Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VsTfsPVrfA.exe

Overview

General Information

Sample name:VsTfsPVrfA.exe
renamed because original name is a hash value
Original sample name:d1465fbe175c0599d01bd7187d5acc41bb386baf783167a7faaa98467fe9e270.exe
Analysis ID:1587723
MD5:e946aea01243abbc72c6341437172647
SHA1:517db53281b8a901f9693caa98ee2e4980377fef
SHA256:d1465fbe175c0599d01bd7187d5acc41bb386baf783167a7faaa98467fe9e270
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • VsTfsPVrfA.exe (PID: 3108 cmdline: "C:\Users\user\Desktop\VsTfsPVrfA.exe" MD5: E946AEA01243ABBC72C6341437172647)
    • svchost.exe (PID: 3892 cmdline: "C:\Users\user\Desktop\VsTfsPVrfA.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.1541751055.0000000002B80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.1541510302.0000000000610000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      SourceRuleDescriptionAuthorStrings
      2.2.svchost.exe.610000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        2.2.svchost.exe.610000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\VsTfsPVrfA.exe", CommandLine: "C:\Users\user\Desktop\VsTfsPVrfA.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\VsTfsPVrfA.exe", ParentImage: C:\Users\user\Desktop\VsTfsPVrfA.exe, ParentProcessId: 3108, ParentProcessName: VsTfsPVrfA.exe, ProcessCommandLine: "C:\Users\user\Desktop\VsTfsPVrfA.exe", ProcessId: 3892, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\VsTfsPVrfA.exe", CommandLine: "C:\Users\user\Desktop\VsTfsPVrfA.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\VsTfsPVrfA.exe", ParentImage: C:\Users\user\Desktop\VsTfsPVrfA.exe, ParentProcessId: 3108, ParentProcessName: VsTfsPVrfA.exe, ProcessCommandLine: "C:\Users\user\Desktop\VsTfsPVrfA.exe", ProcessId: 3892, ProcessName: svchost.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: VsTfsPVrfA.exeVirustotal: Detection: 31%Perma Link
          Source: VsTfsPVrfA.exeReversingLabs: Detection: 76%
          Source: Yara matchFile source: 2.2.svchost.exe.610000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.610000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1541751055.0000000002B80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1541510302.0000000000610000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: VsTfsPVrfA.exeJoe Sandbox ML: detected
          Source: VsTfsPVrfA.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: wntdll.pdbUGP source: VsTfsPVrfA.exe, 00000000.00000003.1461270981.0000000003B00000.00000004.00001000.00020000.00000000.sdmp, VsTfsPVrfA.exe, 00000000.00000003.1455400739.0000000003910000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1541856086.0000000003200000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1506188652.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1504324547.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1541856086.000000000339E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: VsTfsPVrfA.exe, 00000000.00000003.1461270981.0000000003B00000.00000004.00001000.00020000.00000000.sdmp, VsTfsPVrfA.exe, 00000000.00000003.1455400739.0000000003910000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.1541856086.0000000003200000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1506188652.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1504324547.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1541856086.000000000339E000.00000040.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001ADBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_001ADBBE
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0017C2A2 FindFirstFileExW,0_2_0017C2A2
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B68EE FindFirstFileW,FindClose,0_2_001B68EE
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_001B698F
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001AD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001AD076
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001AD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001AD3A9
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_001B9642
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_001B979D
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_001B9B2B
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_001B5C97
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001BCE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_001BCE44
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001BEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_001BEAFF
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001BED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_001BED6A
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001BEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_001BEAFF
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001AAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_001AAA57
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001D9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_001D9576

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.610000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.610000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1541751055.0000000002B80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1541510302.0000000000610000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: VsTfsPVrfA.exeString found in binary or memory: This is a third-party compiled AutoIt script.
          Source: VsTfsPVrfA.exe, 00000000.00000000.1440110410.0000000000202000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_adf77c7b-b
          Source: VsTfsPVrfA.exe, 00000000.00000000.1440110410.0000000000202000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_9a11e8bc-7
          Source: VsTfsPVrfA.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d7e9177d-5
          Source: VsTfsPVrfA.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_fb2219dd-0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0063C8C3 NtClose,2_2_0063C8C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272B60 NtClose,LdrInitializeThunk,2_2_03272B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03272DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032735C0 NtCreateMutant,LdrInitializeThunk,2_2_032735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03274340 NtSetContextThread,2_2_03274340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03274650 NtSuspendThread,2_2_03274650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272BA0 NtEnumerateValueKey,2_2_03272BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272B80 NtQueryInformationFile,2_2_03272B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272BE0 NtQueryValueKey,2_2_03272BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272BF0 NtAllocateVirtualMemory,2_2_03272BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272AB0 NtWaitForSingleObject,2_2_03272AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272AF0 NtWriteFile,2_2_03272AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272AD0 NtReadFile,2_2_03272AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272F30 NtCreateSection,2_2_03272F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272F60 NtCreateProcessEx,2_2_03272F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272FA0 NtQuerySection,2_2_03272FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272FB0 NtResumeThread,2_2_03272FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272F90 NtProtectVirtualMemory,2_2_03272F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272FE0 NtCreateFile,2_2_03272FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272E30 NtWriteVirtualMemory,2_2_03272E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272EA0 NtAdjustPrivilegesToken,2_2_03272EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272E80 NtReadVirtualMemory,2_2_03272E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272EE0 NtQueueApcThread,2_2_03272EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272D30 NtUnmapViewOfSection,2_2_03272D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272D00 NtSetInformationFile,2_2_03272D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272D10 NtMapViewOfSection,2_2_03272D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272DB0 NtEnumerateKey,2_2_03272DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272DD0 NtDelayExecution,2_2_03272DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272C00 NtQueryInformationProcess,2_2_03272C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272C60 NtCreateKey,2_2_03272C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272C70 NtFreeVirtualMemory,2_2_03272C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272CA0 NtQueryInformationToken,2_2_03272CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272CF0 NtOpenProcess,2_2_03272CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272CC0 NtQueryVirtualMemory,2_2_03272CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03273010 NtOpenDirectoryObject,2_2_03273010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03273090 NtSetValueKey,2_2_03273090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032739B0 NtGetContextThread,2_2_032739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03273D10 NtOpenProcessToken,2_2_03273D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03273D70 NtOpenThread,2_2_03273D70
