000,?,004217DC,?,?,00000000,004219D3,?,00000000,00000000,00000000,?,?,00000000,004219E9), ref: 0042178A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseFlush
                                • String ID:
                                • API String ID: 320916635-0
                                • Opcode ID: 172e384c99633260910a49d367581092f6a30a1e7669a58c219ddb1578f9b5c9
                                • Instruction ID: fc924f33d897f6e4b67b20dec39f56b568dbcb6892d1a516178f316fd36fbaf7
                                • Opcode Fuzzy Hash: 172e384c99633260910a49d367581092f6a30a1e7669a58c219ddb1578f9b5c9
                                • Instruction Fuzzy Hash: 4ED01261B102009ACF50EE76D9C96077BD89F44344B44C4A7A808DF197D638D4048B28
                                APIs
                                • GetCurrentHwProfileA.ADVAPI32(?), ref: 0048B776
                                  • Part of subcall function 00489BB0: GetTempPathA.KERNEL32(?,00000000,00000000,00489C5F,?,?,00000005,00000000,00000000,?,00485721,00000000,00485755,?,?,00000005), ref: 00489BEC
                                  • Part of subcall function 0048C91C: GetVolumeInformationA.KERNEL32(00000000,00000000,00000104,?,?,?,00000000,00000104,00000000,0048C9CD,?,00000000,0048C9FA), ref: 0048C974
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CurrentInformationPathProfileTempVolume
                                • String ID:
                                • API String ID: 2757621706-0
                                • Opcode ID: 61eb7985d0b5bd84454a827fd82226c7999c8cca4c9cea09af0c50f0d06e985d
                                • Instruction ID: cdac46f4a2fce0d9d757658583800b58a2f3db20cb4703613cf624bb0b21ab22
                                • Opcode Fuzzy Hash: 61eb7985d0b5bd84454a827fd82226c7999c8cca4c9cea09af0c50f0d06e985d
                                • Instruction Fuzzy Hash: 39415370A046089FDB14FB65C851B9EB7B9EF88304F5084FBE408A3691DB385B459F58
                                APIs
                                • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,?,?,00000000,004222FA), ref: 004222DF
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Open
                                • String ID:
                                • API String ID: 71445658-0
                                • Opcode ID: 6d67a2beb7c1e076d38b4a70447f95d26d9b7e21cc5438e818ef7a82c653c995
                                • Instruction ID: 46b1baecfced4c43d3002fbbd46695a66abe038bcc33cdd1a8f76b1c16d2a77b
                                • Opcode Fuzzy Hash: 6d67a2beb7c1e076d38b4a70447f95d26d9b7e21cc5438e818ef7a82c653c995
                                • Instruction Fuzzy Hash: A901B570700608BFD700EBA5DC52B9F73ECEB48304FA0007AF805E3691EA799E009A58
                                APIs
                                • CompareStringA.KERNEL32(00000800,00000001,00000000,00000000,00000000,00000000,00000000,004045CB), ref: 004045AA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CompareString
                                • String ID:
                                • API String ID: 1825529933-0
                                • Opcode ID: 43944fdcd3f4fd2ba1253df16c312b873a3489a7e9ea22d13b794c4bab242403
                                • Instruction ID: 8e50b20754b99778aea2fd508be551c6341b36c8a3d143169880bc4ef9dbbca9
                                • Opcode Fuzzy Hash: 43944fdcd3f4fd2ba1253df16c312b873a3489a7e9ea22d13b794c4bab242403
                                • Instruction Fuzzy Hash: A201A2B1604608AFCB10FB299D4398FB7ACDB44704FA144BBB508F36D2EA785F108968
                                APIs
                                • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004085BB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: d30b484ec921266ed0f81df9ba10d707b2799ba7563b7fd009626a4d8c406424
                                • Instruction ID: 04bc7ba690b64a9cd008a2157679cce2d6694ce6da89d54e433565a2feb9e053
                                • Opcode Fuzzy Hash: d30b484ec921266ed0f81df9ba10d707b2799ba7563b7fd009626a4d8c406424
                                • Instruction Fuzzy Hash: B7F074B2700118BF9B80DE9DDD81D9B7BECEB4D264B054129FA08E7201D634ED118BB4
                                APIs
                                • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004085BB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: 8c04635c6acf6c9936716696905ed52fd88a22118769ec0bb158fc0be345f43f
                                • Instruction ID: e72d876b6b6ada9aac40d2b7e7319e3113bbcda415e24fd85b0ef7280cc01dba
                                • Opcode Fuzzy Hash: 8c04635c6acf6c9936716696905ed52fd88a22118769ec0bb158fc0be345f43f
                                • Instruction Fuzzy Hash: 19F074B2600118BF8B80DE9DDD81D9B7BECEB4D264B054129FA08E7201D634ED118BB4
                                APIs
                                  • Part of subcall function 00422274: RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,?,?,00000000,004222FA), ref: 004222DF
                                • RegCloseKey.ADVAPI32(00000000,00000000,00422371), ref: 0042234F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpen
                                • String ID:
                                • API String ID: 47109696-0
                                • Opcode ID: 0b42893eec94ef0df653ea858331c836291e82fb3a636da02a1ad569b43690bd
                                • Instruction ID: b3b501d6ce1d198399b5acc55379d4f22d8b1445f3d6bad9d7175ef71cc839ec
                                • Opcode Fuzzy Hash: 0b42893eec94ef0df653ea858331c836291e82fb3a636da02a1ad569b43690bd
                                • Instruction Fuzzy Hash: F1018C71E04304EFDB05CFA9D99195DB7F8EB49300BA140F6E800A3351D678EE00DA54
                                APIs
                                • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,?,?,?,?,00422140), ref: 00421F9A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: QueryValue
                                • String ID:
                                • API String ID: 3660427363-0
                                • Opcode ID: e0d48b570f592cecfd3cf1baece5e13ed63849365e340ae46cf7aee04b00ff40
                                • Instruction ID: f661016e06004236a119a1492c017bb107c3e28a2e266acda23c6d4558a64836
                                • Opcode Fuzzy Hash: e0d48b570f592cecfd3cf1baece5e13ed63849365e340ae46cf7aee04b00ff40
                                • Instruction Fuzzy Hash: 45F012663091046BD604E96A9C41FAB779CDB84355F04443EF548C7141DA24DD059769
                                APIs
                                • CreateFileA.KERNEL32(00000000,00000000,00000000,00000000,00000003,00000080,00000000,?,?,00417A80,0041BCD6,00000000,0041BD54,?,?,00417A80), ref: 0040A1BA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: 413e68b8dc054b864993eada5ac3718994ab04eddc793b5cb84f24028698c737
                                • Instruction ID: 189b4e2f57034ccfc0894311bd19ddf6960378b78735a07a5fdbd8cf74b751bb
                                • Opcode Fuzzy Hash: 413e68b8dc054b864993eada5ac3718994ab04eddc793b5cb84f24028698c737
                                • Instruction Fuzzy Hash: B9E06DB2B9065526F230B59D9CC2B8B614EC7857A9F19013BF514EB2D1C07CDC0662A9
                                APIs
                                • SetFileAttributesA.KERNEL32(00000000,?,00000000,004729D0), ref: 004729B0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AttributesFile
                                • String ID:
                                • API String ID: 3188754299-0
                                • Opcode ID: 586070523af7e67f8fb8a9420f93687de41047ef680ae4d7f873c01af75ab043
                                • Instruction ID: ca29aa0cc0c10cea8c2cc5f8fbca96927c4974e0813dc21f7bc577f7369313da
                                • Opcode Fuzzy Hash: 586070523af7e67f8fb8a9420f93687de41047ef680ae4d7f873c01af75ab043
                                • Instruction Fuzzy Hash: 82F0BBB0604704BFCB04EBA5CC5288EBBB8EB48310F60447BB404E36D1D6385E009958
                                APIs
                                • SetFileAttributesA.KERNEL32(00000000,?,00000000,00472969), ref: 0047294E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AttributesFile
                                • String ID:
                                • API String ID: 3188754299-0
                                • Opcode ID: 4c6a1fff45d03a0536812af493d1a32943d7e1c38b53daa8433cc08e4865bad8
                                • Instruction ID: 7b9874b43244ca409f97191b304c2d96234f3a274cde773ee34bcf6a84d82eb8
                                • Opcode Fuzzy Hash: 4c6a1fff45d03a0536812af493d1a32943d7e1c38b53daa8433cc08e4865bad8
                                • Instruction Fuzzy Hash: 9BE06DF0614704BFD705EB66CD5285EBBECEB497107E144B6F508E2691E6786E009868
                                APIs
                                • GetModuleFileNameA.KERNEL32(00400000,?,00000105), ref: 004069E6
                                  • Part of subcall function 00406C2C: GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 00406C48
                                  • Part of subcall function 00406C2C: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00406C66
                                  • Part of subcall function 00406C2C: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00406C84
                                  • Part of subcall function 00406C2C: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 00406CA2
                                  • Part of subcall function 00406C2C: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,00406D31,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 00406CEB
                                  • Part of subcall function 00406C2C: RegQueryValueExA.ADVAPI32(?,00406E98,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,00406D31,?,80000001), ref: 00406D09
                                  • Part of subcall function 00406C2C: RegCloseKey.ADVAPI32(?,00406D38,00000000,00000000,00000005,00000000,00406D31,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00406D2B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Open$FileModuleNameQueryValue$Close
                                • String ID:
                                • API String ID: 2796650324-0
                                • Opcode ID: cbb5936cde9907489e9df45f8c74cff5da1cf77b760d36e24b353934a863591f
                                • Instruction ID: cc8616488df236c9c396893e69553b13bc7ba1f64ff3dd71edb0a08e9e1e42dc
                                • Opcode Fuzzy Hash: cbb5936cde9907489e9df45f8c74cff5da1cf77b760d36e24b353934a863591f
                                • Instruction Fuzzy Hash: 13E06D71A002108BDF10EE68C8C1A8737D8AB08754F014966ED54EF38AD3B5DE208BD4
                                APIs
                                • 74601370.SHFOLDER(00000000,00000026,00000000,00000000,?,?,00473AAB,00000000,00473AD0,?,?,00000000), ref: 00473A51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: 74601370
                                • String ID:
                                • API String ID: 492834031-0
                                • Opcode ID: b43270a4b48d584534e77d9d86a836dadcc4e98bef61c45e96a6421820e75870
                                • Instruction ID: 20c61e685c0064e9ca10ddcb07d8265ffd1137f39ddf272bdb95c69999f92b8d
                                • Opcode Fuzzy Hash: b43270a4b48d584534e77d9d86a836dadcc4e98bef61c45e96a6421820e75870
                                • Instruction Fuzzy Hash: 41E0C26135470023F310142A0C83BA7204DCB807A5FA4403E3A58DA2E2ED8CDA04256A
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000105,?,00000000,00473B94,00000000,00473C15,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040F24B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileModuleName
                                • String ID:
                                • API String ID: 514040917-0
                                • Opcode ID: c5e80ab05d07216b1c405b7f831b1c66e2845050ae7b292eeb89b8df078fb885
                                • Instruction ID: 6b6d79c0b1cff8c4e6b8a822e08737e838be10aa554a27adf4acbba5d3dbee01
                                • Opcode Fuzzy Hash: c5e80ab05d07216b1c405b7f831b1c66e2845050ae7b292eeb89b8df078fb885
                                • Instruction Fuzzy Hash: BED02372B0091427D300E06C1C829FB31CD8B88728F400036759CD73C2F9655D0003D6
                                APIs
                                • GetFileAttributesA.KERNEL32(00000000,?,0045F60D), ref: 0040A277
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AttributesFile
                                • String ID:
                                • API String ID: 3188754299-0
                                • Opcode ID: ca430efd6d1af3f88608577e57a415d2a7a9318a6c8bf82aed908aade91cf978
                                • Instruction ID: 46b79c9c4024027cd3ed892940770b7067cf466bdeca4dc6913eab36ba71945e
                                • Opcode Fuzzy Hash: ca430efd6d1af3f88608577e57a415d2a7a9318a6c8bf82aed908aade91cf978
                                • Instruction Fuzzy Hash: 64C08CA03127000ADA9061BD1CC921F03884A4533836C0FBBF828F27D3D23E9872242B
                                APIs
                                • GetFileAttributesA.KERNEL32(00000000,00000001,0040A334,00000000,0040A39D,?,?,00000000,00000000,00000000,00000000), ref: 0040A29B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AttributesFile
                                • String ID:
                                • API String ID: 3188754299-0
                                • Opcode ID: 9b9b1dad7bcb53aec0f9ff38cc09dd645f46a9eca66c5f7f37c49a5f9f992f98
                                • Instruction ID: 60f1dd72526640fd44ef64e84f9aa93273782f2607bf232b5a25cf6c21d6d861
                                • Opcode Fuzzy Hash: 9b9b1dad7bcb53aec0f9ff38cc09dd645f46a9eca66c5f7f37c49a5f9f992f98
                                • Instruction Fuzzy Hash: 7DC08CE07117000BDE1061BE0CC111F22884AA53387741BBBF038F2BC3D23E9872242A
                                APIs
                                • CreateDirectoryA.KERNEL32(00000000,00000000,00000001,0040A378,00000000,0040A39D,?,?,00000000,00000000,00000000,00000000), ref: 0040A859
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateDirectory
                                • String ID:
                                • API String ID: 4241100979-0
                                • Opcode ID: 9a149f50b79a9565910e520281c21b8a27bb12522ecd158f1916ae7445b046ed
                                • Instruction ID: 3b5a30eb45fec5fb1e70915e099d61b5d1901136ac7d909abf41746f3b96e812
                                • Opcode Fuzzy Hash: 9a149f50b79a9565910e520281c21b8a27bb12522ecd158f1916ae7445b046ed
                                • Instruction Fuzzy Hash: 51B092E2B943401AEA0035BA0CC2F2F008CD70462AF60193BF101E6183D57AC8044065
                                APIs
                                • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040), ref: 004210A2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 308b0a8e157a38aba37f1cb0246eb6e8aea15631d0b9b0806a497c48e0e80e4f
                                • Instruction ID: 545a2004b0a199b424e65af0b6ad9350791d782df71e5161e124e3c884d4c3a1
                                • Opcode Fuzzy Hash: 308b0a8e157a38aba37f1cb0246eb6e8aea15631d0b9b0806a497c48e0e80e4f
                                • Instruction Fuzzy Hash: 8211487424031A9BD710DF19D881B82FBE5EB58390F10C53BEA988B795D378E9018BA9
                                APIs
                                  • Part of subcall function 0040A16C: CreateFileA.KERNEL32(00000000,00000000,00000000,00000000,00000003,00000080,00000000,?,?,00417A80,0041BCD6,00000000,0041BD54,?,?,00417A80), ref: 0040A1BA
                                  • Part of subcall function 0040A3AC: DosDateTimeToFileTime.KERNEL32(?,?,?), ref: 0040A3C9
                                  • Part of subcall function 0040A3AC: LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0040A3DA
                                  • Part of subcall function 0040A3AC: SetFileTime.KERNEL32(?,00000000,00000000,?,?,?), ref: 0040A3EC
                                  • Part of subcall function 0040A3AC: GetLastError.KERNEL32(?,00000000,00000000,?,?,?), ref: 0040A3F5
                                • CloseHandle.KERNEL32(?,0048C39D), ref: 0048C390
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileTime$CloseCreateDateErrorHandleLastLocal
                                • String ID:
                                • API String ID: 2313166750-0
                                • Opcode ID: 9522c8212507b8d7d75b2f40495846eb5b106b5cc7e24c7e56510e5b1b40e3aa
                                • Instruction ID: 01c718f21c504b2d3cba53ed9342c5db474bfa9d3e8c0c045f56d2a338be4d65
                                • Opcode Fuzzy Hash: 9522c8212507b8d7d75b2f40495846eb5b106b5cc7e24c7e56510e5b1b40e3aa
                                • Instruction Fuzzy Hash: 5A01D6B0A10704BFD711EF65CC9281EBBF8EB0A714F5188BAF810E3A90D7385D10DA58
                                APIs
                                • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004), ref: 0040170E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: a708df6bad618cf595e0409471c4dde2eefb5957c61e6843bc63c9b7a36677d3
                                • Instruction ID: 53975941242e7c688173782f03e5d60935352646a045c052a767a41d5ae573f7
                                • Opcode Fuzzy Hash: a708df6bad618cf595e0409471c4dde2eefb5957c61e6843bc63c9b7a36677d3
                                • Instruction Fuzzy Hash: 9BF04FF1B117008BDB069FF99D817057AD5E789344F2081BEEA09DB3A8E77585018B18
                                APIs
                                • keybd_event.USER32(00000011,00000045,00000001,00000000), ref: 0048B460
                                • keybd_event.USER32(00000041,00000045,00000001,00000000), ref: 0048B46D
                                • keybd_event.USER32(00000011,00000045,00000003,00000000), ref: 0048B47A
                                • keybd_event.USER32(00000041,00000045,00000003,00000000), ref: 0048B487
                                • keybd_event.USER32(00000011,00000045,00000001,00000000), ref: 0048B4A8
                                • keybd_event.USER32(00000056,00000045,00000001,00000000), ref: 0048B4B5
                                • keybd_event.USER32(00000011,00000045,00000003,00000000), ref: 0048B4C2
                                • keybd_event.USER32(00000056,00000045,00000003,00000000), ref: 0048B4CF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: keybd_event
                                • String ID: CTRLA$CTRLC$CTRLF$CTRLP$CTRLV$CTRLX$CTRLY$CTRLZ
                                • API String ID: 2665452162-853614746
                                • Opcode ID: f089d9734505696fd3cf7c75580600df9ea08211b03c854e42bcbcafaf83bed7
                                • Instruction ID: 7bc6cfcbce1aa6a609a57895faa01688f24ad8a403329c94b47a068b8f17d9de
                                • Opcode Fuzzy Hash: f089d9734505696fd3cf7c75580600df9ea08211b03c854e42bcbcafaf83bed7
                                • Instruction Fuzzy Hash: 396197B07D0F087EF9B172958D6BF9E12558B04F15F20482A77483D1C3BAED2B4126AE
                                APIs
                                • GetModuleHandleA.KERNEL32(kernel32.dll,00000002,00460D47,00000000,00000000,00466CF5,?,?,00000000,0046722E,?,?,?,?), ref: 00460AD4
                                • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00460AEC
                                • GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 00460AFE
                                • GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 00460B10
                                • GetProcAddress.KERNEL32(00000000,Heap32First), ref: 00460B22
                                • GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 00460B34
                                • GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 00460B46
                                • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00460B58
                                • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 00460B6A
                                • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 00460B7C
                                • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 00460B8E
                                • GetProcAddress.KERNEL32(00000000,Thread32First), ref: 00460BA0
                                • GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 00460BB2
                                • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00460BC4
                                • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00460BD6
                                • GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 00460BE8
                                • GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 00460BFA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$HandleModule
                                • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
                                • API String ID: 667068680-597814768
                                • Opcode ID: cb1c389d623ae70f2f21763bd60f54e95ca16ce77cbbfbc0a35f95540e24b027
                                • Instruction ID: 2dcb8aa922954ef3a3816dc7fa4d1e8ed79793e01e615060b68accaeef17e046
                                • Opcode Fuzzy Hash: cb1c389d623ae70f2f21763bd60f54e95ca16ce77cbbfbc0a35f95540e24b027
                                • Instruction Fuzzy Hash: DA31C8B0A442109FDF04EBB9D886B1737A8AB557487500E7BB000DF2D9E7B8AC408B5F
                                APIs
                                • CallNextHookEx.USER32(?,00000000,?,?), ref: 00481948
                                • CallNextHookEx.USER32(?,00000000,00000100,?), ref: 0048198C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CallHookNext
                                • String ID: [<-]$[DEL]$[DOWN]$[ESC]$[F1]$[F2]$[F3]$[F4]$[F5]$[F6]$[F7]$[F8]$[INS]$[LEFT]$[NUM_LOCK]$[RIGHT]$[SNAPSHOT]$[UP]
                                • API String ID: 3378577984-52828794
                                • Opcode ID: 8e213d5daa596fe2973b521e1542285b3be37ee3ec3a5330c975ec30fdea5668
                                • Instruction ID: 78927d755c31f68748f33c75f3b8e7a4b1291bdf9e1aaa957a5492ef2a046fff
                                • Opcode Fuzzy Hash: 8e213d5daa596fe2973b521e1542285b3be37ee3ec3a5330c975ec30fdea5668
                                • Instruction Fuzzy Hash: 9F814035514608EFDB00FA95C941ADE77EDEB04344F608C77E900A26A5D73CAE479B2E
                                APIs
                                  • Part of subcall function 0048DFF0: GetForegroundWindow.USER32(00000000,0048E05D,?,?,?,?,00000000), ref: 0048E00F
                                  • Part of subcall function 0048DFF0: GetWindowTextLengthA.USER32(00000000), ref: 0048E01B
                                  • Part of subcall function 0048DFF0: GetWindowTextA.USER32(00000000,00000000,00000001), ref: 0048E038
                                • FindWindowA.USER32(#32770,00000000), ref: 0048E0C3
                                • FindWindowExA.USER32(?,00000000,#32770,00000000), ref: 0048E0D8
                                • FindWindowExA.USER32(?,00000000,SysListView32,00000000), ref: 0048E0ED
                                • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0048E102
                                • VirtualAlloc.KERNEL32(00000000,0000012C,00003000,00000004,?,00001004,00000000,00000000,?,00000000,SysListView32,00000000,?,00000000,#32770,00000000), ref: 0048E12A
                                • GetWindowThreadProcessId.USER32(?,?), ref: 0048E139
                                • OpenProcess.KERNEL32(00000038,00000000,?,?,?,00000000,0000012C,00003000,00000004,?,00001004,00000000,00000000,?,00000000,SysListView32), ref: 0048E146
                                • VirtualAllocEx.KERNEL32(00000000,00000000,0000012C,00003000,00000004,00000038,00000000,?,?,?,00000000,0000012C,00003000,00000004,?,00001004), ref: 0048E158
                                • WriteProcessMemory.KERNEL32(00000000,00000000,00000000,00000400,?,00000000,00000000,0000012C,00003000,00000004,00000038,00000000,?,?,?,00000000), ref: 0048E18A
                                • SendMessageA.USER32(00000064,0000102D,00000000,00000000), ref: 0048E19D
                                • ReadProcessMemory.KERNEL32(00000000,00000000,00000000,00000400,?,00000064,0000102D,00000000,00000000,00000000,00000000,00000000,00000400,?,00000000,00000000), ref: 0048E1AE
                                • SendMessageA.USER32(00000064,00001008,00000000,00000000), ref: 0048E219
                                • VirtualFree.KERNEL32(00000000,00000000,00008000,00000064,00001008,00000000,00000000,00000000,00000000,00000000,00000400,?,00000064,0000102D,00000000,00000000), ref: 0048E226
                                • VirtualFreeEx.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00008000,00000064,00001008,00000000,00000000,00000000,00000000,00000000,00000400,?), ref: 0048E234
                                • CloseHandle.KERNEL32(00000000,00000000,00000000,00000000,00008000,00000000,00000000,00008000,00000064,00001008,00000000,00000000,00000000,00000000,00000000,00000400), ref: 0048E23A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$ProcessVirtual$FindMessageSend$AllocFreeMemoryText$CloseForegroundHandleLengthOpenReadThreadWrite
                                • String ID: #32770$SysListView32$d
                                • API String ID: 2704228757-185556463
                                • Opcode ID: cd693579a1cfdc96ec20bb5d67622a8a1745748781cc2e690d1306c65cbc88a8
                                • Instruction ID: ea16c31bb30a777811bce740e25f0c1c06cc35dcd76950f9802152683edf4bda
                                • Opcode Fuzzy Hash: cd693579a1cfdc96ec20bb5d67622a8a1745748781cc2e690d1306c65cbc88a8
                                • Instruction Fuzzy Hash: 7E510371E44608ABDB10EBA5DC42FDFBBB8EF48714F10446AF604F72C1D678A9418B69
                                APIs
                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?,00000000,0047419C), ref: 00473FF4
                                • GetThreadContext.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?,00000000,0047419C), ref: 00474027
                                • ReadProcessMemory.KERNEL32(?,?,?,00000004,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044), ref: 0047404F
                                • NtUnmapViewOfSection.N(?,?,?,?,?,00000004,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000004,00000000), ref: 00474064
                                • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040,?,?,?,?,?,00000004,?,?,00000000,00000000,00000000), ref: 00474080
                                • VirtualAllocEx.KERNEL32(?,00000000,?,00003000,00000040,?,?,?,?,?,00000004,?,?,00000000,00000000,00000000), ref: 0047409B
                                • WriteProcessMemory.KERNEL32(?,00000000,00000000,?,?,?,?,?,00003000,00000040,?,?,?,00000004,?,?), ref: 00474110
                                • WriteProcessMemory.KERNEL32(?,?,00000000,00000004,?,?,00000000,00000000,?,?,?,?,?,00003000,00000040,?), ref: 00474130
                                • SetThreadContext.KERNEL32(?,00000000,?,?,00000000,00000004,?,?,00000000,00000000,?,?,?,?,?,00003000), ref: 0047414C
                                • ResumeThread.KERNEL32(?,?,00000000,?,?,00000000,00000004,?,?,00000000,00000000,?,?,?,?,?), ref: 00474155
                                • VirtualFree.KERNEL32(?,00000000,00008000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?,00000000), ref: 0047416B
                                • TerminateProcess.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?,00000000,0047419C), ref: 0047417C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$MemoryThreadVirtual$AllocContextWrite$CreateFreeReadResumeSectionTerminateUnmapView
                                • String ID: D$MZ
                                • API String ID: 3369150660-3290396648
                                • Opcode ID: 34951654fb7148f7d51727159e74b85ba96b60081b22600c665b761a110ad23e
                                • Instruction ID: 52d790d3033ef108d7995e8787b9561e9053cac5372873f187a16e15736c85ec
                                • Opcode Fuzzy Hash: 34951654fb7148f7d51727159e74b85ba96b60081b22600c665b761a110ad23e
                                • Instruction Fuzzy Hash: 0E71DD71A00209AFDB50EB99CD45FEFB7BCBF48304F54442AF614E7681D778A9408B69
                                APIs
                                • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00406A85
                                • GetProcAddress.KERNEL32(00000000,GetLongPathNameA), ref: 00406A9C
                                • lstrcpyn.KERNEL32(?,?,?), ref: 00406ACC
                                • lstrcpyn.KERNEL32(?,?,?,kernel32.dll), ref: 00406B30
                                • lstrcpyn.KERNEL32(?,?,00000001,?,?,?,kernel32.dll), ref: 00406B66
                                • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 00406B79
                                • FindClose.KERNEL32(000000FF,?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 00406B8B
                                • lstrlen.KERNEL32(?,000000FF,?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 00406B97
                                • lstrcpyn.KERNEL32(0000005D,?,00000104), ref: 00406BCB
                                • lstrlen.KERNEL32(?,0000005D,?,00000104), ref: 00406BD7
                                • lstrcpyn.KERNEL32(?,0000005C,?,?,0000005D,?,00000104), ref: 00406BF9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                • String ID: GetLongPathNameA$\$kernel32.dll
                                • API String ID: 3245196872-1565342463
                                • Opcode ID: 5aafdc4be12e5efdd9d42279546bac25bca391ed4356c3f45b4e9f3bfcbd8aef
                                • Instruction ID: 3ae5c37d409f34fcf27cdf08506cb16005cd8bd3eecbd42afbf411402edc3aaa
                                • Opcode Fuzzy Hash: 5aafdc4be12e5efdd9d42279546bac25bca391ed4356c3f45b4e9f3bfcbd8aef
                                • Instruction Fuzzy Hash: DB417171E00168ABDB10DFA8CC89AEEB3BCEB45304F0544BAA545F7291D678DE508B58
                                APIs
                                • socket.WS2_32(00000002,00000001,00000000), ref: 00488581
                                • htons.WS2_32(00000000), ref: 004885A7
                                • inet_addr.WS2_32(00000000), ref: 004885BB
                                • gethostbyname.WS2_32(00000000), ref: 004885D3
                                • connect.WS2_32(?,00000002,00000010), ref: 004885FD
                                • mouse_event.USER32(00000800,00000000,00000000,00000000,00000000), ref: 00488743
                                • shutdown.WS2_32(?,00000002), ref: 00488907
                                • closesocket.WS2_32(?), ref: 00488913
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: closesocketconnectgethostbynamehtonsinet_addrmouse_eventshutdownsocket
                                • String ID: CONTROLIO$XLEFT$XMID$XRIGHT$XWHEEL
                                • API String ID: 1027240917-1300867655
                                • Opcode ID: cd3a30b1e80f02b0565ff0fac0a5cae3a82dd1764119b69fd4ca89cad38ac8d4
                                • Instruction ID: 4e03fa2607c6324ea98fb6bd6484ce50c7e0e3354b1b39edae72725015318aa2
                                • Opcode Fuzzy Hash: cd3a30b1e80f02b0565ff0fac0a5cae3a82dd1764119b69fd4ca89cad38ac8d4
                                • Instruction Fuzzy Hash: 7FC10474A00208DFDB10EB99C985B9EB7B9EF48304F5044ABE504EB396DB39AE45CF14
                                APIs
                                • socket.WS2_32(00000002,00000001,00000006), ref: 00486E87
                                • htons.WS2_32(?), ref: 00486EA8
                                • bind.WS2_32(00000000,00000002,00000010), ref: 00486EBD
                                • listen.WS2_32(00000000,00000005), ref: 00486ECD
                                  • Part of subcall function 004870D4: RtlEnterCriticalSection.NTDLL(0049C3A8), ref: 00487110
                                • accept.WS2_32(00000000,?,00000010), ref: 00486F37
                                • LocalAlloc.KERNEL32(00000040,00000010,?,00000002,00000001,00000006,00000000,00487046), ref: 00486F49
                                • CreateThread.KERNEL32(00000000,00000000,Function_00086918,00000000,00000000,?), ref: 00486F83
                                • CloseHandle.KERNEL32(00000000,00000000,00000000,Function_00086918,00000000,00000000,?,00000040,00000010,?,00000002,00000001,00000006,00000000,00487046), ref: 00486F89
                                • Sleep.KERNEL32(00000064,00000000,00000000,00000000,Function_00086918,00000000,00000000,?,00000040,00000010,?,00000002,00000001,00000006,00000000,00487046), ref: 00486FD0
                                • RtlExitUserThread.NTDLL(00000000,?,00000002,00000001,00000006,00000000,00487046), ref: 00487018
                                Strings
                                • ERR|Cannot listen to port, try another one..|, xrefs: 00486FEE
                                • OK|Successfully started..|, xrefs: 00486EEF
                                • ERR|Socket error..|, xrefs: 00486FA4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Thread$AllocCloseCreateCriticalEnterExitHandleLocalSectionSleepUseracceptbindhtonslistensocket
                                • String ID: ERR|Cannot listen to port, try another one..|$ERR|Socket error..|$OK|Successfully started..|
                                • API String ID: 1455999496-3262568804
                                • Opcode ID: 9c853b67c0efaaf0e8379862e1d854b70b8415ed8a934f3e9757a40df7a5e797
                                • Instruction ID: 330b6d5e8ca7d358a96bd715d31c0046abed32a4602e77c3a9e55e8bbd96ec0a
                                • Opcode Fuzzy Hash: 9c853b67c0efaaf0e8379862e1d854b70b8415ed8a934f3e9757a40df7a5e797
                                • Instruction Fuzzy Hash: 2A610F70E042189FDB40FBA5CC81AAEB7B9EF44704F20853BF514BB295DB38AD058B59
                                APIs
                                • LoadLibraryA.KERNEL32(wlanapi.dll,?,?,0047466E,00000000,00474A0A), ref: 00474216
                                • GetProcAddress.KERNEL32(00000000,WlanOpenHandle), ref: 0047422E
                                • GetProcAddress.KERNEL32(00000000,WlanCloseHandle), ref: 00474249
                                • GetProcAddress.KERNEL32(00000000,WlanEnumInterfaces), ref: 00474264
                                • GetProcAddress.KERNEL32(00000000,WlanQueryInterface), ref: 0047427F
                                • GetProcAddress.KERNEL32(00000000,WlanGetAvailableNetworkList), ref: 0047429A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad
                                • String ID: WlanCloseHandle$WlanEnumInterfaces$WlanGetAvailableNetworkList$WlanOpenHandle$WlanQueryInterface$wlanapi.dll
                                • API String ID: 2238633743-982783174
                                • Opcode ID: 131f67ed18dc1841b747a54eeab0c0e9484d912c37ab1340ea7a1dc050488e21
                                • Instruction ID: 1b1b584ab70b599a09e57ee393cfeb683b0a66385e096c4620ec619856160cb6
                                • Opcode Fuzzy Hash: 131f67ed18dc1841b747a54eeab0c0e9484d912c37ab1340ea7a1dc050488e21
                                • Instruction Fuzzy Hash: 5B11D670B402109ED321AFA4D84B7A772A4ABA4788F544D7BB848572D5C37C54E0CB9D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: @$incorrect header check$invalid bit length repeat$invalid block type$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$invalid stored block lengths$invalid window size$too many length or distance symbols$unknown compression method
                                • API String ID: 0-1207251497
                                • Opcode ID: af32fa4fea2f8c98aa1611dc648d68027fc368677272e79b99ff8803321847fd
                                • Instruction ID: 70a742bf0e6b26802f145232956222fdd1f506e219ea46470b50f8d4138f946c
                                • Opcode Fuzzy Hash: af32fa4fea2f8c98aa1611dc648d68027fc368677272e79b99ff8803321847fd
                                • Instruction Fuzzy Hash: 36922570608B418FC725CF29C58066AB7E2FB88304F148A2EE4D687755E778E995CF47
                                APIs
                                • InternetOpenA.WININET(Mozilla,00000001,00000000,00000000,00000000), ref: 0048490C
                                • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,04000000,00000000), ref: 00484944
                                • HttpQueryInfoA.WININET(00000000,00000013,?,00000200,?), ref: 0048497D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: InternetOpen$HttpInfoQuery
                                • String ID: 200$Mozilla$open
                                • API String ID: 3396275114-1265730427
                                • Opcode ID: 7d4210e464e6b5513354a01147238eeb12002b753217856a999451a1928529e8
                                • Instruction ID: bd4a7f331ee14c47fdc3a16549272b02c59d40185987180eb944be2a6f51d9b7
                                • Opcode Fuzzy Hash: 7d4210e464e6b5513354a01147238eeb12002b753217856a999451a1928529e8
                                • Instruction Fuzzy Hash: B5618170A4020A9FDB20EFA5CC52B9EB7B5EB88704F5004A6F104BB281C7796E44CF5D
                                APIs
                                • IsIconic.USER32(?), ref: 0045891F
                                • GetWindowPlacement.USER32(?,0000002C), ref: 0045893C
                                • GetWindowRect.USER32(?), ref: 00458955
                                • GetWindowLongA.USER32(?,000000F0), ref: 00458963
                                • GetWindowLongA.USER32(?,000000F8), ref: 00458978
                                • ScreenToClient.USER32(00000000), ref: 00458985
                                • ScreenToClient.USER32(00000000,?), ref: 00458990
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$ClientLongScreen$IconicPlacementRect
                                • String ID: ,
                                • API String ID: 2266315723-3772416878
                                • Opcode ID: a7e4015638541305c0cc4330e15c929173bc9f0cd132b6a38aa9e6750d00e7b5
                                • Instruction ID: afcd0112b0a353e0b7b880c9ef2dfc7896f534c7da4812f16fdfb8643e04b228
                                • Opcode Fuzzy Hash: a7e4015638541305c0cc4330e15c929173bc9f0cd132b6a38aa9e6750d00e7b5
                                • Instruction Fuzzy Hash: 091163B15047019FC700DF6DC985A9B77D8AF49314F044A7EBD98EB287DB39D8048B66
                                APIs
                                • GetWindowLongA.USER32(?,000000EC), ref: 0043B7E8
                                • IsIconic.USER32(?), ref: 0043B800
                                • IsWindowVisible.USER32(?), ref: 0043B80C
                                • ShowWindow.USER32(?,00000000,?,?,?,000000EC,00000000,?,?,?,0043E506), ref: 0043B840
                                • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0043B855
                                • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0043B866
                                • ShowWindow.USER32(?,00000006,?,000000EC,00000000,?,?,?,000000EC,00000000,?,?,?,0043E506), ref: 0043B881
                                • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,?,?,000000EC,00000000,?,?,?,0043E506), ref: 0043B88B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$LongShow$IconicVisible
                                • String ID:
                                • API String ID: 3484284227-0
                                • Opcode ID: 5794a87fcb703386a158b02435ea0ce775cf32bf35bbb06824415d0d0e307dce
                                • Instruction ID: b2bc2e831fba9c85f1db1661d09b10185500d8c57d07e90355f63ebc4dd6214f
                                • Opcode Fuzzy Hash: 5794a87fcb703386a158b02435ea0ce775cf32bf35bbb06824415d0d0e307dce
                                • Instruction Fuzzy Hash: AE11292154969029D625722B0D42FAF2A9CCFD7319F14257FF6D0AB2C3DB3C580282EE
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,00471976,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00471890
                                • CreateServiceA.ADVAPI32(00000000,?,?,000F01FF,00000110,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0047193B), ref: 004718D1
                                  • Part of subcall function 004711E8: RegCreateKeyA.ADVAPI32(?,00000000,?), ref: 0047122E
                                  • Part of subcall function 004711E8: RegSetValueExA.ADVAPI32(?,00000000,00000000,00000002,00000000,?,00000000,00471291), ref: 0047125A
                                  • Part of subcall function 004711E8: RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000002,00000000,?,00000000,00471291), ref: 00471269
                                • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,000F01FF,00000110,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00471926
                                • CloseServiceHandle.ADVAPI32(00000000,00000000,?,00000000,?,?,000F01FF,00000110,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0047192C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseService$CreateHandle$ManagerOpenValue
                                • String ID: Description$System\CurrentControlSet\Services\
                                • API String ID: 1622739332-3489731058
                                • Opcode ID: e3290a4c3f4982e3a5bdd6d0dc0dc46e571c815a3ea731a19b905e8ffe0c482e
                                • Instruction ID: d71fd5d28cf64b6debb896e556e2f5286ba0cc510098e96131e6a63da4f4140e
                                • Opcode Fuzzy Hash: e3290a4c3f4982e3a5bdd6d0dc0dc46e571c815a3ea731a19b905e8ffe0c482e
                                • Instruction Fuzzy Hash: 4321B4B0A00709ABD711EBA6CC52BAF77A8DB45750F60843BB604B72D1DA785D01CA68
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,0047159E), ref: 004714FD
                                • OpenServiceA.ADVAPI32(00000000,00000000,00000020,00000000,00000000,000F003F,00000000,0047159E), ref: 0047152D
                                • StartServiceA.ADVAPI32(00000000,00000000,?,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,0047159E), ref: 00471555
                                • ControlService.ADVAPI32(00000000,00000001,?,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,0047159E), ref: 00471563
                                • QueryServiceStatus.ADVAPI32(00000000,?,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,0047159E), ref: 0047156D
                                • CloseServiceHandle.ADVAPI32(00000000,00000000,?,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,0047159E), ref: 00471573
                                • CloseServiceHandle.ADVAPI32(00000000,00000000,00000000,00000020,00000000,00000000,000F003F,00000000,0047159E), ref: 00471579
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$ControlManagerQueryStartStatus
                                • String ID:
                                • API String ID: 1698138069-0
                                • Opcode ID: d81ff42534bb92f495ecd7a7d21fa6ffb6ca4a6fc5c4bad083ad3a8c8d45062f
                                • Instruction ID: 4844ad43a9a94d366381623c7387db9b1216949b4c3e73d84466f01584c6e375
                                • Opcode Fuzzy Hash: d81ff42534bb92f495ecd7a7d21fa6ffb6ca4a6fc5c4bad083ad3a8c8d45062f
                                • Instruction Fuzzy Hash: 0521B171E50308BAD714EAB98C42ABF77BCDB95754F50843BF409E3251E67889018A29
                                APIs
                                • GetCurrentProcess.KERNEL32(00000028), ref: 0048A083
                                • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0048A089
                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000000), ref: 0048A0A4
                                • AdjustTokenPrivileges.ADVAPI32(00000002,00000000,00000002,00000010,?,?), ref: 0048A0E5
                                • ExitWindowsEx.USER32(00000012,00000000), ref: 0048A0ED
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessToken$AdjustCurrentExitLookupOpenPrivilegePrivilegesValueWindows
                                • String ID: SeShutdownPrivilege
                                • API String ID: 1314775590-3733053543
                                • Opcode ID: 92b606e17cd6d1aa1c202ccba4538ae46431c09c6fdc184b2d621ed42b84d8fe
                                • Instruction ID: 1f7382a4d51b7e70aafbd4014b945519f9f361ca119e71566e3caf28b1cc7c1a
                                • Opcode Fuzzy Hash: 92b606e17cd6d1aa1c202ccba4538ae46431c09c6fdc184b2d621ed42b84d8fe
                                • Instruction Fuzzy Hash: CC01B172A483016AE600EE64CD46F6F32DCDB46709F10893BF580E62C1D6BAD909872B
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: RestoreSave$NtdllProc_Window
                                • String ID:
                                • API String ID: 2725519021-0
                                • Opcode ID: d857d62a1a632f2784ca0ed3ccba81296459d581ec29f6c0a57c488cff45230a
                                • Instruction ID: e4e44a0c06a28b487b829f1d891154b504435a24dd35e4513ccf7ca6d42b3576
                                • Opcode Fuzzy Hash: d857d62a1a632f2784ca0ed3ccba81296459d581ec29f6c0a57c488cff45230a
                                • Instruction Fuzzy Hash: A4E13774A046099FCB10EFA9C48199EF7F5EB8D304F6195AAF800E7365CB38AD41CB58
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: RestoreSave$Focus
                                • String ID:
                                • API String ID: 1675357626-0
                                • Opcode ID: 62db0cf1fd47e9f916f53f6fca2d0e1b7c6d02cae937029d1cfd94e2cdcaccac
                                • Instruction ID: c9d8ad8847979b898198798682e1015be22ec676faa0239dcd38a036b1fcd990
                                • Opcode Fuzzy Hash: 62db0cf1fd47e9f916f53f6fca2d0e1b7c6d02cae937029d1cfd94e2cdcaccac
                                • Instruction Fuzzy Hash: AFD1A430A01104DFCB15EB6AC996B6EB3F1EF48300F6554A7E405AB7A1CB38ED01DB58
                                APIs
                                • SetActiveWindow.USER32(?,?,?,00445ABE,00000000,00445F57), ref: 0044608F
                                • ShowWindow.USER32(00000000,00000009,?,?,?,00445ABE,00000000,00445F57), ref: 004460B4
                                • IsWindowEnabled.USER32(00000000), ref: 004460D3
                                • NtdllDefWindowProc_A.NTDLL(?,00000112,0000F120,00000000,00000000,?,?,?,00445ABE,00000000,00445F57), ref: 004460EC
                                • SetWindowPos.USER32(?,00000000,00000000,?,?,00445ABE,00000000,00445F57), ref: 00446132
                                • SetFocus.USER32(00000000,?,?,?,00445ABE,00000000,00445F57), ref: 00446180
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$ActiveEnabledFocusNtdllProc_Show
                                • String ID:
                                • API String ID: 3940358795-0
                                • Opcode ID: b1b462c4c0b27444b5e3059da4d9d060714824b191a1171d52b5f949d25dd0ba
                                • Instruction ID: 7771b678008882a5346f7f7e14208c7af855db790d32a4f67b6c3589a60653e7
                                • Opcode Fuzzy Hash: b1b462c4c0b27444b5e3059da4d9d060714824b191a1171d52b5f949d25dd0ba
                                • Instruction Fuzzy Hash: C73109706002409BFB24EF69CD86B5A2798AB06709F0904BFF9449F297DE7DEC44875D
                                APIs
                                • IsIconic.USER32(?), ref: 00458013
                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00458031
                                • GetWindowPlacement.USER32(?,0000002C), ref: 00458067
                                • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 0045808B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Placement$Iconic
                                • String ID: ,
                                • API String ID: 568898626-3772416878
                                • Opcode ID: 57f7d01298d6fadd7b704e7c3bd13db1abb5b807ecc8f1dc30706c824b580abd
                                • Instruction ID: 0756e720f040076a6b1a06bb3dc50e40de6b01f0a6705036d4428c5c05f1e2ba
                                • Opcode Fuzzy Hash: 57f7d01298d6fadd7b704e7c3bd13db1abb5b807ecc8f1dc30706c824b580abd
                                • Instruction Fuzzy Hash: 992110716002049BCB54EF69C8C199A77A8AF45355F01846AFE18EF247DF7AEC088BA4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc
                                • String ID: MonitorFromWindow$pB
                                • API String ID: 190572456-71766695
                                • Opcode ID: 7b596b5103f23bd8cf39f6639b784127fff38481ba28460c9dfa71151c7fa379
                                • Instruction ID: 109af5a3656dd04642540b776c7c4cf0ef378c335892b76b1731f46c74af4ae6
                                • Opcode Fuzzy Hash: 7b596b5103f23bd8cf39f6639b784127fff38481ba28460c9dfa71151c7fa379
                                • Instruction Fuzzy Hash: F6018F32A006686B9B00DA66AC829BF736CEB05315B84457FFC11A3241DB3D9D0187AE
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,0047162F), ref: 004715DB
                                • OpenServiceA.ADVAPI32(00000000,00000000,00010000,00000000,00000000,000F003F,00000000,0047162F), ref: 004715F5
                                • DeleteService.ADVAPI32(00000000,00000000,00000000,00010000,00000000,00000000,000F003F,00000000,0047162F), ref: 00471601
                                • CloseServiceHandle.ADVAPI32(00000000,00000000,00000000,00000000,00010000,00000000,00000000,000F003F,00000000,0047162F), ref: 0047160E
                                • CloseServiceHandle.ADVAPI32(00000000,00000000,00000000,00010000,00000000,00000000,000F003F,00000000,0047162F), ref: 00471614
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$DeleteManager
                                • String ID:
                                • API String ID: 204194956-0
                                • Opcode ID: d63e4e1d6d8213caaf582b6c13c4d7bc56db8f035963a3f880160170e7f30123
                                • Instruction ID: 48f8861388c1cc15b3aa0d764589b73454904c9e8850451f47ed5d818063b4be
                                • Opcode Fuzzy Hash: d63e4e1d6d8213caaf582b6c13c4d7bc56db8f035963a3f880160170e7f30123
                                • Instruction Fuzzy Hash: 9301F9706407057BD321B7B68C03F6F769CCB45794F51417BB504B22D2EABC8E00956D
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Capture
                                • String ID: zC
                                • API String ID: 1145282425-2346723311
                                • Opcode ID: ffcfca1be7a8009be322743130056fd1861afbdade67f45d923b83940dd46d1b
                                • Instruction ID: feb0281e3d630b705ab24a8226fb5d35ef7dee81b98c3a62c70701ba9cbaed2f
                                • Opcode Fuzzy Hash: ffcfca1be7a8009be322743130056fd1861afbdade67f45d923b83940dd46d1b
                                • Instruction Fuzzy Hash: C7E11F34A04604DFDB10DB99C599BBEB7F1AF04316F6441A6EC04AB363D778AE49DB08
                                APIs
                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,00000000,00465C6C), ref: 004660A7
                                • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000,?,00000000,00465C6C), ref: 004660D8
                                • GetProcessHeap.KERNEL32(00000000,?,?,?,00000000,?,00000000,00465C6C), ref: 004660E0
                                • HeapFree.KERNEL32(00000000,00000000,?,?,?,00000000,?,00000000,00465C6C), ref: 004660E6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Free$Heap$LibraryProcessVirtual
                                • String ID:
                                • API String ID: 548792435-0
                                • Opcode ID: 0dcb3e3161119dcea285469acc199e04202481ca827ee9910d190a37f3fc748a
                                • Instruction ID: 5a5fad9a356e2128dae37ec7c9699b4349d5fa7005371798cc668f9eb0e2849d
                                • Opcode Fuzzy Hash: 0dcb3e3161119dcea285469acc199e04202481ca827ee9910d190a37f3fc748a
                                • Instruction Fuzzy Hash: 7A21A5B1604214AFDB10EA69CC80F1777ACEF84718F1981AAF544DF286D779EC01C7A6
                                APIs
                                • SetActiveWindow.USER32(?,?,00445AB1,00000000,00445F57), ref: 00445FB5
                                  • Part of subcall function 004455EC: EnumWindows.USER32(00445518,00000000), ref: 00445620
                                  • Part of subcall function 004455EC: ShowWindow.USER32(?,00000000,00445518,00000000,?,?,02378130,00448275), ref: 00445655
                                  • Part of subcall function 004455EC: ShowOwnedPopups.USER32(00000000,?), ref: 00445684
                                • IsWindowEnabled.USER32(00000000), ref: 00445FE1
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,00000000,00000040,00000000,?,?,00445AB1,00000000,00445F57), ref: 0044602B
                                • NtdllDefWindowProc_A.NTDLL(?,00000112,0000F020,00000000,?,00000000,00000000,00000000,?,00000000,00000040,00000000,?,?,00445AB1,00000000), ref: 00446040
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Show$ActiveEnabledEnumNtdllOwnedPopupsProc_Windows
                                • String ID:
                                • API String ID: 2964316467-0
                                • Opcode ID: 834d15232277396c33905eef5c3926d5e543e0d39f9f2d01c29d2e85dd2a97aa
                                • Instruction ID: 9677a9fbcd8b89dad956ebf336f959bd137e36a98a3b68a660edcd45336556f9
                                • Opcode Fuzzy Hash: 834d15232277396c33905eef5c3926d5e543e0d39f9f2d01c29d2e85dd2a97aa
                                • Instruction Fuzzy Hash: 3821BF706002409BEB54EF6AC9C6B5A37A96F05309F4910BEFE04DF29BDA7EDC448719
                                APIs
                                • GlobalAlloc.KERNEL32(00002002,?,00000000,00431572), ref: 004314CF
                                • GlobalLock.KERNEL32(?), ref: 004314E9
                                • SetClipboardData.USER32(?,?), ref: 00431517
                                • GlobalUnlock.KERNEL32(?), ref: 0043152D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Global$AllocClipboardDataLockUnlock
                                • String ID:
                                • API String ID: 3735636508-0
                                • Opcode ID: 5769396b532ca0dd24eaa437a4c1bac6b314fdadb45e13adde9d398250666039
                                • Instruction ID: 9dd664fdbcea1eb594e4b940028bbab039169917cdecfb14faced22c63785a30
                                • Opcode Fuzzy Hash: 5769396b532ca0dd24eaa437a4c1bac6b314fdadb45e13adde9d398250666039
                                • Instruction Fuzzy Hash: 6311A570A04604BFD711EF6ACD52C5EBBBEEB8D714B5044BAB804D36A0CA38AE50C658
                                APIs
                                • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,00482007,?,?,00000003,00000000,00000000), ref: 00481EFB
                                • SetWindowsHookExA.USER32(0000000D,Function_000818F8,00000000,00000000), ref: 00481F09
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: HandleHookModuleWindows
                                • String ID: dclogs\
                                • API String ID: 1637815062-2015714602
                                • Opcode ID: ca164597c862bb80ac5c258a428db531b87507f30e06bc79cdd92d3859876e26
                                • Instruction ID: f5bdc2482957d119b2c7a948f64f3f6e247a36b7c84638b5e0fb7533d995eca2
                                • Opcode Fuzzy Hash: ca164597c862bb80ac5c258a428db531b87507f30e06bc79cdd92d3859876e26
                                • Instruction Fuzzy Hash: 83311430A002099BDB01FBD5C842B9EB7B9DF45308F50887BF900B7295D77C6D158B6A
                                APIs
                                  • Part of subcall function 004217A0: RegCloseKey.ADVAPI32(10940000,00421610,00000001,004216E2,?,?,0042B4DA,00000008,00000060,00000048,00000000,0042B57F), ref: 004217B4
                                  • Part of subcall function 004218E4: RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,?,?,00000000,004219E9), ref: 0042195E
                                • SystemParametersInfoA.USER32(00000014,00000000,00000000,00000002), ref: 00489F82
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseInfoOpenParametersSystem
                                • String ID: Control Panel\Desktop$Wallpaper
                                • API String ID: 2577197673-3610005575
                                • Opcode ID: 883dfc37d4f9f973076bcba842931cd525a35637c189c1c99ddf285a98deadd8
                                • Instruction ID: 7509788a31261db8c7a6f70405d8e1c8e7558ed05086fc1595e00b19fae261c9
                                • Opcode Fuzzy Hash: 883dfc37d4f9f973076bcba842931cd525a35637c189c1c99ddf285a98deadd8
                                • Instruction Fuzzy Hash: F4217430700604AFDB04EFA5D952A6DB7A5EB85704F64887BF600E7791D739AD01DB18
                                APIs
                                • ShellExecuteEx.SHELL32(0000003C), ref: 0048A283
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExecuteShell
                                • String ID: <$runas
                                • API String ID: 587946157-1187129395
                                • Opcode ID: 603765f9212b45fb0a496032abadb0e52370b72655c0de8c03cd1a609a0d9f86
                                • Instruction ID: c460beef4a30210286d0763f74090151d95dda824b3e03195a79d9eb8af4952b
                                • Opcode Fuzzy Hash: 603765f9212b45fb0a496032abadb0e52370b72655c0de8c03cd1a609a0d9f86
                                • Instruction Fuzzy Hash: 4601ED70900608EFEB15EFA9D842A9EBBF8EB08314F51447BE404E2390E7799E15DB59
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,00000005,00000000,00471828), ref: 004716A2
                                • EnumServicesStatusA.ADVAPI32(00000000,0000013F,00000003,?,00004800,?,?,?,00000000,00000000,00000005,00000000,00471828), ref: 004716DC
                                • CloseServiceHandle.ADVAPI32(00000000,00000000,0000013F,00000003,?,00004800,?,?,?,00000000,00000000,00000005,00000000,00471828), ref: 00471805
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseEnumHandleManagerOpenServiceServicesStatus
                                • String ID:
                                • API String ID: 236840872-0
                                • Opcode ID: f967aefc7bf76423e22f9d52bd21a8b5005219b2ea94b15966fbc90713c84a8e
                                • Instruction ID: 6c6477a3aa7f16ff1d10dbc936ab973cf43f9545cae1b33ee76929128eccf4f8
                                • Opcode Fuzzy Hash: f967aefc7bf76423e22f9d52bd21a8b5005219b2ea94b15966fbc90713c84a8e
                                • Instruction Fuzzy Hash: 1251B771A002589BDB21EB59CC41BDFB7F9EF48704F10C8B7A508A7260DA799E418F9D
                                APIs
                                • GetClipboardData.USER32(0000000E), ref: 00428425
                                • CopyEnhMetaFileA.GDI32(00000000,00000000), ref: 00428447
                                • GetEnhMetaFileHeader.GDI32(?,00000064,?,00000000,00000000), ref: 00428459
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileMeta$ClipboardCopyDataHeader
                                • String ID:
                                • API String ID: 1752724394-0
                                • Opcode ID: 4478b9a3c138687a0686639fd50ba47db60e4a65974e421b62bfd88401c9f0de
                                • Instruction ID: 8af468d6ef4827c3facc6b8cc20fd518375f6c7cb41f1e6f0df9759fd5641c79
                                • Opcode Fuzzy Hash: 4478b9a3c138687a0686639fd50ba47db60e4a65974e421b62bfd88401c9f0de
                                • Instruction Fuzzy Hash: 631127727006048FC710DFAAC885A9BBBF8AF58314F50427EE948DB252DA74EC05CB95
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 00444A88
                                • GetCursorPos.USER32(?), ref: 00444AA5
                                • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 00444AC5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CurrentCursorObjectSingleThreadWait
                                • String ID:
                                • API String ID: 1359611202-0
                                • Opcode ID: 051814c8f75384b05a6fe715f78794a8db92b8490947a9b10c5ba414622dab25
                                • Instruction ID: 84b77d7c604ebb900be4f1c72e54bb18ce27068443de3344f6bc49165850a39d
                                • Opcode Fuzzy Hash: 051814c8f75384b05a6fe715f78794a8db92b8490947a9b10c5ba414622dab25
                                • Instruction Fuzzy Hash: 61F082315482099BFF24E7A9DC86B5A33D8AF44318F10057BE200AA2D2DB7DA880C65E
                                APIs
                                • GetMessagePos.USER32 ref: 00455503
                                • GetKeyboardState.USER32(?,?,?,?,00455B06), ref: 00455600
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: KeyboardMessageState
                                • String ID:
                                • API String ID: 3083355189-0
                                • Opcode ID: 808654e812c04b8cf002c45e4c9406cc7ba5de4f5b303a7e3f51be5d593894dd
                                • Instruction ID: fd6bb3eee380972d7b7e17b74c465dd610416f13f5cf6c755ee4c8c9f0fe4d16
                                • Opcode Fuzzy Hash: 808654e812c04b8cf002c45e4c9406cc7ba5de4f5b303a7e3f51be5d593894dd
                                • Instruction Fuzzy Hash: B031C571508B45ABC724CF38C1553ABB7D2AF89311F00492FE9C9C7246E778C909879B
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CaptureIconic
                                • String ID:
                                • API String ID: 2277910766-0
                                • Opcode ID: 6063ac2dd12fac1c017f77210c41f4ed72a9a687f2f49046f9cc679a9348211b
                                • Instruction ID: 0327d78a268b35ce8c677789ff907e2c6448dab7d1f279d91d5c842f90c86f2f
                                • Opcode Fuzzy Hash: 6063ac2dd12fac1c017f77210c41f4ed72a9a687f2f49046f9cc679a9348211b
                                • Instruction Fuzzy Hash: 08115E356042059FDB20DB59E985E6AB3E5AF08349B1490FAE804DB753DB38FD08D788
                                APIs
                                • VirtualAllocEx.KERNEL32(?,00000000,?,00003000,00000040,00000000,00474DDE,?,?,?,?,00000000,00000000,00000000), ref: 00474D98
                                • WriteProcessMemory.KERNEL32(?,00000000,?,?,?,?,00000000,?,00003000,00000040,00000000,00474DDE), ref: 00474DBE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocMemoryProcessVirtualWrite
                                • String ID:
                                • API String ID: 645232735-0
                                • Opcode ID: 0f06b3a9d05d14c227d8f49d300fba19357ac7f4f8b004a930f7be4c12f8c954
                                • Instruction ID: 3d4a7009d76dd484f758c987681c7f943ef1eb3517999386d02c5c582c31b7ea
                                • Opcode Fuzzy Hash: 0f06b3a9d05d14c227d8f49d300fba19357ac7f4f8b004a930f7be4c12f8c954
                                • Instruction Fuzzy Hash: 220192317006087FF720DA668C42FBBB7ADDB85B44F514476F900E7284D678EE008668
                                APIs
                                • SetClipboardData.USER32(?,?), ref: 004318E9
                                • SetClipboardData.USER32(00000009,00000000), ref: 004318FA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ClipboardData
                                • String ID:
                                • API String ID: 2952336681-0
                                • Opcode ID: 0f2010860b73ae64819a8b1b72e47c22cf11ea669d4f218ec66432101ff0f195
                                • Instruction ID: e739612fef9c341ec323a7699842473cd7885f0e480b2b8cfae146d1adeeb8b8
                                • Opcode Fuzzy Hash: 0f2010860b73ae64819a8b1b72e47c22cf11ea669d4f218ec66432101ff0f195
                                • Instruction Fuzzy Hash: 1B012D75A00209EFDB04DFA9C985AAEB7F8FF0D304F1105A6E904D72A1EB74AE44CB55
                                APIs
                                • GetLastError.KERNEL32(00000000,00425B0C), ref: 00425A90
                                • FormatMessageA.KERNEL32(00001000,00000000,00000000,00000400,?,00000100,00000000,00000000,00425B0C), ref: 00425AB6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorFormatLastMessage
                                • String ID:
                                • API String ID: 3479602957-0
                                • Opcode ID: ca2504a4ef36ec185e89c5cbe45427999975da89f83053bcc25645cf0a502aaf
                                • Instruction ID: 6a340e060300fe569a79e53c9b5b4605939e3dd8f34e65c4cd0e79fc2e2f564c
                                • Opcode Fuzzy Hash: ca2504a4ef36ec185e89c5cbe45427999975da89f83053bcc25645cf0a502aaf
                                • Instruction Fuzzy Hash: AF01D4707146185BE721EB619C93BDA73A8E748704F9000BAB604E21C1EAFC6D808A19
                                APIs
                                • SetClipboardData.USER32(?,?), ref: 00431865
                                • SetClipboardData.USER32(00000009,00000000), ref: 00431876
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ClipboardData
                                • String ID:
                                • API String ID: 2952336681-0
                                • Opcode ID: 8d686bb3edcbf1f0287f23636d0be7645290c9d5e61bd0a60621f4e583b22844
                                • Instruction ID: c258abfd1bae3cce223fcfdb5e86e5ad3d018e03488e907c6d93f987f21c481c
                                • Opcode Fuzzy Hash: 8d686bb3edcbf1f0287f23636d0be7645290c9d5e61bd0a60621f4e583b22844
                                • Instruction Fuzzy Hash: 4E012D71A04209AFCB04DBA9C9419AEB7F8FB08314F1015A6A504E7291EB74AE40CB59
                                APIs
                                • FindFirstFileA.KERNEL32(00000000,?,?,?,?,00461DB1,00000000,00461F3B), ref: 0040A4A3
                                • GetLastError.KERNEL32(00000000,?,?,?,?,00461DB1,00000000,00461F3B), ref: 0040A4C8
                                  • Part of subcall function 0040A404: FileTimeToLocalFileTime.KERNEL32(?), ref: 0040A434
                                  • Part of subcall function 0040A404: FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 0040A443
                                  • Part of subcall function 0040A4FC: FindClose.KERNEL32(?,?,0040A4C6,00000000,?,?,?,?,00461DB1,00000000,00461F3B), ref: 0040A508
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileTime$Find$CloseDateErrorFirstLastLocal
                                • String ID:
                                • API String ID: 976985129-0
                                • Opcode ID: b271951cdbd7389c100cdf0ae7ed88a28fb5f573b9783d0a390267f2762ac902
                                • Instruction ID: 2bdbaae247d1a3425dea7b77b5e76db409c649ff8386320d85249ab3d928ec5d
                                • Opcode Fuzzy Hash: b271951cdbd7389c100cdf0ae7ed88a28fb5f573b9783d0a390267f2762ac902
                                • Instruction Fuzzy Hash: B8E0EDAAB0172007C750BA6E188545F51888A843B4319037FF908FB3C3E57CCC2647EA
                                APIs
                                • VirtualAllocEx.KERNEL32(?,00000000,?,00003000,00000040,?,?,?,?,?,00474E3D), ref: 00474E06
                                • WriteProcessMemory.KERNEL32(?,00000000,?,?,?,?,00000000,?,00003000,00000040,?,?,?,?,?,00474E3D), ref: 00474E12
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocMemoryProcessVirtualWrite
                                • String ID:
                                • API String ID: 645232735-0
                                • Opcode ID: c4326007e9121653f81660db04232ac1090b6013cbe3dc4bcb879eaff10942f8
                                • Instruction ID: fbe7163d10dc84c5d00fca427994746e854fe78ce380d4a737e55ffcb7709b53
                                • Opcode Fuzzy Hash: c4326007e9121653f81660db04232ac1090b6013cbe3dc4bcb879eaff10942f8
                                • Instruction Fuzzy Hash: DDD05EA234A21437E134206B6C46FB71E4CCBC77F5E21003AB708E618294AA6C0180F8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: @
                                • API String ID: 0-2766056989
                                • Opcode ID: 2292dd3615177964b088e19524fed57bc495a9c266fe1c1bfff713db51e8fbad
                                • Instruction ID: ddbe40538e9baf708d2be47c02668f95594b17b4f6917a86af6053f8ded7a178
                                • Opcode Fuzzy Hash: 2292dd3615177964b088e19524fed57bc495a9c266fe1c1bfff713db51e8fbad
                                • Instruction Fuzzy Hash: FDF15970E00619DBCF14CF98C5906EEBBB2FF89314F24815AD821A7350E7395A85CF9A
                                APIs
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 00464010
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: NtdllProc_Window
                                • String ID:
                                • API String ID: 4255912815-0
                                • Opcode ID: 7e3cccf241d719a6543ab1a14e6c351e39daf389e48f2197bdd78e8b7251981f
                                • Instruction ID: 93754ef2e04dab4bf7e425cca76cac7516a65884f424cfd1e14bc392bef5dc41
                                • Opcode Fuzzy Hash: 7e3cccf241d719a6543ab1a14e6c351e39daf389e48f2197bdd78e8b7251981f
                                • Instruction Fuzzy Hash: 5B215975A04108EFDB04CF99CA85E9ABBF8EF49314F258096E904DB312E735EE44DB64
                                APIs
                                • FindFirstFileA.KERNEL32(00000000,?,00000000,0048109E), ref: 0048101E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileFindFirst
                                • String ID:
                                • API String ID: 1974802433-0
                                • Opcode ID: 58189b131d6bad9b31b58bb5dd0d6936964206077b18410e7332de7fd67d7e07
                                • Instruction ID: 9eec0aa66b0e6b17a465713017becbaaf7ac7ec6db9e3a98db6aba3fc89bfd4d
                                • Opcode Fuzzy Hash: 58189b131d6bad9b31b58bb5dd0d6936964206077b18410e7332de7fd67d7e07
                                • Instruction Fuzzy Hash: 7C117C70E04648AFDB11DFA9CC11A9EB7F8FB89310F9189B7E418E2A90D7385A01DF44
                                APIs
                                • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 0040A769
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: DiskFreeSpace
                                • String ID:
                                • API String ID: 1705453755-0
                                • Opcode ID: f6ec613ebcadacc7a2e0cd5499a95e83878b86a09f324e190c5682c8a23e5bb4
                                • Instruction ID: 4025c5bd7047a0701642cd159606230db5b7f06ee4e1c4f744affcdd8b686913
                                • Opcode Fuzzy Hash: f6ec613ebcadacc7a2e0cd5499a95e83878b86a09f324e190c5682c8a23e5bb4
                                • Instruction Fuzzy Hash: 3B11D6B5E00209AFDB04DF99C881DAFF7F9EFC8304B14C569A505E7255E631AE018BA5
                                APIs
                                  • Part of subcall function 0042BDBC: CLSIDFromProgID.COMBASE(00000000), ref: 0042BDE9
                                • CoCreateInstance.COMBASE(?,00000000,00000005,0042C200,00000000), ref: 0042C16B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFromInstanceProg
                                • String ID:
                                • API String ID: 2151042543-0
                                • Opcode ID: 1e67343cf6a3755dcc648c8cb1c137304937c0c58de1aa6cf99e86137d7c8245
                                • Instruction ID: 0e77bf06c80596dcaa68c6d5969b34b49859e8a43eb0ea69bc2740a840eb9101
                                • Opcode Fuzzy Hash: 1e67343cf6a3755dcc648c8cb1c137304937c0c58de1aa6cf99e86137d7c8245
                                • Instruction Fuzzy Hash: 7301F770708704AEE715DF61EC539AF77ACE749710BE1047BF404E26C1E678591089A8
                                APIs
                                • FtpPutFileA.WININET(?,00000000,00000000,00000002,00000000), ref: 004735B2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: File
                                • String ID:
                                • API String ID: 749574446-0
                                • Opcode ID: 80a18fa0b11a04b532a738fee1de739b4567f8fdc0dfc872b2df7eb5e2d0ef8a
                                • Instruction ID: 6f3341fd20da57f58a3475690a976c02730a0e18f521c7973ac2effae8f0c2ec
                                • Opcode Fuzzy Hash: 80a18fa0b11a04b532a738fee1de739b4567f8fdc0dfc872b2df7eb5e2d0ef8a
                                • Instruction Fuzzy Hash: F10162B0600604BFDB05EFA9CC52B9E7BE8EB04314FA040B6B408E26D1D638AE009A58
                                APIs
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 00430B75
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: NtdllProc_Window
                                • String ID:
                                • API String ID: 4255912815-0
                                • Opcode ID: b38e94b57b4479addc08563d81d5e6e1362ea2dcec4b8b7a13faf6446262da47
                                • Instruction ID: ee8813f00c41f682bc0c08bc4bb87949efde74055c84f2d7d70abe30ec2de666
                                • Opcode Fuzzy Hash: b38e94b57b4479addc08563d81d5e6e1362ea2dcec4b8b7a13faf6446262da47
                                • Instruction Fuzzy Hash: 0EF09076608204AFEB40DFDAD892D96F7ECEB4D764B6140B6F908D7641D235AD008B74
                                APIs
                                • GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0040D352
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoLocale
                                • String ID:
                                • API String ID: 2299586839-0
                                • Opcode ID: e61051f54857a69d72c9be6c8c858c0c2dae7a9817b6c0e5e63ecb697defcde6
                                • Instruction ID: b6b3bc27cba818dd86f07b3c1014e1150591c86ae65fc585a946909a32d306c9
                                • Opcode Fuzzy Hash: e61051f54857a69d72c9be6c8c858c0c2dae7a9817b6c0e5e63ecb697defcde6
                                • Instruction Fuzzy Hash: 08E09272B04A1817D710A5A95C869FB729CA758310F40427FBD08E73C2EDB89E4446AA
                                APIs
                                • SystemParametersInfoA.USER32(00000014,00000000,00000000,00000002), ref: 0048BB61
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoParametersSystem
                                • String ID:
                                • API String ID: 3098949447-0
                                • Opcode ID: f1c68654e61d79d595f5e402f839bb6eeab1f148254c942a856f03da32687206
                                • Instruction ID: 2ef191fbe8193a00e2e83069fb47910ddd53355cffce1850e0bcedea997f1bc3
                                • Opcode Fuzzy Hash: f1c68654e61d79d595f5e402f839bb6eeab1f148254c942a856f03da32687206
                                • Instruction Fuzzy Hash: D8E0A0B0200704BFE700EB66CC03F1E7BA8E708710FA0047AF500A25D2D6782E00A928
                                APIs
                                • GetLocaleInfoA.KERNEL32(00000400,0000005A,00000005,00000005), ref: 0048CF00
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoLocale
                                • String ID:
                                • API String ID: 2299586839-0
                                • Opcode ID: 7b5f676b7e6b9a88d9893fae38e51468712678d2565a0147376fd67b38a2ba85
                                • Instruction ID: f0546baeb7acae3cb5e3c522522ce2647ebb903ee0b46d33e3f215fff8233b70
                                • Opcode Fuzzy Hash: 7b5f676b7e6b9a88d9893fae38e51468712678d2565a0147376fd67b38a2ba85
                                • Instruction Fuzzy Hash: 23E0C2113087012AF90065691CC262F2286D740366F60863BBB14EF2C1DA7D8906672F
                                APIs
                                • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040EC7E,00000000,0040EE97,?,?,00000000,00000000), ref: 0040D393
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoLocale
                                • String ID:
                                • API String ID: 2299586839-0
                                • Opcode ID: a79a0e4f37643c31da84fcc1cc3c35027888807660626107ab029df975161c11
                                • Instruction ID: 975386fa7b5d916ad20be6fbaba23759347011934ff9901da2678f5332244a89
                                • Opcode Fuzzy Hash: a79a0e4f37643c31da84fcc1cc3c35027888807660626107ab029df975161c11
                                • Instruction Fuzzy Hash: 60D05B6671D15029E210519F1D45D7F5ADCDBC5761F10403FB948D6141D1688C069376
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: NameUser
                                • String ID:
                                • API String ID: 2645101109-0
                                • Opcode ID: 13010ae4802796b4cebb758f70dee98ac04f0f90e3eed5081c51549290dec938
                                • Instruction ID: 98e4b33eabaf53e06ac02edb4bf0a61fd95dc5c31155c6a725237dc9a82e4cf1
                                • Opcode Fuzzy Hash: 13010ae4802796b4cebb758f70dee98ac04f0f90e3eed5081c51549290dec938
                                • Instruction Fuzzy Hash: A7D05BB260430057C300B665ECC259B71CD4B94354F144C3F7989D62D2F77CD998976B
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: LocalTime
                                • String ID:
                                • API String ID: 481472006-0
                                • Opcode ID: d2c8365eac706f000001c641cc2a0dc3bb950baae54d49401a9c61011e267c3a
                                • Instruction ID: 18359d170877d6c9a5d502834d040339afa8c639152749978d6f4e91199c9c0b
                                • Opcode Fuzzy Hash: d2c8365eac706f000001c641cc2a0dc3bb950baae54d49401a9c61011e267c3a
                                • Instruction Fuzzy Hash: F8D0179040862190C200FF9AC88147EB7E8AE84A01F404C9EF8D0901E2EB3CC5ACD3B7
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Iconic
                                • String ID:
                                • API String ID: 110040809-0
                                • Opcode ID: f1ef583641e5e91257dae9f568209ebbc2ab3bfede60cb79f03aca5766d5fbca
                                • Instruction ID: a9af49f0c07d919ea4f91b38e3aa69d70141cd554bb4b85f797305e8e7badf51
                                • Opcode Fuzzy Hash: f1ef583641e5e91257dae9f568209ebbc2ab3bfede60cb79f03aca5766d5fbca
                                • Instruction Fuzzy Hash: D3C08C708101008BCF10A7398C80A493391B3A0302F9089FFE04081045CB79E8854A9C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 41e99c62f9cb34a1d69dba0a4e9228bdbe4a237ce076249af5adb7012cd77c24
                                • Instruction ID: 8c5cc3955c1a1485aa0d62e32d88b494c96bfa0573a48a57b466807d67334b11
                                • Opcode Fuzzy Hash: 41e99c62f9cb34a1d69dba0a4e9228bdbe4a237ce076249af5adb7012cd77c24
                                • Instruction Fuzzy Hash: 8E42503755961D4FD348AEEE4C48081F2D7ABD4264B2F423A8A14E3312FDF9B856A5C8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a46a25728c0e4dbe5aa0a1433bd48846487817f0c63754d6310f19dcd07371b1
                                • Instruction ID: 91d046bc6df7f9e3a082991c3d1068be4f9010872feba14cae71677946551eb9
                                • Opcode Fuzzy Hash: a46a25728c0e4dbe5aa0a1433bd48846487817f0c63754d6310f19dcd07371b1
                                • Instruction Fuzzy Hash: F461342238DA8103E73D8E7D5CE12B7EAD35FC631862ED57E94DAC3F42E85EA4165108
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                • Instruction ID: d9ca5c35b085eece62e9f9345e2df5b5b2dbbbf6d6fdc43b5a6e4acac797e09a
                                • Opcode Fuzzy Hash: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                • Instruction Fuzzy Hash: 44317E3213659B4EC7088B3CC8514ADAB93BE937353A843B7C071CB5D7D7B5A26E8290
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d17ffc1b7c175c9f3f133bcf490b3ef334a0cf6f2a578ee1034f9dfeca47056c
                                • Instruction ID: e47f3aaeb8ed6147a650c2cc587590c84cccb032643323742196eb2bc5cbf075
                                • Opcode Fuzzy Hash: d17ffc1b7c175c9f3f133bcf490b3ef334a0cf6f2a578ee1034f9dfeca47056c
                                • Instruction Fuzzy Hash: 5901B932B057210B874CDD7ECD9952BB6D3ABD8910F0AC73E9989D76C8DD318C1AC686
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8db4a5db7d948965695fc5265557db2a6743ad504c03fffaf59ce3dfba969469
                                • Instruction ID: 50d85d2cfeb51aaf7e84f544721989ee94c7533a7d714e26348b198219ee39fd
                                • Opcode Fuzzy Hash: 8db4a5db7d948965695fc5265557db2a6743ad504c03fffaf59ce3dfba969469
                                • Instruction Fuzzy Hash:
                                APIs
                                • LoadLibraryA.KERNEL32(uxtheme.dll,00000000,0042F5B7), ref: 0042F23A
                                • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0042F252
                                • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0042F264
                                • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0042F276
                                • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0042F288
                                • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0042F29A
                                • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0042F2AC
                                • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0042F2BE
                                • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0042F2D0
                                • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0042F2E2
                                • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0042F2F4
                                • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0042F306
                                • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0042F318
                                • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0042F32A
                                • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0042F33C
                                • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0042F34E
                                • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0042F360
                                • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0042F372
                                • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0042F384
                                • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0042F396
                                • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0042F3A8
                                • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0042F3BA
                                • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0042F3CC
                                • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0042F3DE
                                • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0042F3F0
                                • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0042F402
                                • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0042F414
                                • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0042F426
                                • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0042F438
                                • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0042F44A
                                • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0042F45C
                                • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0042F46E
                                • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0042F480
                                • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0042F492
                                • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0042F4A4
                                • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0042F4B6
                                • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0042F4C8
                                • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0042F4DA
                                • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0042F4EC
                                • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0042F4FE
                                • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0042F510
                                • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0042F522
                                • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0042F534
                                • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0042F546
                                • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0042F558
                                • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0042F56A
                                • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0042F57C
                                • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0042F58E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad
                                • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                • API String ID: 2238633743-2910565190
                                • Opcode ID: f9ff708dac386ae5d9e30e138ad9962b1451089ba6adc41bbb3e40df37f83233
                                • Instruction ID: cebc7dfec6fd2eb3f6e9ec4c46b7472560df98df2d2e0d818cd08284bc94b5c0
                                • Opcode Fuzzy Hash: f9ff708dac386ae5d9e30e138ad9962b1451089ba6adc41bbb3e40df37f83233
                                • Instruction Fuzzy Hash: 32A170B0B44660AFDB00EF69E895F2637B8EB557843D0097BB400DF299D67CB8448B5E
                                APIs
                                  • Part of subcall function 0040A26C: GetFileAttributesA.KERNEL32(00000000,?,0045F60D), ref: 0040A277
                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 00475590
                                • GetModuleHandleA.KERNEL32(kernel32,LoadLibraryA,00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004756B4
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 004756BA