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001AD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_001AD5EB
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001A1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_001A1201
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001AE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_001AE8F6
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0014BF400_2_0014BF40
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B20460_2_001B2046
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001480600_2_00148060
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001A82980_2_001A8298
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0017E4FF0_2_0017E4FF
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0017676B0_2_0017676B
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001D48730_2_001D4873
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0016CAA00_2_0016CAA0
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0014CAF00_2_0014CAF0
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0015CC390_2_0015CC39
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_00176DD90_2_00176DD9
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0015B1190_2_0015B119
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001491C00_2_001491C0
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001613940_2_00161394
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001617060_2_00161706
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0016781B0_2_0016781B
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001479200_2_00147920
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0015997D0_2_0015997D
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001619B00_2_001619B0
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_00167A4A0_2_00167A4A
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_00161C770_2_00161C77
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_00167CA70_2_00167CA7
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001CBE440_2_001CBE44
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_00179EEE0_2_00179EEE
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_00161F320_2_00161F32
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_011D64B80_2_011D64B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_006201432_2_00620143
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0062694E2_2_0062694E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_006269532_2_00626953
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0061E1332_2_0061E133
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0061E27F2_2_0061E27F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_006132502_2_00613250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0061E2832_2_0061E283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_006124E02_2_006124E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0063EEA32_2_0063EEA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0061277A2_2_0061277A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0061FF232_2_0061FF23
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0061FF1A2_2_0061FF1A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_006127802_2_00612780
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FA3522_2_032FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E3F02_2_0324E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_033003E62_2_033003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E02742_2_032E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C02C02_2_032C02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032301002_2_03230100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DA1182_2_032DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C81582_2_032C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F41A22_2_032F41A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_033001AA2_2_033001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F81CC2_2_032F81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D20002_2_032D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032407702_2_03240770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032647502_2_03264750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323C7C02_2_0323C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325C6E02_2_0325C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032405352_2_03240535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_033005912_2_03300591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E44202_2_032E4420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F24462_2_032F2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EE4F62_2_032EE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FAB402_2_032FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F6BD72_2_032F6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA802_2_0323EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032569622_2_03256962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A02_2_032429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0330A9A62_2_0330A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324A8402_2_0324A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032428402_2_03242840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032268B82_2_032268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E8F02_2_0326E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03282F282_2_03282F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03260F302_2_03260F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E2F302_2_032E2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B4F402_2_032B4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BEFA02_2_032BEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324CFE02_2_0324CFE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03232FC82_2_03232FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FEE262_2_032FEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240E592_2_03240E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03252E902_2_03252E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FCE932_2_032FCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FEEDB2_2_032FEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324AD002_2_0324AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DCD1F2_2_032DCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03258DBF2_2_03258DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323ADE02_2_0323ADE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240C002_2_03240C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0CB52_2_032E0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230CF22_2_03230CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F132D2_2_032F132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322D34C2_2_0322D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0328739A2_2_0328739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032452A02_2_032452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E12ED2_2_032E12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325B2C02_2_0325B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0327516C2_2_0327516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322F1722_2_0322F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0330B16B2_2_0330B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324B1B02_2_0324B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F70E92_2_032F70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FF0E02_2_032FF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EF0CC2_2_032EF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032470C02_2_032470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FF7B02_2_032FF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032856302_2_03285630
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F16CC2_2_032F16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F75712_2_032F7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DD5B02_2_032DD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_033095C32_2_033095C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FF43F2_2_032FF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032314602_2_03231460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FFB762_2_032FFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325FB802_2_0325FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B5BF02_2_032B5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0327DBF92_2_0327DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B3A6C2_2_032B3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FFA492_2_032FFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F7A462_2_032F7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DDAAC2_2_032DDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03285AA02_2_03285AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E1AA32_2_032E1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EDAC62_2_032EDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D59102_2_032D5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032499502_2_03249950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325B9502_2_0325B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AD8002_2_032AD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032438E02_2_032438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FFF092_2_032FFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FFFB12_2_032FFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03241F922_2_03241F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03203FD22_2_03203FD2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03203FD52_2_03203FD5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03249EB02_2_03249EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F7D732_2_032F7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03243D402_2_03243D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F1D5A2_2_032F1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325FDC02_2_0325FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B9C322_2_032B9C32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FFCF22_2_032FFCF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03275130 appears 58 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0322B970 appears 280 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 032AEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03287E54 appears 110 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 032BF290 appears 105 times
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: String function: 00149CB3 appears 31 times
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: String function: 00164963 appears 31 times
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: String function: 00160A30 appears 46 times
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: String function: 0015F9F2 appears 40 times
          Source: VsTfsPVrfA.exe, 00000000.00000003.1460370747.0000000003A83000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs VsTfsPVrfA.exe
          Source: VsTfsPVrfA.exe, 00000000.00000003.1455681463.0000000003BDD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs VsTfsPVrfA.exe
          Source: VsTfsPVrfA.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: classification engineClassification label: mal84.troj.evad.winEXE@3/2@0/0
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B37B5 GetLastError,FormatMessageW,0_2_001B37B5
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001A10BF AdjustTokenPrivileges,CloseHandle,0_2_001A10BF
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001A16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_001A16C3
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_001B51CD
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001CA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_001CA67C
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_001B648E
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001442A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_001442A2
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeFile created: C:\Users\user\AppData\Local\Temp\autDC5D.tmpJump to behavior
          Source: VsTfsPVrfA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: VsTfsPVrfA.exeVirustotal: Detection: 31%
          Source: VsTfsPVrfA.exeReversingLabs: Detection: 76%
          Source: unknownProcess created: C:\Users\user\Desktop\VsTfsPVrfA.exe "C:\Users\user\Desktop\VsTfsPVrfA.exe"
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\VsTfsPVrfA.exe"
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\VsTfsPVrfA.exe"Jump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeSection loaded: ntmarta.dllJump to behavior
          Source: VsTfsPVrfA.exeStatic file information: File size 1261568 > 1048576
          Source: VsTfsPVrfA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: VsTfsPVrfA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: VsTfsPVrfA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: VsTfsPVrfA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: VsTfsPVrfA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: VsTfsPVrfA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: VsTfsPVrfA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: wntdll.pdbUGP source: VsTfsPVrfA.exe, 00000000.00000003.1461270981.0000000003B00000.00000004.00001000.00020000.00000000.sdmp, VsTfsPVrfA.exe, 00000000.00000003.1455400739.0000000003910000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1541856086.0000000003200000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1506188652.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1504324547.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1541856086.000000000339E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: VsTfsPVrfA.exe, 00000000.00000003.1461270981.0000000003B00000.00000004.00001000.00020000.00000000.sdmp, VsTfsPVrfA.exe, 00000000.00000003.1455400739.0000000003910000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.1541856086.0000000003200000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1506188652.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1504324547.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1541856086.000000000339E000.00000040.00001000.00020000.00000000.sdmp
          Source: VsTfsPVrfA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: VsTfsPVrfA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: VsTfsPVrfA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: VsTfsPVrfA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: VsTfsPVrfA.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001442DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001442DE
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_00160A76 push ecx; ret 0_2_00160A89
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00629050 push esp; retf 2_2_00629056
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00624263 push ebp; retf 2_2_0062444B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0061739C push ds; iretd 2_2_006173A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_006134F0 push eax; ret 2_2_006134F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0062ED70 push F3E5F1E9h; retf 2_2_0062EDAA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0061D532 push 00000016h; ret 2_2_0061D543
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0061AD3D push esp; ret 2_2_0061AD53
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00611E68 push ds; retf 2_2_00611E6B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_006266B2 push ds; retf 2_2_006266BF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00626693 push ds; retf 2_2_006266BF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_006117CE push ds; ret 2_2_006117E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00611FB8 push ds; ret 2_2_00611FD6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0320225F pushad ; ret 2_2_032027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032027FA pushad ; ret 2_2_032027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032309AD push ecx; mov dword ptr [esp], ecx2_2_032309B6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0320283D push eax; iretd 2_2_03202858
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0320135E push eax; iretd 2_2_03201369
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0015F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0015F98E
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001D1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_001D1C41
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-99544
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeAPI/Special instruction interceptor: Address: 11D60DC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0327096E rdtsc 2_2_0327096E
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeAPI coverage: 4.0 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
          Source: C:\Windows\SysWOW64\svchost.exe TID: 6812Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001ADBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_001ADBBE
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0017C2A2 FindFirstFileExW,0_2_0017C2A2