                                • GetModuleHandleA.KERNEL32(kernel32,GetProcAddress,00000000,kernel32,LoadLibraryA,00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 004756CB
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 004756D1
                                • GetModuleHandleA.KERNEL32(kernel32,Sleep,00000000,kernel32,GetProcAddress,00000000,kernel32,LoadLibraryA,00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000), ref: 004756E3
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 004756E9
                                • GetModuleHandleA.KERNEL32(user32,MessageBoxA,00000000,kernel32,Sleep,00000000,kernel32,GetProcAddress,00000000,kernel32,LoadLibraryA,00000000,00000000,00000000,00000000,00000000), ref: 004756FB
                                • GetProcAddress.KERNEL32(00000000,user32), ref: 00475701
                                • GetModuleHandleA.KERNEL32(kernel32,CloseHandle,00000000,user32,MessageBoxA,00000000,kernel32,Sleep,00000000,kernel32,GetProcAddress,00000000,kernel32,LoadLibraryA,00000000,00000000), ref: 00475713
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 00475719
                                • GetModuleHandleA.KERNEL32(kernel32,CreateProcessA,00000000,kernel32,CloseHandle,00000000,user32,MessageBoxA,00000000,kernel32,Sleep,00000000,kernel32,GetProcAddress,00000000,kernel32), ref: 0047572B
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 00475731
                                • GetModuleHandleA.KERNEL32(kernel32,GetLastError,00000000,kernel32,CreateProcessA,00000000,kernel32,CloseHandle,00000000,user32,MessageBoxA,00000000,kernel32,Sleep,00000000,kernel32), ref: 00475743
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 00475749
                                • GetModuleHandleA.KERNEL32(kernel32,SetLastError,00000000,kernel32,GetLastError,00000000,kernel32,CreateProcessA,00000000,kernel32,CloseHandle,00000000,user32,MessageBoxA,00000000,kernel32), ref: 0047575B
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 00475761
                                • GetModuleHandleA.KERNEL32(kernel32,CreateMutexA,00000000,kernel32,SetLastError,00000000,kernel32,GetLastError,00000000,kernel32,CreateProcessA,00000000,kernel32,CloseHandle,00000000,user32), ref: 00475773
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 00475779
                                • GetModuleHandleA.KERNEL32(kernel32,GetExitCodeProcess,00000000,kernel32,CreateMutexA,00000000,kernel32,SetLastError,00000000,kernel32,GetLastError,00000000,kernel32,CreateProcessA,00000000,kernel32), ref: 0047578B
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 00475791
                                • GetModuleHandleA.KERNEL32(kernel32,ExitThread,00000000,kernel32,GetExitCodeProcess,00000000,kernel32,CreateMutexA,00000000,kernel32,SetLastError,00000000,kernel32,GetLastError,00000000,kernel32), ref: 004757A3
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 004757A9
                                • GetModuleHandleA.KERNEL32(kernel32,TerminateProcess,00000000,kernel32,ExitThread,00000000,kernel32,GetExitCodeProcess,00000000,kernel32,CreateMutexA,00000000,kernel32,SetLastError,00000000,kernel32), ref: 004757BB
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 004757C1
                                • GetModuleHandleA.KERNEL32(kernel32,WaitForSingleObject,00000000,kernel32,TerminateProcess,00000000,kernel32,ExitThread,00000000,kernel32,GetExitCodeProcess,00000000,kernel32,CreateMutexA,00000000,kernel32), ref: 004757D3
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 004757D9
                                • GetModuleHandleA.KERNEL32(kernel32,OpenProcess,00000000,kernel32,WaitForSingleObject,00000000,kernel32,TerminateProcess,00000000,kernel32,ExitThread,00000000,kernel32,GetExitCodeProcess,00000000,kernel32), ref: 004757EB
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 004757F1
                                  • Part of subcall function 00474E20: CreateRemoteThread.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00474E5E
                                  • Part of subcall function 00474E20: WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00474E6E
                                  • Part of subcall function 00474E20: ReadProcessMemory.KERNEL32(?,00000000,?,?,00000000,00000000,000000FF), ref: 00474E81
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleModuleProc$CreateProcess$AttributesFileMemoryObjectReadRemoteSingleThreadWait
                                • String ID: CloseHandle$CreateMutexA$CreateProcessA$D$DCPERSFWBP$ExitThread$GetExitCodeProcess$GetLastError$GetProcAddress$LoadLibraryA$MessageBoxA$OpenProcess$SetLastError$Sleep$TerminateProcess$WaitForSingleObject$kernel32$kernel32.dll$notepad$user32$user32.dll
                                • API String ID: 1639997394-2012025182
                                • Opcode ID: 6f9ff9a4cc1378be953fd1ee1977a3659b763e422276e2f8980670f72d616d10
                                • Instruction ID: e9d3a9bfe88baf75e55dadfdac4beb4fd7c7d96bac81333de36e5bf418f232b7
                                • Opcode Fuzzy Hash: 6f9ff9a4cc1378be953fd1ee1977a3659b763e422276e2f8980670f72d616d10
                                • Instruction Fuzzy Hash: E6811EB0E40B049BD710BB768C42B9E76A49F44708F61887F705DBF692DABCB9108B59
                                APIs
                                • LoadLibraryA.KERNEL32(PSAPI.dll,?,00461159), ref: 00460DF0
                                • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00460E0C
                                • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00460E1E
                                • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00460E30
                                • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00460E42
                                • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00460E54
                                • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00460E66
                                • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 00460E78
                                • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 00460E8A
                                • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00460E9C
                                • GetProcAddress.KERNEL32(00000000,EmptyWorkingSet), ref: 00460EAE
                                • GetProcAddress.KERNEL32(00000000,QueryWorkingSet), ref: 00460EC0
                                • GetProcAddress.KERNEL32(00000000,InitializeProcessForWsWatch), ref: 00460ED2
                                • GetProcAddress.KERNEL32(00000000,GetMappedFileNameA), ref: 00460EE4
                                • GetProcAddress.KERNEL32(00000000,GetDeviceDriverBaseNameA), ref: 00460EF6
                                • GetProcAddress.KERNEL32(00000000,GetDeviceDriverFileNameA), ref: 00460F08
                                • GetProcAddress.KERNEL32(00000000,GetMappedFileNameA), ref: 00460F1A
                                • GetProcAddress.KERNEL32(00000000,GetDeviceDriverBaseNameA), ref: 00460F2C
                                • GetProcAddress.KERNEL32(00000000,GetDeviceDriverFileNameA), ref: 00460F3E
                                • GetProcAddress.KERNEL32(00000000,GetMappedFileNameW), ref: 00460F50
                                • GetProcAddress.KERNEL32(00000000,GetDeviceDriverBaseNameW), ref: 00460F62
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad
                                • String ID: EmptyWorkingSet$EnumDeviceDrivers$EnumProcessModules$EnumProcesses$GetDeviceDriverBaseNameA$GetDeviceDriverBaseNameW$GetDeviceDriverFileNameA$GetDeviceDriverFileNameW$GetMappedFileNameA$GetMappedFileNameW$GetModuleBaseNameA$GetModuleBaseNameW$GetModuleFileNameExA$GetModuleFileNameExW$GetModuleInformation$GetProcessMemoryInfo$InitializeProcessForWsWatch$PSAPI.dll$QueryWorkingSet
                                • API String ID: 2238633743-2267155864
                                • Opcode ID: ab661342394daa93bdfc84b549fb0db1521f2f56ef024eda48370ff564e5d94e
                                • Instruction ID: a24e5f005b97b8d3632871dff6e343d4ef672c2fd5f25bd1742d1874c9fd01e1
                                • Opcode Fuzzy Hash: ab661342394daa93bdfc84b549fb0db1521f2f56ef024eda48370ff564e5d94e
                                • Instruction Fuzzy Hash: 3B41E0B0A44250AFDF00EFB99896F1637A8AB557883540D7BB400DF299E67DAC408B5F
                                APIs
                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 0047500B
                                  • Part of subcall function 0040A26C: GetFileAttributesA.KERNEL32(00000000,?,0045F60D), ref: 0040A277
                                • GetModuleHandleA.KERNEL32(kernel32,LoadLibraryA,00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 0047511C
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 00475122
                                • GetModuleHandleA.KERNEL32(kernel32,GetProcAddress,00000000,kernel32,LoadLibraryA,00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 00475133
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 00475139
                                • GetModuleHandleA.KERNEL32(kernel32,Sleep,00000000,kernel32,GetProcAddress,00000000,kernel32,LoadLibraryA,00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000), ref: 0047514B
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 00475151
                                • GetModuleHandleA.KERNEL32(kernel32,MessageBoxA,00000000,kernel32,Sleep,00000000,kernel32,GetProcAddress,00000000,kernel32,LoadLibraryA,00000000,00000000,00000000,00000000,00000000), ref: 00475163
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 00475169
                                • GetModuleHandleA.KERNEL32(kernel32,ExitThread,00000000,kernel32,MessageBoxA,00000000,kernel32,Sleep,00000000,kernel32,GetProcAddress,00000000,kernel32,LoadLibraryA,00000000,00000000), ref: 0047517B
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 00475181
                                • GetModuleHandleA.KERNEL32(kernel32,DeleteFileA,00000000,kernel32,ExitThread,00000000,kernel32,MessageBoxA,00000000,kernel32,Sleep,00000000,kernel32,GetProcAddress,00000000,kernel32), ref: 00475193
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 00475199
                                • GetModuleHandleA.KERNEL32(kernel32,GetLastError,00000000,kernel32,DeleteFileA,00000000,kernel32,ExitThread,00000000,kernel32,MessageBoxA,00000000,kernel32,Sleep,00000000,kernel32), ref: 004751AB
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 004751B1
                                • GetModuleHandleA.KERNEL32(kernel32,TerminateProcess,00000000,kernel32,GetLastError,00000000,kernel32,DeleteFileA,00000000,kernel32,ExitThread,00000000,kernel32,MessageBoxA,00000000,kernel32), ref: 004751C3
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 004751C9
                                • GetModuleHandleA.KERNEL32(kernel32,CloseHandle,00000000,kernel32,TerminateProcess,00000000,kernel32,GetLastError,00000000,kernel32,DeleteFileA,00000000,kernel32,ExitThread,00000000,kernel32), ref: 004751DB
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 004751E1
                                • GetModuleHandleA.KERNEL32(kernel32,OpenProcess,00000000,kernel32,CloseHandle,00000000,kernel32,TerminateProcess,00000000,kernel32,GetLastError,00000000,kernel32,DeleteFileA,00000000,kernel32), ref: 004751F3
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 004751F9
                                • GetModuleHandleA.KERNEL32(kernel32,GetExitCodeProcess,00000000,kernel32,OpenProcess,00000000,kernel32,CloseHandle,00000000,kernel32,TerminateProcess,00000000,kernel32,GetLastError,00000000,kernel32), ref: 0047520B
                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 00475211
                                  • Part of subcall function 00474E20: CreateRemoteThread.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00474E5E
                                  • Part of subcall function 00474E20: WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00474E6E
                                  • Part of subcall function 00474E20: ReadProcessMemory.KERNEL32(?,00000000,?,?,00000000,00000000,000000FF), ref: 00474E81
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleModuleProc$CreateProcess$AttributesFileMemoryObjectReadRemoteSingleThreadWait
                                • String ID: CloseHandle$D$DeleteFileA$ExitThread$GetExitCodeProcess$GetLastError$GetProcAddress$LoadLibraryA$MessageBoxA$OpenProcess$Sleep$TerminateProcess$kernel32$kernel32.dll$notepad$user32.dll
                                • API String ID: 1639997394-1586427593
                                • Opcode ID: 47d984d89d447a740af8b3480d1bf6b14dff3af0580e8dc4d822aeea4be16fae
                                • Instruction ID: 20f2dfa10427aafd6656507844e619c9700bbfc3e667e8045d5c03969cadce47
                                • Opcode Fuzzy Hash: 47d984d89d447a740af8b3480d1bf6b14dff3af0580e8dc4d822aeea4be16fae
                                • Instruction Fuzzy Hash: 0D615E70A40B049AD710BB758C42B9EB6A5AF44748F50887FB44DBB692DBBCB9008F5D
                                APIs
                                • SetErrorMode.KERNEL32(00008000), ref: 0045D701
                                • GetModuleHandleA.KERNEL32(USER32,00000000,0045D84E,?,00008000), ref: 0045D725
                                • GetProcAddress.KERNEL32(00000000,WINNLSEnableIME), ref: 0045D732
                                • LoadLibraryA.KERNEL32(imm32.dll,00000000,0045D84E,?,00008000), ref: 0045D74E
                                • GetProcAddress.KERNEL32(00000000,ImmGetContext), ref: 0045D770
                                • GetProcAddress.KERNEL32(00000000,ImmReleaseContext), ref: 0045D785
                                • GetProcAddress.KERNEL32(00000000,ImmGetConversionStatus), ref: 0045D79A
                                • GetProcAddress.KERNEL32(00000000,ImmSetConversionStatus), ref: 0045D7AF
                                • GetProcAddress.KERNEL32(00000000,ImmSetOpenStatus), ref: 0045D7C4
                                • GetProcAddress.KERNEL32(00000000,ImmSetCompositionWindow), ref: 0045D7D9
                                • GetProcAddress.KERNEL32(00000000,ImmSetCompositionFontA), ref: 0045D7EE
                                • GetProcAddress.KERNEL32(00000000,ImmGetCompositionStringA), ref: 0045D803
                                • GetProcAddress.KERNEL32(00000000,ImmIsIME), ref: 0045D818
                                • GetProcAddress.KERNEL32(00000000,ImmNotifyIME), ref: 0045D82D
                                • SetErrorMode.KERNEL32(?,0045D855,00008000), ref: 0045D848
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$ErrorMode$HandleLibraryLoadModule
                                • String ID: ImmGetCompositionStringA$ImmGetContext$ImmGetConversionStatus$ImmIsIME$ImmNotifyIME$ImmReleaseContext$ImmSetCompositionFontA$ImmSetCompositionWindow$ImmSetConversionStatus$ImmSetOpenStatus$USER32$WINNLSEnableIME$imm32.dll
                                • API String ID: 3397921170-3950384806
                                • Opcode ID: 57c5e944ddb563a745ba340de0f34f829c81228d5db11bbe286ca3a6e782315b
                                • Instruction ID: 350e7b0c72bf7dc8e61b3cc467ad8a58c375954f1a989729b8f00de9bb81095f
                                • Opcode Fuzzy Hash: 57c5e944ddb563a745ba340de0f34f829c81228d5db11bbe286ca3a6e782315b
                                • Instruction Fuzzy Hash: 0B3163B0E44300BEE710FFB99D46A1637E8EB98749B50487FF410A7292D6BD6844CB5D
                                APIs
                                • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 004104F9
                                  • Part of subcall function 004104C4: GetProcAddress.KERNEL32(00000000), ref: 004104DD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleModuleProc
                                • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
                                • API String ID: 1646373207-1918263038
                                • Opcode ID: 1ad1c5755158f3bb792f8e52e50cc48a0cf3b3d723dbf6682b27caf97537bf49
                                • Instruction ID: 395bb6d0e7018af265d6a1d04e1d62bb5da875e14dc9152300494530f45af478
                                • Opcode Fuzzy Hash: 1ad1c5755158f3bb792f8e52e50cc48a0cf3b3d723dbf6682b27caf97537bf49
                                • Instruction Fuzzy Hash: DC4118B06062086B5304AB6E7A415EA7BD8D788714360C13FF5188B796DFBDBCC18B2D
                                APIs
                                • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000005), ref: 0047EEA0
                                • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 0047EF11
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExecuteShell
                                • String ID: .dcp$BATCH$EDITSVR$GENCODE$HOSTS$SOUND$UPANDEXEC$UPDATE$UPLOADEXEC$drivers\etc\hosts$open
                                • API String ID: 587946157-486951257
                                • Opcode ID: 2ed11dc5f73f97296b9f86895d695e4a36e1ab87a975bba46df742df2ed0e9fd
                                • Instruction ID: 40a804d31181451f2c4759b72ce87a8f54f85bc05e0707d030e3e1ba04200fa5
                                • Opcode Fuzzy Hash: 2ed11dc5f73f97296b9f86895d695e4a36e1ab87a975bba46df742df2ed0e9fd
                                • Instruction Fuzzy Hash: 52712D74750604EBDB10FAA5C882FAF73A4EB04714FA08077F904BB6C6D67DAD058A6D
                                APIs
                                • CreatePipe.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 004895ED
                                • CreatePipe.KERNEL32(?,?,00000000,00000000,FFFFFFFF,?,00000000,00000000), ref: 004895FD
                                • GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000104,?,?,00000000,00000000,FFFFFFFF,?,00000000,00000000), ref: 00489613
                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,000000FF,00000000,00000000,00000000,00000044,?,COMSPEC,?,00000104,?,?,00000000), ref: 00489668
                                • Sleep.KERNEL32(000007D0,00000000,?,00000000,00000000,000000FF,00000000,00000000,00000000,00000044,?,COMSPEC,?,00000104,?,?), ref: 00489685
                                • TranslateMessage.USER32(?), ref: 00489693
                                • DispatchMessageA.USER32(?), ref: 0048969F
                                • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 004896B3
                                • GetExitCodeProcess.KERNEL32(?,?), ref: 004896C8
                                • PeekNamedPipe.KERNEL32(FFFFFFFF,00000000,00000000,00000000,?,00000000,?,?,?,00000000,00000000,00000000,00000001,?,?,?), ref: 004896F2
                                • ReadFile.KERNEL32(FFFFFFFF,?,00002400,00000000,00000000,FFFFFFFF,00000000,00000000,00000000,?,00000000,?,?,?,00000000,00000000), ref: 00489717
                                • OemToCharA.USER32(?,?), ref: 0048972E
                                • PeekNamedPipe.KERNEL32(FFFFFFFF,00000000,00000000,00000000,00000000,00000000,?,FFFFFFFF,?,00002400,00000000,00000000,FFFFFFFF,00000000,00000000,00000000), ref: 00489781
                                • TerminateProcess.KERNEL32(?,00000000,00000000,?,00000000,00000000,000000FF,00000000,00000000,00000000,00000044,?,COMSPEC,?,00000104,?), ref: 0048980A
                                • CloseHandle.KERNEL32(?,?,00000000,00000000,?,00000000,00000000,000000FF,00000000,00000000,00000000,00000044,?,COMSPEC,?,00000104), ref: 00489813
                                • CloseHandle.KERNEL32(?,?,?,00000000,00000000,?,00000000,00000000,000000FF,00000000,00000000,00000000,00000044,?,COMSPEC,?), ref: 0048981C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Pipe$CreateMessagePeekProcess$CloseHandleNamed$CharCodeDispatchEnvironmentExitFileReadSleepTerminateTranslateVariable
                                • String ID: COMSPEC$D
                                • API String ID: 3228586300-942777791
                                • Opcode ID: 921b814b1b9b0d7ec9f6e9d770daa33d458549549ecd313183d227896a2ee1ba
                                • Instruction ID: 95e1e43dfd61edd3a26936943111fa7a72a59d87f82baf661aca6111ca42b787
                                • Opcode Fuzzy Hash: 921b814b1b9b0d7ec9f6e9d770daa33d458549549ecd313183d227896a2ee1ba
                                • Instruction Fuzzy Hash: 70814571A14608AAEB10EBA9CC85BDE77BCAF44304F14047AF604F7281D779AE45CB69
                                APIs
                                • RtlExitUserThread.NTDLL(00000000,00000000,00483E62), ref: 00483CB1
                                • OpenProcess.KERNEL32(00000010,00000000,?,00000000,00483E62), ref: 00483CBE
                                • RtlExitUserThread.NTDLL(00000000,00000010,00000000,?,00000000,00483E62), ref: 00483CD8
                                • CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000004,00000000,00000000,00000000,00483E1C,?,00000010,00000000,?,00000000,00483E62), ref: 00483D03
                                • RtlExitUserThread.NTDLL(00000000,00000000,40000000,00000000,00000000,00000004,00000000,00000000,00000000,00483E1C,?,00000010,00000000,?,00000000,00483E62), ref: 00483D1D
                                • VirtualProtectEx.KERNEL32(00000000,?,?,00000004,?), ref: 00483D5D
                                • ReadProcessMemory.KERNEL32(00000000,?,?,?,?,00000000,?,?,00000004,?), ref: 00483D70
                                • VirtualProtectEx.KERNEL32(00000000,?,?,?,?,00000000,?,?,?,?,00000000,?,?,00000004,?), ref: 00483D83
                                • SetEndOfFile.KERNEL32(000000FF,00483E23), ref: 00483DC4
                                • CloseHandle.KERNEL32(000000FF,000000FF,00483E23), ref: 00483DCD
                                • CloseHandle.KERNEL32(00000000,000000FF,000000FF,00483E23), ref: 00483DD6
                                • WriteFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,?,?,?,00000000,?,?,?,?,00000000), ref: 00483D9A
                                  • Part of subcall function 00475E2C: send.WSOCK32(00000000,00000000,?,00000000,00000000,00475EBD), ref: 00475E9D
                                • RtlExitUserThread.NTDLL(00000000,00483F4C,?,) successfully dump in ,?,SYSINFORemote process (,00000000,000000FF,000000FF,00483E23), ref: 00483E16
                                Strings
                                • ) successfully dump in , xrefs: 00483DF2
                                • SYSERRCannot create the output file!, xrefs: 00483D11
                                • SYSERRNot a valid range set!, xrefs: 00483CA5
                                • SYSINFORemote process (, xrefs: 00483DDB
                                • SYSERRCannot open remote process for reading.., xrefs: 00483CCC
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExitThreadUser$File$CloseHandleProcessProtectVirtual$CreateMemoryOpenReadWritesend
                                • String ID: ) successfully dump in $SYSERRCannot create the output file!$SYSERRCannot open remote process for reading..$SYSERRNot a valid range set!$SYSINFORemote process (
                                • API String ID: 4161570757-2263546889
                                • Opcode ID: 4bdb0c2d688b396db2f2506c44608d8f1756cc61627dee67bab92f8d873f7d95
                                • Instruction ID: 1bf0248c18ca834f60428792f65fe9590105a4575173fe751b1e1da963c3cdc7
                                • Opcode Fuzzy Hash: 4bdb0c2d688b396db2f2506c44608d8f1756cc61627dee67bab92f8d873f7d95
                                • Instruction Fuzzy Hash: EB51E0B1E04118AFDB00EFA9DD81FDEB7B9EB08714F50456AF504F7281D678AE408B69
                                APIs
                                • send.WSOCK32(?,00000005,00000002,00000000,?,00000005,?,00000000), ref: 004869EE
                                • send.WSOCK32(?,00000005,00000002,00000000,?,00000005,?,00000000), ref: 00486A0B
                                • send.WSOCK32(?,00000001,00000002,00000000), ref: 00486A9E
                                • send.WSOCK32(?,00000001,00000002,00000000), ref: 00486ABB
                                • send.WSOCK32(?,00000005,00000002,00000000,?,00000005,?,00000000), ref: 00486AE8
                                • gethostbyname.WS2_32(00000000), ref: 00486BFF
                                • htons.WS2_32(?), ref: 00486C29
                                • socket.WS2_32(00000002,00000001,00000000), ref: 00486C44
                                • connect.WS2_32(00000000,00000002,00000010), ref: 00486C55
                                • getsockname.WS2_32(00000000,?,00000010), ref: 00486CA8
                                • send.WSOCK32(?,00000005,0000000A,00000000,00000000,00000002,00000010,00000002,00000001,00000000), ref: 00486CDD
                                • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 00486D1D
                                • send.WSOCK32(?,?,00000000,00000000,00000000,?,00001000,00000000,00000000,?,00000000,00000000,00000000,00000096,?,00000005), ref: 00486D72
                                  • Part of subcall function 00408710: __WSAFDIsSet.WS2_32(00000000,?), ref: 00408718
                                • send.WSOCK32(00000000,?,00000000,00000000,?,?,00001000,00000000,00000000,?,00000000,00000000,00000000,00000096,?,00000005), ref: 00486DC0
                                • Sleep.KERNEL32(00000096,?,00000005,0000000A,00000000,00000000,00000002,00000010,00000002,00000001,00000000), ref: 00486DCA
                                • closesocket.WS2_32(?), ref: 00486DE2
                                • closesocket.WS2_32 ref: 00486DE8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: send$closesocket$Sleepconnectgethostbynamegetsocknamehtonsselectsocket
                                • String ID:
                                • API String ID: 129894690-0
                                • Opcode ID: dffc39fc354fbfc3c555f2e0031b39c7209a0c13b48ec1f4e14dedd229b09c68
                                • Instruction ID: 5f6b45cba2bdcbc4bd5ebe49aad55af6eec3315c819bbbe8d5cacfbd29903a14
                                • Opcode Fuzzy Hash: dffc39fc354fbfc3c555f2e0031b39c7209a0c13b48ec1f4e14dedd229b09c68
                                • Instruction Fuzzy Hash: 9AD1A570A00218AADB20E725CC82BEE77BC9F45304F5005FBF549BA1C6DA7C9B848F59
                                APIs
                                • CharNextA.USER32(00000000,?,?,?,00000000,?,0040331C,00000000,00403349,?,?,?,00000000), ref: 00403236
                                • CharNextA.USER32(00000000,00000000,?,?,?,00000000,?,0040331C,00000000,00403349,?,?,?,00000000), ref: 00403240
                                • CharNextA.USER32(00000000,00000000,?,?,?,00000000,?,0040331C,00000000,00403349,?,?,?,00000000), ref: 0040325F
                                • CharNextA.USER32(00000000,?,?,?,00000000,?,0040331C,00000000,00403349,?,?,?,00000000), ref: 00403269
                                • CharNextA.USER32(00000000,00000000,?,?,?,00000000,?,0040331C,00000000,00403349,?,?,?,00000000), ref: 00403295
                                • CharNextA.USER32(00000000,00000000,00000000,?,?,?,00000000,?,0040331C,00000000,00403349,?,?,?,00000000), ref: 0040329F
                                • CharNextA.USER32(00000000,00000000,00000000,?,?,?,00000000,?,0040331C,00000000,00403349,?,?,?,00000000), ref: 004032C7
                                • CharNextA.USER32(00000000,00000000,?,?,?,00000000,?,0040331C,00000000,00403349,?,?,?,00000000), ref: 004032D1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CharNext
                                • String ID: $ $ $"$"$"$"$"$"
                                • API String ID: 3213498283-3597982963
                                • Opcode ID: 3bd9a193daecdd238f67bae6ba487182a8676f0db8e6ba609be4f5a64eecd842
                                • Instruction ID: bdf7d2ac8bc3fc46c7ed94e96313c0ac358e30d7acbc24f56d7c24abc7c8abfb
                                • Opcode Fuzzy Hash: 3bd9a193daecdd238f67bae6ba487182a8676f0db8e6ba609be4f5a64eecd842
                                • Instruction Fuzzy Hash: D9317250A083D12AEB327AB54DC47662ECC4B96356F1805FF9541B62D7D5BC8A41C31A
                                APIs
                                • socket.WS2_32(00000002,00000001,00000000), ref: 00472EC7
                                • WSAIoctl.WS2_32(000000FF,4004747F,00000000,00000000,?,00000400,?,00000000,00000000), ref: 00472F08
                                • inet_ntoa.WS2_32(?), ref: 00472F40
                                • inet_ntoa.WS2_32(?), ref: 00472F81
                                • inet_ntoa.WS2_32(?), ref: 00472FC2
                                • closesocket.WS2_32(000000FF), ref: 004730E3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: inet_ntoa$Ioctlclosesocketsocket
                                • String ID: Broadcast adress : $ Broadcasts : NO$ Broadcasts : YES$ IP : $ IP Mask : $ Loopback interface$ Network interface$ Status : DOWN$ Status : UP
                                • API String ID: 4072187599-1810517698
                                • Opcode ID: c1cdba5071aa0e60e5044a1513dbdb5a4bb804c93194c752e20350a9e0c33837
                                • Instruction ID: ab23de6604ef5ba243a1e2c870081f23a3f4f579f5567ed3b19c45597694430d
                                • Opcode Fuzzy Hash: c1cdba5071aa0e60e5044a1513dbdb5a4bb804c93194c752e20350a9e0c33837
                                • Instruction Fuzzy Hash: FA51F931750604AFD711AE55CC02FDB77AAEB44701FA0846BF848B72C4C6BE5E12AF59
                                APIs
                                • socket.WS2_32(00000002,00000001,00000000), ref: 004808B5
                                • htons.WS2_32(00000000), ref: 004808D9
                                • inet_addr.WS2_32(00000000), ref: 004808ED
                                • gethostbyname.WS2_32(00000000), ref: 00480905
                                • connect.WS2_32(000000FF,00000002,00000010), ref: 0048092C
                                • shutdown.WS2_32(000000FF,00000002), ref: 00480C26
                                • closesocket.WS2_32(000000FF), ref: 00480C2F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: closesocketconnectgethostbynamehtonsinet_addrshutdownsocket
                                • String ID: FILEBOF$FILEEND$FILEEOF$FILEERR$UPLOADFILE
                                • API String ID: 1626636048-857550588
                                • Opcode ID: f026bc058f5ac4961d630fe413edeafc05871d8492a04b3790b5f3b19503eb5b
                                • Instruction ID: cdc034c040f455281bc25cad72133b6b44e65767978c96b0c7ce34103b78e964
                                • Opcode Fuzzy Hash: f026bc058f5ac4961d630fe413edeafc05871d8492a04b3790b5f3b19503eb5b
                                • Instruction Fuzzy Hash: D6A17270A102189BDB14FB65C885BDE73B9EB44308F5045BBF504AB2C6DB78AE85CF58
                                APIs
                                • socket.WS2_32(00000002,00000001,00000000), ref: 0047FACB
                                • htons.WS2_32(00000000), ref: 0047FAEF
                                • inet_addr.WS2_32(00000000), ref: 0047FB03
                                • gethostbyname.WS2_32(00000000), ref: 0047FB1B
                                • connect.WS2_32(000000FF,00000002,00000010), ref: 0047FB42
                                • 73A0A570.USER32(00000000,00000000,0047FD2B,?,000000FF,?,00002000,00000000,000000FF,?,00002000,00000000,000000FF,00000002,00000010,00000000), ref: 0047FBE3
                                • SelectObject.GDI32(?,?), ref: 0047FC23
                                • send.WSOCK32(000000FF,?,00000000,00000000,?,000000FF,?,00002000,00000000,000000FF,?,00002000,00000000,000000FF,00000002,00000010), ref: 0047FCCD
                                • SelectObject.GDI32(?,?), ref: 0047FD08
                                • DeleteObject.GDI32(?), ref: 0047FD11
                                • DeleteObject.GDI32(?), ref: 0047FD1A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Object$DeleteSelect$A570connectgethostbynamehtonsinet_addrsendsocket
                                • String ID: THUMB
                                • API String ID: 2044821664-3798143851
                                • Opcode ID: 74ed5629067ad22bcd7fadb54db7d4cdd69b89a75588b3c51667ced20d1b0c24
                                • Instruction ID: 8cf77986ac8e812088483114d2154e400579996fdeeff4b414df514635362606
                                • Opcode Fuzzy Hash: 74ed5629067ad22bcd7fadb54db7d4cdd69b89a75588b3c51667ced20d1b0c24
                                • Instruction Fuzzy Hash: 59911174A40304AFDB10EBA5CD86FAEB3B9EF48704F10447AF604E7291D678AD45CB69
                                Strings
                                • BTMemoryLoadLibary: VirtualAlloc failed, xrefs: 00465AEC
                                • BTMemoryLoadLibary: Get DLLEntyPoint failed, xrefs: 00465C28
                                • BTMemoryLoadLibary: BuildImportTable failed, xrefs: 00465BD5
                                • BTMemoryLoadLibary: IMAGE_NT_SIGNATURE is not valid, xrefs: 00465A95
                                • BTMemoryLoadLibary: Can't attach library, xrefs: 00465C5A
                                • BTMemoryLoadLibary: dll dos header is not valid, xrefs: 00465A4E
                                • PE, xrefs: 00465A84
                                • MZ, xrefs: 00465A41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: BTMemoryLoadLibary: BuildImportTable failed$BTMemoryLoadLibary: Can't attach library$BTMemoryLoadLibary: Get DLLEntyPoint failed$BTMemoryLoadLibary: IMAGE_NT_SIGNATURE is not valid$BTMemoryLoadLibary: VirtualAlloc failed$BTMemoryLoadLibary: dll dos header is not valid$MZ$PE
                                • API String ID: 0-3631919656
                                • Opcode ID: 55e51ac784f6f41ad5d714717ace54d489d53ab6b595cfd356cbe4ff5d71c969
                                • Instruction ID: b20ef3fee28795f126b59ee3d7137661f71c46c8834bf65cff6539cc8d466484
                                • Opcode Fuzzy Hash: 55e51ac784f6f41ad5d714717ace54d489d53ab6b595cfd356cbe4ff5d71c969
                                • Instruction Fuzzy Hash: 49719571B04A04AFEB14DB6DCC41B6EB7E5EB88714F10C4BAF504E7381EA389D418B5A
                                APIs
                                • SelectObject.GDI32(?,?), ref: 00425D20
                                • MaskBlt.GDI32(?,?,?,?,?,?,?,?,?,?,?,CCAA0029,00000000,00425D90,?,?), ref: 00425D64
                                • SelectObject.GDI32(?,?), ref: 00425D7E
                                • DeleteObject.GDI32(?), ref: 00425D8A
                                • SelectObject.GDI32(?,?), ref: 00425DD4
                                • StretchBlt.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 00425E53
                                • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,?,?,?,?,00440328), ref: 00425E75
                                • SetTextColor.GDI32(?,00000000), ref: 00425E7D
                                • SetBkColor.GDI32(?,00FFFFFF), ref: 00425E8B
                                • StretchBlt.GDI32(?,?,?,?,?,?,?,?,?,?,008800C6), ref: 00425EB7
                                • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 00425EDC
                                • SetTextColor.GDI32(?,?), ref: 00425EE6
                                • SetBkColor.GDI32(?,?), ref: 00425EF0
                                • SelectObject.GDI32(?,00000000), ref: 00425F03
                                • DeleteObject.GDI32(?), ref: 00425F0C
                                • DeleteDC.GDI32(?), ref: 00425F37
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Object$ColorSelectStretch$Delete$Text$Mask
                                • String ID:
                                • API String ID: 326492243-0
                                • Opcode ID: d8e1724576f574ae09a1413f8e0e13ab6aadab4a8bbe90aca38c9fdbb62b321e
                                • Instruction ID: e983f0c62ec482ac6a7694e4d78d7742d1d0dd20c2797562eb9a97e0ed3ed78c
                                • Opcode Fuzzy Hash: d8e1724576f574ae09a1413f8e0e13ab6aadab4a8bbe90aca38c9fdbb62b321e
                                • Instruction Fuzzy Hash: 0A81B4B1A04219AFDB50DFA9CD85FAF77ECAB0D314F514459F618F7281C638AD008B69
                                APIs
                                • socket.WS2_32(00000002,00000001,00000000), ref: 00480264
                                • htons.WS2_32(00000000), ref: 00480288
                                • inet_addr.WS2_32(00000000), ref: 0048029C
                                • gethostbyname.WS2_32(00000000), ref: 004802B4
                                • connect.WS2_32(000000FF,00000002,00000010), ref: 004802DB
                                • send.WSOCK32(000000FF,?,00000000,00000000,00000000,00480523,?,000000FF,?,00002000,00000000,?,0048064C,?,FILEBOF), ref: 004804DB
                                • shutdown.WS2_32(000000FF,00000002), ref: 004805D5
                                • closesocket.WS2_32(000000FF), ref: 004805DE
                                  • Part of subcall function 00475F68: send.WSOCK32(?,00000000,?,00000000,00000000,00475FCA), ref: 00475FAF
                                  • Part of subcall function 0040A26C: GetFileAttributesA.KERNEL32(00000000,?,0045F60D), ref: 0040A277
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: send$AttributesFileclosesocketconnectgethostbynamehtonsinet_addrshutdownsocket
                                • String ID: FILEBOF$FILEEND$FILEEOF$FILEERR$FILETRANSFER
                                • API String ID: 1000740278-2201142619
                                • Opcode ID: de141080d0af0e70ed050346cbac32d333074886a60d1ece429222566f44452a
                                • Instruction ID: d884f81a31d127129e457d29bc3a887c149848b3ea7592e29df607f4b17ad49f
                                • Opcode Fuzzy Hash: de141080d0af0e70ed050346cbac32d333074886a60d1ece429222566f44452a
                                • Instruction Fuzzy Hash: 39B14E70A10219AFDB60EB95CC85BDEB7B8EF48304F5044AAA604F7291DB789E45CF58
                                APIs
                                • Sleep.KERNEL32(000000C8), ref: 00486682
                                • TranslateMessage.USER32(?), ref: 00486690
                                • DispatchMessageA.USER32(?), ref: 0048669C
                                • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 004866B0
                                • socket.WS2_32(00000002,00000001,00000000), ref: 004866CE
                                • htons.WS2_32(00000000), ref: 004866F8
                                • inet_addr.WS2_32(00000000), ref: 00486709
                                • gethostbyname.WS2_32(00000000), ref: 0048671F
                                • connect.WS2_32(00000000,00000002,00000010), ref: 00486744
                                • shutdown.WS2_32(00000000,00000001), ref: 00486881
                                • closesocket.WS2_32(00000000), ref: 0048688E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$DispatchPeekSleepTranslateclosesocketconnectgethostbynamehtonsinet_addrshutdownsocket
                                • String ID: `cH$AI
                                • API String ID: 2253344678-3416697501
                                • Opcode ID: bedb0ffaec52e44a88e2de0e8a99cec9f55a2e9ce9d1910240818cd027755a58
                                • Instruction ID: 41e6e4eb2a8756f4af6665dd27e47b218bc7cc1c13d6ade83d67c70cfc95b343
                                • Opcode Fuzzy Hash: bedb0ffaec52e44a88e2de0e8a99cec9f55a2e9ce9d1910240818cd027755a58
                                • Instruction Fuzzy Hash: A7816E74A006049FDB10FB69DD85B8EB3B9AF44308F1144BBE504E73A2D778AE46CB59
                                APIs
                                • socket.WS2_32(00000002,00000001,00000000), ref: 00483247
                                • RtlExitUserThread.NTDLL(00000000,00000002,00000001,00000000,00000000,004833A9,?,00000000,0048340F), ref: 00483257
                                • htons.WS2_32(00000000), ref: 0048326E
                                • inet_addr.WS2_32(00000000), ref: 00483282
                                • gethostbyname.WS2_32(00000000), ref: 0048329A
                                • RtlExitUserThread.NTDLL(00000000,00000000,00000000,00000000), ref: 004832A7
                                • connect.WS2_32(000000FF,00000002,00000010), ref: 004832C6
                                • send.WSOCK32(000000FF,?,00000000,00000000), ref: 0048335C
                                • shutdown.WS2_32(000000FF,00000002), ref: 00483382
                                • closesocket.WS2_32(000000FF), ref: 0048338B
                                • RtlExitUserThread.NTDLL(00000000,000000FF,000000FF,00000002,000000FF,?,00000400,00000000,000000FF,00000002,00000010,00000000,00000000), ref: 0048339A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExitThreadUser$closesocketconnectgethostbynamehtonsinet_addrsendshutdownsocket
                                • String ID: DATAFLUX$AI
                                • API String ID: 2465866365-1069322248
                                • Opcode ID: 108bb0699211b11e589103643461899d014b8e42d96da5f9b0910472b6323014
                                • Instruction ID: a550a1352afb7896cb68f3560b5cabc46008ece412a12536725869762f02c33b
                                • Opcode Fuzzy Hash: 108bb0699211b11e589103643461899d014b8e42d96da5f9b0910472b6323014
                                • Instruction Fuzzy Hash: 9E611274A002189FDB10EFA5CC82B8E77B9EB48704F50447AF604F7296DA78EE458B59
                                APIs
                                • socket.WS2_32(00000002,00000001,00000000), ref: 004829FE
                                • RtlExitUserThread.NTDLL(00000000,00000002,00000001,00000000,00000000,00482AC1,?,00000000,00482B03), ref: 00482A0C
                                • htons.WS2_32(?), ref: 00482A18
                                • inet_addr.WS2_32(00000000), ref: 00482A2A
                                • gethostbyname.WS2_32(00000000), ref: 00482A40
                                • RtlExitUserThread.NTDLL(00000000,00000000,00000000,?,00000002,00000001,00000000,00000000,00482AC1,?,00000000,00482B03), ref: 00482A4D
                                • connect.WS2_32(00000000,00000002,00000010), ref: 00482A63
                                • closesocket.WS2_32(00000000), ref: 00482A9C
                                • RtlExitUserThread.NTDLL(00000000,00000000,?,00482B30,?,PortScanAdd,00000000,00000002,00000010,00000000,?,00000002,00000001,00000000,00000000,00482AC1), ref: 00482AA3
                                • closesocket.WS2_32(00000000), ref: 00482AAB
                                • RtlExitUserThread.NTDLL(00000000,00000000,00000000,00000002,00000010,00000000,?,00000002,00000001,00000000,00000000,00482AC1,?,00000000,00482B03), ref: 00482AB2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExitThreadUser$closesocket$connectgethostbynamehtonsinet_addrsocket
                                • String ID: PortScanAdd$T)H
                                • API String ID: 3331331703-1310557750
                                • Opcode ID: 4f0aaf588a8e68274f49ca44d2d491ec8a76cf678dfed71faac18fa6c5d4ccc3
                                • Instruction ID: dfbeccaf93b07c71eaea7559705428fa792c13e1ab77e083179d187ea886d1de