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B68EE FindFirstFileW,FindClose,0_2_001B68EE
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_001B698F
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001AD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001AD076
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001AD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_001AD3A9
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_001B9642
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_001B979D
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_001B9B2B
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_001B5C97
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001442DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001442DE
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0327096E rdtsc 2_2_0327096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_006278E3 LdrLoadDll,2_2_006278E3
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001BEAA2 BlockInput,0_2_001BEAA2
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_00172622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00172622
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001442DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001442DE
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_00164CE8 mov eax, dword ptr fs:[00000030h]0_2_00164CE8
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_011D6348 mov eax, dword ptr fs:[00000030h]0_2_011D6348
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_011D63A8 mov eax, dword ptr fs:[00000030h]0_2_011D63A8
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_011D4D48 mov eax, dword ptr fs:[00000030h]0_2_011D4D48
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03308324 mov eax, dword ptr fs:[00000030h]2_2_03308324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03308324 mov ecx, dword ptr fs:[00000030h]2_2_03308324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03308324 mov eax, dword ptr fs:[00000030h]2_2_03308324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03308324 mov eax, dword ptr fs:[00000030h]2_2_03308324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A30B mov eax, dword ptr fs:[00000030h]2_2_0326A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A30B mov eax, dword ptr fs:[00000030h]2_2_0326A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A30B mov eax, dword ptr fs:[00000030h]2_2_0326A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322C310 mov ecx, dword ptr fs:[00000030h]2_2_0322C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03250310 mov ecx, dword ptr fs:[00000030h]2_2_03250310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D437C mov eax, dword ptr fs:[00000030h]2_2_032D437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B035C mov eax, dword ptr fs:[00000030h]2_2_032B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B035C mov eax, dword ptr fs:[00000030h]2_2_032B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B035C mov eax, dword ptr fs:[00000030h]2_2_032B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B035C mov ecx, dword ptr fs:[00000030h]2_2_032B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B035C mov eax, dword ptr fs:[00000030h]2_2_032B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B035C mov eax, dword ptr fs:[00000030h]2_2_032B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FA352 mov eax, dword ptr fs:[00000030h]2_2_032FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D8350 mov ecx, dword ptr fs:[00000030h]2_2_032D8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0330634F mov eax, dword ptr fs:[00000030h]2_2_0330634F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322E388 mov eax, dword ptr fs:[00000030h]2_2_0322E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322E388 mov eax, dword ptr fs:[00000030h]2_2_0322E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322E388 mov eax, dword ptr fs:[00000030h]2_2_0322E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325438F mov eax, dword ptr fs:[00000030h]2_2_0325438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325438F mov eax, dword ptr fs:[00000030h]2_2_0325438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03228397 mov eax, dword ptr fs:[00000030h]2_2_03228397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03228397 mov eax, dword ptr fs:[00000030h]2_2_03228397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03228397 mov eax, dword ptr fs:[00000030h]2_2_03228397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E3F0 mov eax, dword ptr fs:[00000030h]2_2_0324E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E3F0 mov eax, dword ptr fs:[00000030h]2_2_0324E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E3F0 mov eax, dword ptr fs:[00000030h]2_2_0324E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032663FF mov eax, dword ptr fs:[00000030h]2_2_032663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EC3CD mov eax, dword ptr fs:[00000030h]2_2_032EC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A3C0 mov eax, dword ptr fs:[00000030h]2_2_0323A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A3C0 mov eax, dword ptr fs:[00000030h]2_2_0323A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A3C0 mov eax, dword ptr fs:[00000030h]2_2_0323A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A3C0 mov eax, dword ptr fs:[00000030h]2_2_0323A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A3C0 mov eax, dword ptr fs:[00000030h]2_2_0323A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A3C0 mov eax, dword ptr fs:[00000030h]2_2_0323A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032383C0 mov eax, dword ptr fs:[00000030h]2_2_032383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032383C0 mov eax, dword ptr fs:[00000030h]2_2_032383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032383C0 mov eax, dword ptr fs:[00000030h]2_2_032383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032383C0 mov eax, dword ptr fs:[00000030h]2_2_032383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B63C0 mov eax, dword ptr fs:[00000030h]2_2_032B63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE3DB mov eax, dword ptr fs:[00000030h]2_2_032DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE3DB mov eax, dword ptr fs:[00000030h]2_2_032DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE3DB mov ecx, dword ptr fs:[00000030h]2_2_032DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE3DB mov eax, dword ptr fs:[00000030h]2_2_032DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D43D4 mov eax, dword ptr fs:[00000030h]2_2_032D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D43D4 mov eax, dword ptr fs:[00000030h]2_2_032D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322823B mov eax, dword ptr fs:[00000030h]2_2_0322823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03234260 mov eax, dword ptr fs:[00000030h]2_2_03234260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03234260 mov eax, dword ptr fs:[00000030h]2_2_03234260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03234260 mov eax, dword ptr fs:[00000030h]2_2_03234260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322826B mov eax, dword ptr fs:[00000030h]2_2_0322826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B8243 mov eax, dword ptr fs:[00000030h]2_2_032B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B8243 mov ecx, dword ptr fs:[00000030h]2_2_032B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0330625D mov eax, dword ptr fs:[00000030h]2_2_0330625D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322A250 mov eax, dword ptr fs:[00000030h]2_2_0322A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236259 mov eax, dword ptr fs:[00000030h]2_2_03236259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EA250 mov eax, dword ptr fs:[00000030h]2_2_032EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EA250 mov eax, dword ptr fs:[00000030h]2_2_032EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032402A0 mov eax, dword ptr fs:[00000030h]2_2_032402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032402A0 mov eax, dword ptr fs:[00000030h]2_2_032402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C62A0 mov eax, dword ptr fs:[00000030h]2_2_032C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C62A0 mov ecx, dword ptr fs:[00000030h]2_2_032C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C62A0 mov eax, dword ptr fs:[00000030h]2_2_032C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C62A0 mov eax, dword ptr fs:[00000030h]2_2_032C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C62A0 mov eax, dword ptr fs:[00000030h]2_2_032C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C62A0 mov eax, dword ptr fs:[00000030h]2_2_032C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E284 mov eax, dword ptr fs:[00000030h]2_2_0326E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E284 mov eax, dword ptr fs:[00000030h]2_2_0326E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B0283 mov eax, dword ptr fs:[00000030h]2_2_032B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B0283 mov eax, dword ptr fs:[00000030h]2_2_032B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B0283 mov eax, dword ptr fs:[00000030h]2_2_032B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032402E1 mov eax, dword ptr fs:[00000030h]2_2_032402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032402E1 mov eax, dword ptr fs:[00000030h]2_2_032402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032402E1 mov eax, dword ptr fs:[00000030h]2_2_032402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A2C3 mov eax, dword ptr fs:[00000030h]2_2_0323A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A2C3 mov eax, dword ptr fs:[00000030h]2_2_0323A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A2C3 mov eax, dword ptr fs:[00000030h]2_2_0323A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A2C3 mov eax, dword ptr fs:[00000030h]2_2_0323A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A2C3 mov eax, dword ptr fs:[00000030h]2_2_0323A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_033062D6 mov eax, dword ptr fs:[00000030h]2_2_033062D6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03260124 mov eax, dword ptr fs:[00000030h]2_2_03260124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov eax, dword ptr fs:[00000030h]2_2_032DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov ecx, dword ptr fs:[00000030h]2_2_032DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov eax, dword ptr fs:[00000030h]2_2_032DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov eax, dword ptr fs:[00000030h]2_2_032DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov ecx, dword ptr fs:[00000030h]2_2_032DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov eax, dword ptr fs:[00000030h]2_2_032DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov eax, dword ptr fs:[00000030h]2_2_032DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov ecx, dword ptr fs:[00000030h]2_2_032DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov eax, dword ptr fs:[00000030h]2_2_032DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov ecx, dword ptr fs:[00000030h]2_2_032DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DA118 mov ecx, dword ptr fs:[00000030h]2_2_032DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DA118 mov eax, dword ptr fs:[00000030h]2_2_032DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DA118 mov eax, dword ptr fs:[00000030h]2_2_032DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DA118 mov eax, dword ptr fs:[00000030h]2_2_032DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F0115 mov eax, dword ptr fs:[00000030h]2_2_032F0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304164 mov eax, dword ptr fs:[00000030h]2_2_03304164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304164 mov eax, dword ptr fs:[00000030h]2_2_03304164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C4144 mov eax, dword ptr fs:[00000030h]2_2_032C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C4144 mov eax, dword ptr fs:[00000030h]2_2_032C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C4144 mov ecx, dword ptr fs:[00000030h]2_2_032C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C4144 mov eax, dword ptr fs:[00000030h]2_2_032C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C4144 mov eax, dword ptr fs:[00000030h]2_2_032C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322C156 mov eax, dword ptr fs:[00000030h]2_2_0322C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C8158 mov eax, dword ptr fs:[00000030h]2_2_032C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236154 mov eax, dword ptr fs:[00000030h]2_2_03236154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236154 mov eax, dword ptr fs:[00000030h]2_2_03236154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03270185 mov eax, dword ptr fs:[00000030h]2_2_03270185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EC188 mov eax, dword ptr fs:[00000030h]2_2_032EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EC188 mov eax, dword ptr fs:[00000030h]2_2_032EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D4180 mov eax, dword ptr fs:[00000030h]2_2_032D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D4180 mov eax, dword ptr fs:[00000030h]2_2_032D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B019F mov eax, dword ptr fs:[00000030h]2_2_032B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B019F mov eax, dword ptr fs:[00000030h]2_2_032B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B019F mov eax, dword ptr fs:[00000030h]2_2_032B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B019F mov eax, dword ptr fs:[00000030h]2_2_032B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322A197 mov eax, dword ptr fs:[00000030h]2_2_0322A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322A197 mov eax, dword ptr fs:[00000030h]2_2_0322A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322A197 mov eax, dword ptr fs:[00000030h]2_2_0322A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_033061E5 mov eax, dword ptr fs:[00000030h]2_2_033061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032601F8 mov eax, dword ptr fs:[00000030h]2_2_032601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F61C3 mov eax, dword ptr fs:[00000030h]2_2_032F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F61C3 mov eax, dword ptr fs:[00000030h]2_2_032F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE1D0 mov eax, dword ptr fs:[00000030h]2_2_032AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE1D0 mov eax, dword ptr fs:[00000030h]2_2_032AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_032AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE1D0 mov eax, dword ptr fs:[00000030h]2_2_032AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE1D0 mov eax, dword ptr fs:[00000030h]2_2_032AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322A020 mov eax, dword ptr fs:[00000030h]2_2_0322A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322C020 mov eax, dword ptr fs:[00000030h]2_2_0322C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C6030 mov eax, dword ptr fs:[00000030h]2_2_032C6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B4000 mov ecx, dword ptr fs:[00000030h]2_2_032B4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E016 mov eax, dword ptr fs:[00000030h]2_2_0324E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E016 mov eax, dword ptr fs:[00000030h]2_2_0324E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E016 mov eax, dword ptr fs:[00000030h]2_2_0324E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E016 mov eax, dword ptr fs:[00000030h]2_2_0324E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325C073 mov eax, dword ptr fs:[00000030h]2_2_0325C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03232050 mov eax, dword ptr fs:[00000030h]2_2_03232050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6050 mov eax, dword ptr fs:[00000030h]2_2_032B6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032280A0 mov eax, dword ptr fs:[00000030h]2_2_032280A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C80A8 mov eax, dword ptr fs:[00000030h]2_2_032C80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F60B8 mov eax, dword ptr fs:[00000030h]2_2_032F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F60B8 mov ecx, dword ptr fs:[00000030h]2_2_032F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323208A mov eax, dword ptr fs:[00000030h]2_2_0323208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0322A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032380E9 mov eax, dword ptr fs:[00000030h]2_2_032380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B60E0 mov eax, dword ptr fs:[00000030h]2_2_032B60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322C0F0 mov eax, dword ptr fs:[00000030h]2_2_0322C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032720F0 mov ecx, dword ptr fs:[00000030h]2_2_032720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B20DE mov eax, dword ptr fs:[00000030h]2_2_032B20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326C720 mov eax, dword ptr fs:[00000030h]2_2_0326C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326C720 mov eax, dword ptr fs:[00000030h]2_2_0326C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326273C mov eax, dword ptr fs:[00000030h]2_2_0326273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326273C mov ecx, dword ptr fs:[00000030h]2_2_0326273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326273C mov eax, dword ptr fs:[00000030h]2_2_0326273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AC730 mov eax, dword ptr fs:[00000030h]2_2_032AC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326C700 