                                • Opcode Fuzzy Hash: 4f0aaf588a8e68274f49ca44d2d491ec8a76cf678dfed71faac18fa6c5d4ccc3
                                • Instruction Fuzzy Hash: 95416030A00609AEDB00FBA5CD42B9F77E8EF48304F60447BF504B7292DAB89D019B59
                                APIs
                                • GetClientRect.USER32(00000000,?), ref: 004594A3
                                • GetWindowRect.USER32(00000000,?), ref: 004594B5
                                • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004594CB
                                • OffsetRect.USER32(?,?,?), ref: 004594E0
                                • ExcludeClipRect.GDI32(?,?,?,?,?,?,?,?,00000000,00000000,?,00000002,00000000,?,00000000,?), ref: 004594F9
                                • InflateRect.USER32(?,00000000,00000000), ref: 00459517
                                • GetWindowLongA.USER32(00000000,000000F0), ref: 00459531
                                • DrawEdge.USER32(?,?,?,00000008), ref: 00459630
                                • IntersectClipRect.GDI32(?,?,?,?,?), ref: 00459649
                                • OffsetRect.USER32(?,?,?), ref: 00459673
                                • GetRgnBox.GDI32(?,?), ref: 00459682
                                • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 00459698
                                • IntersectRect.USER32(?,?,?), ref: 004596A9
                                • OffsetRect.USER32(?,?,?), ref: 004596BE
                                • FillRect.USER32(?,?,00000000), ref: 004596DA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Rect$Window$Offset$ClipIntersectPoints$ClientDrawEdgeExcludeFillInflateLong
                                • String ID:
                                • API String ID: 1904870186-0
                                • Opcode ID: ba0e585f5a220742b43e222ef255719f620f5db918f749e3f708f6a4cc6e7059
                                • Instruction ID: f381e9d907e84e040b15bb07fcc8fa9a46ca188c9f9e639884964784588c8640
                                • Opcode Fuzzy Hash: ba0e585f5a220742b43e222ef255719f620f5db918f749e3f708f6a4cc6e7059
                                • Instruction Fuzzy Hash: 34A10F71E00108EFCB01DBA9C986EDE77F9AF49305F1440AAF914F7252DB79AE058B64
                                APIs
                                • CoInitialize.OLE32(00000000), ref: 00487B90
                                • socket.WS2_32(00000002,00000001,00000000), ref: 00487B9B
                                • htons.WS2_32(00000000), ref: 00487BBD
                                • inet_addr.WS2_32(00000000), ref: 00487BD1
                                • gethostbyname.WS2_32(00000000), ref: 00487BE9
                                • connect.WS2_32(00000000,00000002,00000010), ref: 00487C0D
                                • send.WSOCK32(00000000,?,00000000,00000000), ref: 00487D26
                                • shutdown.WS2_32(00000000,00000002), ref: 00487D94
                                • closesocket.WS2_32(00000000), ref: 00487D9A
                                  • Part of subcall function 00475E2C: send.WSOCK32(00000000,00000000,?,00000000,00000000,00475EBD), ref: 00475E9D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: send$Initializeclosesocketconnectgethostbynamehtonsinet_addrshutdownsocket
                                • String ID: #CAMEND$CAMERA$ENDSNAP
                                • API String ID: 188043792-4109213444
                                • Opcode ID: 2e8e43355300db45eee3b1acb2fde681b8b21a56a9e16257beb1a2d33dc8670f
                                • Instruction ID: 0fef1f828821176ef50aa4f11f0847c4136632d7fec43a4d81c01dd0a7c27fcc
                                • Opcode Fuzzy Hash: 2e8e43355300db45eee3b1acb2fde681b8b21a56a9e16257beb1a2d33dc8670f
                                • Instruction Fuzzy Hash: 9C616E70A04618AFDB20EB55CC85FAE73F9AF44304F2044BBF914AB292D7789E44CB59
                                APIs
                                • CreateThread.KERNEL32(00000000,00000000,00482028,00000000,00000000,00499F94), ref: 0047EB8D
                                  • Part of subcall function 0041FA34: GetLastError.KERNEL32(00000000,0041FADE), ref: 0041FA94
                                  • Part of subcall function 0041FC40: SetThreadPriority.KERNEL32(?,00000000,?,00000000,00461FFA), ref: 0041FC55
                                  • Part of subcall function 0041FEF0: ResumeThread.KERNEL32(?,?,00000000,00462033), ref: 0041FEF8
                                • TranslateMessage.USER32(00499F5C), ref: 0047ECAD
                                • DispatchMessageA.USER32(00499F5C), ref: 0047ECB3
                                • GetMessageA.USER32(00499F5C,00000000,00000000,00000000), ref: 0047ECBF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageThread$CreateDispatchErrorLastPriorityResumeTranslate
                                • String ID: at $,xI$MPI$OFFLINEK$PWD$Unknow$AI$AI
                                • API String ID: 3002801514-2464480815
                                • Opcode ID: bc69af0adfb34cd0679ee449daf121cc4336e7819dd874c63be97dde00923ef5
                                • Instruction ID: e2167eeccbf4afbe61ec2f3fb3de221b5c7edd7213e8530d036ea6c8de836f7f
                                • Opcode Fuzzy Hash: bc69af0adfb34cd0679ee449daf121cc4336e7819dd874c63be97dde00923ef5
                                • Instruction Fuzzy Hash: 37514E386002059FDB11EB65DC81F9A77B5EF9D308F108576F904AB3A1C739A942CB6D
                                APIs
                                • socket.WS2_32(00000002,00000001,00000006), ref: 0048373A
                                • RtlExitUserThread.NTDLL(00000000,00000002,00000001,00000006,00483854,00000000,?,POST /index.php/1.0Host: ,00000000,00483817), ref: 00483747
                                • inet_addr.WS2_32(?), ref: 00483762
                                • htons.WS2_32(00000050), ref: 0048376B
                                • gethostbyname.WS2_32(?), ref: 0048377B
                                • RtlExitUserThread.NTDLL(00000000,?,00000050,?,00000002,00000001,00000006,00483854,00000000,?,POST /index.php/1.0Host: ,00000000,00483817), ref: 00483788
                                • connect.WS2_32(00000000,00000002,00000010), ref: 0048379E
                                • RtlExitUserThread.NTDLL(00000000,00000000,00000002,00000010,00000050,?,00000002,00000001,00000006,00483854,00000000,?,POST /index.php/1.0Host: ,00000000,00483817), ref: 004837A9
                                • Sleep.KERNEL32(000003E8,00000000,?,00000400,00000000,00000000,00000002,00000010,00000050,?,00000002,00000001,00000006,00483854,00000000,?), ref: 004837DF
                                • closesocket.WS2_32(00000000), ref: 004837E5
                                • RtlExitUserThread.NTDLL(00000000,00000000,000003E8,00000000,?,00000400,00000000,00000000,00000002,00000010,00000050,?,00000002,00000001,00000006,00483854), ref: 004837EC
                                Strings
                                • POST /index.php/1.0Host: , xrefs: 00483708
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExitThreadUser$Sleepclosesocketconnectgethostbynamehtonsinet_addrsocket
                                • String ID: POST /index.php/1.0Host:
                                • API String ID: 681257413-3360397365
                                • Opcode ID: ba673a4f71954a393736f9a25fadc427223304dae623b4873d499f9a8ce2d311
                                • Instruction ID: 945f41c8bfcd063cc9095e44db21a60f0fa1d8b30e727fd2b73fa24ca6d896be
                                • Opcode Fuzzy Hash: ba673a4f71954a393736f9a25fadc427223304dae623b4873d499f9a8ce2d311
                                • Instruction Fuzzy Hash: D83154B0A40709AAE710FB65CC82B9F76E8DF04B04F50447EF644B72C2DA789A459B6D
                                APIs
                                • socket.WS2_32(00000002,00000001,00000000), ref: 00487F77
                                • htons.WS2_32(00000000), ref: 00487F9B
                                • inet_addr.WS2_32(00000000), ref: 00487FAF
                                • gethostbyname.WS2_32(00000000), ref: 00487FC7
                                • connect.WS2_32(000000FF,00000002,00000010), ref: 00487FEE
                                  • Part of subcall function 0041FC40: SetThreadPriority.KERNEL32(?,00000000,?,00000000,00461FFA), ref: 0041FC55
                                  • Part of subcall function 0041FEF0: ResumeThread.KERNEL32(?,?,00000000,00462033), ref: 0041FEF8
                                  • Part of subcall function 00487EE4: SendMessageA.USER32(0000FFFF,00000112,0000F170,00000002), ref: 00487F18
                                • Sleep.KERNEL32(00000064,000000FF,?,00002000,00000000,000000FF,?,00002000,00000000,000000FF,?,00002000,00000000,000000FF,00000002,00000010), ref: 0048813E
                                • send.WSOCK32(000000FF,?,00000000,00000000), ref: 004881A4
                                • shutdown.WS2_32(000000FF,00000002), ref: 0048822C
                                • closesocket.WS2_32(000000FF), ref: 00488235
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Thread$MessagePriorityResumeSendSleepclosesocketconnectgethostbynamehtonsinet_addrsendshutdownsocket
                                • String ID: DESKTOP$ENDSNAP
                                • API String ID: 932760545-2699096840
                                • Opcode ID: 274f77465147dea2047d641798f8d10ee4cf6c573f26e1fd71b0c87a182315d8
                                • Instruction ID: fbbc371b6da7babc7e7fba5de805cf5b325ab46e38a64bd95ffdedec6976ea4d
                                • Opcode Fuzzy Hash: 274f77465147dea2047d641798f8d10ee4cf6c573f26e1fd71b0c87a182315d8
                                • Instruction Fuzzy Hash: EF915274E002089FDB10FB65CC8AB9EB7B5AF44304F5044BAF504AB396DB78AE45CB58
                                APIs
                                • socket.WS2_32(00000002,00000001,00000000), ref: 004892BA
                                • htons.WS2_32(00000000), ref: 004892DC
                                • inet_addr.WS2_32(00000000), ref: 004892F0
                                • gethostbyname.WS2_32(00000000), ref: 00489308
                                • connect.WS2_32(00000000,00000002,00000010), ref: 0048932C
                                • send.WSOCK32(00000000,?,00000000,00000000), ref: 004893E3
                                • shutdown.WS2_32(00000000,00000002), ref: 00489409
                                • closesocket.WS2_32(00000000), ref: 0048940F
                                • RtlExitUserThread.NTDLL(00000000,00000000,00000000,00000002,00000002,00000001,00000000,00000000,00489441), ref: 0048941E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExitThreadUserclosesocketconnectgethostbynamehtonsinet_addrsendshutdownsocket
                                • String ID: DATAFLUX$AI
                                • API String ID: 3056308631-1069322248
                                • Opcode ID: 2aac826394ee2e9f95569d49ddf89aa4d8c633bf8c4c6fbc1029c09139eb1da2
                                • Instruction ID: e94b19134a2825d7369040221fb4b3e091a3923ddeed24191365a97965517ff0
                                • Opcode Fuzzy Hash: 2aac826394ee2e9f95569d49ddf89aa4d8c633bf8c4c6fbc1029c09139eb1da2
                                • Instruction Fuzzy Hash: 195175B0600614ABDB10FB55CD82F9E73A8EF48704F1044BAFB05B7296DB789E428B5D
                                APIs
                                • GetVersionExA.KERNEL32(00000094), ref: 0048D410
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Version
                                • String ID: Unknow$Windows 2000$Windows 7$Windows 95$Windows 98$Windows Me$Windows NT 4.0$Windows Server 2003$Windows Vista$Windows XP
                                • API String ID: 1889659487-3783844371
                                • Opcode ID: f363f8a68b66fb66844f20a54f2ae758c12e1c0f56a243a01e60438542fb073e
                                • Instruction ID: efafa3d656913f47c086d577804a577f76815ad5de1f3f09d66c721075e28549
                                • Opcode Fuzzy Hash: f363f8a68b66fb66844f20a54f2ae758c12e1c0f56a243a01e60438542fb073e
                                • Instruction Fuzzy Hash: 4F417530F025599BDB147A6D8C81B6EB761EB44708F508877A808F73E5DA3CAD458B1E
                                APIs
                                • FindResourceA.KERNEL32(00000000,?,?), ref: 0048C4C3
                                  • Part of subcall function 00489BB0: GetTempPathA.KERNEL32(?,00000000,00000000,00489C5F,?,?,00000005,00000000,00000000,?,00485721,00000000,00485755,?,?,00000005), ref: 00489BEC
                                • CreateFileA.KERNEL32(00000000,.dll,?,?,40000000,00000002,00000000,00000002,00000080,00000000,00000000,?,?,00000000,0048C5AC), ref: 0048C50F
                                • SizeofResource.KERNEL32(00000000,00000000,?,00000000,00000000,.dll,?,?,40000000,00000002,00000000,00000002,00000080,00000000,00000000,?), ref: 0048C51F
                                • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,.dll,?,?,40000000,00000002,00000000,00000002,00000080), ref: 0048C528
                                • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,.dll,?,?,40000000,00000002,00000000,00000002), ref: 0048C52E
                                • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,.dll,?,?,40000000,00000002), ref: 0048C535
                                • CloseHandle.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,.dll,?,?,40000000), ref: 0048C53B
                                • LocalAlloc.KERNEL32(00000040,00000004,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,.dll,?), ref: 0048C544
                                • CreateThread.KERNEL32(00000000,00000000,Function_0008C3E4,00000000,00000000,?), ref: 0048C586
                                • CloseHandle.KERNEL32(00000000,00000000,00000000,Function_0008C3E4,00000000,00000000,?,.dll,?,?,00000040,00000004,00000000,00000000,00000000,00000000), ref: 0048C58C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Resource$CloseCreateFileHandle$AllocFindLoadLocalLockPathSizeofTempThreadWrite
                                • String ID: .dll
                                • API String ID: 4181437036-2738580789
                                • Opcode ID: 172676192bd48a15e25f4538ae0c5f2c57fab97685bd01033f6145ba94befb32
                                • Instruction ID: 2d684a32aa0f3bf6099de899b5d84f1ca013df19b15e080bb526a55772640a92
                                • Opcode Fuzzy Hash: 172676192bd48a15e25f4538ae0c5f2c57fab97685bd01033f6145ba94befb32
                                • Instruction Fuzzy Hash: C4215371A442197AFB10BAA58C43FAF76ADDF44B14F50443AF600B61C1DA7CBD019B79
                                APIs
                                • FindWindowA.USER32(MouseZ,Magellan MSWHEEL), ref: 004085EC
                                • RegisterClipboardFormatA.USER32(MSWHEEL_ROLLMSG), ref: 004085F8
                                • RegisterClipboardFormatA.USER32(MSH_WHEELSUPPORT_MSG), ref: 00408607
                                • RegisterClipboardFormatA.USER32(MSH_SCROLL_LINES_MSG), ref: 00408613
                                • SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 0040862B
                                • SendMessageA.USER32(00000000,?,00000000,00000000), ref: 0040864F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ClipboardFormatRegister$MessageSend$FindWindow
                                • String ID: MSH_SCROLL_LINES_MSG$MSH_WHEELSUPPORT_MSG$MSWHEEL_ROLLMSG$Magellan MSWHEEL$MouseZ
                                • API String ID: 1416857345-3736581797
                                • Opcode ID: bffac0ca2944af111f0aaca626089726f4c9d7f7cc5f7d605a4dcdc83858f7b1
                                • Instruction ID: d0a151b3b5bd4fe86493293965c5d8c588d0e8c9ac58049b083f8f0e3ddb59a9
                                • Opcode Fuzzy Hash: bffac0ca2944af111f0aaca626089726f4c9d7f7cc5f7d605a4dcdc83858f7b1
                                • Instruction Fuzzy Hash: 81112170200305AFE7109F65CA41B6AB7A8EF55754F22483FB9C4AB2C1DEBA5C418B68
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: LoadString
                                • String ID:
                                • API String ID: 2948472770-0
                                • Opcode ID: 0905aa29309d56c5e5724bcdf27190bb67b48a3456a12131699bde8e238d7290
                                • Instruction ID: ede02fa90f1d609892362da0619453e2b311665d98c321069f64f2548bfd4230
                                • Opcode Fuzzy Hash: 0905aa29309d56c5e5724bcdf27190bb67b48a3456a12131699bde8e238d7290
                                • Instruction Fuzzy Hash: 60024E71A10204AFEB10EB6DCA85B5D77F4AB14305F5505BAF904EB362DBB8AE40DB48
                                APIs
                                • GetObjectA.GDI32(?,00000054,?), ref: 004291F3
                                • 73A0A570.USER32(00000000,00000000,004293CB,?,?,00000054,?), ref: 00429221
                                • SelectObject.GDI32(?,00000000), ref: 00429267
                                • PatBlt.GDI32(?,00000000,00000000,?,?,00000042), ref: 00429289
                                • SelectObject.GDI32(?), ref: 004292DF
                                • SetBkColor.GDI32(?), ref: 0042931A
                                • SetBkColor.GDI32(?,00000000), ref: 00429348
                                • SelectObject.GDI32(?,00000000), ref: 0042935B
                                • DeleteObject.GDI32 ref: 00429367
                                • DeleteDC.GDI32(?), ref: 0042937D
                                • SelectObject.GDI32(?,00000000), ref: 00429398
                                • DeleteDC.GDI32(00000000), ref: 004293B4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Object$Select$Delete$Color$A570
                                • String ID:
                                • API String ID: 3306858847-0
                                • Opcode ID: 56b678e6e476b2794f677a3b73cc423569be5500bb579b412db42deba11a9f0c
                                • Instruction ID: 63b1f4329c251e8023cf45a796c31d8c1c76af58f12f1bcae7cf91cce33ab726
                                • Opcode Fuzzy Hash: 56b678e6e476b2794f677a3b73cc423569be5500bb579b412db42deba11a9f0c
                                • Instruction Fuzzy Hash: 92511D71F04218ABDB10EBE9DC55FAEB7BCAF08704F54446AF614E72C1D678AD008B69
                                APIs
                                • socket.WS2_32(00000002,00000001,00000000), ref: 0047F543
                                • htons.WS2_32(00000000), ref: 0047F567
                                • inet_addr.WS2_32(00000000), ref: 0047F57B
                                • gethostbyname.WS2_32(00000000), ref: 0047F593
                                • connect.WS2_32(000000FF,00000002,00000010), ref: 0047F5BA
                                  • Part of subcall function 0047F4C0: send.WSOCK32(?,00000000,00000001,00000000), ref: 0047F4D9
                                • shutdown.WS2_32(000000FF,00000002), ref: 0047F8B9
                                • closesocket.WS2_32(000000FF), ref: 0047F8C2
                                  • Part of subcall function 0048ADCC: SHGetSpecialFolderLocation.SHELL32(00000000,0000001A,?,00000000,0048AE8C,?,00000001,00000000,?,0047F6FD,?,00000000,0047F749,?,000000FF,?), ref: 0048ADF9
                                  • Part of subcall function 0048ADCC: SHGetPathFromIDList.SHELL32(?,?), ref: 0048AE09
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: FolderFromListLocationPathSpecialclosesocketconnectgethostbynamehtonsinet_addrsendshutdownsocket
                                • String ID: FILEEND$PLUGIN$QUICKUP
                                • API String ID: 799534975-4134529074
                                • Opcode ID: 998f738617d970be2094329e7867a189451794c4539014d258a0e86ac305f136
                                • Instruction ID: 51ce96c1098092ccf250bfa6c83678238c8feeb2df66a5b2be934bd4070a7dd2
                                • Opcode Fuzzy Hash: 998f738617d970be2094329e7867a189451794c4539014d258a0e86ac305f136
                                • Instruction Fuzzy Hash: 57C16570A04219AFDB10EB55CC45BDEB3B9EF58304F5080BBB608A7292D778AE45CF59
                                APIs
                                • MessageBoxA.USER32(00000000,?,Unexpected Memory Leak,00002010), ref: 00402BBE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message
                                • String ID: $ bytes: $7$An unexpected memory leak has occurred. $String$The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak$Unknown
                                • API String ID: 2030045667-32948583
                                • Opcode ID: d98dbe31d933f5a7662105fcb468f2e778fe9ab2c6d0efd817a8327315cadbc5
                                • Instruction ID: 496791c9fb10991fef7c7f523b03bfff7a95d4bb9ec06be82af5ff3dde038bcd
                                • Opcode Fuzzy Hash: d98dbe31d933f5a7662105fcb468f2e778fe9ab2c6d0efd817a8327315cadbc5
                                • Instruction Fuzzy Hash: 7FA1D430B042548BDF21AA2DC988B99B7E4EB09314F1441F7E449BB3C2CBBD9985CB59
                                APIs
                                • socket.WS2_32(00000002,00000001,00000000), ref: 0047FE69
                                • htons.WS2_32(00000000), ref: 0047FE8D
                                • inet_addr.WS2_32(00000000), ref: 0047FEA1
                                • gethostbyname.WS2_32(00000000), ref: 0047FEB9
                                • connect.WS2_32(000000FF,00000002,00000010), ref: 0047FEE0
                                • send.WSOCK32(000000FF,?,00000400,00000000,?,000000FF,?,00000400,00000000,000000FF,?,00000400,00000000,000000FF,00000002,00000010), ref: 0047FFF2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: connectgethostbynamehtonsinet_addrsendsocket
                                • String ID: UPFLUX$AI
                                • API String ID: 3699060267-1493256192
                                • Opcode ID: dfaee7c100c24160caf41e5b9eb2dac0fb6ac46cd5fed7960ee9fdda6f87ab9d
                                • Instruction ID: b7191babfadc448a06c2fa94924859304e88a291c5e2e33197d2760698211c1f
                                • Opcode Fuzzy Hash: dfaee7c100c24160caf41e5b9eb2dac0fb6ac46cd5fed7960ee9fdda6f87ab9d
                                • Instruction Fuzzy Hash: FA513174A00608AFDB10EF55DC82F9EB7F8EF49704F5044BAF604A7291DA78AE458B58
                                APIs
                                • GetWindowTextA.USER32(?,00000000,?), ref: 0046F1D2
                                • GetWindowPlacement.USER32(?,0000002C,?,00000000,?,00000000,0046F2ED), ref: 0046F1ED
                                • IsWindowVisible.USER32(?), ref: 0046F258
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$PlacementTextVisible
                                • String ID: ,$Maximized$Minimized$Normal$Normal/Unactive$Show/Unactive$True
                                • API String ID: 2923846316-511446200
                                • Opcode ID: ca7620ef2b838701469bee390c0adac9b49d7030bcdb8755161c2745663fdc3c
                                • Instruction ID: 4768b413c3f92b58cbc98992ebaeaf5a1acde39280e8134cd0dc30b0707b2055
                                • Opcode Fuzzy Hash: ca7620ef2b838701469bee390c0adac9b49d7030bcdb8755161c2745663fdc3c
                                • Instruction Fuzzy Hash: 65416474900608BEDF10EBA5E851A9F76B9DB45314F60407BF880B2285E73D9E889E5E
                                APIs
                                • EnumDisplayMonitors.USER32(?,?,?,?), ref: 0042E755
                                • GetSystemMetrics.USER32(00000000), ref: 0042E77A
                                • GetSystemMetrics.USER32(00000001), ref: 0042E785
                                • GetClipBox.GDI32(?,?), ref: 0042E797
                                • GetDCOrgEx.GDI32(?,?), ref: 0042E7A4
                                • OffsetRect.USER32(?,?,?), ref: 0042E7BD
                                • IntersectRect.USER32(?,?,?), ref: 0042E7CE
                                • IntersectRect.USER32(?,?,?), ref: 0042E7E4
                                  • Part of subcall function 0042E174: GetProcAddress.KERNEL32(75A50000,00000000), ref: 0042E1F3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Rect$IntersectMetricsSystem$AddressClipDisplayEnumMonitorsOffsetProc
                                • String ID: EnumDisplayMonitors
                                • API String ID: 362875416-2491903729
                                • Opcode ID: bb1c40e1e40fe5ea8981d8ce3863e0b24a774febe785fe6cb73acb90b1a5addf
                                • Instruction ID: e6956310d25dfe635fe51df9bf9dc645aed7cc5b0bfdb5b5b2e39949136a7a88
                                • Opcode Fuzzy Hash: bb1c40e1e40fe5ea8981d8ce3863e0b24a774febe785fe6cb73acb90b1a5addf
                                • Instruction Fuzzy Hash: 2C312C72E00259AFDB11DAAADD459FF77FCEB49310F40413BE915E3241EB3899018BA5
                                APIs
                                • socket.WS2_32(00000002,00000001,00000006), ref: 004826CB
                                • RtlExitUserThread.NTDLL(00000000,00000002,00000001,00000006,?,00000000,004827A8), ref: 004826D8
                                • inet_addr.WS2_32(00000000), ref: 004826F3
                                • htons.WS2_32(00000000), ref: 004826FC
                                • gethostbyname.WS2_32(00000000), ref: 0048270C
                                • RtlExitUserThread.NTDLL(00000000,00000000,00000000,00000000,00000002,00000001,00000006,?,00000000,004827A8), ref: 00482719
                                • connect.WS2_32(00000000,00000002,00000010), ref: 0048272F
                                • RtlExitUserThread.NTDLL(00000000,00000000,00000002,00000010,00000000,00000000,00000002,00000001,00000006,?,00000000,004827A8), ref: 0048273A
                                • Sleep.KERNEL32(000003E8,00000000,?,00000400,00000000,00000000,00000002,00000010,00000000,00000000,00000002,00000001,00000006,?,00000000,004827A8), ref: 00482770
                                • closesocket.WS2_32(00000000), ref: 00482776
                                • RtlExitUserThread.NTDLL(00000000,00000000,000003E8,00000000,?,00000400,00000000,00000000,00000002,00000010,00000000,00000000,00000002,00000001,00000006,?), ref: 0048277D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExitThreadUser$Sleepclosesocketconnectgethostbynamehtonsinet_addrsocket
                                • String ID:
                                • API String ID: 681257413-0
                                • Opcode ID: 9bd3994d80b3de13de8329bfaa00d7a866a4eee7f27e0c96566f1dee57e50916
                                • Instruction ID: 0be33a30a7168a946e52d020e8be30beffd6b954083bdbc56d0a3abcfca40686
                                • Opcode Fuzzy Hash: 9bd3994d80b3de13de8329bfaa00d7a866a4eee7f27e0c96566f1dee57e50916
                                • Instruction Fuzzy Hash: 2E411170A00608ABDB10FBA6CD82B9FB3F9DF44708F50457BB504B72D2DA789A418B59
                                APIs
                                • RtlExitUserThread.NTDLL(00000000,00000000,00481687,?,00000000,004816C3,?,?,?,?,0000000C,00000000,00000000), ref: 0048135E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExitThreadUser
                                • String ID: Bytes ($,xI$:: $:: Clipboard Change : size = $FTPSIZE$FTPUPLOADK$dclogs\
                                • API String ID: 3424019298-4171340091
                                • Opcode ID: c4f74cd142afbfb1dc6b2ff528ab4f1a771df7ac5d408ff0fa9b512a621e47c2
                                • Instruction ID: 35b805d7260a6fe87c5eaec9904f23cf78c99d644eafe8f6a33729b82c253e93
                                • Opcode Fuzzy Hash: c4f74cd142afbfb1dc6b2ff528ab4f1a771df7ac5d408ff0fa9b512a621e47c2
                                • Instruction Fuzzy Hash: A5914230600208ABDB01FBD5D842E9E7BB9EF45708F60883BF500B72A5D77DA9169B5D
                                APIs
                                • DeleteFileA.KERNEL32(00000000,Error,00000000,00485C82), ref: 00485A63
                                • DeleteFileA.KERNEL32(00000000,00000000,Error,00000000,00485C82), ref: 00485A92
                                • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 00485BE3
                                • Beep.KERNEL32(00000000,00000000), ref: 00485C68
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteFile$BeepMessage
                                • String ID: Error$SYSINFO$out.txt$systeminfo$tmp.txt
                                • API String ID: 1009875511-345806071
                                • Opcode ID: 35605ac806c6e6c0df7aea1f30d165abb8cea25106146d3ee0af70c63aa8fd39
                                • Instruction ID: b8610570d90741432704fbe5da62b6114c0f79561c7d0df99b3aa1d2e601203f
                                • Opcode Fuzzy Hash: 35605ac806c6e6c0df7aea1f30d165abb8cea25106146d3ee0af70c63aa8fd39
                                • Instruction Fuzzy Hash: 9891AC74A105099FCB00FB99D5829AEB7F5EF48304B608467F900BB796D639EE018F69
                                APIs
                                • CoCreateInstance.COMBASE(00492A2C,00000000,00000003,0049296C,00000000), ref: 00462CC9
                                • CoCreateInstance.COMBASE(00492A8C,00000000,00000001,00462EC8,00000000), ref: 00462CF4
                                • CoCreateInstance.COMBASE(00492A9C,00000000,00000001,0049295C,00000000), ref: 00462D20
                                • CoCreateInstance.COMBASE(00492A1C,00000000,00000003,004929AC,00000000), ref: 00462E12
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateInstance
                                • String ID: ,*I$\)I$l)I$|*I$)I
                                • API String ID: 542301482-3023651653
                                • Opcode ID: 2c8a3f1827572771026c356a1b69bfb746972271e97e3a08649d14abf9c4534d
                                • Instruction ID: e19e976b9b68773fa06a866662e043369aca2b2800dc5aa44595a26c5ff47f56
                                • Opcode Fuzzy Hash: 2c8a3f1827572771026c356a1b69bfb746972271e97e3a08649d14abf9c4534d
                                • Instruction Fuzzy Hash: 4A616A72A40A05AFDB61EF58D981F4737ECAF59314F0101B6FD04EB2A1D6B9EC048B69
                                APIs
                                  • Part of subcall function 0040A26C: GetFileAttributesA.KERNEL32(00000000,?,0045F60D), ref: 0040A277
                                • CreateFileA.KERNEL32(?,C0000000,00000003,0000000C,00000004,00000100,00000000), ref: 0048A953
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AttributesCreate
                                • String ID: D
                                • API String ID: 415043291-2746444292
                                • Opcode ID: 5cd9e9b814d5f853602ab11d8444d8bd60a961894b34ba5fc45cdf8a40de1e48
                                • Instruction ID: e817184193c0c03b942df6feaf068dcea89dbf5970112bf3689cad218da2397a
                                • Opcode Fuzzy Hash: 5cd9e9b814d5f853602ab11d8444d8bd60a961894b34ba5fc45cdf8a40de1e48
                                • Instruction Fuzzy Hash: 1D517870D04318ABEB21EBA5CC45BDEB7B8AB08314F1045ABF514B62C1D7785B55CB1A
                                APIs
                                  • Part of subcall function 0040A26C: GetFileAttributesA.KERNEL32(00000000,?,0045F60D), ref: 0040A277
                                • CreateFileA.KERNEL32(?,C0000000,00000003,0000000C,00000004,00000100,00000000), ref: 00466DF3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AttributesCreate
                                • String ID: D
                                • API String ID: 415043291-2746444292
                                • Opcode ID: 8e25f129ac98a2af74fbe22f8256de9f63df749bb7f8f244f057abbdcadcc4f6
                                • Instruction ID: 2cc22e803c6896be624e4fbc2b28d0711532e3aa6bb33fc83574ad53e660c3ef
                                • Opcode Fuzzy Hash: 8e25f129ac98a2af74fbe22f8256de9f63df749bb7f8f244f057abbdcadcc4f6
                                • Instruction Fuzzy Hash: 61519370E04318ABEB21DBA5CC45BDEB7B8AB08314F1045EAF518F22C1D7795B45CB1A
                                APIs
                                • GetCurrentProcess.KERNEL32(00000008,?,00000000,0048BA4E,?,00000000,0048BAB3), ref: 0048B93E
                                • OpenProcessToken.ADVAPI32(00000000,00000008,?,00000000,0048BA4E,?,00000000,0048BAB3), ref: 0048B944
                                • GetTokenInformation.ADVAPI32(?,00000012(TokenIntegrityLevel),?,00000004,?,00000000,0048BA30,?,00000000,00000008,?,00000000,0048BA4E,?,00000000,0048BAB3), ref: 0048B96F
                                • GetTokenInformation.ADVAPI32(?,00000014(TokenIntegrityLevel),?,00000004,?,?,TokenIntegrityLevel,?,00000004,?,00000000,0048BA30,?,00000000,00000008,?), ref: 0048B9DF
                                • CloseHandle.KERNEL32(?,0048BA44,00000004,?,?,TokenIntegrityLevel,?,00000004,?,00000000,0048BA30,?,00000000,00000008,?,00000000), ref: 0048BA2A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Token$InformationProcess$CloseCurrentHandleOpen
                                • String ID: Default$Full$Limited$unknow
                                • API String ID: 434396405-3005279702
                                • Opcode ID: e98ab3777b43703bd83954c61211922ed6540875020cd577eeac98e4cbb4028c
                                • Instruction ID: b96fe4ddba3f969ee1a658b8c7442e4488c28be40354120335758c9657957b45
                                • Opcode Fuzzy Hash: e98ab3777b43703bd83954c61211922ed6540875020cd577eeac98e4cbb4028c
                                • Instruction Fuzzy Hash: EB416375A04609EFDB05FB95C8419AFB7B9EB44304F508877E900A3684D73CAA05DB99
                                APIs
                                • InternetOpenA.WININET(myappname,00000000,00000000,00000000,00000000), ref: 0048350C
                                • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,00000000,00000000), ref: 00483537
                                • InternetCloseHandle.WININET(00000000), ref: 0048353D
                                • InternetCloseHandle.WININET(?), ref: 00483553
                                  • Part of subcall function 00475E2C: send.WSOCK32(00000000,00000000,?,00000000,00000000,00475EBD), ref: 00475E9D
                                • RtlExitUserThread.NTDLL(00000000, Times.,?,00483684,?,BTRESULTVisit URL|finished to visit ,?,004835AC,?,myappname,00000000,00000000,00000000,00000000,00000000,004835BF), ref: 0048359F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$CloseHandleOpen$ExitThreadUsersend
                                • String ID: Times.$BTRESULTVisit URL|finished to visit $H4H$myappname
                                • API String ID: 3039500454-1696038370
                                • Opcode ID: 95f3495bc1fd2ed96fde18f6bdb763fc9107a9d67400c539238762eafd59d53a
                                • Instruction ID: 9acfa86b35768e9f0b1189a3f7144397f4aa44dc505a2439edd4324a26b71e15
                                • Opcode Fuzzy Hash: 95f3495bc1fd2ed96fde18f6bdb763fc9107a9d67400c539238762eafd59d53a
                                • Instruction Fuzzy Hash: 72418670B00608AFDB11EF65DC52F5EB7F9EB48B04FA044BAB504B3281D6789A448F1C
                                APIs
                                • closesocket.WS2_32(00000000), ref: 00475D2E
                                • GetCurrentProcessId.KERNEL32(00000000,00000000,00475D47,?,00000000,00475D76,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 00475D33
                                  • Part of subcall function 00484388: OpenProcess.KERNEL32(00000001,00000000,00000000), ref: 00484393
                                  • Part of subcall function 00484388: GetExitCodeProcess.KERNEL32(00000000,?), ref: 004843B7
                                  • Part of subcall function 00484388: TerminateProcess.KERNEL32(00000000,?,00000000,004843E0,?,00000001,00000000,00000000), ref: 004843C4
                                  • Part of subcall function 00484388: CloseHandle.KERNEL32(00000000,004843E7,004843E0,?,00000001,00000000,00000000), ref: 004843DA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseCodeCurrentExitHandleOpenTerminateclosesocket
                                • String ID: HKCU$INSTALL$KEYNAME$SOFTWARE\Microsoft\Windows\CurrentVersion\Run$cmd.exe$notepad$notepad.exe
                                • API String ID: 1670311568-510231361
                                • Opcode ID: ab6da3c05fde2bb65ff1431237b14476660256d48494369583b3202a6be6a1eb
                                • Instruction ID: 5436a74f6f9e389a6a853b2f59f3f34778588aef63ff4b707e578e357af83887
                                • Opcode Fuzzy Hash: ab6da3c05fde2bb65ff1431237b14476660256d48494369583b3202a6be6a1eb
                                • Instruction Fuzzy Hash: 8931E430604F449EDB21BBB689066DE7368DB45304B90C83BF80C9E642DAFD9901967E
                                APIs
                                • GetWindowTextA.USER32(?,00000000,?), ref: 0046F40E
                                • GetWindowPlacement.USER32(?,0000002C,?,00000000,?,00000000,0046F519), ref: 0046F429
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$PlacementText
                                • String ID: ,$False$Maximized$Minimized$Normal$Normal/Unactive$Show/Unactive
                                • API String ID: 29908588-3661939895
                                • Opcode ID: c952794d25804e356698621d42fc77dd4c8f063034a3f45e57410c79a7368757
                                • Instruction ID: 1ebd0148d9e47f58defe53e300c6861d9f7041bc1cac8e0206192933632317c6
                                • Opcode Fuzzy Hash: c952794d25804e356698621d42fc77dd4c8f063034a3f45e57410c79a7368757
                                • Instruction Fuzzy Hash: 00315970A00208BEDF10EEA5E84299F77B9DB55314F604077F441B2A46EB3C9E499A5B
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 0041FD39
                                • CreateEventA.KERNEL32(00000000,000000FF,00000000,00000000), ref: 0041FD84
                                • RtlEnterCriticalSection.NTDLL(004999D0), ref: 0041FDAC
                                • RtlLeaveCriticalSection.NTDLL(004999D0), ref: 0041FE23
                                • WaitForSingleObject.KERNEL32(?,000000FF,00000000,0041FE5C,?,004999D0,00000000,0041FE7B,?,004999D0,00000000,0041FEA2), ref: 0041FE3F
                                • RtlEnterCriticalSection.NTDLL(004999D0), ref: 0041FE56
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$Enter$CreateCurrentEventLeaveObjectSingleThreadWait
                                • String ID: 4PI$\tA
                                • API String ID: 1504017990-2555596473
                                • Opcode ID: 699add66cfc5c1a546ea256eb7318c36655a720336dc8ee65dce3a5f0a19966a
                                • Instruction ID: 6ecddfbed167c30d3b6a2ba75b467dd7d5a4ef8dd7646cfe1292a76b632e5a0c
                                • Opcode Fuzzy Hash: 699add66cfc5c1a546ea256eb7318c36655a720336dc8ee65dce3a5f0a19966a
                                • Instruction Fuzzy Hash: 8E41E334A04204AFDB01DF69D892F9ABBB0EB09314F2585B7F810A73E1D2786D45DB59
                                APIs
                                • FindResourceA.KERNEL32(00000000,?,?), ref: 0048BE01
                                  • Part of subcall function 00489BB0: GetTempPathA.KERNEL32(?,00000000,00000000,00489C5F,?,?,00000005,00000000,00000000,?,00485721,00000000,00485755,?,?,00000005), ref: 00489BEC
                                • CreateFileA.KERNEL32(00000000,40000000,00000002,00000000,00000002,00000080,00000000,00000000,0048BEC8,?,?,?,?,00000000,00000000,00000000), ref: 0048BE42
                                • SizeofResource.KERNEL32(00000000,00000000,?,00000000,00000000,40000000,00000002,00000000,00000002,00000080,00000000,00000000,0048BEC8), ref: 0048BE52
                                • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,40000000,00000002,00000000,00000002,00000080,00000000,00000000,0048BEC8), ref: 0048BE5B
                                • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,40000000,00000002,00000000,00000002,00000080,00000000,00000000), ref: 0048BE61
                                • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,40000000,00000002,00000000,00000002,00000080), ref: 0048BE68
                                • CloseHandle.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,40000000,00000002,00000000,00000002), ref: 0048BE6E
                                • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000005), ref: 0048BEA8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Resource$File$CloseCreateExecuteFindHandleLoadLockPathShellSizeofTempWrite
                                • String ID: open
                                • API String ID: 3695355325-2758837156
                                • Opcode ID: 84ffd76be853ab9c6405f1b094a76dc14c66fdc70abd0f1d84ba6f869d33b198
                                • Instruction ID: 43799e2b1c38d44b387fd2260005e8023c2738a30ee5bcac768a912206ce1f91
                                • Opcode Fuzzy Hash: 84ffd76be853ab9c6405f1b094a76dc14c66fdc70abd0f1d84ba6f869d33b198
                                • Instruction Fuzzy Hash: 5D214F71A442087EE710FBA18C43FBF776CDF45714F50443AB600B61C2DA78AD048AB9
                                APIs
                                • RectVisible.GDI32(?,?), ref: 00456000
                                • SaveDC.GDI32(?), ref: 00456023
                                • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00456063
                                • RestoreDC.GDI32(?,00455EAF), ref: 0045608F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Rect$ClipIntersectRestoreSaveVisible
                                • String ID:
                                • API String ID: 1976014923-0
                                • Opcode ID: 302d3445eb35f344943271f76171046b7a78bcd8011980b810a40f27115c4e32
                                • Instruction ID: 6b1bab20f6622f3c7de5a7da467ef4f255f77b2f8cc452f27cf9149d9c103c32
                                • Opcode Fuzzy Hash: 302d3445eb35f344943271f76171046b7a78bcd8011980b810a40f27115c4e32
                                • Instruction Fuzzy Hash: 8E911A71A002489FDB05DF99C485FAEBBF5AF08304F1544AAEA04EB396D739ED84CB54
                                APIs
                                • SaveDC.GDI32(?), ref: 00456295
                                  • Part of subcall function 0044EEA0: GetWindowOrgEx.GDI32(?), ref: 0044EEAE
                                  • Part of subcall function 0044EEA0: SetWindowOrgEx.GDI32(?,?,?,00000000), ref: 0044EEC4
                                • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 004562CE
                                • GetWindowLongA.USER32(00000000,000000EC), ref: 004562E2
                                • GetWindowLongA.USER32(00000000,000000F0), ref: 00456303
                                • SetRect.USER32(00000010,00000000,00000000,?,?), ref: 00456363
                                • IntersectClipRect.GDI32(?,00000000,00000000,00000010,?), ref: 004563D3
                                  • Part of subcall function 004561C8: SaveDC.GDI32(?), ref: 004561D8
                                  • Part of subcall function 004561C8: ExcludeClipRect.GDI32(?,?,?,?,?,00000000,0045625E,?,?), ref: 00456219
                                  • Part of subcall function 004561C8: RestoreDC.GDI32(?,?), ref: 00456258
                                • SetRect.USER32(?,00000000,00000000,?,?), ref: 004563F4
                                • DrawEdge.USER32(?,?,00000000,00000000), ref: 00456403
                                • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 0045642C
                                • RestoreDC.GDI32(?,?), ref: 004564AB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Rect$ClipWindow$Intersect$LongRestoreSave$DrawEdgeExclude
                                • String ID:
                                • API String ID: 3997055466-0
                                • Opcode ID: 3b7d523e932b42692fd9767136263b0deb8b2cdb8b0c873496559cd326214015
                                • Instruction ID: bc8c08a30705a648f3c0ee3797e460638e083646ba0508a3aa660b25b454cb0d
                                • Opcode Fuzzy Hash: 3b7d523e932b42692fd9767136263b0deb8b2cdb8b0c873496559cd326214015
                                • Instruction Fuzzy Hash: 83711F75A00209AFDB00DB99C981F9EB7B9AF48304F51419AF900E7392D778AE45CB54
                                APIs
                                • GetWindowLongA.USER32(00000000,000000EC), ref: 00432917
                                • GetWindowRect.USER32(00000000,?), ref: 00432932
                                • OffsetRect.USER32(?,?,?), ref: 00432947
                                • GetWindowLongA.USER32(00000000,000000F0), ref: 00432986
                                • GetSystemMetrics.USER32(00000002), ref: 0043299B
                                • GetSystemMetrics.USER32(00000003), ref: 004329A4
                                • InflateRect.USER32(?,000000FE,000000FE), ref: 004329B3
                                • GetSysColorBrush.USER32(0000000F), ref: 004329E0
                                • FillRect.USER32(?,?,00000000), ref: 004329EE
                                • ExcludeClipRect.GDI32(?,?,?,?,?,00000000,00432A57,?,00000000,?,?,?,00000000,?), ref: 00432A13
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Rect$Window$LongMetricsSystem$BrushClipColorExcludeFillInflateOffset
                                • String ID:
                                • API String ID: 239630386-0
                                • Opcode ID: c62bb7f6d1ddd562bc9a4e327f4f8333aff447e7fef4794d3d367fcbc27dcffe
                                • Instruction ID: 47c1cbc41cf51a97151adcc7d9c98bfe2d9ebf44448c518fa4ffad7f7cf84421
                                • Opcode Fuzzy Hash: c62bb7f6d1ddd562bc9a4e327f4f8333aff447e7fef4794d3d367fcbc27dcffe
                                • Instruction Fuzzy Hash: 6E415171A00509ABCB00EAE9CE42EDFB7BDEF49315F10016AF914F7281DE789E458768
                                APIs
                                • GetWindowLongA.USER32(00000000,000000F0), ref: 0043F329
                                • GetWindowLongA.USER32(00000000,000000EC), ref: 0043F33B
                                • GetClassLongA.USER32(00000000,000000E6), ref: 0043F34E
                                • SetWindowLongA.USER32(00000000,000000F0,00000000), ref: 0043F38E
                                • SetWindowLongA.USER32(00000000,000000EC,?), ref: 0043F3A2
                                • SetClassLongA.USER32(00000000,000000E6,?), ref: 0043F3B6
                                • SendMessageA.USER32(00000000,00000080,00000001,00000000), ref: 0043F3F0
                                • SendMessageA.USER32(00000000,00000080,00000001,00000000), ref: 0043F408
                                • GetSystemMenu.USER32(00000000,000000FF,00000000,000000EC,?,00000000,000000F0,00000000,?,00000000,000000EC,00000000,000000F0), ref: 0043F417
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000037,00000000,000000EC,?,00000000,000000F0,00000000,?,00000000,000000EC), ref: 0043F440
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Long$Window$ClassMessageSend$MenuSystem
                                • String ID:
                                • API String ID: 494549727-0
                                • Opcode ID: ed5950b7513ab977bace3757989dcf4a3624f85c4cc875f857bb5c37b5fc2fad
                                • Instruction ID: 31ba2022adaebc7c5454a2c3e9b048a584a8924d3ab32279ab6cf42859ad06cc
                                • Opcode Fuzzy Hash: ed5950b7513ab977bace3757989dcf4a3624f85c4cc875f857bb5c37b5fc2fad
                                • Instruction Fuzzy Hash: A041D2A070824276C611733A8C46BBF66491FA1319F18462EF8A4BB2D3DE7C9849935E
                                APIs
                                • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0040364C
                                • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00403670
                                • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0040368C
                                • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000001,00000000), ref: 004036AD
                                • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 004036D6
                                • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 004036E4
                                • GetStdHandle.KERNEL32(000000F5), ref: 0040371F
                                • GetFileType.KERNEL32(?,000000F5), ref: 00403735
                                • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403750
                                • GetLastError.KERNEL32(000000F5), ref: 00403768
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                • String ID:
                                • API String ID: 1694776339-0
                                • Opcode ID: 3c59c421baf084b5402e12b6d9ea479adb88dd9353cbee7bf8cbef23f48ab899
                                • Instruction ID: 75c841ba4a36448c979fa12aada2731fe230a3b4169333e97607d36735e9785c
                                • Opcode Fuzzy Hash: 3c59c421baf084b5402e12b6d9ea479adb88dd9353cbee7bf8cbef23f48ab899
                                • Instruction Fuzzy Hash: 274172F0100700AAE730AF2989157637E98AB40715F20CE3FE496B76E1D77DAA45874D
                                APIs
                                • socket.WS2_32(00000002,00000002,00000000), ref: 0048223B
                                • RtlExitUserThread.NTDLL(00000000,00000002,00000002,00000000,?,00000000,00482302), ref: 00482248
                                • inet_addr.WS2_32(00000000), ref: 00482263
                                • htons.WS2_32(00000000), ref: 0048226C
                                • gethostbyname.WS2_32(00000000), ref: 0048227C
                                • RtlExitUserThread.NTDLL(00000000,00000000,00000000,00000000,00000002,00000002,00000000,?,00000000,00482302), ref: 00482289
                                • sendto.WS2_32(00000000,?,?,00000000,00000002,00000010), ref: 004822B2
                                • Sleep.KERNEL32(000003E8,00000000,00000000,00000002,00000002,00000000,?,00000000,00482302), ref: 004822CA
                                • closesocket.WS2_32(00000000), ref: 004822D0
                                • RtlExitUserThread.NTDLL(00000000,00000000,000003E8,00000000,00000000,00000002,00000002,00000000,?,00000000,00482302), ref: 004822D7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExitThreadUser$Sleepclosesocketgethostbynamehtonsinet_addrsendtosocket
                                • String ID:
                                • API String ID: 2434912527-0
                                • Opcode ID: dc2b18d090f96f50001781a49c1916779bf8e014fcf552723931d7593c2535bd
                                • Instruction ID: 54d30ec4a33870b5ffb2ae8f4417bf7d68c57728b1a7ca45fc5f0cbf2655ad28
                                • Opcode Fuzzy Hash: dc2b18d090f96f50001781a49c1916779bf8e014fcf552723931d7593c2535bd
                                • Instruction Fuzzy Hash: 50412370A00608AFDB10FBA5C942B9FB3B8EF44704F50457BF904B72D2DA78AE018B59
                                APIs
                                • GetSystemMenu.USER32(00000000,00000000), ref: 004415A7
                                • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 004415C5
                                • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004415D2
                                • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004415DF
                                • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004415EC
                                • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 004415F9
                                • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 00441606
                                • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 00441613
                                • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 00441631
                                • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 0044164D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Menu$Delete$EnableItem$System
                                • String ID:
                                • API String ID: 3985193851-0
                                • Opcode ID: 64978b088510bca8045298f4beebeb97328a657705bac038d36d957966bd8c36
                                • Instruction ID: 552ce7ce67e27a723339bed75d044a5a00990493b53a2f8ca8fffe2ebb762983
                                • Opcode Fuzzy Hash: 64978b088510bca8045298f4beebeb97328a657705bac038d36d957966bd8c36
                                • Instruction Fuzzy Hash: EF213670384704BBE7309625CD8EF597BD86B14709F0580BDB6897F2D3CAB8E988461C
                                APIs
                                • 73A0A570.USER32(00000000,?,00000000,0042A505,?,?), ref: 0042A252
                                • SelectObject.GDI32(?,00000000), ref: 0042A2D6
                                • GetLastError.KERNEL32(?,?,00000004,00000000,?,00000000,00000000,0042A38F,?,?,00000000,00000001,00000001,00000001,00000001,00000000), ref: 0042A344
                                • SelectObject.GDI32(?,?), ref: 0042A383
                                • DeleteObject.GDI32(00000000), ref: 0042A389
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Object$Select$A570DeleteErrorLast
                                • String ID: ($BM
                                • API String ID: 2612784382-2980357723
                                • Opcode ID: 895dfda919fa588d9196c89d0cfc3d733bd05c266270671261156b86dde51a39
                                • Instruction ID: 24cf4028bdda640bb24370e5a5a8d260a52f2390f1075e60c82c5e2027258d8d
                                • Opcode Fuzzy Hash: 895dfda919fa588d9196c89d0cfc3d733bd05c266270671261156b86dde51a39
                                • Instruction Fuzzy Hash: 6FD14B70B002189FDF14DFA9D885AAEBBB5FF48314F54846AF900E7395D7389850CB6A
                                Strings
                                • An unexpected memory leak has occurred. , xrefs: 00402980
                                • Unexpected Memory Leak, xrefs: 00402BB0
                                • 7, xrefs: 00402991
                                • The sizes of unexpected leaked medium and large blocks are: , xrefs: 00402B39
                                • The unexpected small block leaks are:, xrefs: 004029F7
                                • bytes: , xrefs: 00402A4D
                                • , xrefs: 00402B04
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: $ bytes: $7$An unexpected memory leak has occurred. $The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak
                                • API String ID: 0-2723507874
                                • Opcode ID: 6b0f9a5b781bc5e2afbc579dbb1cc35cb3e841a7c806f8fbee9488eb84cc441a
                                • Instruction ID: 720d71dd93e16757c094652892308823067c6484f77dd192ad315921d69cc0b3
                                • Opcode Fuzzy Hash: 6b0f9a5b781bc5e2afbc579dbb1cc35cb3e841a7c806f8fbee9488eb84cc441a
                                • Instruction Fuzzy Hash: E471A430B042548BDF21AA2DC988B99BBE4EB09714F1041F7E449F72C2DBBD4A85CB59
                                APIs
                                • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 0047111D
                                • GetWindow.USER32(00000000,00000005), ref: 00471125
                                • GetClassNameA.USER32(00000000,?,00000080), ref: 0047113D
                                • ShowWindow.USER32(00000000,00000001,00000000,00000005,Shell_TrayWnd,00000000,00000000,004711BA), ref: 0047117C
                                • ShowWindow.USER32(00000000,00000000,00000000,00000005,Shell_TrayWnd,00000000,00000000,004711BA), ref: 00471186
                                • GetWindow.USER32(00000000,00000002), ref: 0047118E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Show$ClassFindName
                                • String ID: BUTTON$Shell_TrayWnd
                                • API String ID: 2018406990-3627955571
                                • Opcode ID: e1eb90fdc09cf4d79db6b5060a49001a14a1470a7d597967df34821b104f8e66
                                • Instruction ID: f5034e82b016deeceec447be7542654671e55c36f1127998497d17e1e0968a59
                                • Opcode Fuzzy Hash: e1eb90fdc09cf4d79db6b5060a49001a14a1470a7d597967df34821b104f8e66
                                • Instruction Fuzzy Hash: 8E11EB30A40A1466D721E6658D03BDE72A8EF48714FD0C17BF548BA1D2EE3C5E05475C
                                APIs
                                  • Part of subcall function 0040D8AC: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0040D8C9
                                  • Part of subcall function 0040D8AC: GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0040D8ED
                                  • Part of subcall function 0040D8AC: GetModuleFileNameA.KERNEL32(00400000,?,00000105), ref: 0040D908
                                  • Part of subcall function 0040D8AC: LoadStringA.USER32(00000000,0000FFED,?,00000100), ref: 0040D99E
                                • CharToOemA.USER32(?,?), ref: 0040DA6B
                                • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,0040E1ED,0040E312,0040FDD4,00000000,0040FF18), ref: 0040DA88
                                • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,0040E1ED,0040E312,0040FDD4,00000000,0040FF18), ref: 0040DA8E
                                • GetStdHandle.KERNEL32(000000F4,0040DAF8,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,0040E1ED,0040E312,0040FDD4,00000000,0040FF18), ref: 0040DAA3
                                • WriteFile.KERNEL32(00000000,000000F4,0040DAF8,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,0040E1ED,0040E312,0040FDD4,00000000), ref: 0040DAA9
                                • LoadStringA.USER32(00000000,0000FFEE,?,00000040), ref: 0040DACB
                                • MessageBoxA.USER32(00000000,?,?,00002010), ref: 0040DAE1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$HandleLoadModuleNameStringWrite$CharMessageQueryVirtual
                                • String ID: LPI
                                • API String ID: 185507032-863635926
                                • Opcode ID: d3f39fb5fbcde67155afe4d72b2c4e48e1d6f5154563cf0cada33c316f953f6e
                                • Instruction ID: 78887651d415d93412bd23f9bad78e48ae5f65dc72d453059ea476f9ca3cc0c1
                                • Opcode Fuzzy Hash: d3f39fb5fbcde67155afe4d72b2c4e48e1d6f5154563cf0cada33c316f953f6e
                                • Instruction Fuzzy Hash: 70113DB29482046EE200F7A5CC42F9B77ECAF55704F40453BB754E60E2DA78E9458B6A
                                APIs
                                • MulDiv.KERNEL32(?,?,?), ref: 004504D7
                                • MulDiv.KERNEL32(?,?,?), ref: 004504F1
                                • MulDiv.KERNEL32(?,?,?), ref: 0045051F
                                • MulDiv.KERNEL32(?,?,?), ref: 00450535
                                • MulDiv.KERNEL32(?,?,?), ref: 0045056D
                                • MulDiv.KERNEL32(?,?,?), ref: 00450585
                                  • Part of subcall function 00424A40: MulDiv.KERNEL32(00000000,00000048,?), ref: 00424A51
                                • MulDiv.KERNEL32(?), ref: 004505DC
                                • MulDiv.KERNEL32(?), ref: 00450606
                                • MulDiv.KERNEL32(00000000), ref: 0045062C
                                  • Part of subcall function 00424A5C: MulDiv.KERNEL32(00000000,?,00000048), ref: 00424A69
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 43fcfd80e463b8ca928775a9cb391cc0adbffc0cab59597b8fed37293dbbe765
                                • Instruction ID: ff0af292283aebd12ba6b1737bf521e2d4a28c9f36469396836769f26dbf1ff6
                                • Opcode Fuzzy Hash: 43fcfd80e463b8ca928775a9cb391cc0adbffc0cab59597b8fed37293dbbe765
                                • Instruction Fuzzy Hash: AA517C74608754AFD320EB69C840B6BB7E9AF89305F044C1EBED5C7352D639E849CB29
                                APIs
                                • OpenProcess.KERNEL32(00000400,00000000,?,00000000,00484275), ref: 00484108
                                • OpenProcessToken.ADVAPI32(00000000,00000008,?,00000400,00000000,?,00000000,00484275), ref: 0048411E
                                • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),00000000,00000000,?,00000000,00000008,?,00000400,00000000,?,00000000,00484275), ref: 00484139
                                • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),?,?,?,?,TokenIntegrityLevel,00000000,00000000,?,00000000,00000008,?,00000400,00000000), ref: 00484168
                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,00000000,00000000,?,00000000,00000008,?,00000400,00000000,?,00000000,00484275), ref: 00484177
                                • CloseHandle.KERNEL32(?,?,TokenIntegrityLevel,00000000,00000000,?,00000000,00000008,?,00000400,00000000,?,00000000,00484275), ref: 00484185
                                • LookupAccountSidA.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 004841B4
                                • LookupAccountSidA.ADVAPI32(00000000,?,00000000,00000000,00000000,00000000,?), ref: 00484205
                                • CloseHandle.KERNEL32(00000000,00000000,00000008,?,00000400,00000000,?,00000000,00484275), ref: 00484255
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Token$AccountCloseHandleInformationLookupOpenProcess$ErrorLast
                                • String ID:
                                • API String ID: 2622969909-0
                                • Opcode ID: 514bf88b30820402c0140000f7026fd75c9fbcb622a42365a0d5b89b9b6ad4b2
                                • Instruction ID: 9380d259a9f08b61f6ae00aa3dbdd2b35d79eeb890988b6a10cd753b18b9dc56
                                • Opcode Fuzzy Hash: 514bf88b30820402c0140000f7026fd75c9fbcb622a42365a0d5b89b9b6ad4b2
                                • Instruction Fuzzy Hash: B151FC71A04209AFDB10EBA5C885FEFB3F9EB49304F144566F510F7291D778AD048B69
                                APIs
                                • GetObjectA.GDI32(?,00000018,?), ref: 00425B69
                                • 73A0A570.USER32(00000000,00000000,00425C76,?,00000000,00000000), ref: 00425B8C
                                • SelectObject.GDI32(?,?), ref: 00425BFA
                                • SelectObject.GDI32(?,00000000), ref: 00425C09
                                • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,00CC0020), ref: 00425C35
                                • SelectObject.GDI32(?,00000000), ref: 00425C43
                                • SelectObject.GDI32(?,00000000), ref: 00425C51
                                • DeleteDC.GDI32(?), ref: 00425C67
                                • DeleteDC.GDI32(?), ref: 00425C70
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Object$Select$Delete$A570Stretch
                                • String ID:
                                • API String ID: 1268976527-0
                                • Opcode ID: 8f69df34464a280598da0626fd4e1fd4675af0d5db5e42a9a2794f1d043afd85
                                • Instruction ID: c2f83d4dfc6a8875747cc31697ec1f6be9fd5449ac02643b06bd0c8eab73a249
                                • Opcode Fuzzy Hash: 8f69df34464a280598da0626fd4e1fd4675af0d5db5e42a9a2794f1d043afd85
                                • Instruction Fuzzy Hash: 1F411A71E04619AFDB10EBE9D842FAFB7BCEF08704F500466F610F7281D67869008B69
                                APIs
                                • LoadLibraryA.KERNEL32(00000000,00000000,004657D8), ref: 00465607
                                • IsBadReadPtr.KERNEL32(?,00000014), ref: 004657A9
                                Strings
                                • BuildImportTable: GetProcAddress failed, xrefs: 0046577C
                                • BuildImportTable: can't load library: , xrefs: 00465644
                                • BuildImportTable: ReallocMemory failed, xrefs: 0046568D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: LibraryLoadRead
                                • String ID: BuildImportTable: GetProcAddress failed$BuildImportTable: ReallocMemory failed$BuildImportTable: can't load library:
                                • API String ID: 1452896035-1384308123
                                • Opcode ID: 6aa059c455888908d262b2dad884aea557a1c1401c9c0ee8554390a8e8e6b66d
                                • Instruction ID: fc7096757c938c905de0045d191350aedab49c8624d725e2722edfb242ce8ecf
                                • Opcode Fuzzy Hash: 6aa059c455888908d262b2dad884aea557a1c1401c9c0ee8554390a8e8e6b66d
                                • Instruction Fuzzy Hash: E2617570A00A04DFDB10EB69C881BAAB7F9EF48718F00C4AAB455DB751E778ED41CB56
                                APIs
                                • CreateThread.KERNEL32(00000000,00000000,Function_00082CDC,?,00000000,?), ref: 00483005
                                • Sleep.KERNEL32(00000032,00000000,00000000,Function_00082CDC,?,00000000,?,?,00483104,?,00483104,?,00483104,?,?,?), ref: 0048300C
                                • Sleep.KERNEL32(00000064,.255,?,00483104,?,00483104,?,?,00000000,004830D3,?,?,?,?,00000000,00000000), ref: 00483054
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep$CreateThread
                                • String ID: .255$127.0.0.1$LanList
                                • API String ID: 3220764680-2919614961
                                • Opcode ID: 39321ad9c43a7aed64eb5cb581981285699f2c1607fc88c75ec9ff32666b745d
                                • Instruction ID: 78557ba10ca83d90213baf83ef5822c4bd7a92da1d7b56c00256e640220ce7ce
                                • Opcode Fuzzy Hash: 39321ad9c43a7aed64eb5cb581981285699f2c1607fc88c75ec9ff32666b745d
                                • Instruction Fuzzy Hash: 01618530B00108AFDB01FB95D891BAFB7B5EB49B05F10847BF500B7295DA78AE05CB59
                                APIs
                                • GetClassInfoA.USER32(?,?,?), ref: 004549F8
                                • UnregisterClassA.USER32(?,?), ref: 00454A20
                                • RegisterClassA.USER32(?), ref: 00454A36
                                • GetWindowLongA.USER32(00000000,000000F0), ref: 00454A72
                                • GetWindowLongA.USER32(00000000,000000F4), ref: 00454A87
                                • SetWindowLongA.USER32(00000000,000000F4,00000000), ref: 00454A9A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ClassLongWindow$InfoRegisterUnregister
                                • String ID: @
                                • API String ID: 717780171-2766056989
                                • Opcode ID: 07524fccf5f8ed6b2e5ca9ac7e8a6429da9d63d9464425a53db4cacc3fe69124
                                • Instruction ID: add7cf6bff182410af35e72f1b44c65e24ea4e07af845d2f3adeee9c8dd83fa8
                                • Opcode Fuzzy Hash: 07524fccf5f8ed6b2e5ca9ac7e8a6429da9d63d9464425a53db4cacc3fe69124
                                • Instruction Fuzzy Hash: 0E5183706003549BDB20EBB9CC41B9B73B9AF85309F00457EE845EB392DB78AD49CB59
                                APIs
                                • MulDiv.KERNEL32(?,000009EC,00000000), ref: 00427DBA
                                • MulDiv.KERNEL32(?,000009EC,00000000), ref: 00427DD7
                                • SetWinMetaFileBits.GDI32(00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC,00000000), ref: 00427E03
                                • GetEnhMetaFileHeader.GDI32(00000016,00000064,?,00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC,00000000), ref: 00427E23
                                • DeleteEnhMetaFile.GDI32(00000016), ref: 00427E44
                                • SetWinMetaFileBits.GDI32(00000016,?,00000000,00000008,00000016,00000064,?,00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC), ref: 00427E57
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileMeta$Bits$DeleteHeader
                                • String ID: `
                                • API String ID: 1990453761-2679148245
                                • Opcode ID: a7e3d36f563d212234cec749c7afc4863b32fe3665694ec03a7e7adec4e7c7c2
                                • Instruction ID: e3ff62f78798f2701d2e51da18529d582c44337715d3bfeb743cae8cd290645b
                                • Opcode Fuzzy Hash: a7e3d36f563d212234cec749c7afc4863b32fe3665694ec03a7e7adec4e7c7c2
                                • Instruction Fuzzy Hash: 5A411C71E04218AFDB00DFA5D485AAEB7F9EF48710F50856AF904F7241E738AD40CB69
                                APIs
                                • GetCurrentProcess.KERNEL32(00000028,?,00000000,0048AD60), ref: 0048AC51
                                • OpenProcessToken.ADVAPI32(00000000,00000028,?,00000000,0048AD60), ref: 0048AC57
                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000320,?,00000000,00000028,?,00000000,0048AD60), ref: 0048AC7D
                                • LookupPrivilegeNameA.ADVAPI32(00000000,?,00000000,000000FF), ref: 0048ACDD
                                • LookupPrivilegeDisplayNameA.ADVAPI32(00000000,00000000,00000000,000000FF,?), ref: 0048ACEE
                                  • Part of subcall function 00489B40: MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 00489B84
                                Strings
                                • OpenProcessToken error, xrefs: 0048AC60
                                • GetTokenInformation error, xrefs: 0048AC86
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: LookupNamePrivilegeProcessToken$CurrentDisplayInformationMessageOpen
                                • String ID: GetTokenInformation error$OpenProcessToken error
                                • API String ID: 3196225041-1842041635
                                • Opcode ID: 64fea5a6abf8e037567579d72d0fa10bdc8dd24788d4b14ee9eda7e6a2843a19
                                • Instruction ID: 3878a87cca9874fde37a330f4442285d0f87575cb7bda5b4bbe82b63adc5078a
                                • Opcode Fuzzy Hash: 64fea5a6abf8e037567579d72d0fa10bdc8dd24788d4b14ee9eda7e6a2843a19
                                • Instruction Fuzzy Hash: 6C317F71A00609ABEB00FB99C845AAFB7F9EF48304F54447BF500F7281D6789E059B6A
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 0041F7BF
                                • GetCurrentThreadId.KERNEL32 ref: 0041F7CE
                                  • Part of subcall function 0041F768: ResetEvent.KERNEL32(00000238,0041F809), ref: 0041F76E
                                • RtlEnterCriticalSection.NTDLL(004999D0), ref: 0041F813
                                • InterlockedExchange.KERNEL32(00491B2C,?), ref: 0041F82F
                                • RtlLeaveCriticalSection.NTDLL(004999D0), ref: 0041F888
                                • RtlEnterCriticalSection.NTDLL(004999D0), ref: 0041F8F7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$CurrentEnterThread$EventExchangeInterlockedLeaveReset
                                • String ID: 4PI
                                • API String ID: 2189153385-1771581502
                                • Opcode ID: 09ff975300d849943e3fcd04de3a87dc99c31ced76aeb7c098c280148ab32fa2
                                • Instruction ID: 337109815828baa05acd0f74cbcbae9347e21aa764477ecd5701fe5bfbdf0f90
                                • Opcode Fuzzy Hash: 09ff975300d849943e3fcd04de3a87dc99c31ced76aeb7c098c280148ab32fa2
                                • Instruction Fuzzy Hash: BF31F570A14304AFD701EF69C852BAEB7F4EB49704F61847BF400E26A1D73C6D86CA29
                                APIs
                                • GetMonitorInfoA.USER32(?,?), ref: 0042E4D1
                                • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0042E4F8
                                • GetSystemMetrics.USER32(00000000), ref: 0042E50D
                                • GetSystemMetrics.USER32(00000001), ref: 0042E518
                                • lstrcpy.KERNEL32(?,DISPLAY), ref: 0042E542
                                  • Part of subcall function 0042E174: GetProcAddress.KERNEL32(75A50000,00000000), ref: 0042E1F3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: System$InfoMetrics$AddressMonitorParametersProclstrcpy
                                • String ID: DISPLAY$GetMonitorInfo
                                • API String ID: 1539801207-1633989206
                                • Opcode ID: e852520c5424640a3b2f8fd5c4260c12b85e4800785811b7a0e8dbb9e876f0df
                                • Instruction ID: 456d4176f5ccada5d366c8f7b6d565fe28fa6be8b4654b750548c457f7b91245
                                • Opcode Fuzzy Hash: e852520c5424640a3b2f8fd5c4260c12b85e4800785811b7a0e8dbb9e876f0df
                                • Instruction Fuzzy Hash: 13110331710321AFE720CFAAAC417A7B7A8FF45324F40453FF85597640E774A8808BA8
                                APIs
                                • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0042E5CC
                                • GetSystemMetrics.USER32(00000000), ref: 0042E5E1
                                • GetSystemMetrics.USER32(00000001), ref: 0042E5EC
                                • lstrcpy.KERNEL32(?,DISPLAY), ref: 0042E616
                                  • Part of subcall function 0042E174: GetProcAddress.KERNEL32(75A50000,00000000), ref: 0042E1F3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: System$Metrics$AddressInfoParametersProclstrcpy
                                • String ID: DISPLAY$GetMonitorInfoA$tB
                                • API String ID: 2545840971-2667026318
                                • Opcode ID: 4e1fa72082cf4869a546b406cddb919f75edc9635d85cb29e06c52c56970664b
                                • Instruction ID: 24d26b85717cd816e1945aa7207ac766b393cffdb44520f45589ec4d3f3fbf9d
                                • Opcode Fuzzy Hash: 4e1fa72082cf4869a546b406cddb919f75edc9635d85cb29e06c52c56970664b
                                • Instruction Fuzzy Hash: 6A1106317003209FD7208F6AAC447A7B7A9EB56711F80493FEC459B740D375A8448FA9
                                APIs
                                • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0042E6A0
                                • GetSystemMetrics.USER32(00000000), ref: 0042E6B5
                                • GetSystemMetrics.USER32(00000001), ref: 0042E6C0
                                • lstrcpy.KERNEL32(?,DISPLAY), ref: 0042E6EA
                                  • Part of subcall function 0042E174: GetProcAddress.KERNEL32(75A50000,00000000), ref: 0042E1F3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: System$Metrics$AddressInfoParametersProclstrcpy
                                • String ID: DISPLAY$GetMonitorInfoW$HB
                                • API String ID: 2545840971-4264061949
                                • Opcode ID: 4e7f2b4a8317ed2c04ffb1e0f1bd1b0aa7a0f9993e4ae3b5d3e5a6fb2dca36c3
                                • Instruction ID: 21b644052e4ba1544673feaddbb0c8192536a1f4c2fb5b1bbf4850f28cb0aa70
                                • Opcode Fuzzy Hash: 4e7f2b4a8317ed2c04ffb1e0f1bd1b0aa7a0f9993e4ae3b5d3e5a6fb2dca36c3
                                • Instruction Fuzzy Hash: 5B11A2317003219FD720CF6AAC45BA7B7A8EB55750F80053FF85697641D7B4A844CBA9
                                APIs
                                • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,004053C3,00000000,00000000,?,00000002,0040546E,00403003,0040304A,00000000,?), ref: 00405335
                                • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,004053C3,00000000,00000000,?,00000002,0040546E,00403003,0040304A,00000000), ref: 0040533B
                                • GetStdHandle.KERNEL32(000000F5,00405384,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,004053C3,00000000,00000000), ref: 00405350
                                • WriteFile.KERNEL32(00000000,000000F5,00405384,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,004053C3,00000000,00000000), ref: 00405356
                                • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00405374
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileHandleWrite$Message
                                • String ID: Error$Runtime error at 00000000
                                • API String ID: 1570097196-2970929446
                                • Opcode ID: 27150f117657527c5bd09bf0f1f1545a92ea8b80ab116458a7641c4d609dd0b4
                                • Instruction ID: 76f3b1a99dd541255ef07f31c01649d9a0dbcbd5632e181e69c4d7c91aea6cb3
                                • Opcode Fuzzy Hash: 27150f117657527c5bd09bf0f1f1545a92ea8b80ab116458a7641c4d609dd0b4
                                • Instruction Fuzzy Hash: B5F06D65684B4178EB1173A46C46F5B26589714B68F6046FFB620B80F296FC44C08B6E
                                APIs
                                  • Part of subcall function 00429D5C: 73A0A570.USER32(00000000,?,?,?,?,0042889B,00000000,00428927), ref: 00429DB2
                                  • Part of subcall function 00429D5C: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,0042889B,00000000,00428927), ref: 00429DF5
                                • GetBrushOrgEx.GDI32(?,?,0000000E,00000000,?,0000000C), ref: 00429786
                                • SetStretchBltMode.GDI32(?,00000004), ref: 00429794
                                • SetBrushOrgEx.GDI32(?,?,?,?,?,00000004,?,?,0000000E,00000000,?,0000000C), ref: 004297AC
                                • SetStretchBltMode.GDI32(00000000,00000003), ref: 004297C9
                                • SelectObject.GDI32(?,?), ref: 0042983F
                                • SelectObject.GDI32(?,00000000), ref: 0042989E
                                • DeleteDC.GDI32(00000000), ref: 004298AD
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: BrushModeObjectSelectStretch$A570CreateDeleteHalftonePalette
                                • String ID:
                                • API String ID: 3467007361-0
                                • Opcode ID: a387074c04359e8af01a2fe67e6a1ab255f0d74921970ce0f5c7fa4d7ecd11b1
                                • Instruction ID: c195afdf496357cbd99ba5c4060dcec9e593aa20b2bbb46d4828fe4d7254503d
                                • Opcode Fuzzy Hash: a387074c04359e8af01a2fe67e6a1ab255f0d74921970ce0f5c7fa4d7ecd11b1
                                • Instruction Fuzzy Hash: AB7159B5B04215AFCB10DFA9C985F5AB7F8AF08300F5484AAF508E7392D638ED40CB94
                                APIs
                                • GetCapture.USER32 ref: 00442D0D
                                • GetCapture.USER32 ref: 00442D1C
                                • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00442D22
                                • ReleaseCapture.USER32 ref: 00442D27
                                • GetActiveWindow.USER32 ref: 00442D78
                                • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00442E0E
                                • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00442E7B
                                • GetActiveWindow.USER32 ref: 00442E8A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CaptureMessageSend$ActiveWindow$Release
                                • String ID:
                                • API String ID: 862346643-0
                                • Opcode ID: 86a969c7f8da45f73aa07e181b4ea3c8b3707a2cad9e43eae031c4b5b1df55d4
                                • Instruction ID: 2f1b271766376fa3c053c9bfcccb2958eddad417a10fa4b06557aab8cee9ce41
                                • Opcode Fuzzy Hash: 86a969c7f8da45f73aa07e181b4ea3c8b3707a2cad9e43eae031c4b5b1df55d4
                                • Instruction Fuzzy Hash: 52514370A00644AFEB11EF69CE46B9D77F1EF44704F5544BAF400AB2A2DB78AD44DB48
                                APIs
                                • RegOpenKeyExA.ADVAPI32(80000000,00000000,00000000,000F003F,?,00000000,0046E238), ref: 0046E15A
                                • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,000F003F,?,0046E23F,80000000,00000000,00000000,000F003F,?,00000000,0046E238), ref: 0046E17D
                                • RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,000F003F,?,80000001,00000000,00000000,000F003F,?,0046E23F,80000000,00000000,00000000,000F003F,?), ref: 0046E19D
                                • RegOpenKeyExA.ADVAPI32(80000003,00000000,00000000,000F003F,?,80000002,00000000,00000000,000F003F,?,80000001,00000000,00000000,000F003F,?,0046E23F), ref: 0046E1BD
                                • RegOpenKeyExA.ADVAPI32(80000005,00000000,00000000,000F003F,?,80000003,00000000,00000000,000F003F,?,80000002,00000000,00000000,000F003F,?,80000001), ref: 0046E1DD
                                • RegOpenKeyExA.ADVAPI32(80000006,00000000,00000000,000F003F,?,80000005,00000000,00000000,000F003F,?,80000003,00000000,00000000,000F003F,?,80000002), ref: 0046E1FD
                                • RegDeleteValueA.ADVAPI32(?,00000000,00000000,0046E238), ref: 0046E20F
                                • RegCloseKey.ADVAPI32(?,?,00000000,00000000,0046E238), ref: 0046E218
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Open$CloseDeleteValue
                                • String ID:
                                • API String ID: 2215348558-0
                                • Opcode ID: 8b6b2314fb6bd852eb358ef415d35007767ec2a8dd2c8354f205172ac6cdf404
                                • Instruction ID: 0d0defd982c84b28728134ce3f8e850540e1230505d603c4eecc2b5e28cb9dd2
                                • Opcode Fuzzy Hash: 8b6b2314fb6bd852eb358ef415d35007767ec2a8dd2c8354f205172ac6cdf404
                                • Instruction Fuzzy Hash: 1A31FBB1A04608EEE701EA96CC52FBF77ACEB04714F60046BB610B75C2D6786D01DA6A
                                APIs
                                • GetCapture.USER32 ref: 0044631A
                                • IsWindowUnicode.USER32(00000000), ref: 0044635D
                                • SendMessageW.USER32(00000000,-0000BBEE,02378130,?), ref: 00446378
                                • SendMessageA.USER32(00000000,-0000BBEE,02378130,?), ref: 00446397
                                • GetWindowThreadProcessId.USER32(00000000), ref: 004463A6
                                • GetWindowThreadProcessId.USER32(?,?), ref: 004463B4
                                • SendMessageA.USER32(00000000,-0000BBEE,02378130,?), ref: 004463D4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageSendWindow$ProcessThread$CaptureUnicode
                                • String ID:
                                • API String ID: 1994056952-0
                                • Opcode ID: b9d9bcca683b51d8ae5a5a0740192773cdcc830a3b6823dc7ba5c0061f55f824
                                • Instruction ID: 13867d2a231eb5f4ff3656b45f74faf81ae527ad78ffc0860992d4fb68bf68a9
                                • Opcode Fuzzy Hash: b9d9bcca683b51d8ae5a5a0740192773cdcc830a3b6823dc7ba5c0061f55f824
                                • Instruction Fuzzy Hash: 7521AD71204648AFE660FE5ACA81E6B73DD9F06314F15443EFD99D3642EA68FC00876E
                                APIs
                                • RegOpenKeyExA.ADVAPI32(80000000,00000000,00000000,000F003F,?,00000000,0046E391), ref: 0046E2B7
                                • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,000F003F,?,80000000,00000000,00000000,000F003F,?,00000000,0046E391), ref: 0046E2DA
                                • RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,000F003F,?,80000001,00000000,00000000,000F003F,?,80000000,00000000,00000000,000F003F,?,00000000), ref: 0046E2FA
                                • RegOpenKeyExA.ADVAPI32(80000003,00000000,00000000,000F003F,?,80000002,00000000,00000000,000F003F,?,80000001,00000000,00000000,000F003F,?,80000000), ref: 0046E31A
                                • RegOpenKeyExA.ADVAPI32(80000005,00000000,00000000,000F003F,?,80000003,00000000,00000000,000F003F,?,80000002,00000000,00000000,000F003F,?,80000001), ref: 0046E33A
                                • RegOpenKeyExA.ADVAPI32(80000006,00000000,00000000,000F003F,?,80000005,00000000,00000000,000F003F,?,80000003,00000000,00000000,000F003F,?,80000002), ref: 0046E35A
                                • RegDeleteKeyA.ADVAPI32(?,0046E39C), ref: 0046E368
                                • RegCloseKey.ADVAPI32(?,?,0046E39C,00000000,0046E391), ref: 0046E371
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Open$CloseDelete
                                • String ID:
                                • API String ID: 3718852434-0
                                • Opcode ID: b5f856d402cd9e412ace6a534cb2575ac9d81021cc551ea9bf5a79f107e4064f
                                • Instruction ID: 324e92aa9deaf5a12c1b943c00b2839a1683a30f452a5a5e905a59a16d4b980d
                                • Opcode Fuzzy Hash: b5f856d402cd9e412ace6a534cb2575ac9d81021cc551ea9bf5a79f107e4064f
                                • Instruction Fuzzy Hash: BC3112B4A04608FEE701E696CC42F7F77ACDB04714F604067BA00B76C2E7785D41CA5A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ebaf3a952b1afae5927fc137353aed0e55f18229a27538bba72325b71fb8a0d3
                                • Instruction ID: 5bd92071042cbb3672ae29785d687eb903e89485942fd4179da11cf124cd87ab
                                • Opcode Fuzzy Hash: ebaf3a952b1afae5927fc137353aed0e55f18229a27538bba72325b71fb8a0d3
                                • Instruction Fuzzy Hash: E7B159727107000BD7159ABD9D8876AB3C19BC0325F28827FF604EB3E6DABCC9458358
                                APIs
                                • GetVersion.KERNEL32(00000000,004347A1), ref: 004345EC
                                • InsertMenuItemA.USER32(?,000000FF,000000FF,0000002C), ref: 004346F5
                                  • Part of subcall function 00434A54: CreatePopupMenu.USER32 ref: 00434A6F
                                • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 0043477E
                                  • Part of subcall function 00434A54: CreateMenu.USER32 ref: 00434A79
                                • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 00434765
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Menu$Insert$Create$ItemPopupVersion
                                • String ID: ,$?