mov eax, dword ptr fs:[00000030h]2_2_0326C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230710 mov eax, dword ptr fs:[00000030h]2_2_03230710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03260710 mov eax, dword ptr fs:[00000030h]2_2_03260710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238770 mov eax, dword ptr fs:[00000030h]2_2_03238770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326674D mov esi, dword ptr fs:[00000030h]2_2_0326674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326674D mov eax, dword ptr fs:[00000030h]2_2_0326674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326674D mov eax, dword ptr fs:[00000030h]2_2_0326674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230750 mov eax, dword ptr fs:[00000030h]2_2_03230750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BE75D mov eax, dword ptr fs:[00000030h]2_2_032BE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272750 mov eax, dword ptr fs:[00000030h]2_2_03272750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272750 mov eax, dword ptr fs:[00000030h]2_2_03272750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B4755 mov eax, dword ptr fs:[00000030h]2_2_032B4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032307AF mov eax, dword ptr fs:[00000030h]2_2_032307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E47A0 mov eax, dword ptr fs:[00000030h]2_2_032E47A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D678E mov eax, dword ptr fs:[00000030h]2_2_032D678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032527ED mov eax, dword ptr fs:[00000030h]2_2_032527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032527ED mov eax, dword ptr fs:[00000030h]2_2_032527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032527ED mov eax, dword ptr fs:[00000030h]2_2_032527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BE7E1 mov eax, dword ptr fs:[00000030h]2_2_032BE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032347FB mov eax, dword ptr fs:[00000030h]2_2_032347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032347FB mov eax, dword ptr fs:[00000030h]2_2_032347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323C7C0 mov eax, dword ptr fs:[00000030h]2_2_0323C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B07C3 mov eax, dword ptr fs:[00000030h]2_2_032B07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E627 mov eax, dword ptr fs:[00000030h]2_2_0324E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03266620 mov eax, dword ptr fs:[00000030h]2_2_03266620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03268620 mov eax, dword ptr fs:[00000030h]2_2_03268620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323262C mov eax, dword ptr fs:[00000030h]2_2_0323262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE609 mov eax, dword ptr fs:[00000030h]2_2_032AE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324260B mov eax, dword ptr fs:[00000030h]2_2_0324260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324260B mov eax, dword ptr fs:[00000030h]2_2_0324260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324260B mov eax, dword ptr fs:[00000030h]2_2_0324260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324260B mov eax, dword ptr fs:[00000030h]2_2_0324260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324260B mov eax, dword ptr fs:[00000030h]2_2_0324260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324260B mov eax, dword ptr fs:[00000030h]2_2_0324260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324260B mov eax, dword ptr fs:[00000030h]2_2_0324260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272619 mov eax, dword ptr fs:[00000030h]2_2_03272619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F866E mov eax, dword ptr fs:[00000030h]2_2_032F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F866E mov eax, dword ptr fs:[00000030h]2_2_032F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A660 mov eax, dword ptr fs:[00000030h]2_2_0326A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A660 mov eax, dword ptr fs:[00000030h]2_2_0326A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03262674 mov eax, dword ptr fs:[00000030h]2_2_03262674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324C640 mov eax, dword ptr fs:[00000030h]2_2_0324C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326C6A6 mov eax, dword ptr fs:[00000030h]2_2_0326C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032666B0 mov eax, dword ptr fs:[00000030h]2_2_032666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03234690 mov eax, dword ptr fs:[00000030h]2_2_03234690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03234690 mov eax, dword ptr fs:[00000030h]2_2_03234690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE6F2 mov eax, dword ptr fs:[00000030h]2_2_032AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE6F2 mov eax, dword ptr fs:[00000030h]2_2_032AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE6F2 mov eax, dword ptr fs:[00000030h]2_2_032AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE6F2 mov eax, dword ptr fs:[00000030h]2_2_032AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B06F1 mov eax, dword ptr fs:[00000030h]2_2_032B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B06F1 mov eax, dword ptr fs:[00000030h]2_2_032B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0326A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A6C7 mov eax, dword ptr fs:[00000030h]2_2_0326A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240535 mov eax, dword ptr fs:[00000030h]2_2_03240535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240535 mov eax, dword ptr fs:[00000030h]2_2_03240535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240535 mov eax, dword ptr fs:[00000030h]2_2_03240535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240535 mov eax, dword ptr fs:[00000030h]2_2_03240535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240535 mov eax, dword ptr fs:[00000030h]2_2_03240535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240535 mov eax, dword ptr fs:[00000030h]2_2_03240535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E53E mov eax, dword ptr fs:[00000030h]2_2_0325E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E53E mov eax, dword ptr fs:[00000030h]2_2_0325E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E53E mov eax, dword ptr fs:[00000030h]2_2_0325E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E53E mov eax, dword ptr fs:[00000030h]2_2_0325E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E53E mov eax, dword ptr fs:[00000030h]2_2_0325E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C6500 mov eax, dword ptr fs:[00000030h]2_2_032C6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304500 mov eax, dword ptr fs:[00000030h]2_2_03304500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304500 mov eax, dword ptr fs:[00000030h]2_2_03304500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304500 mov eax, dword ptr fs:[00000030h]2_2_03304500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304500 mov eax, dword ptr fs:[00000030h]2_2_03304500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304500 mov eax, dword ptr fs:[00000030h]2_2_03304500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304500 mov eax, dword ptr fs:[00000030h]2_2_03304500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304500 mov eax, dword ptr fs:[00000030h]2_2_03304500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326656A mov eax, dword ptr fs:[00000030h]2_2_0326656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326656A mov eax, dword ptr fs:[00000030h]2_2_0326656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326656A mov eax, dword ptr fs:[00000030h]2_2_0326656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238550 mov eax, dword ptr fs:[00000030h]2_2_03238550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238550 mov eax, dword ptr fs:[00000030h]2_2_03238550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B05A7 mov eax, dword ptr fs:[00000030h]2_2_032B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B05A7 mov eax, dword ptr fs:[00000030h]2_2_032B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B05A7 mov eax, dword ptr fs:[00000030h]2_2_032B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032545B1 mov eax, dword ptr fs:[00000030h]2_2_032545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032545B1 mov eax, dword ptr fs:[00000030h]2_2_032545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03232582 mov eax, dword ptr fs:[00000030h]2_2_03232582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03232582 mov ecx, dword ptr fs:[00000030h]2_2_03232582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03264588 mov eax, dword ptr fs:[00000030h]2_2_03264588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E59C