                                • API String ID: 2359071979-2308483597
                                • Opcode ID: d0caef3cf46ac8a557962603bc65c22dfc050fa75b1ffcd56991762ebc954d8a
                                • Instruction ID: 84b8b59cc77567219983042769a44960b1f0fe195c185aa27248aa5cc96d9529
                                • Opcode Fuzzy Hash: d0caef3cf46ac8a557962603bc65c22dfc050fa75b1ffcd56991762ebc954d8a
                                • Instruction Fuzzy Hash: 8F61E234904244AFDB00EF69D9826AA77F9AF4A314F54517BF940A7396D73CEE00CB68
                                APIs
                                • SetCursorPos.USER32(00000000,00000000,?,?,?,00000000,0048916A,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004890E0
                                • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 004890FB
                                • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 0048910A
                                • mouse_event.USER32(00000008,00000000,00000000,00000000,00000000), ref: 0048911B
                                • mouse_event.USER32(00000010,00000000,00000000,00000000,00000000), ref: 0048912A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: mouse_event$Cursor
                                • String ID:
                                • API String ID: 930491299-0
                                • Opcode ID: a1a94421c1cb220ceb425be68ae3d4e2083a1e0f8bba6155c0dfd86be6771a44
                                • Instruction ID: 2942b52aaad0b5401ecbc9f6a8dd5ff6b056584561b49769336fe13875f60f22
                                • Opcode Fuzzy Hash: a1a94421c1cb220ceb425be68ae3d4e2083a1e0f8bba6155c0dfd86be6771a44
                                • Instruction Fuzzy Hash: 80515E30740609BBEB14F6A9DD47BAE73A5DB48704F34443AB504BB2D2DA78BE009B5D
                                APIs
                                • SetWindowPos.USER32(00000000,000000FF,?,?,?,?,00000010,00000000,00459FAC), ref: 00459EAD
                                • GetTickCount.KERNEL32 ref: 00459EB2
                                • SystemParametersInfoA.USER32(00001016,00000000,?,00000000), ref: 00459EF6
                                • SystemParametersInfoA.USER32(00001018,00000000,00000000,00000000), ref: 00459F0E
                                • AnimateWindow.USER32(00000000,00000064,?), ref: 00459F53
                                • ShowWindow.USER32(00000000,00000004,00000000,000000FF,?,?,?,?,00000010,00000000,00459FAC), ref: 00459F76
                                  • Part of subcall function 0045D588: GetCursorPos.USER32(?), ref: 0045D58C
                                • GetTickCount.KERNEL32 ref: 00459F93
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$CountInfoParametersSystemTick$AnimateCursorShow
                                • String ID:
                                • API String ID: 3024527889-0
                                • Opcode ID: aa14a5b9b66d5ffca03ecf7fe8ed1f1a39584a83342b2a9436fbcdb81203739a
                                • Instruction ID: b53e01449b071247014518636bdbe8eca2e9b90678afcd3b34df346eefcdc5f2
                                • Opcode Fuzzy Hash: aa14a5b9b66d5ffca03ecf7fe8ed1f1a39584a83342b2a9436fbcdb81203739a
                                • Instruction Fuzzy Hash: 7E514E74A00205EFDB10DF99C982A9EB7F5EF44305F2041AAE900EB392D778AE45DB58
                                APIs
                                  • Part of subcall function 00447BE4: GetActiveWindow.USER32 ref: 00447C0B
                                  • Part of subcall function 00447BE4: GetLastActivePopup.USER32(?), ref: 00447C1D
                                • GetWindowRect.USER32(?,?), ref: 004468B6
                                • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,?), ref: 004468EE
                                • MessageBoxA.USER32(00000000,?,?,?), ref: 0044692D
                                • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,004469A3,?,00000000,0044699C), ref: 0044697D
                                • SetActiveWindow.USER32(00000000,004469A3,?,00000000,0044699C), ref: 0044698E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Active$LastMessagePopupRect
                                • String ID: (
                                • API String ID: 3456420849-3887548279
                                • Opcode ID: 2170b5857a065a963d76b73bbb908134d8a6a1db87677a3c5f78d7cd79966a58
                                • Instruction ID: 42eed2a894508410f77d993bec14c055e9d3e175a50d70d66cb23c42a0f64e55
                                • Opcode Fuzzy Hash: 2170b5857a065a963d76b73bbb908134d8a6a1db87677a3c5f78d7cd79966a58
                                • Instruction Fuzzy Hash: 23510CB5E00108AFEB04DBA9DD81FAEB7B8FB49304F55446AF500E7391D774AD008B54
                                APIs
                                • BeginPaint.USER32(00000000,?), ref: 00455D7B
                                • SaveDC.GDI32(00000000), ref: 00455DB4
                                • ExcludeClipRect.GDI32(00000000,?,?,?,?,00000000,00455E72,?,00000000), ref: 00455E36
                                • RestoreDC.GDI32(00000000,00000000), ref: 00455E6C
                                • EndPaint.USER32(00000000,?,00455EB6), ref: 00455EA9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Paint$BeginClipExcludeRectRestoreSave
                                • String ID: C
                                • API String ID: 3808407030-2515487769
                                • Opcode ID: 888a879ae99cbd7647c9a7e1035508b39fe22815fd165fdbe5a34adac1fe7c2e
                                • Instruction ID: e001a26d531563fa23fdc803b396fbfa676b07fad10f8407f7f1d2b29e1fb75b
                                • Opcode Fuzzy Hash: 888a879ae99cbd7647c9a7e1035508b39fe22815fd165fdbe5a34adac1fe7c2e
                                • Instruction Fuzzy Hash: D0416070904648DFDB04DB94C86AFBEB7F4EF49305F1544AAE904973A2D778AE44CB44
                                APIs
                                • GetKeyboardLayoutList.USER32(00000040,?,00000000,004441A3,?,0237F360,?,00444205,00000000,?,004535D7), ref: 0044404E
                                • RegOpenKeyExA.ADVAPI32(80000002,00000000), ref: 004440B6
                                • RegQueryValueExA.ADVAPI32(?,layout text,00000000,00000000,?,00000100,00000000,0044415F,?,80000002,00000000), ref: 004440F0
                                • RegCloseKey.ADVAPI32(?,00444166,00000000,?,00000100,00000000,0044415F,?,80000002,00000000), ref: 00444159
                                Strings
                                • System\CurrentControlSet\Control\Keyboard Layouts\%.8x, xrefs: 004440A0
                                • layout text, xrefs: 004440E7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseKeyboardLayoutListOpenQueryValue
                                • String ID: System\CurrentControlSet\Control\Keyboard Layouts\%.8x$layout text
                                • API String ID: 1703357764-2652665750
                                • Opcode ID: c6432470b7be4713b8879043ef602826cba518c5e4738e84ecc5872081b1ac54
                                • Instruction ID: a9d280ae9ca0cb7535a0fb6f98684f98e26f6f05a10c65fd5f5b626f0ad54445
                                • Opcode Fuzzy Hash: c6432470b7be4713b8879043ef602826cba518c5e4738e84ecc5872081b1ac54
                                • Instruction Fuzzy Hash: 26416C74A00609AFEB10DF55CD85B9EB7F8EB88304F5040A6E904E7391D738AE44CB69
                                APIs
                                • GetDesktopWindow.USER32 ref: 0045148F
                                • SelectObject.GDI32(?,00000000), ref: 004514C5
                                • PatBlt.GDI32(?,?,?,?,00000000,005A0049), ref: 004514EB
                                • PatBlt.GDI32(?,?,?,00000000,?,005A0049), ref: 0045150D
                                • PatBlt.GDI32(?,?,?,?,00000000,005A0049), ref: 0045152C
                                • PatBlt.GDI32(?,?,?,00000000,?,005A0049), ref: 00451546
                                • SelectObject.GDI32(?,?), ref: 00451553
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ObjectSelect$DesktopWindow
                                • String ID:
                                • API String ID: 2666862715-0
                                • Opcode ID: 9184ead9b5e56207c9c1889c545010ee8ad39081a282cccd7d10f9368b9e6461
                                • Instruction ID: f45762fa14ff2fc965c7ee9ec3915ddbddd17c45d0235e4fafe665391fa36151
                                • Opcode Fuzzy Hash: 9184ead9b5e56207c9c1889c545010ee8ad39081a282cccd7d10f9368b9e6461
                                • Instruction Fuzzy Hash: 47310976E00219BFDB00DEEDCD85EAFBBBDAF49704B404469B504F7241C679AD058BA4
                                APIs
                                • RegCreateKeyExA.ADVAPI32(80000000,00000000,00000000,00000000,00000000,00020006,00000000,?,00000000,00000000,0046E0CE), ref: 0046DFD7
                                • RegCreateKeyExA.ADVAPI32(80000001,00000000,00000000,00000000,00000000,00020006,00000000,?,00000000,80000000,00000000,00000000,00000000,00000000,00020006,00000000), ref: 0046E002
                                • RegCreateKeyExA.ADVAPI32(80000002,00000000,00000000,00000000,00000000,00020006,00000000,?,00000000,80000001,00000000,00000000,00000000,00000000,00020006,00000000), ref: 0046E02D
                                • RegCreateKeyExA.ADVAPI32(80000003,00000000,00000000,00000000,00000000,00020006,00000000,?,00000000,80000002,00000000,00000000,00000000,00000000,00020006,00000000), ref: 0046E055
                                • RegCreateKeyExA.ADVAPI32(80000005,00000000,00000000,00000000,00000000,00020006,00000000,?,00000000,80000003,00000000,00000000,00000000,00000000,00020006,00000000), ref: 0046E07D
                                • RegCreateKeyExA.ADVAPI32(80000006,00000000,00000000,00000000,00000000,00020006,00000000,?,00000000,80000005,00000000,00000000,00000000,00000000,00020006,00000000), ref: 0046E0A5
                                • RegCloseKey.ADVAPI32(?,00000000,0046E0CE), ref: 0046E0AE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Create$Close
                                • String ID:
                                • API String ID: 2684088411-0
                                • Opcode ID: 535f876901661327ebb3f6d24e7aabe520628f23553f163764c067a39374f371
                                • Instruction ID: 79eda703fa904f021ee76264a421b81fdcdbdeb9f81b8cb632efd02e44c44320
                                • Opcode Fuzzy Hash: 535f876901661327ebb3f6d24e7aabe520628f23553f163764c067a39374f371
                                • Instruction Fuzzy Hash: C831E375B84718BEF620E695DC43F6F77A9DB04B14F704066B701BA1C2D6B46D00C76A
                                APIs
                                • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00446538
                                • IsWindowUnicode.USER32 ref: 0044654C
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0044656D
                                • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00446583
                                • TranslateMessage.USER32 ref: 0044660C
                                • DispatchMessageW.USER32 ref: 00446618
                                • DispatchMessageA.USER32 ref: 00446620
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$Peek$Dispatch$TranslateUnicodeWindow
                                • String ID:
                                • API String ID: 2190272339-0
                                • Opcode ID: 89415d6b3f9b761de0f341790fedd2f27846a16c3b0d3cdcf15f79df058f7dc4
                                • Instruction ID: e1c1aeb17a52bbcef9af639f6a3ee2d69bf8a5c229f36a97b83069c848892604
                                • Opcode Fuzzy Hash: 89415d6b3f9b761de0f341790fedd2f27846a16c3b0d3cdcf15f79df058f7dc4
                                • Instruction Fuzzy Hash: E521D23070474075FB3136291D42BABAB994FD3B48F17446FF981A62CACEBE9846811F
                                APIs
                                • MulDiv.KERNEL32(?,?,000009EC), ref: 00428322
                                • MulDiv.KERNEL32(?,?,000009EC), ref: 00428339
                                • 73A0A570.USER32(00000000,?,?,000009EC,?,?,000009EC), ref: 00428350
                                • GetWinMetaFileBits.GDI32(?,00000000,00000000,00000008,?,00000000,0042840B,?,00000000,?,?,000009EC,?,?,000009EC), ref: 00428374
                                • GetWinMetaFileBits.GDI32(?,?,?,00000008,?,00000000,004283EB,?,?,00000000,00000000,00000008,?,00000000,0042840B), ref: 004283A7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: BitsFileMeta$A570
                                • String ID: `
                                • API String ID: 2497453717-2679148245
                                • Opcode ID: 1b5c98303e53a6854ef7c32807cf423d83e0e83dc439d022958a30544264a49e
                                • Instruction ID: 51eeb2669b08d6c6b0e11feb4cea8572e5981be65c445000373ac7e6655679c9
                                • Opcode Fuzzy Hash: 1b5c98303e53a6854ef7c32807cf423d83e0e83dc439d022958a30544264a49e
                                • Instruction Fuzzy Hash: EA318A75B00214ABDB00DFD5D882AAFB7B8EF08704F50446AF904FB281D7399D40D7A9
                                APIs
                                • socket.WS2_32(00000002,00000001,00000000), ref: 00485F69
                                • htons.WS2_32(00000000), ref: 00485F8F
                                • inet_addr.WS2_32(00000000), ref: 00485FA0
                                • gethostbyname.WS2_32(00000000), ref: 00485FB5
                                • connect.WS2_32(?,00000002,00000010), ref: 00485FD8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: connectgethostbynamehtonsinet_addrsocket
                                • String ID: SOUND
                                • API String ID: 2758610518-265945396
                                • Opcode ID: 2cb1f141cd5c49f875004771a4018114f88d6b5d4e1e208129e86d4fa458a0af
                                • Instruction ID: b144254ac8ecc6f49a75c77847817f2209d912285863e49d2354dc1b776f67d4
                                • Opcode Fuzzy Hash: 2cb1f141cd5c49f875004771a4018114f88d6b5d4e1e208129e86d4fa458a0af
                                • Instruction Fuzzy Hash: 71315E74600604AFDB10EBA5CC86F6F77A9EB89714F50843BB505E72E1D7789810CB59
                                APIs
                                • IsWindowUnicode.USER32(?), ref: 0044D1CA
                                • SetWindowLongA.USER32(?,000000FC,?), ref: 0044D22E
                                • GetWindowLongA.USER32(?,000000F0), ref: 0044D239
                                • GetWindowLongA.USER32(?,000000F4), ref: 0044D24B
                                • SetWindowLongA.USER32(?,000000F4,?), ref: 0044D25E
                                • SetPropA.USER32(?,00000000,00000000), ref: 0044D275
                                • SetPropA.USER32(?,00000000,00000000), ref: 0044D28C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Long$Prop$Unicode
                                • String ID:
                                • API String ID: 1693715928-0
                                • Opcode ID: 0fac7224efcef0e86c53bd90891ffa8de72719c288afddcebd9547b64a95db78
                                • Instruction ID: 870d7b9fba80d909d72d24a943b55cf57afb08b5bd731cf2e579d49592492411
                                • Opcode Fuzzy Hash: 0fac7224efcef0e86c53bd90891ffa8de72719c288afddcebd9547b64a95db78
                                • Instruction Fuzzy Hash: 05316775504204BBDF00DFA9CD84EAA37A8BB18364F14426AF914DB2A0D678E900CB68
                                APIs
                                • RtlExitUserThread.NTDLL(00000000,00000000,00482BF9,?,00000000,00482C2E), ref: 00482BA4
                                • LocalAlloc.KERNEL32(00000040,00000008,00000000,00482BF9,?,00000000,00482C2E), ref: 00482BAD
                                • CreateThread.KERNEL32(00000000,00000000,Function_0008298C,00000000,00000000,?), ref: 00482BD6
                                • Sleep.KERNEL32(00000064,00000000,00000000,Function_0008298C,00000000,00000000,?,00000040,00000008,00000000,00482BF9,?,00000000,00482C2E), ref: 00482BDD
                                • RtlExitUserThread.NTDLL(00000000,00000000,00482BF9,?,00000000,00482C2E), ref: 00482BEA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Thread$ExitUser$AllocCreateLocalSleep
                                • String ID: p)H
                                • API String ID: 205382184-2549212939
                                • Opcode ID: a80da87ff1e73bc28b7644bdaa09c5f9996a6c934d98c52843a1a76ebecf666f
                                • Instruction ID: bf14973b296dbd898b304faf9790d54e98c1f7480834556acc5c969932de2cc8
                                • Opcode Fuzzy Hash: a80da87ff1e73bc28b7644bdaa09c5f9996a6c934d98c52843a1a76ebecf666f
                                • Instruction Fuzzy Hash: F421D270644608AFEB01EF65CD42F6E77E8EB48704F60483BF904B72D1D6B8AD008B69
                                APIs
                                  • Part of subcall function 0040E3A4: 74D31540.VERSION(?,0040E48C,?,?,00000000,?,00000000,?,00000000,0040E45D,?,00000000,?,00000000,0040E47A), ref: 0040E435
                                • GetModuleHandleA.KERNEL32(comctl32.dll), ref: 00449868
                                • GetProcAddress.KERNEL32(00000000,ImageList_WriteEx), ref: 00449879
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressD31540HandleModuleProc
                                • String ID: $qA$ImageList_WriteEx$comctl32.dll$comctl32.dll
                                • API String ID: 1396334358-220664750
                                • Opcode ID: 0d97a52227134e47b9bf7452b25302d48b1f27c0742add7b0a67af76e61bc053
                                • Instruction ID: a93832194650b3540e04aa494f4a9d3b54b7cefa1e230934a88febb79c7440a8
                                • Opcode Fuzzy Hash: 0d97a52227134e47b9bf7452b25302d48b1f27c0742add7b0a67af76e61bc053
                                • Instruction Fuzzy Hash: 13218E706082019BE715FB7ADC52B6B37A8AB96718B40013FB404E73D1DB7CAD04E65D
                                APIs
                                • GetKeyboardLayoutNameA.USER32(00000000), ref: 00437BE4
                                  • Part of subcall function 004217A0: RegCloseKey.ADVAPI32(10940000,00421610,00000001,004216E2,?,?,0042B4DA,00000008,00000060,00000048,00000000,0042B57F), ref: 004217B4
                                  • Part of subcall function 00421A08: RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,?,?,00000000,00421BB9), ref: 00421A81
                                  • Part of subcall function 0040FA10: SetErrorMode.KERNEL32 ref: 0040FA1A
                                  • Part of subcall function 0040FA10: LoadLibraryA.KERNEL32(00000000,00000000,0040FA64,?,00000000,0040FA82), ref: 0040FA49
                                • GetProcAddress.KERNEL32(?,KbdLayerDescriptor), ref: 00437C75
                                • FreeLibrary.KERNEL32(?,00437CAF,?,00000000,00437CEF), ref: 00437CA2
                                Strings
                                • \SYSTEM\CurrentControlSet\Control\Keyboard Layouts\, xrefs: 00437C29
                                • KbdLayerDescriptor, xrefs: 00437C6C
                                • Layout File, xrefs: 00437C41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Library$AddressCloseErrorFreeKeyboardLayoutLoadModeNameOpenProc
                                • String ID: KbdLayerDescriptor$Layout File$\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\
                                • API String ID: 3365787578-2194312379
                                • Opcode ID: 2b88126a0f4520e25a82f5c41262df8ea1c18c93d1c11cce69c3f150b5885a32
                                • Instruction ID: 3dd7391f7c6f851bf46be3104fc741d671385897a1f138f514713a5a44896589
                                • Opcode Fuzzy Hash: 2b88126a0f4520e25a82f5c41262df8ea1c18c93d1c11cce69c3f150b5885a32
                                • Instruction Fuzzy Hash: DC21B274E04208AFCB11EFA5D95299EB7B6FF8D704F90947AE400A7650D73CA905CB68
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 0041FF2E
                                • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0041FF5A
                                • MsgWaitForMultipleObjects.USER32(00000002,?,00000000,000003E8,00000040), ref: 0041FF6F
                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041FF9C
                                • GetExitCodeThread.KERNEL32(?,?,?,000000FF), ref: 0041FFA7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ThreadWait$CodeCurrentExitMessageMultipleObjectObjectsPeekSingle
                                • String ID: 4PI
                                • API String ID: 1797888035-1771581502
                                • Opcode ID: 7e44043004774fc2fa5ed107ff81dac6efd4f0ebb9cde2c90c950d13309c5f0d
                                • Instruction ID: ea62180bd67ea2655a2d729fb534156628def659346ffae691d532a91bbd1061
                                • Opcode Fuzzy Hash: 7e44043004774fc2fa5ed107ff81dac6efd4f0ebb9cde2c90c950d13309c5f0d
                                • Instruction Fuzzy Hash: C411C2317443006BD610EA79CCC2F9F73C8AF45B24F104A3BF654E72D1D678E986864A
                                APIs
                                • GetCursorPos.USER32 ref: 004442C3
                                • WindowFromPoint.USER32(?,?), ref: 004442D0
                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004442DE
                                • GetCurrentThreadId.KERNEL32 ref: 004442E5
                                • SendMessageA.USER32(00000000,00000084,00000000,?), ref: 0044430E
                                • SendMessageA.USER32(00000000,00000020,00000000,?), ref: 00444320
                                • SetCursor.USER32(00000000), ref: 00444332
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                • String ID:
                                • API String ID: 1770779139-0
                                • Opcode ID: 6cb808043ec799ce6d142cfd6818718385bdb66353ee07f8ef48e87ada51ee1c
                                • Instruction ID: b51619169152862e494bab1bd9cd2aabd8da2712daabcd4049ae248c8f1ac08c
                                • Opcode Fuzzy Hash: 6cb808043ec799ce6d142cfd6818718385bdb66353ee07f8ef48e87ada51ee1c
                                • Instruction Fuzzy Hash: A501D22120421075D6212F658D82F3FB6A8EFC4B59F40453FF9C4AA292EA3DCC01932E
                                APIs
                                • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 0040446A
                                • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,&,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 0040449D
                                • RegCloseKey.ADVAPI32(?,004044C0,00000000,?,00000004,00000000,&,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 004044B3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL$&
                                • API String ID: 3677997916-897963132
                                • Opcode ID: 166030d2d1aa8aae0688cd7852a0e5c7b62e02226967b94fe18ea4d0696d1e06
                                • Instruction ID: 8996b5f54206d66871a04cf72f1bcd55ef108f6bf4bf99d44132976ec8c8988a
                                • Opcode Fuzzy Hash: 166030d2d1aa8aae0688cd7852a0e5c7b62e02226967b94fe18ea4d0696d1e06
                                • Instruction Fuzzy Hash: A701B5B5900308BAE711DBD19D42BF973ECEB48B04F104577BB04E29D0E6795950D65C
                                APIs
                                • FindResourceA.KERNEL32(00400000,DVCLAL,0000000A), ref: 0040F3C1
                                • LoadResource.KERNEL32(00400000,00000000,00400000,DVCLAL,0000000A), ref: 0040F3CF
                                • FindResourceA.KERNEL32(00400000,DVCLAL,0000000A), ref: 0040F3F3
                                • LoadResource.KERNEL32(00400000,00000000,00400000,DVCLAL,0000000A), ref: 0040F3FA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Resource$FindLoad
                                • String ID: 0PI$DVCLAL
                                • API String ID: 2619053042-2981686760
                                • Opcode ID: 11aa13915ab47e4800454c0d78372b615ad1b2374bfd46017ae8eba7b05ab764
                                • Instruction ID: 21f1df4665e6585a1bc63aad75ab048ec5abeb20943727226ac101720324ec8b
                                • Opcode Fuzzy Hash: 11aa13915ab47e4800454c0d78372b615ad1b2374bfd46017ae8eba7b05ab764
                                • Instruction Fuzzy Hash: 6B011D757403016BD620DB5AECC1F1733A8EBEA755B140076FE11EB692CA78AC068B29
                                APIs
                                • BeginPaint.USER32(00000000,?), ref: 0045653C
                                • EndPaint.USER32(00000000,?,004566F9,004565D6,?,00000000,?), ref: 004565D0
                                  • Part of subcall function 00455D50: BeginPaint.USER32(00000000,?), ref: 00455D7B
                                  • Part of subcall function 00455D50: EndPaint.USER32(00000000,?,00455EB6), ref: 00455EA9
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Paint$Begin
                                • String ID:
                                • API String ID: 3787552996-0
                                • Opcode ID: 95ec08e0ea46a350ec8412fd35fa276b3992f283e0b1b1fe99c91dcc30870285
                                • Instruction ID: ba54978d8a76accaba9251eccd698e15939d291b1a8974ea29829a9457ff2739
                                • Opcode Fuzzy Hash: 95ec08e0ea46a350ec8412fd35fa276b3992f283e0b1b1fe99c91dcc30870285
                                • Instruction Fuzzy Hash: CE516371A00108BFCB00DFA9D951E9EB7F9EF49304F51406AF904E7256DB78AE05CB58
                                APIs
                                • Sleep.KERNEL32(000007D0,?,?,?,?,?,?,?,00000000,00484D9A,?,?,?,?,00000006,00000000), ref: 00484D38
                                  • Part of subcall function 00475E2C: send.WSOCK32(00000000,00000000,?,00000000,00000000,00475EBD), ref: 00475E9D
                                Strings
                                • BTRESULTDownload File|Mass Download : File Downloaded , Executing new one in temp dir...|, xrefs: 00484CEA
                                • DownloadFail, xrefs: 00484CBC
                                • BTRESULTMass Download|Downloading File...|, xrefs: 00484C52
                                • BTERRORDownload File| Error on downloading file check if you type the correct url...|, xrefs: 00484D0C
                                • DownloadSuccess, xrefs: 00484CA2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleepsend
                                • String ID: BTERRORDownload File| Error on downloading file check if you type the correct url...|$BTRESULTDownload File|Mass Download : File Downloaded , Executing new one in temp dir...|$BTRESULTMass Download|Downloading File...|$DownloadFail$DownloadSuccess
                                • API String ID: 3569362012-992323826
                                • Opcode ID: edb6eb458c1380df5f0b9521920cc591fbb72250e50f87fcd1ab301eb8c3db09
                                • Instruction ID: 4dc3f21750824eb761b8ddbffe2b69eac43d88aacfe18e4a0d1c018291212bec
                                • Opcode Fuzzy Hash: edb6eb458c1380df5f0b9521920cc591fbb72250e50f87fcd1ab301eb8c3db09
                                • Instruction Fuzzy Hash: 91613034A0060A9FCB10FBA5D5819EEB7F5FF89304F51886AE800B7791D738AD41CB69
                                APIs
                                • FillRect.USER32(?,?), ref: 0043EC91
                                • GetClientRect.USER32(00000000,?), ref: 0043ECBC
                                • FillRect.USER32(?,?,00000000), ref: 0043ECDB
                                  • Part of subcall function 0043EB8C: CallWindowProcA.USER32(?,?,?,?,?), ref: 0043EBC6
                                • BeginPaint.USER32(?,?), ref: 0043ED53
                                • GetWindowRect.USER32(?,?), ref: 0043ED80
                                • EndPaint.USER32(?,?,0043EDF4), ref: 0043EDE0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Rect$FillPaintWindow$BeginCallClientProc
                                • String ID:
                                • API String ID: 901200654-0
                                • Opcode ID: bd5654e44538387235f788496d1a83f81909e7a7d0aed47606b8842c0d0d3158
                                • Instruction ID: 791a0078e2b19a0cdf00cf67927d0bfb3d11a9ff5f7251d28017940130aac08b
                                • Opcode Fuzzy Hash: bd5654e44538387235f788496d1a83f81909e7a7d0aed47606b8842c0d0d3158
                                • Instruction Fuzzy Hash: E651FD74A05109EFCB10DBAAC589E9DB7F9AB48314F1591A6F408EB392C738AE45CF04
                                APIs
                                • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 00411881
                                • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0041189D
                                • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 004118D6
                                • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 00411953
                                • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 0041196C
                                • VariantCopy.OLEAUT32(?,00000000), ref: 004119A1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                                • String ID:
                                • API String ID: 351091851-0
                                • Opcode ID: 64ad64c3195a2b266e732bc1d787a2588087a1c16bed5c34222ee16cb595d48a
                                • Instruction ID: 56e7be974e145dbdf24d11057acd3082f22e7a8583729f48528c280c05a6b93d
                                • Opcode Fuzzy Hash: 64ad64c3195a2b266e732bc1d787a2588087a1c16bed5c34222ee16cb595d48a
                                • Instruction Fuzzy Hash: 9B51EC7590022D9BCB61DB59C891BD9B3FCAF48304F0041DAF609E7212D678AFC58F69
                                APIs
                                  • Part of subcall function 004253D0: RtlEnterCriticalSection.NTDLL(00499A30), ref: 004253D8
                                  • Part of subcall function 004253D0: RtlLeaveCriticalSection.NTDLL(00499A30), ref: 004253E5
                                  • Part of subcall function 004253D0: RtlEnterCriticalSection.NTDLL(00000038), ref: 004253EE
                                • SaveDC.GDI32(?), ref: 004411AD
                                • ExcludeClipRect.GDI32(?,?,?,?,?,?,?,00000000,00441338,?,00000000,0044135B), ref: 00441234
                                • GetStockObject.GDI32(00000004), ref: 00441256
                                • FillRect.USER32(00000000,?,00000000), ref: 0044126F
                                • RestoreDC.GDI32(00000000,?), ref: 004412E5
                                  • Part of subcall function 00424230: GetSysColor.USER32(?), ref: 0042423A
                                • SetBkColor.GDI32(00000000,00000000), ref: 004412BA
                                  • Part of subcall function 0042535C: FillRect.USER32(?,00000000,00000000), ref: 00425385
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalRectSection$ColorEnterFill$ClipExcludeLeaveObjectRestoreSaveStock
                                • String ID:
                                • API String ID: 3001281481-0
                                • Opcode ID: 217837fbf3a9bd6a06c3e796d742c275667895d3d49c3d6df1e429443568758f
                                • Instruction ID: c4e04a309c28a4001c2c80d3d4d997d98b5031581d989019e0f34b0d4a3095b6
                                • Opcode Fuzzy Hash: 217837fbf3a9bd6a06c3e796d742c275667895d3d49c3d6df1e429443568758f
                                • Instruction Fuzzy Hash: 8051F974A00104EFDB40DFA9C985E9EB7F9BB49304F5540E6F404EB362CA78AD41CB59
                                APIs
                                • Sleep.KERNEL32(00000000,?,004019DA), ref: 00401AC3
                                • Sleep.KERNEL32(0000000A,00000000,?,004019DA), ref: 00401AD9
                                • Sleep.KERNEL32(00000000,?,?,?,004019DA), ref: 00401B07
                                • Sleep.KERNEL32(0000000A,00000000,?,?,?,004019DA), ref: 00401B1D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep
                                • String ID:
                                • API String ID: 3472027048-0
                                • Opcode ID: ef251b9545fb198064ea3512c1ee2f9da540059c4816aee8c877f4aa09c806df
                                • Instruction ID: 0c431259617cb9d74e53d2be59ec808ff93416f5b309ea3195937a398a0c087f
                                • Opcode Fuzzy Hash: ef251b9545fb198064ea3512c1ee2f9da540059c4816aee8c877f4aa09c806df
                                • Instruction Fuzzy Hash: AAC15A726016408FD716CF68E8C4716BBE1EB95310F2882BFE4059B3F6D778A941CB98
                                APIs
                                  • Part of subcall function 00424FEC: CreateBrushIndirect.GDI32(?), ref: 00425097
                                • UnrealizeObject.GDI32(00000000), ref: 004258F8
                                • SelectObject.GDI32(?,00000000), ref: 0042590A
                                • SetBkColor.GDI32(?,00000000), ref: 0042592D
                                • SetBkMode.GDI32(?,00000002), ref: 00425938
                                • SetBkColor.GDI32(?,00000000), ref: 00425953
                                • SetBkMode.GDI32(?,00000001), ref: 0042595E
                                  • Part of subcall function 00424230: GetSysColor.USER32(?), ref: 0042423A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                • String ID:
                                • API String ID: 3527656728-0
                                • Opcode ID: c4ccee4f487ba90d668899706d29f06526b2cd7f7153b6181cf69ee1bf7ae84a
                                • Instruction ID: 81bb47dbdfc32cbbdc6fdef5b628dde2854f69910ed02703a0ac4bf5e0a11307
                                • Opcode Fuzzy Hash: c4ccee4f487ba90d668899706d29f06526b2cd7f7153b6181cf69ee1bf7ae84a
                                • Instruction Fuzzy Hash: 62F0BF757041109BCF01FFBAEAC6E0B679CAF443097404096B904DF29BCA38E810477A
                                APIs
                                • SetTextColor.GDI32(00000000,00FFFFFF), ref: 00448BE1
                                • SetBkColor.GDI32(00000000,00000000), ref: 00448BE9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Color$Text
                                • String ID: 6B
                                • API String ID: 657580467-4127139157
                                • Opcode ID: 81d1818aea6d19e0595d1cd307410b55b7e5ca1a1f5949623886d4f481612452
                                • Instruction ID: 6bc529a5eccb1f955ba1aaa618d20ba3ad597f5f47841333e2455c053005e396
                                • Opcode Fuzzy Hash: 81d1818aea6d19e0595d1cd307410b55b7e5ca1a1f5949623886d4f481612452
                                • Instruction Fuzzy Hash: 5851F871740114AFDB40EF69DDC2F9E37A9AF48318F50416AFA04EB386CA78EC418769
                                APIs
                                • Netbios.NETAPI32(00000032), ref: 0048DA8A
                                • Netbios.NETAPI32(00000033), ref: 0048DB01
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Netbios
                                • String ID: %.2x-%.2x-%.2x-%.2x-%.2x-%.2x$3$memory allocation failed!
                                • API String ID: 544444789-2654533857
                                • Opcode ID: de4336aeebc80715663fbf42346b2f456234e10abfb8800ea57e19441f9f51bf
                                • Instruction ID: 3c8698a95295099e7773eda12b7d456ee7ba9a9c1c397da230e155ece48b36bf
                                • Opcode Fuzzy Hash: de4336aeebc80715663fbf42346b2f456234e10abfb8800ea57e19441f9f51bf
                                • Instruction Fuzzy Hash: 2A418070D042988EDB11EBA5C8957DEBBB8AF09304F1404FBE448F7282D7789E458F55
                                APIs
                                  • Part of subcall function 00446E50: GetCursorPos.USER32 ref: 00446E57
                                • SetTimer.USER32(00000000,00000000,?,00446E74), ref: 00446FAB
                                • GetCurrentThreadId.KERNEL32 ref: 00446FE5
                                • WaitMessage.USER32(00000000,00447029,?,?,?,02378130), ref: 00447009
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CurrentCursorMessageThreadTimerWait
                                • String ID: 4PI$TfD
                                • API String ID: 3909455694-2665388893
                                • Opcode ID: d3398b0d4299286fab3d3ebc7e731ec4ce436e3110c4dedfb8f2fd2e615eca5e
                                • Instruction ID: 02ea40d705db833de404523f4eb9caf30b6421c57475094da6122cc77e9977b1
                                • Opcode Fuzzy Hash: d3398b0d4299286fab3d3ebc7e731ec4ce436e3110c4dedfb8f2fd2e615eca5e
                                • Instruction Fuzzy Hash: CC419530A08208EFFB11DF68E985B9EB7F5EB06304F6144BAE440A7391DB786D44CB59
                                APIs
                                • Sleep.KERNEL32(00000064,?,00000000,00482455), ref: 004823D3
                                • CreateThread.KERNEL32(00000000,00000000,Function_000821A0,00000000,00000000,?), ref: 004823E8
                                • RtlExitUserThread.NTDLL(00000000,00000000,00000000,Function_000821A0,00000000,00000000,?,00000064,?,00000000,00482455), ref: 0048242B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Thread$CreateExitSleepUser
                                • String ID: @$BTRESULTUDP Flood|UDP Flood task finished!|
                                • API String ID: 109117123-696998096
                                • Opcode ID: b19ec0970c7a19c74fddcc9309a9b84bf9cccbf89499dce76df7411564ce6ac1
                                • Instruction ID: dac8b786dc4711ef7958a0d0fde63276d43ba23e6262d4ec867ffc253f1f534f
                                • Opcode Fuzzy Hash: b19ec0970c7a19c74fddcc9309a9b84bf9cccbf89499dce76df7411564ce6ac1
                                • Instruction Fuzzy Hash: 5A318F30A0420D9FDB00FBA1CA42A9EBBB5EF05B04F10497BE590B7292D7795E51CF69
                                APIs
                                • Sleep.KERNEL32(00000064,?,00000000,004828F9), ref: 00482877
                                • CreateThread.KERNEL32(00000000,00000000,Function_00082630,00000000,00000000,?), ref: 0048288C
                                • RtlExitUserThread.NTDLL(00000000,00000000,00000000,Function_00082630,00000000,00000000,?,00000064,?,00000000,004828F9), ref: 004828CF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Thread$CreateExitSleepUser
                                • String ID: @$BTRESULTSyn Flood|Syn task finished!|
                                • API String ID: 109117123-491318438
                                • Opcode ID: 42de27092773758683cee76bfceb05ba93f5d9755bff5fb230ec06535b0786b8
                                • Instruction ID: 2629518abf078e329d9764aa694850172635a37c95095883a7ad8a545da6d5d7
                                • Opcode Fuzzy Hash: 42de27092773758683cee76bfceb05ba93f5d9755bff5fb230ec06535b0786b8
                                • Instruction Fuzzy Hash: 44319E70A042099BCF00FBA6CA42BDEBBB5EF49700F10497AE540B6282D7795E51CF69
                                APIs
                                • Sleep.KERNEL32(00000064,?,00000000,0048398D), ref: 0048390B
                                • CreateThread.KERNEL32(00000000,00000000,Function_000836D8,00000000,00000000,?), ref: 00483920
                                • RtlExitUserThread.NTDLL(00000000,00000000,00000000,Function_000836D8,00000000,00000000,?,00000064,?,00000000,0048398D), ref: 00483963
                                Strings
                                • BTRESULTHTTP Flood|Http Flood task finished!|, xrefs: 0048394F
                                • @, xrefs: 004838F6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Thread$CreateExitSleepUser
                                • String ID: @$BTRESULTHTTP Flood|Http Flood task finished!|
                                • API String ID: 109117123-4253556105
                                • Opcode ID: 42f0a1c2957b48f7db12a0605d88cc59a4fb094909fba9af75420654a8eed734
                                • Instruction ID: f9d6cd39d9c23f0841c0acb005dd29cb950e3e8bcfb665bce00bd41e8d019a16
                                • Opcode Fuzzy Hash: 42f0a1c2957b48f7db12a0605d88cc59a4fb094909fba9af75420654a8eed734
                                • Instruction Fuzzy Hash: 0C317070A04209AFCB00FFA5C842A9EBBB5EF45B05F10497AE140B6291D7795E51CF59
                                APIs
                                • EnumClipboardFormats.USER32(00000000), ref: 00431657
                                • GetClipboardData.USER32(00000000), ref: 00431677
                                • GetClipboardData.USER32(00000009), ref: 00431680
                                • EnumClipboardFormats.USER32(00000000), ref: 0043169F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Clipboard$DataEnumFormats
                                • String ID: 84B
                                • API String ID: 1256399260-4139892337
                                • Opcode ID: 4219c04158b95b345db8d233863d4f11910d9c89ddc842dd24f410603c174a87
                                • Instruction ID: ff5c98a8763761211607e77cacae524aff0688b704e0153d877757c2f50ea531
                                • Opcode Fuzzy Hash: 4219c04158b95b345db8d233863d4f11910d9c89ddc842dd24f410603c174a87
                                • Instruction Fuzzy Hash: B911E2707042049FCB00EBAAE99296AB7E8EF88318B14007BF404DB3E1DE399C018658
                                APIs
                                • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,00473DAA), ref: 00473D47
                                • GetFileSize.KERNEL32(00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,00473DAA), ref: 00473D56
                                • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00473D82
                                • CloseHandle.KERNEL32(00000000,00000000,?,00000000,?,00000000), ref: 00473D88
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseCreateHandleReadSize
                                • String ID: L9G
                                • API String ID: 3919263394-1627255871
                                • Opcode ID: 7a4f968ceea1c80c161ce31f524ed7d12ba7a9cf6897a16bee17ad6a486d7f6f
                                • Instruction ID: 84e136a9889659cbc120cce4238abd922c707cfdc7fc235f052f83d4754a7617
                                • Opcode Fuzzy Hash: 7a4f968ceea1c80c161ce31f524ed7d12ba7a9cf6897a16bee17ad6a486d7f6f
                                • Instruction Fuzzy Hash: DF11A0B0A04204BFE720EB65CC82FAFB7BCDB45724F60407AF514B72D1D6B86E009669
                                APIs
                                • IsWindow.USER32(?), ref: 0042EA99
                                • FindWindowExA.USER32(00000000,00000000,OleMainThreadWndClass,00000000), ref: 0042EACA
                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0042EB03
                                • GetCurrentThreadId.KERNEL32 ref: 0042EB0A
                                  • Part of subcall function 00407688: TlsGetValue.KERNEL32(00000000,00000000,00403029,00000000,?,?,?,?,00000000,?,0040331C,00000000,00403349), ref: 004076AD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Thread$CurrentFindProcessValue
                                • String ID: OleMainThreadWndClass
                                • API String ID: 973455579-3883841218
                                • Opcode ID: b10ee7b4311bedd8a02f4c8b6a14b5cdc3576e2ebf8fd4ee16def8fe29f58f9b
                                • Instruction ID: 3dc99f441cbbede9a6a90ceb584179f5b103827a6b127714019bffc55e4543cd
                                • Opcode Fuzzy Hash: b10ee7b4311bedd8a02f4c8b6a14b5cdc3576e2ebf8fd4ee16def8fe29f58f9b
                                • Instruction Fuzzy Hash: 6D01CC307016154EC620A767D845FAE32947B01358F8605BFF4116B2D3C77D5C41979A
                                APIs
                                • Sleep.KERNEL32(00000000,?,?,00000000,00401A02), ref: 00401E26
                                • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,00401A02), ref: 00401E40
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Sleep
                                • String ID:
                                • API String ID: 3472027048-0
                                • Opcode ID: 0658a26165dfe11a71e8e5bf91f1e6dfc6673b3b5ed921901ac69654fee218d3
                                • Instruction ID: 280e6153d3f621d3339723179526883bd68d610e10723e7e5f411b5a6cdb0fe1
                                • Opcode Fuzzy Hash: 0658a26165dfe11a71e8e5bf91f1e6dfc6673b3b5ed921901ac69654fee218d3
                                • Instruction Fuzzy Hash: 8361CF716042408FE716DF68C984B1BBBD4EF95314F2882BFE8489B3E2D778D9418799
                                APIs
                                • MulDiv.KERNEL32(00000000,?,?), ref: 0043DA73
                                • MulDiv.KERNEL32(?,00000000,00000000), ref: 0043DB05
                                • MulDiv.KERNEL32(?,00000000,00000000), ref: 0043DB34
                                • MulDiv.KERNEL32(?,00000000,00000000), ref: 0043DB63
                                • MulDiv.KERNEL32(?,00000000,00000000), ref: 0043DB86
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 427b3cb58f6961ef56a93255873bae8c1105c158471aa706a38dd43a19803bd1
                                • Instruction ID: 30fdeedd186cb293460d9106d0277b40e192e7c44a4fa8c41a56d1ee01a12c62
                                • Opcode Fuzzy Hash: 427b3cb58f6961ef56a93255873bae8c1105c158471aa706a38dd43a19803bd1
                                • Instruction Fuzzy Hash: 6D81C334A04204EFDB44DBA9D589A9EB7F9AF48304F2541B6E808DB362DB34AE40DB54
                                APIs
                                • GetMenu.USER32(00000000), ref: 0043FA38
                                • SetMenu.USER32(00000000,00000000), ref: 0043FA55
                                • SetMenu.USER32(00000000,00000000), ref: 0043FA8A
                                • SetMenu.USER32(00000000,00000000), ref: 0043FAA6
                                  • Part of subcall function 00407550: LoadStringA.USER32(00000000,0000FF91,?,00001000), ref: 00407582
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000037), ref: 0043FAED
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Menu$LoadStringWindow
                                • String ID:
                                • API String ID: 1738039741-0
                                • Opcode ID: 5288ce882c23e549840cd028d49c9d4e5b7fcbd8b4b8055bbccc0491f5fdd421
                                • Instruction ID: a2532ed296aaca44e1c6de19fdfe80cbd4cd99d3913609f125dfb974a20550da
                                • Opcode Fuzzy Hash: 5288ce882c23e549840cd028d49c9d4e5b7fcbd8b4b8055bbccc0491f5fdd421
                                • Instruction Fuzzy Hash: FB519FB0A043055ADB20AB39888676A67946F48708F04647FFC49AB397DE7CDC4C8759
                                APIs
                                • DrawEdge.USER32(00000000,?,00000006,00000002), ref: 00434BB3
                                • OffsetRect.USER32(?,00000001,00000001), ref: 00434C04
                                • DrawTextA.USER32(00000000,00000000,?,?,?), ref: 00434C3D
                                • OffsetRect.USER32(?,000000FF,000000FF), ref: 00434C4A
                                • DrawTextA.USER32(00000000,00000000,?,?,?), ref: 00434CB5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Draw$OffsetRectText$Edge
                                • String ID:
                                • API String ID: 3610532707-0
                                • Opcode ID: 9059c8c7aad982c0553cd365936dd021185d668aba8fddca7e52af7508275176
                                • Instruction ID: 4474ca1fe0641309f6af3567fdadf1a3f93f9cdaa9ed04adaee8a277695298db
                                • Opcode Fuzzy Hash: 9059c8c7aad982c0553cd365936dd021185d668aba8fddca7e52af7508275176
                                • Instruction Fuzzy Hash: 95519270A00604AFDB10EBA9C881BDFB7A5EF89324F55516AF850A7391C73CFD408B68
                                APIs
                                • socket.WS2_32(00000002,00000001,00000000), ref: 0047323B
                                • WSAIoctl.WS2_32(000000FF,4004747F,00000000,00000000,?,00000400,?,00000000,00000000), ref: 0047327C
                                • inet_ntoa.WS2_32(?), ref: 004732AC
                                • inet_ntoa.WS2_32(?), ref: 004732E8
                                • closesocket.WS2_32(000000FF), ref: 00473319
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: inet_ntoa$Ioctlclosesocketsocket
                                • String ID:
                                • API String ID: 4072187599-0
                                • Opcode ID: 48d4df02d0504f8eda764eb0a0579c01d6fbbdec3c354c22fd2baab0a400123d
                                • Instruction ID: df59a71f5368ad083a9d17eb8c0d40df95f647edb997494a596d8df9614b4470
                                • Opcode Fuzzy Hash: 48d4df02d0504f8eda764eb0a0579c01d6fbbdec3c354c22fd2baab0a400123d
                                • Instruction Fuzzy Hash: D031F871A00A14AFDB21DF55CC41BDFB77AEB85714F108067FD04BB180DA796E059AA8
                                APIs
                                • EnumWindows.USER32(00445518,00000000), ref: 00445620
                                • ShowWindow.USER32(?,00000000,00445518,00000000,?,?,02378130,00448275), ref: 00445655
                                • ShowOwnedPopups.USER32(00000000,?), ref: 00445684
                                • ShowWindow.USER32(?,00000005,?,?,02378130,00448275), ref: 004456EA
                                • ShowOwnedPopups.USER32(00000000,?), ref: 00445719
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Show$OwnedPopupsWindow$EnumWindows
                                • String ID:
                                • API String ID: 315437064-0
                                • Opcode ID: 81f71630437b3a42195c352f3d05fd3ff7b259b932490981182b2dc959ae7826
                                • Instruction ID: f765bda79f8973cc8f8af83c84ed5e2d9b390c63a9c03f4a47b8107340ee6d36
                                • Opcode Fuzzy Hash: 81f71630437b3a42195c352f3d05fd3ff7b259b932490981182b2dc959ae7826
                                • Instruction Fuzzy Hash: A6316531750A008BEF20EB3DC845F5673D6AB91329F55453FE45D8B2E3CA78AC858B08
                                APIs
                                • RtlEnterCriticalSection.NTDLL(0049C3A8), ref: 004878F3
                                  • Part of subcall function 00487318: RtlEnterCriticalSection.NTDLL(0049C3A8), ref: 00487347
                                • LocalAlloc.KERNEL32(00000040,00000010,?,0049C3A8,00000000,00487A08), ref: 0048795A
                                • CreateThread.KERNEL32(00000000,00000000,Function_00086E2C,00000000,00000000,?), ref: 004879AE
                                • CloseHandle.KERNEL32(00000000,00000000,00000000,Function_00086E2C,00000000,00000000,?,00000040,00000010,?,0049C3A8,00000000,00487A08), ref: 004879B4
                                • RtlLeaveCriticalSection.NTDLL(0049C3A8), ref: 004879CB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$Enter$AllocCloseCreateHandleLeaveLocalThread
                                • String ID:
                                • API String ID: 1089455982-0
                                • Opcode ID: 9cc05d7f378bd184611ca56150661b1d8701c114d5bea5d46de3e95f06d61272
                                • Instruction ID: e068474e461a39b7e082ea5237c64619a375e42a34232f35b00c94968281a6c0
                                • Opcode Fuzzy Hash: 9cc05d7f378bd184611ca56150661b1d8701c114d5bea5d46de3e95f06d61272
                                • Instruction Fuzzy Hash: 8A414670A14209AFDB00FF95CC92A9EBBB5EF48704F60847BF514B6291D778AD018B59
                                APIs
                                  • Part of subcall function 0042EA7C: IsWindow.USER32(?), ref: 0042EA99
                                  • Part of subcall function 0042EA7C: FindWindowExA.USER32(00000000,00000000,OleMainThreadWndClass,00000000), ref: 0042EACA
                                  • Part of subcall function 0042EA7C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0042EB03
                                  • Part of subcall function 0042EA7C: GetCurrentThreadId.KERNEL32 ref: 0042EB0A
                                • MsgWaitForMultipleObjectsEx.USER32(?,?,?,000000BF,?), ref: 0042EB6A
                                • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 0042EB85
                                • TranslateMessage.USER32(?), ref: 0042EB92
                                • DispatchMessageA.USER32(?), ref: 0042EB9B
                                • WaitForMultipleObjectsEx.KERNEL32(?,?,?,?,00000000), ref: 0042EBC7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$MultipleObjectsThreadWait$CurrentDispatchFindPeekProcessTranslate
                                • String ID:
                                • API String ID: 2725875890-0
                                • Opcode ID: 5e6a8f8f11a1ecece3c40051b1880d12c77f539d77dcc0a5b60d2b5d727fb8b3
                                • Instruction ID: c27327caccafb5d17abbad0a0c6b679d28f0d30169e972cbd362b20f7aac55e0
                                • Opcode Fuzzy Hash: 5e6a8f8f11a1ecece3c40051b1880d12c77f539d77dcc0a5b60d2b5d727fb8b3
                                • Instruction Fuzzy Hash: 7B21B372700219ABDB10DEA6DC85FAF37ADEB49350F50053AFA05E7280D67DED4087A9
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 417d2e33efd8d1f4a4e13b39fe3434ad07656f76604e99a58816d22ffa866e7c
                                • Instruction ID: f38e40545f3a6f7f33cc825dd442a49a2369967ec672df0a98496aff5399133a
                                • Opcode Fuzzy Hash: 417d2e33efd8d1f4a4e13b39fe3434ad07656f76604e99a58816d22ffa866e7c
                                • Instruction Fuzzy Hash: D51175B16012495ADB60AA7B89067DB27845FC970CF04216FBD919B383CF3CEC45C69C
                                APIs
                                  • Part of subcall function 004262B4: GetObjectA.GDI32(?,00000004), ref: 004262CB
                                • 73A0A570.USER32(00000000), ref: 00428A3E
                                • SelectObject.GDI32(?), ref: 00428A57
                                • SetDIBColorTable.GDI32(?,00000000,00000000,?,00000000,00428AAF,?,?,?,?,00000000), ref: 00428A7B
                                • SelectObject.GDI32(?,?), ref: 00428A95
                                • DeleteDC.GDI32(?), ref: 00428A9E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Object$Select$A570ColorDeleteTable
                                • String ID:
                                • API String ID: 1418124628-0
                                • Opcode ID: 459ee56b8a0076c6d5f42f18b9545e0a98d32530f80f1c14435ed32ef1dec8e8
                                • Instruction ID: 89e55e46c886e53e27e6994c94697f070aa226fdf736d19200dd4a213e954df7
                                • Opcode Fuzzy Hash: 459ee56b8a0076c6d5f42f18b9545e0a98d32530f80f1c14435ed32ef1dec8e8
                                • Instruction Fuzzy Hash: 4A115171E052196BDB10EBE9DC41AAEB3BCEF48704F4044BAF904E7682DA789D4087A4
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,0046DDF8), ref: 0046DD73
                                • OpenServiceA.ADVAPI32(00000000,00000000,000F01FF,00000000,0046DDD6,?,00000000,00000000,000F003F,00000000,0046DDF8), ref: 0046DDA1
                                • StartServiceA.ADVAPI32(00000000,00000000,?,00000000,00000000,000F01FF,00000000,0046DDD6,?,00000000,00000000,000F003F,00000000,0046DDF8), ref: 0046DDB4
                                • CloseServiceHandle.ADVAPI32(00000000,00000000,00000000,?,00000000,00000000,000F01FF,00000000,0046DDD6,?,00000000,00000000,000F003F,00000000,0046DDF8), ref: 0046DDBA
                                • CloseServiceHandle.ADVAPI32(00000000,0046DDDD,?,00000000,00000000,000F01FF,00000000,0046DDD6,?,00000000,00000000,000F003F,00000000,0046DDF8), ref: 0046DDD0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$ManagerStart
                                • String ID:
                                • API String ID: 1485051382-0
                                • Opcode ID: 2f464f236cef4453b537482dff97950f1fb1000a7f10605753704b9d11f1f76e
                                • Instruction ID: b2bf648e9c28990d28f84aa75d2ec1e2979c0b7f568cadef568eec4470b52009
                                • Opcode Fuzzy Hash: 2f464f236cef4453b537482dff97950f1fb1000a7f10605753704b9d11f1f76e
                                • Instruction Fuzzy Hash: BB114FB0E40708BFDB05EBA6CC52A6FBBB8EB49714F61447AB510E2681E6785900CB59
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,0046DD2B), ref: 0046DCAB
                                • OpenServiceA.ADVAPI32(00000000,00000000,000F01FF,00000000,0046DD09,?,00000000,00000000,000F003F,00000000,0046DD2B), ref: 0046DCD9
                                • ControlService.ADVAPI32(00000000,00000001,?,00000000,00000000,000F01FF,00000000,0046DD09,?,00000000,00000000,000F003F,00000000,0046DD2B), ref: 0046DCE7
                                • CloseServiceHandle.ADVAPI32(00000000,00000000,00000001,?,00000000,00000000,000F01FF,00000000,0046DD09,?,00000000,00000000,000F003F,00000000,0046DD2B), ref: 0046DCED
                                • CloseServiceHandle.ADVAPI32(00000000,0046DD10,?,00000000,00000000,000F01FF,00000000,0046DD09,?,00000000,00000000,000F003F,00000000,0046DD2B), ref: 0046DD03
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleOpen$ControlManager
                                • String ID:
                                • API String ID: 2705437689-0
                                • Opcode ID: 26fe5fcf8b2d2be3ff56d615f19ce5581ed12070c42200f63a556ac302b65431
                                • Instruction ID: f4a63c36d63dbc772f10b72078c2f0dd07b7d1baa284763727168e3553480a13
                                • Opcode Fuzzy Hash: 26fe5fcf8b2d2be3ff56d615f19ce5581ed12070c42200f63a556ac302b65431
                                • Instruction Fuzzy Hash: DE115174E40704BFDB11BBA6CC52A5FBBA8EB49714F514876F500A3681E67C5900CA59
                                APIs
                                • GetThreadLocale.KERNEL32(?,00000000,0040D657,?,?,00000000), ref: 0040D5D8
                                  • Part of subcall function 0040D334: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0040D352
                                • GetThreadLocale.KERNEL32(00000000,00000004,00000000,0040D657,?,?,00000000), ref: 0040D608
                                • EnumCalendarInfoA.KERNEL32(Function_0000D50C,00000000,00000000,00000004), ref: 0040D613
                                • GetThreadLocale.KERNEL32(00000000,00000003,00000000,0040D657,?,?,00000000), ref: 0040D631
                                • EnumCalendarInfoA.KERNEL32(Function_0000D548,00000000,00000000,00000003), ref: 0040D63C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Locale$InfoThread$CalendarEnum
                                • String ID:
                                • API String ID: 4102113445-0
                                • Opcode ID: 1d9e3c471f6307009a41c853857f32eee9842bf557f42afe10a4d8ba562254eb
                                • Instruction ID: 81d9639949f410756d6313e91defad55bcab0c41faafb99bc3a7c6c2a0003a06
                                • Opcode Fuzzy Hash: 1d9e3c471f6307009a41c853857f32eee9842bf557f42afe10a4d8ba562254eb
                                • Instruction Fuzzy Hash: DF014270E446043BE701BAB58C13F6E726CCB86718FA00577F504F62C1D63DAE00826E
                                APIs
                                • UnhookWindowsHookEx.USER32(00000000), ref: 00444B9F
                                • SetEvent.KERNEL32(00000000,004474C2,?,00447333), ref: 00444BBA
                                • GetCurrentThreadId.KERNEL32 ref: 00444BBF
                                • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,004474C2,?,00447333), ref: 00444BD4
                                • CloseHandle.KERNEL32(00000000,00000000,004474C2,?,00447333), ref: 00444BDF
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCurrentEventHandleHookObjectSingleThreadUnhookWaitWindows
                                • String ID:
                                • API String ID: 2429646606-0
                                • Opcode ID: ded9cf5d4c0aaa63f33caae6349075b6406390ce4da940f241fea10fa4a913be
                                • Instruction ID: 3e8eafe7108706a14c16d133dd8fe74e483f53c30c189f57ff72eba54b12659a
                                • Opcode Fuzzy Hash: ded9cf5d4c0aaa63f33caae6349075b6406390ce4da940f241fea10fa4a913be
                                • Instruction Fuzzy Hash: 51F098719541449AEA60EBBD9D87B5A33D4A765315F10093FA410E72A1DE38A840CB1D
                                APIs
                                • RtlEnterCriticalSection.NTDLL(0049C3A8), ref: 004874B5
                                • closesocket.WS2_32(00000000), ref: 0048761C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalEnterSectionclosesocket
                                • String ID: FpH
                                • API String ID: 763151358-3698235444
                                • Opcode ID: 66be2723a1daf2fc637343c0f7af1f304d50c6568caad62c1dcac5c4c178fabe
                                • Instruction ID: 014d6c7dbf53fa4957d6004b34e39dadd5b8ac8b6e10eebb7e7ff919d5902d66
                                • Opcode Fuzzy Hash: 66be2723a1daf2fc637343c0f7af1f304d50c6568caad62c1dcac5c4c178fabe
                                • Instruction Fuzzy Hash: BD513474B049059FDB04FB99D4919AFB7B5EB88314B60853BB810B7395DA3CEC028F69
                                APIs
                                • GetThreadLocale.KERNEL32(?,00000000,0040D840,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0040D69F
                                  • Part of subcall function 0040D334: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0040D352
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Locale$InfoThread
                                • String ID: eeee$ggg$yyyy
                                • API String ID: 4232894706-1253427255
                                • Opcode ID: 867fb0a8c754460a88f101de0f7bbe7a884297298cce2a16c97d7ecefaea5fb7
                                • Instruction ID: cb2eded8d6144d77a806d5d67bbca697e16fcb31a7e26b9b51427538ed7a3ea7
                                • Opcode Fuzzy Hash: 867fb0a8c754460a88f101de0f7bbe7a884297298cce2a16c97d7ecefaea5fb7
                                • Instruction Fuzzy Hash: 7D41E626F0450447C711BAEA884227FB2EADB85304B64C53BE451F33C5DA3CDD0A9A6E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: closesocketconnectgethostbynamehtonsinet_addrshutdownsocket
                                • String ID: @^H
                                • API String ID: 1626636048-3554995626
                                • Opcode ID: 653800a9f4583d8fcb12dfb61415bcc4dc947239afede3309b4cf51e5c0c4da3
                                • Instruction ID: 668b0f3ef2f2a4112427f66f718cbb1b44d47742eec345053f3efa6125297b1b
                                • Opcode Fuzzy Hash: 653800a9f4583d8fcb12dfb61415bcc4dc947239afede3309b4cf51e5c0c4da3
                                • Instruction Fuzzy Hash: 78415934600215DFC710EF69C885BAAB7F0FF58308F1144BAF9049B752E739A950CB99
                                APIs
                                • 73A0A570.USER32(00000000), ref: 0042A9EC
                                • CreateHalftonePalette.GDI32(00000000,00000000), ref: 0042A9F9
                                • DeleteObject.GDI32(00000000), ref: 0042AA76
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: A570CreateDeleteHalftoneObjectPalette
                                • String ID: (
                                • API String ID: 1897567740-3887548279
                                • Opcode ID: 76435e970d260e14dd08c51be940bbb79dde174e9ed0f333b875da88d7492688
                                • Instruction ID: 0f431452e849f766b31d06aaa992442caf9d889f75fac56a221b4e007dd27547
                                • Opcode Fuzzy Hash: 76435e970d260e14dd08c51be940bbb79dde174e9ed0f333b875da88d7492688
                                • Instruction Fuzzy Hash: CD41F170B04218DFDB10DFA9D485A9EB7F2EF49304F9040ABE804A7391D6785E55CB4A
                                APIs
                                • UnhandledExceptionFilter.KERNEL32(00000006,00000000), ref: 00404B9A
                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?), ref: 00404BD7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID: @$4L@
                                • API String ID: 3192549508-816902871
                                • Opcode ID: bcf9dde854f427948faed987d613c0c61148ceca2f936dc12a588ac8d5df3104
                                • Instruction ID: ddf3432de19ff96cee22118ec311a003e8f7acb72d87259a3750d8c3bb1762ec
                                • Opcode Fuzzy Hash: bcf9dde854f427948faed987d613c0c61148ceca2f936dc12a588ac8d5df3104
                                • Instruction Fuzzy Hash: 0531AFB4608241AFE724EB15C884F2B77E5ABC4314F15857BE608A7291C738EC84CB2D
                                APIs
                                • GetWindowTextA.USER32(?,00000000,?), ref: 0046F634
                                • GetWindowPlacement.USER32(?,0000002C,?,00000000,?,00000000,0046F6B7), ref: 0046F64F
                                • IsWindowVisible.USER32(?), ref: 0046F655
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$PlacementTextVisible
                                • String ID: ,
                                • API String ID: 2923846316-3772416878
                                • Opcode ID: 4f9a84bd75cebfb5a29fa87980aa69aaaf6b0bc2d7d0fa8618ec36b973865d7c
                                • Instruction ID: 7bb297613ceb2860488900fb4a1c389b1e2e6db9b347c16121d30143f119c7b1
                                • Opcode Fuzzy Hash: 4f9a84bd75cebfb5a29fa87980aa69aaaf6b0bc2d7d0fa8618ec36b973865d7c
                                • Instruction Fuzzy Hash: 5921A471900608BFDB10EFA1ED42A9F77BDEF44704F60007BB440B25A1EB789E059B59
                                APIs
                                • InternetOpenA.WININET(DCSC,00000000,00000000,00000000,00000000), ref: 00473493
                                • InternetConnectA.WININET(?,00000000,00000000,00000000,00000000,00000001,08000000,00000000), ref: 004734D9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Internet$ConnectOpen
                                • String ID: 84G$DCSC
                                • API String ID: 2790792615-1372800958
                                • Opcode ID: f16ba62487e45c0bb3ae0f8d6507cde5dc0cd1ff2598c1b212a8927f2f2ad6f4
                                • Instruction ID: cf760a81baa12cf792fcafcaf38ce4e630975f2ae3a29469885831bbb7575d69
                                • Opcode Fuzzy Hash: f16ba62487e45c0bb3ae0f8d6507cde5dc0cd1ff2598c1b212a8927f2f2ad6f4
                                • Instruction Fuzzy Hash: D0215EB0600604FFD714EF6ADC42B8E7BA4EB04704FA0847BB008A76D2C6786E409F5D
                                APIs
                                • inet_addr.WS2_32(00000000), ref: 004606F6
                                • gethostbyname.WS2_32(00000000), ref: 00460711
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: gethostbynameinet_addr
                                • String ID: %d.%d.%d.%d$0.0.0.0
                                • API String ID: 1594361348-464342551
                                • Opcode ID: cc9badf0c084f4eb49e4fcafe4880d7c8f8021d1ac39fbcf06db16789101aa94
                                • Instruction ID: a68b14d7db89d42c4d62e482932328a85465348a4f87ba99872a8eef66d897d9
                                • Opcode Fuzzy Hash: cc9badf0c084f4eb49e4fcafe4880d7c8f8021d1ac39fbcf06db16789101aa94
                                • Instruction Fuzzy Hash: E011E2602083915FC3009A7A484032BBBC49F89349F14897FF894D7386E67CDE058FAB
                                APIs
                                • GetMenuItemInfoA.USER32(00000000,00000000,000000FF), ref: 0043809A
                                • SetMenuItemInfoA.USER32(00000000,00000000,000000FF), ref: 004380EC
                                • DrawMenuBar.USER32(00000000), ref: 004380F9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Menu$InfoItem$Draw
                                • String ID: P
                                • API String ID: 3227129158-3110715001
                                • Opcode ID: 3120961b5f2aed66afb396d36cb665d9e3bb4654c350d2f2634c942cfb3d86d8
                                • Instruction ID: 796bbc59969b9dd7a9d5bda8889d0a047799a05cf3daead4c937c16a65311190
                                • Opcode Fuzzy Hash: 3120961b5f2aed66afb396d36cb665d9e3bb4654c350d2f2634c942cfb3d86d8
                                • Instruction Fuzzy Hash: 161182312053005FD7109B29CC81B4BB6E4AF88364F14D62EF494DB3E6DB79D948C789
                                APIs
                                • LoadLibraryA.KERNEL32(00000000,00000000,0048C473), ref: 0048C431
                                • GetProcAddress.KERNEL32(00000000,_DCEntryPoint), ref: 0048C442
                                • FreeLibrary.KERNEL32(00000000), ref: 0048C44A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Library$AddressFreeLoadProc
                                • String ID: _DCEntryPoint
                                • API String ID: 145871493-2130044969
                                • Opcode ID: dc9de319974c91b80f75a171a3fafd18a087cecb792355b11053285377cf0a19
                                • Instruction ID: 0a300236071779ff74f1163fb28d1d435799c7cfefb16094ecf62a0a87b511dc
                                • Opcode Fuzzy Hash: dc9de319974c91b80f75a171a3fafd18a087cecb792355b11053285377cf0a19
                                • Instruction Fuzzy Hash: 44015270614608AFDB00FB71DCD295E77ACEB45704BA1487BA501A2692DA3CAE448B69
                                APIs
                                • GetSystemMetrics.USER32(00000000), ref: 0042E331
                                • GetSystemMetrics.USER32(00000001), ref: 0042E33D
                                  • Part of subcall function 0042E174: GetProcAddress.KERNEL32(75A50000,00000000), ref: 0042E1F3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: MetricsSystem$AddressProc
                                • String ID: MonitorFromRect$B
                                • API String ID: 1792783759-20189883
                                • Opcode ID: c4233d62c1f5c8efbdee28eb20025ebbf54ff8a537a9b06a5da3890313890725
                                • Instruction ID: dc5f8bef81080ac6e58aab0957e71af51fc3e882e0a54e95acd7cc2d2fad424f
                                • Opcode Fuzzy Hash: c4233d62c1f5c8efbdee28eb20025ebbf54ff8a537a9b06a5da3890313890725
                                • Instruction Fuzzy Hash: 97014F31700264DBE710CB5AEC86B56BB66E792766F88407BED05CB602C3789C40CBAD
                                APIs
                                • LoadLibraryA.KERNEL32(DWMAPI.DLL,?,?,?,00447F98), ref: 0042FA0E
                                • GetProcAddress.KERNEL32(00000000,DwmExtendFrameIntoClientArea), ref: 0042FA31
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: DWMAPI.DLL$DwmExtendFrameIntoClientArea
                                • API String ID: 2574300362-2956373744
                                • Opcode ID: cbffe4edd2f2ef447d685c1bd5452ff904a6874e48ee84ebba24b8ca91363ddb
                                • Instruction ID: fcf78170a3cf770167fa5f36a9b525ed706a05443091ba13c5a63d82eb46c79f
                                • Opcode Fuzzy Hash: cbffe4edd2f2ef447d685c1bd5452ff904a6874e48ee84ebba24b8ca91363ddb
                                • Instruction Fuzzy Hash: 1DF01D757002209FDB109BAEFC59B4736B4B7A9759F80403FA109972A1C37D2C48CB6D
                                APIs
                                • ShellExecuteA.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00489E55
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExecuteShell
                                • String ID: /k $cmd.exe$open
                                • API String ID: 587946157-2943618638
                                • Opcode ID: b36887bf7e4b0bcce89e05cb4c512ae014f10941a035e9d745ef3fa335c150bd
                                • Instruction ID: 27d1b85cc062e7ddcf84c2f73e9695fc4a26b4e0be3d567abf4813233345782d
                                • Opcode Fuzzy Hash: b36887bf7e4b0bcce89e05cb4c512ae014f10941a035e9d745ef3fa335c150bd
                                • Instruction Fuzzy Hash: B4F04470610B04BBDB14FAA5CC52B6EBFA8DB85710F644476A404B26D1D7785E00DA59
                                APIs
                                • LoadLibraryA.KERNEL32(DWMAPI.DLL,?,?,0042FB22,?,00447EFB), ref: 0042FAA6
                                • GetProcAddress.KERNEL32(00000000,DwmIsCompositionEnabled), ref: 0042FAC9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: DWMAPI.DLL$DwmIsCompositionEnabled
                                • API String ID: 2574300362-2128843254
                                • Opcode ID: 783662385db0a180f92178ad6978572c092378b63905f9447fe6834710138d35
                                • Instruction ID: e865cc1d961e5560293b4342ba215906113c7bd0c8dbfb923edd7503eb684348
                                • Opcode Fuzzy Hash: 783662385db0a180f92178ad6978572c092378b63905f9447fe6834710138d35
                                • Instruction Fuzzy Hash: 90F0B7717112319FEB10ABA9F84975632B4B76C359F90043FA109962A1D2BD2C48CB5D
                                APIs
                                • GetModuleHandleA.KERNEL32(kernel32.dll,?,0048F10B,00000000,0048F11E), ref: 0040F4B2
                                • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 0040F4C3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleModuleProc
                                • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                • API String ID: 1646373207-3712701948
                                • Opcode ID: 4cc31627e91733d5dd97eeb503830692a25aae6e0e406c6413c6a608c2f6e091
                                • Instruction ID: 0d62609c0d87e9bc12772cdc487b7bb4e46ba53de1f656002390614a84bce5b3
                                • Opcode Fuzzy Hash: 4cc31627e91733d5dd97eeb503830692a25aae6e0e406c6413c6a608c2f6e091
                                • Instruction Fuzzy Hash: 17D05E64A003024AD330FBA2588570722EC8330348B10853BA820766E2DFBC98089F4E
                                APIs
                                • GetModuleHandleA.KERNEL32(ole32.dll,?,0042EC9A), ref: 0042EC26
                                • GetProcAddress.KERNEL32(00000000,CoWaitForMultipleHandles), ref: 0042EC37
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleModuleProc
                                • String ID: CoWaitForMultipleHandles$ole32.dll
                                • API String ID: 1646373207-2593175619
                                • Opcode ID: 71d1f1b6b167f0ea05a74daed833860a1450d6d2832c35c7f60d4bc4d4601477
                                • Instruction ID: 1c707138d3e81649b15e1ce0dc5978dd8bf195319b8672649068bb032171cab6
                                • Opcode Fuzzy Hash: 71d1f1b6b167f0ea05a74daed833860a1450d6d2832c35c7f60d4bc4d4601477
                                • Instruction Fuzzy Hash: 3ED09E627053A15FEE00ABE7B8C57173679A750389B90443FA00135655C6BE58449F1D
                                APIs
                                • GetModuleHandleA.KERNEL32(User32.dll,?,0048F661,00000000,0048F68F), ref: 00447D5A
                                • GetProcAddress.KERNEL32(00000000,SetLayeredWindowAttributes), ref: 00447D6B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleModuleProc
                                • String ID: SetLayeredWindowAttributes$User32.dll
                                • API String ID: 1646373207-2510956139
                                • Opcode ID: 090d732d3254e072cbed815f1791114cea1602195e41d2a072cbc7b457e1790c
                                • Instruction ID: 89f74696c9515f1f60a5e00fa2cf8cc5b85ed691f8b843a35d7c72a9f99c385a
                                • Opcode Fuzzy Hash: 090d732d3254e072cbed815f1791114cea1602195e41d2a072cbc7b457e1790c
                                • Instruction Fuzzy Hash: 0CC02BD0FACB013AB2007FF10CD2A37215C4D4034C310043B700032182DBFCAC01025E
                                APIs
                                • MulDiv.KERNEL32(?,00000000,00000000), ref: 00453A53
                                • MulDiv.KERNEL32(?,?,?), ref: 00453A8E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5514173e82925ec4c98ad2bb0ac9fb75202ee9f8500419a3fe379c13f5386cd2
                                • Instruction ID: 68ef9f1f88d9efa14826e557d27bb4446c81758090d7d15f2a4de284e0d97ae0
                                • Opcode Fuzzy Hash: 5514173e82925ec4c98ad2bb0ac9fb75202ee9f8500419a3fe379c13f5386cd2
                                • Instruction Fuzzy Hash: 3CD17C71A04A059FDB11CF69C484AABBBF2BF48302F108959E896DB356C734FE45CB51
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CursorDesktopWindow
                                • String ID:
                                • API String ID: 3023140981-0
                                • Opcode ID: a013222572b915d8e5b09eb8d8d6a2a35e4b0c757d133ba209ac07f97a746832
                                • Instruction ID: a5c2cd3d377f16bec15173dc73fd2654dbd8fa8db2d02a07daf6c9dda43507f7
                                • Opcode Fuzzy Hash: a013222572b915d8e5b09eb8d8d6a2a35e4b0c757d133ba209ac07f97a746832
                                • Instruction Fuzzy Hash: 86912934601240AFE710DF3ED984A5A7BE1BBA9304F0585BFE8448B366DB78EC45CB59
                                APIs
                                  • Part of subcall function 0044E2B4: WindowFromPoint.USER32(-000000F7,?,00000000,0044DE86,?,-00000010,?), ref: 0044E2BA
                                  • Part of subcall function 0044E2B4: GetParent.USER32(00000000), ref: 0044E2D1
                                • GetWindow.USER32(00000000,00000004), ref: 0044DE8E
                                • GetCurrentThreadId.KERNEL32 ref: 0044DF62
                                • GetWindowRect.USER32(00000000,?), ref: 0044DF7F
                                • IntersectRect.USER32(?,?,?), ref: 0044DFED
                                  • Part of subcall function 0044D2F4: GetWindowThreadProcessId.USER32(?), ref: 0044D301
                                  • Part of subcall function 0044D2F4: GetCurrentProcessId.KERNEL32(?,00000000,?,004387ED,?,004378A9), ref: 0044D30A
                                  • Part of subcall function 0044D2F4: GlobalFindAtomA.KERNEL32(00000000,?,00000000,?,004387ED,?,004378A9), ref: 0044D31F
                                  • Part of subcall function 0044D2F4: GetPropA.USER32(?,00000000), ref: 0044D336
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$CurrentProcessRectThread$AtomFindFromGlobalIntersectParentPointProp
                                • String ID:
                                • API String ID: 2049660638-0
                                • Opcode ID: bd958141efdfbaeaca242a96d0172ba21c13b34d5ff0a38146969e9ba1a46992
                                • Instruction ID: 9e25b0c4de8ac9593826e10cda60362fc30e97bb84d7d0ee3ed8c7429b952ba2
                                • Opcode Fuzzy Hash: bd958141efdfbaeaca242a96d0172ba21c13b34d5ff0a38146969e9ba1a46992
                                • Instruction Fuzzy Hash: B251AF31E001099FDB20DFA9C485AAEB7F4AF08354F1441AAF805EB351EB38ED05CB99
                                APIs
                                • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 004114F3
                                • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0041150F
                                • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 00411586
                                • VariantClear.OLEAUT32(?), ref: 004115AF
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ArraySafe$Bound$ClearIndexVariant
                                • String ID:
                                • API String ID: 920484758-0
                                • Opcode ID: 8aa00cc61b707ac15c9433f3790f772ad147275ad2ddf2cbfec09d81ee21ca74
                                • Instruction ID: cab86c602b54948d4f88bb36a43d8803a5233357784664e1254e066218a73c04
                                • Opcode Fuzzy Hash: 8aa00cc61b707ac15c9433f3790f772ad147275ad2ddf2cbfec09d81ee21ca74
                                • Instruction Fuzzy Hash: D241FA75A0121D9FCB61DB59CC91BD9B3BDAF48714F0041DAE649E7222DA38AFC08F58
                                APIs
                                • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0040D8C9
                                • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0040D8ED
                                • GetModuleFileNameA.KERNEL32(00400000,?,00000105), ref: 0040D908
                                • LoadStringA.USER32(00000000,0000FFED,?,00000100), ref: 0040D99E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileModuleName$LoadQueryStringVirtual
                                • String ID:
                                • API String ID: 3990497365-0
                                • Opcode ID: c69cc8a73fb96c924f201388a030d3378615ce6a01c282ac1113fb1fd46e56d4
                                • Instruction ID: 1bfa35b3286bf150645f38c2bec688b4392a860aa3854ae67781de399f3d5790
                                • Opcode Fuzzy Hash: c69cc8a73fb96c924f201388a030d3378615ce6a01c282ac1113fb1fd46e56d4
                                • Instruction Fuzzy Hash: 16411371E002589BDB21DBA9CC85BDAB7B89B08304F0440FAA548F7291D778AF84CF59
                                APIs
                                • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0040D8C9
                                • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0040D8ED
                                • GetModuleFileNameA.KERNEL32(00400000,?,00000105), ref: 0040D908
                                • LoadStringA.USER32(00000000,0000FFED,?,00000100), ref: 0040D99E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileModuleName$LoadQueryStringVirtual
                                • String ID:
                                • API String ID: 3990497365-0
                                • Opcode ID: 33710387fc01e37e6b501eb16bdd5be4669e32278954024dcf3041876f2921f7
                                • Instruction ID: f85c759a6d19d1c43c30d787c81a7b7be61824bd6937ac9ab050fc02a3367429