mov eax, dword ptr fs:[00000030h]2_2_0326E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032325E0 mov eax, dword ptr fs:[00000030h]2_2_032325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326C5ED mov eax, dword ptr fs:[00000030h]2_2_0326C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326C5ED mov eax, dword ptr fs:[00000030h]2_2_0326C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E5CF mov eax, dword ptr fs:[00000030h]2_2_0326E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E5CF mov eax, dword ptr fs:[00000030h]2_2_0326E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032365D0 mov eax, dword ptr fs:[00000030h]2_2_032365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A5D0 mov eax, dword ptr fs:[00000030h]2_2_0326A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A5D0 mov eax, dword ptr fs:[00000030h]2_2_0326A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322E420 mov eax, dword ptr fs:[00000030h]2_2_0322E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322E420 mov eax, dword ptr fs:[00000030h]2_2_0322E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322E420 mov eax, dword ptr fs:[00000030h]2_2_0322E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322C427 mov eax, dword ptr fs:[00000030h]2_2_0322C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6420 mov eax, dword ptr fs:[00000030h]2_2_032B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6420 mov eax, dword ptr fs:[00000030h]2_2_032B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6420 mov eax, dword ptr fs:[00000030h]2_2_032B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6420 mov eax, dword ptr fs:[00000030h]2_2_032B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6420 mov eax, dword ptr fs:[00000030h]2_2_032B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6420 mov eax, dword ptr fs:[00000030h]2_2_032B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6420 mov eax, dword ptr fs:[00000030h]2_2_032B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A430 mov eax, dword ptr fs:[00000030h]2_2_0326A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03268402 mov eax, dword ptr fs:[00000030h]2_2_03268402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03268402 mov eax, dword ptr fs:[00000030h]2_2_03268402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03268402 mov eax, dword ptr fs:[00000030h]2_2_03268402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BC460 mov ecx, dword ptr fs:[00000030h]2_2_032BC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325A470 mov eax, dword ptr fs:[00000030h]2_2_0325A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325A470 mov eax, dword ptr fs:[00000030h]2_2_0325A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325A470 mov eax, dword ptr fs:[00000030h]2_2_0325A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EA456 mov eax, dword ptr fs:[00000030h]2_2_032EA456
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322645D mov eax, dword ptr fs:[00000030h]2_2_0322645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325245A mov eax, dword ptr fs:[00000030h]2_2_0325245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032364AB mov eax, dword ptr fs:[00000030h]2_2_032364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032644B0 mov ecx, dword ptr fs:[00000030h]2_2_032644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BA4B0 mov eax, dword ptr fs:[00000030h]2_2_032BA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EA49A mov eax, dword ptr fs:[00000030h]2_2_032EA49A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032304E5 mov ecx, dword ptr fs:[00000030h]2_2_032304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325EB20 mov eax, dword ptr fs:[00000030h]2_2_0325EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325EB20 mov eax, dword ptr fs:[00000030h]2_2_0325EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F8B28 mov eax, dword ptr fs:[00000030h]2_2_032F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F8B28 mov eax, dword ptr fs:[00000030h]2_2_032F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304B00 mov eax, dword ptr fs:[00000030h]2_2_03304B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322CB7E mov eax, dword ptr fs:[00000030h]2_2_0322CB7E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E4B4B mov eax, dword ptr fs:[00000030h]2_2_032E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E4B4B mov eax, dword ptr fs:[00000030h]2_2_032E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03302B57 mov eax, dword ptr fs:[00000030h]2_2_03302B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03302B57 mov eax, dword ptr fs:[00000030h]2_2_03302B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03302B57 mov eax, dword ptr fs:[00000030h]2_2_03302B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03302B57 mov eax, dword ptr fs:[00000030h]2_2_03302B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C6B40 mov eax, dword ptr fs:[00000030h]2_2_032C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C6B40 mov eax, dword ptr fs:[00000030h]2_2_032C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FAB40 mov eax, dword ptr fs:[00000030h]2_2_032FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D8B42 mov eax, dword ptr fs:[00000030h]2_2_032D8B42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03228B50 mov eax, dword ptr fs:[00000030h]2_2_03228B50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DEB50 mov eax, dword ptr fs:[00000030h]2_2_032DEB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240BBE mov eax, dword ptr fs:[00000030h]2_2_03240BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240BBE mov eax, dword ptr fs:[00000030h]2_2_03240BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E4BB0 mov eax, dword ptr fs:[00000030h]2_2_032E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E4BB0 mov eax, dword ptr fs:[00000030h]2_2_032E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238BF0 mov eax, dword ptr fs:[00000030h]2_2_03238BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238BF0 mov eax, dword ptr fs:[00000030h]2_2_03238BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238BF0 mov eax, dword ptr fs:[00000030h]2_2_03238BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325EBFC mov eax, dword ptr fs:[00000030h]2_2_0325EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BCBF0 mov eax, dword ptr fs:[00000030h]2_2_032BCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03250BCB mov eax, dword ptr fs:[00000030h]2_2_03250BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03250BCB mov eax, dword ptr fs:[00000030h]2_2_03250BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03250BCB mov eax, dword ptr fs:[00000030h]2_2_03250BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230BCD mov eax, dword ptr fs:[00000030h]2_2_03230BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230BCD mov eax, dword ptr fs:[00000030h]2_2_03230BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230BCD mov eax, dword ptr fs:[00000030h]2_2_03230BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DEBD0 mov eax, dword ptr fs:[00000030h]2_2_032DEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326CA24 mov eax, dword ptr fs:[00000030h]2_2_0326CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325EA2E mov eax, dword ptr fs:[00000030h]2_2_0325EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03254A35 mov eax, dword ptr fs:[00000030h]2_2_03254A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03254A35 mov eax, dword ptr fs:[00000030h]2_2_03254A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326CA38 mov eax, dword ptr fs:[00000030h]2_2_0326CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BCA11 mov eax, dword ptr fs:[00000030h]2_2_032BCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326CA6F mov eax, dword ptr fs:[00000030h]2_2_0326CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326CA6F mov eax, dword ptr fs:[00000030h]2_2_0326CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326CA6F mov eax, dword ptr fs:[00000030h]2_2_0326CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DEA60 mov eax, dword ptr fs:[00000030h]2_2_032DEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032ACA72 mov eax, dword ptr fs:[00000030h]2_2_032ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032ACA72 mov eax, dword ptr fs:[00000030h]2_2_032ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236A50 mov eax, dword ptr fs:[00000030h]2_2_03236A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236A50 mov eax, dword ptr fs:[00000030h]2_2_03236A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236A50 mov eax, dword ptr fs:[00000030h]2_2_03236A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236A50 mov eax, dword ptr fs:[00000030h]2_2_03236A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236A50 mov eax, dword ptr