                                • Opcode Fuzzy Hash: 33710387fc01e37e6b501eb16bdd5be4669e32278954024dcf3041876f2921f7
                                • Instruction Fuzzy Hash: D7412571E002589BD711DB99CC85BDAB7B89B08304F4440FAB548F7291D7789F84CF59
                                APIs
                                  • Part of subcall function 00431970: GetClipboardData.USER32(00000000), ref: 00431996
                                • GlobalLock.KERNEL32(00000000), ref: 00470BDE
                                • DragQueryFile.SHELL32(?,000000FF,00000000,00000000), ref: 00470BF0
                                • DragQueryFile.SHELL32(?,00000000,?,00000105), ref: 00470C10
                                • GlobalUnlock.KERNEL32(00000000), ref: 00470C56
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: DragFileGlobalQuery$ClipboardDataLockUnlock
                                • String ID:
                                • API String ID: 3712500663-0
                                • Opcode ID: 1e5a6c0af4cfd364a4287fb39c28367ddd890438fc510a0449d5219834a1fa38
                                • Instruction ID: f29ff63567113a161b16e310a4652d7eab08671450cbef5ddba763d9d47e18d3
                                • Opcode Fuzzy Hash: 1e5a6c0af4cfd364a4287fb39c28367ddd890438fc510a0449d5219834a1fa38
                                • Instruction Fuzzy Hash: 7A21A130A0060DAFDB25EBA6CC46BDEB6BDEF44704F5041B7B508E3191D678AE408A59
                                APIs
                                • GetMenuState.USER32(?,?,?), ref: 00438733
                                • GetSubMenu.USER32(?,?), ref: 0043873E
                                • GetMenuItemID.USER32(?,?), ref: 00438757
                                • GetMenuStringA.USER32(?,?,?,?,?), ref: 004387AA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Menu$ItemStateString
                                • String ID:
                                • API String ID: 306270399-0
                                • Opcode ID: e4fc4d16ca1a58d9dc919c03c4120a27049188f647e80e8b852713a3752e95c8
                                • Instruction ID: 4445c07b309860435ed1900f1c8f07edae592b28bfc19ebe557ab8a263edd411
                                • Opcode Fuzzy Hash: e4fc4d16ca1a58d9dc919c03c4120a27049188f647e80e8b852713a3752e95c8
                                • Instruction Fuzzy Hash: 6D116075201214AFCB10EA698C819AFB7E99F49364F20546EF958D7381DA389D029764
                                APIs
                                • GetWindow.USER32(?,00000004), ref: 00445528
                                • GetWindowThreadProcessId.USER32(?,?), ref: 00445542
                                • GetCurrentProcessId.KERNEL32(?,00000004), ref: 0044554E
                                • IsWindowVisible.USER32(?), ref: 0044559E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Process$CurrentThreadVisible
                                • String ID:
                                • API String ID: 3926708836-0
                                • Opcode ID: cf774294026ba9430f0356ee9fe5f0d889c0a25b38098ac12d59c0f4c4171a0c
                                • Instruction ID: b5c4deab8c7cf64f686ea7aced4f3fe8afeb05f275eae08bfe96d692e86abc19
                                • Opcode Fuzzy Hash: cf774294026ba9430f0356ee9fe5f0d889c0a25b38098ac12d59c0f4c4171a0c
                                • Instruction Fuzzy Hash: 9F216F71300600ABEF10EB6ADDC2D6A33EAAB50314B20407BF9019B357DE39ED45876C
                                APIs
                                • GetWindowLongA.USER32(00000000,000000EC), ref: 00443464
                                • SetWindowLongA.USER32(00000000,000000EC,00000000), ref: 00443496
                                • SetLayeredWindowAttributes.USER32(00000000,?,?,00000000,00000000,000000EC,?,?,004408B8), ref: 004434CF
                                • SetWindowLongA.USER32(00000000,000000EC,00000000), ref: 004434E8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Long$AttributesLayered
                                • String ID:
                                • API String ID: 2169480361-0
                                • Opcode ID: 717edc08d492b10e977a01c39bd90696cad71758d24ca10dff8dc6b7536ce234
                                • Instruction ID: fc9bd34a641e5069966aa1f9253d96bee2abad2aae9060c33e21484fe4320937
                                • Opcode Fuzzy Hash: 717edc08d492b10e977a01c39bd90696cad71758d24ca10dff8dc6b7536ce234
                                • Instruction Fuzzy Hash: 2711E7A0A0065436DB116F754C46B6A2A4C0B1572BF08057FBC95EA2C3CE7CCA48C76C
                                APIs
                                • GetClassInfoA.USER32(00400000,004667A4,?), ref: 004668A9
                                • UnregisterClassA.USER32(004667A4,00400000), ref: 004668D2
                                • RegisterClassA.USER32(00492AC8), ref: 004668DC
                                • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 00466927
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Class$InfoLongRegisterUnregisterWindow
                                • String ID:
                                • API String ID: 4025006896-0
                                • Opcode ID: 1361744953ea873d6b32f515f136a2e1fa596bcaa48eca3c214a597cd70c792d
                                • Instruction ID: 3a7649a2c5b790901fc4f285049fbd28333fe9236c9632785a37b3f7d0da47cf
                                • Opcode Fuzzy Hash: 1361744953ea873d6b32f515f136a2e1fa596bcaa48eca3c214a597cd70c792d
                                • Instruction Fuzzy Hash: C201A1726441007BCB50EBA89E81F5B379DE718314F11413BF944E73D1DA79E845876D
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Object$Delete$IconInfo
                                • String ID:
                                • API String ID: 507670407-0
                                • Opcode ID: b47afb5eb511aca4f03d9de83dda0e9554922f77b4baa286230760b7e4f4b8db
                                • Instruction ID: 41c7b2879172756473c4c529f1409dbd5c07a41a3725de9276adf285cb9331a7
                                • Opcode Fuzzy Hash: b47afb5eb511aca4f03d9de83dda0e9554922f77b4baa286230760b7e4f4b8db
                                • Instruction Fuzzy Hash: 71111275B04208AFDB04DFA5D9818AEB7F9EF48300B5085AAFD04E7355DB34ED019A94
                                APIs
                                • SelectObject.GDI32(00000000,00000000), ref: 00426232
                                • GetDIBColorTable.GDI32(00000000,00000000,00000100,?,00000000,00000000,00000000,00000000,?,?,00429DA7,?,?,?,?,0042889B), ref: 00426246
                                • SelectObject.GDI32(00000000,00000000), ref: 00426252
                                • DeleteDC.GDI32(00000000), ref: 00426258
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ObjectSelect$ColorDeleteTable
                                • String ID:
                                • API String ID: 3862836420-0
                                • Opcode ID: 1ca0ea2a30b5f9ec87b67caa3006731a500d3e57da45ded6ae2804fad1160acf
                                • Instruction ID: 2d406f2276c00154e1a94b7392b5cffd8c46c8785723cda12f88f537d4201806
                                • Opcode Fuzzy Hash: 1ca0ea2a30b5f9ec87b67caa3006731a500d3e57da45ded6ae2804fad1160acf
                                • Instruction Fuzzy Hash: EF018471708310A2E614B7669C43F6B72A98FC0718F15886FB584972C2E67C9C4452EF
                                APIs
                                • MulDiv.KERNEL32(?,00000000,00000000), ref: 00450365
                                • MulDiv.KERNEL32(?,00000000,00000000), ref: 00450382
                                • MulDiv.KERNEL32(?,00000000,00000000), ref: 0045039F
                                • MulDiv.KERNEL32(?,00000000,00000000), ref: 004503BC
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0466c361a850ab9f170d0962fd17ac30b440ff8ad54b3735b7d0dcb7ceaad6f0
                                • Instruction ID: 43f1ab9f737733cb6dea97c24c6e81f1cc91a978def0eee6151f26c360f8f18d
                                • Opcode Fuzzy Hash: 0466c361a850ab9f170d0962fd17ac30b440ff8ad54b3735b7d0dcb7ceaad6f0
                                • Instruction Fuzzy Hash: 70018B2570820C2BD324BE276C44F5B3A5DDFC2714B00457EBE299B343E9ADEC0583A8
                                APIs
                                • EnumWindows.USER32(Function_000452BC), ref: 0044535E
                                • GetWindow.USER32(?,00000003), ref: 00445376
                                • GetWindowLongA.USER32(00000000,000000EC), ref: 00445383
                                • SetWindowPos.USER32(00000000,000000EC,00000000,00000000,00000000,00000000,00000213,00000000,000000EC,?,00000003,Function_000452BC), ref: 004453C2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$EnumLongWindows
                                • String ID:
                                • API String ID: 4191631535-0
                                • Opcode ID: 78b51759b18893e656c0df72f3859838825290b8097ad2adc499b8842e77f762
                                • Instruction ID: c8332a885479ae0c7b6d0aff87d2a3103102a9f6306b53b98315deba79dc9663
                                • Opcode Fuzzy Hash: 78b51759b18893e656c0df72f3859838825290b8097ad2adc499b8842e77f762
                                • Instruction Fuzzy Hash: F911C231604A10AFEB10AE28CC81F9A73D8AB41764F14067EFD98EB2D3C6B89C408765
                                APIs
                                • FindNextFileA.KERNEL32(?,?), ref: 0040A415
                                • GetLastError.KERNEL32(?,?), ref: 0040A41E
                                • FileTimeToLocalFileTime.KERNEL32(?), ref: 0040A434
                                • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 0040A443
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileTime$DateErrorFindLastLocalNext
                                • String ID:
                                • API String ID: 2103556486-0
                                • Opcode ID: 55d53cb21e89f1729f9ee26751a19f022f705f4629744f421492ba9ff8e64f2d
                                • Instruction ID: 102ea568e68c1ca8e32db508c12b28ddf1adc9d8aabe648b82930bfe66b03b3c
                                • Opcode Fuzzy Hash: 55d53cb21e89f1729f9ee26751a19f022f705f4629744f421492ba9ff8e64f2d
                                • Instruction Fuzzy Hash: FB1161B2A042009FDB44DFA9C8C5C9773ECEF8830475185B7ED45DB24AE638E9118BA6
                                APIs
                                • FindResourceA.KERNEL32(?,?,?), ref: 0041C2EB
                                • LoadResource.KERNEL32(?,0041C370,?,?,?,00417C88,?,00000001,00000000,?,0041C216,00000000,?), ref: 0041C305
                                • SizeofResource.KERNEL32(?,0041C370,?,0041C370,?,?,?,00417C88,?,00000001,00000000,?,0041C216,00000000,?), ref: 0041C31F
                                • LockResource.KERNEL32(0041BDF4,00000000,?,0041C370,?,0041C370,?,?,?,00417C88,?,00000001,00000000,?,0041C216,00000000), ref: 0041C329
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Resource$FindLoadLockSizeof
                                • String ID:
                                • API String ID: 3473537107-0
                                • Opcode ID: 8ca1b039680916f72078d49da694da8b64f6d4e4b7ab777a64e8123957097da1
                                • Instruction ID: dfa690896acbcf9ee164be46d0a5d467c7e272d6235caba40c78dbe5a7786a72
                                • Opcode Fuzzy Hash: 8ca1b039680916f72078d49da694da8b64f6d4e4b7ab777a64e8123957097da1
                                • Instruction Fuzzy Hash: EFF06D73A092046F9744EE9DAD81D9B77ECEE89364310406FFD18D7202DA38ED4147B9
                                APIs
                                • OpenProcess.KERNEL32(00000001,00000000,00000000), ref: 00484393
                                • GetExitCodeProcess.KERNEL32(00000000,?), ref: 004843B7
                                • TerminateProcess.KERNEL32(00000000,?,00000000,004843E0,?,00000001,00000000,00000000), ref: 004843C4
                                • CloseHandle.KERNEL32(00000000,004843E7,004843E0,?,00000001,00000000,00000000), ref: 004843DA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$CloseCodeExitHandleOpenTerminate
                                • String ID:
                                • API String ID: 315287510-0
                                • Opcode ID: ce343bc79c5ef81ed084953790ac9be7ad30bd2e3901011d5fe6fcbe84b8e51d
                                • Instruction ID: 80d79d5a99ccd0432db7e52ddf200e3a7cb1bc2d7923bd238d1990a18f6c60dd
                                • Opcode Fuzzy Hash: ce343bc79c5ef81ed084953790ac9be7ad30bd2e3901011d5fe6fcbe84b8e51d
                                • Instruction Fuzzy Hash: ECF06276E08208BFEB00ABE59C42F9EB7ACD748714F600466F504E26C0D639AA40D769
                                APIs
                                • GetWindowThreadProcessId.USER32(00000000), ref: 0044E261
                                • GetCurrentProcessId.KERNEL32(00000000,?,?,-00000010,00000000,0044E2CC,-000000F7,?,00000000,0044DE86,?,-00000010,?), ref: 0044E26A
                                • GlobalFindAtomA.KERNEL32(00000000,00000000,?,?,-00000010,00000000,0044E2CC,-000000F7,?,00000000,0044DE86,?,-00000010,?), ref: 0044E27F
                                • GetPropA.USER32(00000000,00000000), ref: 0044E296
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                                • String ID:
                                • API String ID: 2582817389-0
                                • Opcode ID: 78e71e4a8fa66b56695303ee18d46d26064ec84ef7aff1e3088a4be34412dfcf
                                • Instruction ID: 108dc389ae2805b6527c23ce436246bf7dd19daa0d154bb0db40879b10eee470
                                • Opcode Fuzzy Hash: 78e71e4a8fa66b56695303ee18d46d26064ec84ef7aff1e3088a4be34412dfcf
                                • Instruction Fuzzy Hash: 6BF0EC6171552257EA6177B75D4147F118CBE41314310007FFC40D1146DE7CCC83A1BE
                                APIs
                                • GetWindowThreadProcessId.USER32(?), ref: 0044D301
                                • GetCurrentProcessId.KERNEL32(?,00000000,?,004387ED,?,004378A9), ref: 0044D30A
                                • GlobalFindAtomA.KERNEL32(00000000,?,00000000,?,004387ED,?,004378A9), ref: 0044D31F
                                • GetPropA.USER32(?,00000000), ref: 0044D336
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                                • String ID:
                                • API String ID: 2582817389-0
                                • Opcode ID: 9fea651bc6240c10730b5963b566c1d8990624d7601b5a7153bf010a8a0aa483
                                • Instruction ID: 8b346ad22a70303e6149d652c663f91cf55635e126bd19d15ad37056d599129e
                                • Opcode Fuzzy Hash: 9fea651bc6240c10730b5963b566c1d8990624d7601b5a7153bf010a8a0aa483
                                • Instruction Fuzzy Hash: CDF03061B0521166E6207BFA5D8286F268C9A967A4340043FFD42E6243DD3CCC4143BE
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 00444B34
                                • SetWindowsHookExA.USER32(00000003,00444AD8,00000000,00000000), ref: 00444B44
                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00447A69,?,?,?,?,?,?,?,?,?,?), ref: 00444B5F
                                • CreateThread.KERNEL32(00000000,000003E8,00444A7C,00000000,00000000), ref: 00444B83
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateThread$CurrentEventHookWindows
                                • String ID:
                                • API String ID: 1195359707-0
                                • Opcode ID: 0ba0917f73b943ef282e26b4d9324e5c44894b2dc3e077c6b1217f8667371603
                                • Instruction ID: ad5bdc25ec605e634095493db4c5df0f88b6d7af2749ec2c182bf55b4997a66e
                                • Opcode Fuzzy Hash: 0ba0917f73b943ef282e26b4d9324e5c44894b2dc3e077c6b1217f8667371603
                                • Instruction Fuzzy Hash: 88F0F470AC53487EF730AB699D47F2636D8D764B26F10503FF204791D1CAB868808B5E
                                APIs
                                  • Part of subcall function 00423A1C: RtlEnterCriticalSection.NTDLL(?), ref: 00423A20
                                • CompareStringA.KERNEL32(00000400,00000001,00000000,?,00000000,Default,00000000,00424930,?,00000000,00424958), ref: 0042486B
                                • CreateFontIndirectA.GDI32(?), ref: 0042490D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CompareCreateCriticalEnterFontIndirectSectionString
                                • String ID: Default
                                • API String ID: 249151401-753088835
                                • Opcode ID: b0279b78a1f9341c076f4f0069a384a9069793346afe2bfb10c1e9e31fb34e0c
                                • Instruction ID: 0750ee8d3e70a248d072dd5e84d46cc935511a93ac2d9f6683bc49608a055191
                                • Opcode Fuzzy Hash: b0279b78a1f9341c076f4f0069a384a9069793346afe2bfb10c1e9e31fb34e0c
                                • Instruction Fuzzy Hash: 6761AF74A04298DFDB10DFA8E441B9EBBF5EF85304FA440AAE400A7352D3789E41CB69
                                APIs
                                • RtlEnterCriticalSection.NTDLL(0049C3A8), ref: 00487110
                                • RtlLeaveCriticalSection.NTDLL(0049C3A8), ref: 004872D4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$EnterLeave
                                • String ID: FpH
                                • API String ID: 3168844106-3698235444
                                • Opcode ID: 8ea77f74b61230213ca5e5db63172e230dc18e19719e86902847ce990beb1337
                                • Instruction ID: 0e7223337c94cfb4bbdb6a528d93948804825ba2dceaf412d13022da24981a28
                                • Opcode Fuzzy Hash: 8ea77f74b61230213ca5e5db63172e230dc18e19719e86902847ce990beb1337
                                • Instruction Fuzzy Hash: 32510D357045099FDF04EB95D851A9E77B5EB48304F60497AF800B7796DA38AC01CF79
                                APIs
                                • UnhandledExceptionFilter.KERNEL32(00000006,00000000), ref: 00404D2E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID: @
                                • API String ID: 3192549508-1615503679
                                • Opcode ID: bb29aa22a639e20c03621917402b57045d4f19db46f9fbfaadd3a61db7a9670f
                                • Instruction ID: 7b23b5d6ac3945664165a7832c2530b6031b764ca23a5f1e3c13a7e6695e3c5d
                                • Opcode Fuzzy Hash: bb29aa22a639e20c03621917402b57045d4f19db46f9fbfaadd3a61db7a9670f
                                • Instruction Fuzzy Hash: 5641A1B46082419FD320DF14D884B27B7E5EFC8714F25857AE645A73A1C739EC41CB69
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateInstance
                                • String ID: E
                                • API String ID: 542301482-2089609516
                                • Opcode ID: 87884c643e29fd276bfd511b14d9c6c9f445f3bacbf46f296f2b4dee0f39e316
                                • Instruction ID: 647f1a6552efa59006bda00afc354c8ab4d2e0e5b4e9863a901f183eb340e257
                                • Opcode Fuzzy Hash: 87884c643e29fd276bfd511b14d9c6c9f445f3bacbf46f296f2b4dee0f39e316
                                • Instruction Fuzzy Hash: 88315330A14218ABDB14EB56D981B9F77E9EF48704F904067FD00A7382DB78EE058B99
                                APIs
                                • CoCreateInstance.COMBASE(00492A3C,00000000,00000003,0049299C,00000000), ref: 0046315A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateInstance
                                • String ID: <*I$L*I
                                • API String ID: 542301482-935359969
                                • Opcode ID: b89da7da2cbb2ca597b5a801ec7feb1d8cf07b6d662a62dae5cbea83b49e7390
                                • Instruction ID: 8911b51016648177f69835b9ee16ab3db86079f14bfbda1bba152385d54be3c9
                                • Opcode Fuzzy Hash: b89da7da2cbb2ca597b5a801ec7feb1d8cf07b6d662a62dae5cbea83b49e7390
                                • Instruction Fuzzy Hash: 9E412C7091424D9FDB11DFA5DC42AEFBBF8FB09314F50457BE404B2291E7785A40CAAA
                                APIs
                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000010,?,00000000,0046E55E), ref: 0046E44B
                                • SHGetPathFromIDList.SHELL32(?,?), ref: 0046E463
                                  • Part of subcall function 0042BE44: CoCreateInstance.COMBASE(?,00000000,00000005,0042BF34,00000000), ref: 0042BE8B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateFolderFromInstanceListLocationPathSpecial
                                • String ID: .LNK
                                • API String ID: 2911153413-2547878182
                                • Opcode ID: 10eb596e800604c91217c1fdbc5244a3e4b3464b5b3a77631530c10e5f01bb46
                                • Instruction ID: 34fc5f22480ae562584a80b72cbf4776a513aff26f6ff4faef366d8d945c011d
                                • Opcode Fuzzy Hash: 10eb596e800604c91217c1fdbc5244a3e4b3464b5b3a77631530c10e5f01bb46
                                • Instruction Fuzzy Hash: 1141DA75A00119AFCB10EF95C881ADEB7F8EF08314F5045BAA509E7291EB34AE548F69
                                APIs
                                  • Part of subcall function 004719C8: GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 004719DF
                                • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00472DAB,?,00000000,00472DE7), ref: 00472D16
                                Strings
                                • I wasn't able to open the hosts file, maybe because UAC is enabled in remote computer!, xrefs: 00472D8D
                                • drivers\etc\hosts, xrefs: 00472CD3, 00472D00
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: AttributesDirectoryFileSystem
                                • String ID: I wasn't able to open the hosts file, maybe because UAC is enabled in remote computer!$drivers\etc\hosts
                                • API String ID: 1682718127-57959411
                                • Opcode ID: 64b7010500cc72a18ad9423f95a9d2af5d36b7e90492c9edcba0d392981ac030
                                • Instruction ID: 108433249ca9f77430d43611c146bd9a9555b6dd73c2718f9bf05e2fbe1fbb0f
                                • Opcode Fuzzy Hash: 64b7010500cc72a18ad9423f95a9d2af5d36b7e90492c9edcba0d392981ac030
                                • Instruction Fuzzy Hash: 2C318570A006189FDB11FF66CD426CEB7B9EF49304F5084BBE808B2291DB789F458E59
                                APIs
                                • CoCreateInstance.COMBASE(00492A3C,00000000,00000001,0049299C,00000000), ref: 00462A3F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateInstance
                                • String ID: <*I$L*I
                                • API String ID: 542301482-935359969
                                • Opcode ID: 993177e28bb83657a4f0d7934c19b7b57de84426a20734aec35bf03e86f42b0c
                                • Instruction ID: 57f55eabde9ec8a13629bfb0fd3d49ff740ad63e8caa479f115da8ad1b302003
                                • Opcode Fuzzy Hash: 993177e28bb83657a4f0d7934c19b7b57de84426a20734aec35bf03e86f42b0c
                                • Instruction Fuzzy Hash: 3331C170900609BFDB21DBA4DD56A9B77F8EB09314F5042B6F400A3291E7B8AD04CB6A
                                APIs
                                • VirtualFree.KERNEL32(?,?,00004000), ref: 00465939
                                • VirtualProtect.KERNEL32(?,?,00000000,?), ref: 004659A5
                                Strings
                                • FinalizeSections: VirtualProtect failed, xrefs: 004659B3
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: Virtual$FreeProtect
                                • String ID: FinalizeSections: VirtualProtect failed
                                • API String ID: 2581862158-3584865983
                                • Opcode ID: 6d8bacac02a381a1e960a19d1b5836a8290fd5d9c70f16fba2b36d910c6932ab
                                • Instruction ID: cd89de6189cb887fe36dad8fb976eb45167b2a9217078df111c2bd8ce3794e6d
                                • Opcode Fuzzy Hash: 6d8bacac02a381a1e960a19d1b5836a8290fd5d9c70f16fba2b36d910c6932ab
                                • Instruction Fuzzy Hash: 5A3129B5704A01DFE700DB5DD885F5677E8AF08364F144156FA58DB3A1E338ED048B8A
                                APIs
                                • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,0040C116), ref: 0040C0AE
                                • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,0040C116), ref: 0040C0B4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: DateFormatLocaleThread
                                • String ID: yyyy
                                • API String ID: 3303714858-3145165042
                                • Opcode ID: 0e142008d243cd8e910f29fac0d96562f194efd0a650c15bae631fbb907bfd48
                                • Instruction ID: 806b1eedba5da343839ca0bbebfa815527dd4d282e64c7db681efa54e76182cb
                                • Opcode Fuzzy Hash: 0e142008d243cd8e910f29fac0d96562f194efd0a650c15bae631fbb907bfd48
                                • Instruction Fuzzy Hash: BC214475A00618DBDB11DB95C881AAF73B8EF48740F5141B7F944F72D2D6389E40CBA9
                                APIs
                                • RtlEnterCriticalSection.NTDLL(00499A18), ref: 004294B3
                                • RtlLeaveCriticalSection.NTDLL(00499A18), ref: 0042953C
                                  • Part of subcall function 00429EBC: RtlEnterCriticalSection.NTDLL(00499A18), ref: 00429F60
                                  • Part of subcall function 00429EBC: RtlLeaveCriticalSection.NTDLL(00499A18), ref: 00429F9E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$EnterLeave
                                • String ID: 6B
                                • API String ID: 3168844106-4127139157
                                • Opcode ID: fa09819f291eb57bd46da5037ae40dc2532e18dc65c2260e842156a19a9edc01
                                • Instruction ID: c436ad2ceecef9db71b827f24a8bc2f81bdce238aadd300098659fb891615237
                                • Opcode Fuzzy Hash: fa09819f291eb57bd46da5037ae40dc2532e18dc65c2260e842156a19a9edc01
                                • Instruction Fuzzy Hash: 8021D631704254AFCB11DF9AD98299EB7F5EF48314FA041BBB40497791C638EE41CB48
                                APIs
                                • GetMonitorInfoA.USER32(?,00000048), ref: 00488A28
                                  • Part of subcall function 00475E2C: send.WSOCK32(00000000,00000000,?,00000000,00000000,00475EBD), ref: 00475E9D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: InfoMonitorsend
                                • String ID: H$MONSIZE
                                • API String ID: 1515828956-578782711
                                • Opcode ID: 72244f0be063ac04e0557e46705f5e0299511308528ffb559c85dcab92249e03
                                • Instruction ID: 69a88adad1f06505f68257dc375ca35d4bb91794e4be082188adddab23c78d66
                                • Opcode Fuzzy Hash: 72244f0be063ac04e0557e46705f5e0299511308528ffb559c85dcab92249e03
                                • Instruction Fuzzy Hash: 9D212C749403089FCB50EFE5CC81A9DBBB6FB48710F90853BE804AB299E7786915CF58
                                APIs
                                • UnhandledExceptionFilter.KERNEL32(00000006), ref: 00405047
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID: @$@
                                • API String ID: 3192549508-55883348
                                • Opcode ID: 49eacba880296758ea4d5c396df1383b101e9b56b834902ad2388b0bfa14426f
                                • Instruction ID: fc8813f7c4006d62bdedb233a1bdc50888f087d7813f8b9b5ea1f2e80d04d4c2
                                • Opcode Fuzzy Hash: 49eacba880296758ea4d5c396df1383b101e9b56b834902ad2388b0bfa14426f
                                • Instruction Fuzzy Hash: 6C2181753046029BD724EF28D985B2F73A5EB84314F24853BA544AB3D5C73CDC81EB99
                                APIs
                                • send.WSOCK32(?,?,?,00000000,00000000,0048642A), ref: 004863F3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: send
                                • String ID: #KEEPALIVE#$AI
                                • API String ID: 2809346765-646448871
                                • Opcode ID: e3df9752dd3ed717e697d17ee2e12eed816abab97c3186ef81cd29e82e1e1476
                                • Instruction ID: 496fae78bc18a10eab856a829f5cdf73656815cb8b2cd1f4b2361e6db55a5dc6
                                • Opcode Fuzzy Hash: e3df9752dd3ed717e697d17ee2e12eed816abab97c3186ef81cd29e82e1e1476
                                • Instruction Fuzzy Hash: 2921A431A00659AFD750EB55CC41A9FB7B9EF44704F514576E800E3391E778AE008B58
                                APIs
                                • UnhandledExceptionFilter.KERNEL32(00000006,00000000), ref: 00404B9A
                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?), ref: 00404BD7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID: @$4L@
                                • API String ID: 3192549508-816902871
                                • Opcode ID: caa4d82db9daec3b3c07e8ef7f9ad3806a677642155a0105a709ddfc2c1d2d18
                                • Instruction ID: 263020c684cbcbce8f69ac41b965c8aefdccc7cff18347826ae5d0ab130f056e
                                • Opcode Fuzzy Hash: caa4d82db9daec3b3c07e8ef7f9ad3806a677642155a0105a709ddfc2c1d2d18
                                • Instruction Fuzzy Hash: 2A216FB4204201AFD724EB15C885F2B77A5EBC4714F1685BEE61867291C738EC85CB6E
                                APIs
                                • UnhandledExceptionFilter.KERNEL32(00000006,00000000), ref: 00404B9A
                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?), ref: 00404BD7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID: @$4L@
                                • API String ID: 3192549508-816902871
                                • Opcode ID: b44e5297991d1dd41d4fba917c9ceeae5b5d61fd0bded67d4bd70d17625b6e2c
                                • Instruction ID: a14102534a051e1492d63c073f8199e74a898bb776db94212624cb5022724b4c
                                • Opcode Fuzzy Hash: b44e5297991d1dd41d4fba917c9ceeae5b5d61fd0bded67d4bd70d17625b6e2c
                                • Instruction Fuzzy Hash: BD214FB4604201AFD724EB15C885F2B77E5EBC4714F1685BEE61867291C738EC84CB6A
                                APIs
                                • OpenProcess.KERNEL32(001F0FFF,00000000), ref: 0048440F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: OpenProcess
                                • String ID: ACCESS DENIED (x64)
                                • API String ID: 3743895883-185273294
                                • Opcode ID: 304f6b08deb962b867f2aa81b700bab919cc9f0c86b1c6fe58f0d5fc0cec51f4
                                • Instruction ID: 0e9250b89d192693a19e77b94bf17b31f02fd69c186701225a5d025e1deeb9cf
                                • Opcode Fuzzy Hash: 304f6b08deb962b867f2aa81b700bab919cc9f0c86b1c6fe58f0d5fc0cec51f4
                                • Instruction Fuzzy Hash: 1E012D317042059BD710F6AA8C42BAE739CEBC8B18F5048BBB644E3681EA7C4E406699
                                APIs
                                • GlobalMemoryStatus.KERNEL32(00000020), ref: 0048DD44
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: GlobalMemoryStatus
                                • String ID: $%d%
                                • API String ID: 1890195054-1553997471
                                • Opcode ID: 97806e5b538e135393ce6a78ab8842bad608ce51c9f6ad6b18a75f971ad60eb4
                                • Instruction ID: 88439d9c2eabed4357755c85552f3f5cbe81af8dfb1ea63edeeefc1de5b012bb
                                • Opcode Fuzzy Hash: 97806e5b538e135393ce6a78ab8842bad608ce51c9f6ad6b18a75f971ad60eb4
                                • Instruction Fuzzy Hash: 49118E70914608AFDB05EFA5D8519DEBBF8EB4D714F91887AE400F26C0E73869008A39
                                APIs
                                • EnumDisplayMonitors.USER32(00000000,00000000,004889F0,00000000,00000000,0000000A,00000000,00000008,00000000,00000000,00000000,00000000,00000000,00488BAC,?,?), ref: 00488B85
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: DisplayEnumMonitors
                                • String ID: DISPLAY$MONSIZE0x0x0x0
                                • API String ID: 2950131505-707749442
                                • Opcode ID: 5cf52360925013a012bee43cefa1aafbdb159de8ad873aa000c0ef30290eac26
                                • Instruction ID: f8454c744632a5d9dd25941c0746c42edd378387c74cb8ef01bea56b6289b09f
                                • Opcode Fuzzy Hash: 5cf52360925013a012bee43cefa1aafbdb159de8ad873aa000c0ef30290eac26
                                • Instruction Fuzzy Hash: 710152B06847007BD220B761DC53F1E7699E744B04FE0497BF500BA1D2DAB87D01479D
                                APIs
                                • GetSystemMetrics.USER32(00000000), ref: 0042E456
                                • GetSystemMetrics.USER32(00000001), ref: 0042E468
                                  • Part of subcall function 0042E174: GetProcAddress.KERNEL32(75A50000,00000000), ref: 0042E1F3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: MetricsSystem$AddressProc
                                • String ID: MonitorFromPoint
                                • API String ID: 1792783759-1072306578
                                • Opcode ID: a47c1597381401e51e94666345cb70981a850344e4d3901735e21b202ebda570
                                • Instruction ID: 9e16766aa2413ea816577c049e68cd25a8b85d073714f7d506ef38c7e5fa7f27
                                • Opcode Fuzzy Hash: a47c1597381401e51e94666345cb70981a850344e4d3901735e21b202ebda570
                                • Instruction Fuzzy Hash: F601A2317001646FEB00AF5BFC84BAA7B95E7A8764F80417BF9448B621C3789C4187AC
                                APIs
                                • EnumClipboardFormats.USER32(00000000), ref: 004319E8
                                • EnumClipboardFormats.USER32(00000000), ref: 00431A0E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: ClipboardEnumFormats
                                • String ID: 84B
                                • API String ID: 3947025145-4139892337
                                • Opcode ID: c63f49fb1886e2b1f147f13b5ba5209d00846f9c58fea2e06627953741474055
                                • Instruction ID: 3628f62a9b186bddbe54625d6d21312597d8aeebedd1f1e325a79ba2d7dfa65b
                                • Opcode Fuzzy Hash: c63f49fb1886e2b1f147f13b5ba5209d00846f9c58fea2e06627953741474055
                                • Instruction Fuzzy Hash: 30012630308340AFC701EF29D864B1ABBE4EF4C301F5090A5F840CB361CA39ED05C654
                                APIs
                                • GetSystemMetrics.USER32(?), ref: 0042E2BA
                                  • Part of subcall function 0042E174: GetProcAddress.KERNEL32(75A50000,00000000), ref: 0042E1F3
                                • GetSystemMetrics.USER32(?), ref: 0042E280
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: MetricsSystem$AddressProc
                                • String ID: GetSystemMetrics
                                • API String ID: 1792783759-96882338
                                • Opcode ID: 29632c1f1f1651f1fdee0b4de2e99c53191e728fa23b5aa8bcdbd8e2ca964af5
                                • Instruction ID: 35cbc800387b3f33683e7bde51bbe078039ce3788c5fde251ffaa49140f5f3f2
                                • Opcode Fuzzy Hash: 29632c1f1f1651f1fdee0b4de2e99c53191e728fa23b5aa8bcdbd8e2ca964af5
                                • Instruction Fuzzy Hash: A1F06D30704560CAEA108A7BBCC5366354EE7A2330BE04BBFA1134ABE5D63C8C41927E
                                APIs
                                • RtlInitializeCriticalSection.NTDLL(00418558), ref: 004189AB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalInitializeSection
                                • String ID: \tA$luA
                                • API String ID: 32694325-2973209611
                                • Opcode ID: 97a0df99a22ee3d664e17a658e14c5389a89957f4968412f7a025c56f55cad77
                                • Instruction ID: 5de4e579f7436390d2bac92cc1d5fd88463d867d68e90a910c01b3743f8c3115
                                • Opcode Fuzzy Hash: 97a0df99a22ee3d664e17a658e14c5389a89957f4968412f7a025c56f55cad77
                                • Instruction Fuzzy Hash: BFF068F270050157C210EB6A9841AD777926BC535CB08863AE514CB792EB3EAC458799
                                APIs
                                • GetKeyState.USER32(00000010), ref: 00437DB7
                                • GetKeyState.USER32(00000011), ref: 00437DC8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2017820559.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2017796473.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.0000000000499000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.000000000049D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004AD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2017820559.00000000004B2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2018044187.00000000004B6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_test.jbxd
                                Yara matches
                                Similarity
                                • API ID: State
                                • String ID:
                                • API String ID: 1649606143-3916222277
                                • Opcode ID: 73d6683b3c4f6cbaf8ab48c12f1d385a28f49bb83da3a75bd13f313b58d706c6
                                • Instruction ID: 96106ebb9835652182e450bae9324755592d7fe799d8fb174ce82df5cd5e6f47
                                • Opcode Fuzzy Hash: 73d6683b3c4f6cbaf8ab48c12f1d385a28f49bb83da3a75bd13f313b58d706c6
                                • Instruction Fuzzy Hash: 46E022B2708B4202E62376692C017F727A14F463A8F08426FBEC02A1C1E99E0A0250A6

                                Execution Graph

                                Execution Coverage:6.8%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:0%
                                Total number of Nodes:11
                                Total number of Limit Nodes:1
                                execution_graph 652 4054b2 653 4054b4 CreateThread 652->653 655 40547c RtlExitUserThread 653->655 642 4054b4 643 4054ce CreateThread 642->643 645 40547c 643->645 646 405484 645->646 649 405514 646->649 647 4054a6 650 405520 649->650 651 405528 RtlExitUserThread 649->651 650->651 651->647

                                Callgraph

                                • Executed
                                • Not Executed
                                • Opacity -> Relevance
                                • Disassembly available
                                callgraph 0 Function_00405D40 1 Function_00405A40 64 Function_00405620 1->64 69 Function_00405530 1->69 2 Function_00405244 3 Function_004051C6 52 Function_00405110 3->52 4 Function_00405EC6 5 Function_00405EC8 6 Function_004050C8 7 Function_004055C8 8 Function_004052CC 9 Function_004059CC 10 Function_00405ACC 29 Function_00405C6C 10->29 11 Function_0040564E 12 Function_00405CCE 17 Function_00405CD8 12->17 13 Function_00405650 14 Function_00405ED2 15 Function_00405554 16 Function_00405F58 16->5 58 Function_00405E18 16->58 18 Function_004057D9 19 Function_004059DC 20 Function_004051DD 20->6 33 Function_00405174 20->33 21 Function_0040515E 21->52 22 Function_0040545F 23 Function_004058E0 23->29 34 Function_004055F4 23->34 42 Function_00405584 23->42 24 Function_004057E3 25 Function_00405268 26 Function_004050E8 27 Function_00405868 27->29 27->34 27->42 28 Function_00405D68 29->34 29->69 30 Function_00405670 31 Function_004059F0 31->34 32 Function_00405172 35 Function_00405974 36 Function_004052FA 37 Function_0040547C 54 Function_00405514 37->54 38 Function_004052FC 39 Function_00405000 40 Function_00405380 40->8 40->25 40->26 40->38 40->52 41 Function_00405D00 42->34 43 Function_00405A84 43->29 44 Function_00405005 45 Function_00405388 45->8 45->25 45->26 45->38 45->52 46 Function_00405788 47 Function_00405009 48 Function_0040580A 49 Function_0040568C 49->13 49->29 49->64 49->69 50 Function_00405D8C 50->30 50->58 65 Function_00405FA4 50->65 67 Function_00405D28 50->67 51 Function_0040500D 53 Function_00405011 55 Function_00405015 56 Function_00405816 56->29 56->34 57 Function_00405E16 59 Function_00405718 59->64 60 Function_00405D18 61 Function_00405D19 62 Function_0040521C 63 Function_00405E9C 64->34 64->69 65->5 65->41 65->60 66 Function_00405026 66->45 68 Function_00405B28 70 Function_004054B2 70->37 71 Function_004054B4 71->37 72 Function_00405EB5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 4054b4-4054cc 1 4054da-4054e6 0->1 2 4054ce-4054d8 0->2 5 4054e9-40550e CreateThread 1->5 2->5
                                APIs
                                • CreateThread.KERNEL32(?,?,Function_0000047C,00000000,?,?), ref: 00405504
                                Memory Dump Source
                                • Source File: 00000008.00000002.3264582906.0000000000405000.00000040.00000001.01000000.00000006.sdmp, Offset: 00405000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_405000_ChromeCookie.jbxd
                                Similarity
                                • API ID: CreateThread
                                • String ID:
                                • API String ID: 2422867632-0
                                • Opcode ID: 5ba212015354f8809fa21e50a548c5a899824dc0bf1f36076e6e3181397b3a2b
                                • Instruction ID: 82965a1724c5dce4971d523c65c682e38f6bbf83b2d7d0d4f8b6b7f7581d9b19
                                • Opcode Fuzzy Hash: 5ba212015354f8809fa21e50a548c5a899824dc0bf1f36076e6e3181397b3a2b
                                • Instruction Fuzzy Hash: 92F0F972204104AFD3009B5E9885A9BBBACEB98755F20817BF508D72A1D6759C858BA4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 6 4054b2-4054cc 8 4054da-4054e6 6->8 9 4054ce-4054d8 6->9 12 4054e9-40550e CreateThread 8->12 9->12
                                APIs
                                • CreateThread.KERNEL32(?,?,Function_0000047C,00000000,?,?), ref: 00405504
                                Memory Dump Source
                                • Source File: 00000008.00000002.3264582906.0000000000405000.00000040.00000001.01000000.00000006.sdmp, Offset: 00405000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_405000_ChromeCookie.jbxd
                                Similarity
                                • API ID: CreateThread
                                • String ID:
                                • API String ID: 2422867632-0
                                • Opcode ID: 76eac5e47358ed49c090876229090dcdca953c32e6c4f96fe0d65551cd1f3258
                                • Instruction ID: 6023cd4e370bf6d95665890e42e4d60829662180bf89ab34331310683abd40d6
                                • Opcode Fuzzy Hash: 76eac5e47358ed49c090876229090dcdca953c32e6c4f96fe0d65551cd1f3258
                                • Instruction Fuzzy Hash: FDF05E72204108BFD300DB5DAC85EAB77ACDB98361F20817BF508D7291D275AC818B64

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 13 405514-40551e 14 405520 13->14 15 405528-40552f RtlExitUserThread 13->15 14->15
                                APIs
                                Memory Dump Source
                                • Source File: 00000008.00000002.3264582906.0000000000405000.00000040.00000001.01000000.00000006.sdmp, Offset: 00405000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_405000_ChromeCookie.jbxd
                                Similarity
                                • API ID: ExitThreadUser
                                • String ID:
                                • API String ID: 3424019298-0
                                • Opcode ID: d87d66e1dede5e547b0845b8255d60d2f9429177fde671b8cecfd70b9f0d1484
                                • Instruction ID: bb2650ac1d7f9bedbb80645de66c7b561e2e4807d69529290af58a20603d9934
                                • Opcode Fuzzy Hash: d87d66e1dede5e547b0845b8255d60d2f9429177fde671b8cecfd70b9f0d1484
                                • Instruction Fuzzy Hash: B5C09B75200341D7C30037B57DCC70721685719346F40587F7112E56B2D67D84D5CF28

                                Execution Graph

                                Execution Coverage:33.1%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:0%
                                Total number of Nodes:6
                                Total number of Limit Nodes:1
                                execution_graph 111 620000 112 620016 CreateMutexA 111->112 115 6200eb 112->115 114 62011b CreateMutexA 114->115 115->114 116 620184 CloseHandle Sleep 115->116 117 620132 115->117 116->115

                                Callgraph

                                • Executed
                                • Not Executed
                                • Opacity -> Relevance
                                • Disassembly available
                                callgraph 0 Function_00620192 1 Function_00620000 2 Function_0062019C

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 620000-6200f0 CreateMutexA 27 6200f2-620101 0->27 28 620116-620130 CreateMutexA 0->28 27->28 31 620103-620111 27->31 33 620132 28->33 34 620184-620190 CloseHandle Sleep 28->34 31->28 36 620136-62015c 33->36 34->28 40 62017a-620182 36->40 41 62015e 36->41 40->36 42 620160-62016f 41->42 45 620171 42->45 46 620174-620176 42->46 45->46 46->42 47 620178 46->47 47->36
                                APIs
                                • CreateMutexA.KERNELBASE(00000000,00000000,?), ref: 006200E5
                                • CreateMutexA.KERNELBASE(00000000,00000000,?), ref: 00620123
                                • CloseHandle.KERNELBASE(00000000), ref: 00620185
                                • Sleep.KERNELBASE(000001F4), ref: 0062018D
                                Strings
                                Memory Dump Source
                                • Source File: 0000000B.00000002.3264210429.0000000000620000.00000040.00000400.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_11_2_620000_notepad.jbxd
                                Similarity
                                • API ID: CreateMutex$CloseHandleSleep
                                • String ID: D
                                • API String ID: 568694521-2746444292
                                • Opcode ID: 6d01b8f3b7773269d6ab6984cc4343c29c1ea18cd121e00fea5f86dcc2d561e3
                                • Instruction ID: 311aa062b8d5d064f8e21abe61209bf3877e77e757602ef86444e0cc56d2240b
                                • Opcode Fuzzy Hash: 6d01b8f3b7773269d6ab6984cc4343c29c1ea18cd121e00fea5f86dcc2d561e3
                                • Instruction Fuzzy Hash: 28513FB1900610AFDF94AFE8C9CDB5A7BACAF09711B544594FE0ACF24ADB34D840CB61