fs:[00000030h]2_2_03236A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236A50 mov eax, dword ptr fs:[00000030h]2_2_03236A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236A50 mov eax, dword ptr fs:[00000030h]2_2_03236A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240A5B mov eax, dword ptr fs:[00000030h]2_2_03240A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240A5B mov eax, dword ptr fs:[00000030h]2_2_03240A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238AA0 mov eax, dword ptr fs:[00000030h]2_2_03238AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238AA0 mov eax, dword ptr fs:[00000030h]2_2_03238AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03286AA4 mov eax, dword ptr fs:[00000030h]2_2_03286AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304A80 mov eax, dword ptr fs:[00000030h]2_2_03304A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03268A90 mov edx, dword ptr fs:[00000030h]2_2_03268A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326AAEE mov eax, dword ptr fs:[00000030h]2_2_0326AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326AAEE mov eax, dword ptr fs:[00000030h]2_2_0326AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03286ACC mov eax, dword ptr fs:[00000030h]2_2_03286ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03286ACC mov eax, dword ptr fs:[00000030h]2_2_03286ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03286ACC mov eax, dword ptr fs:[00000030h]2_2_03286ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230AD0 mov eax, dword ptr fs:[00000030h]2_2_03230AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03264AD0 mov eax, dword ptr fs:[00000030h]2_2_03264AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03264AD0 mov eax, dword ptr fs:[00000030h]2_2_03264AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B892A mov eax, dword ptr fs:[00000030h]2_2_032B892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C892B mov eax, dword ptr fs:[00000030h]2_2_032C892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE908 mov eax, dword ptr fs:[00000030h]2_2_032AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE908 mov eax, dword ptr fs:[00000030h]2_2_032AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BC912 mov eax, dword ptr fs:[00000030h]2_2_032BC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03228918 mov eax, dword ptr fs:[00000030h]2_2_03228918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03228918 mov eax, dword ptr fs:[00000030h]2_2_03228918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03256962 mov eax, dword ptr fs:[00000030h]2_2_03256962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03256962 mov eax, dword ptr fs:[00000030h]2_2_03256962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03256962 mov eax, dword ptr fs:[00000030h]2_2_03256962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0327096E mov eax, dword ptr fs:[00000030h]2_2_0327096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0327096E mov edx, dword ptr fs:[00000030h]2_2_0327096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0327096E mov eax, dword ptr fs:[00000030h]2_2_0327096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D4978 mov eax, dword ptr fs:[00000030h]2_2_032D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D4978 mov eax, dword ptr fs:[00000030h]2_2_032D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BC97C mov eax, dword ptr fs:[00000030h]2_2_032BC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B0946 mov eax, dword ptr fs:[00000030h]2_2_032B0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304940 mov eax, dword ptr fs:[00000030h]2_2_03304940
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032309AD mov eax, dword ptr fs:[00000030h]2_2_032309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032309AD mov eax, dword ptr fs:[00000030h]2_2_032309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B89B3 mov esi, dword ptr fs:[00000030h]2_2_032B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B89B3 mov eax, dword ptr fs:[00000030h]2_2_032B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B89B3 mov eax, dword ptr fs:[00000030h]2_2_032B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BE9E0 mov eax, dword ptr fs:[00000030h]2_2_032BE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032629F9 mov eax, dword ptr fs:[00000030h]2_2_032629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032629F9 mov eax, dword ptr fs:[00000030h]2_2_032629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C69C0 mov eax, dword ptr fs:[00000030h]2_2_032C69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A9D0 mov eax, dword ptr fs:[00000030h]2_2_0323A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A9D0 mov eax, dword ptr fs:[00000030h]2_2_0323A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A9D0 mov eax, dword ptr fs:[00000030h]2_2_0323A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A9D0 mov eax, dword ptr fs:[00000030h]2_2_0323A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A9D0 mov eax, dword ptr fs:[00000030h]2_2_0323A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A9D0 mov eax, dword ptr fs:[00000030h]2_2_0323A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032649D0 mov eax, dword ptr fs:[00000030h]2_2_032649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FA9D3 mov eax, dword ptr fs:[00000030h]2_2_032FA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03252835 mov eax, dword ptr fs:[00000030h]2_2_03252835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03252835 mov eax, dword ptr fs:[00000030h]2_2_03252835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03252835 mov eax, dword ptr fs:[00000030h]2_2_03252835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03252835 mov ecx, dword ptr fs:[00000030h]2_2_03252835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03252835 mov eax, dword ptr fs:[00000030h]2_2_03252835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03252835 mov eax, dword ptr fs:[00000030h]2_2_03252835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A830 mov eax, dword ptr fs:[00000030h]2_2_0326A830
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D483A mov eax, dword ptr fs:[00000030h]2_2_032D483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D483A mov eax, dword ptr fs:[00000030h]2_2_032D483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BC810 mov eax, dword ptr fs:[00000030h]2_2_032BC810
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001A0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_001A0B62
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_00172622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00172622
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0016083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0016083F
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001609D5 SetUnhandledExceptionFilter,0_2_001609D5
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_00160C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00160C21

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 46C008Jump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001A1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_001A1201
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_00182BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00182BA5
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001AB226 SendInput,keybd_event,0_2_001AB226
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001C22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_001C22DA
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\VsTfsPVrfA.exe"Jump to behavior
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001A0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_001A0B62
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001A1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_001A1663
          Source: VsTfsPVrfA.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
          Source: VsTfsPVrfA.exeBinary or memory string: Shell_TrayWnd
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_00160698 cpuid 0_2_00160698
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001B8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_001B8195
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0019D27A GetUserNameW,0_2_0019D27A
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_0017B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0017B952
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001442DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001442DE

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.610000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.610000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1541751055.0000000002B80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1541510302.0000000000610000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: VsTfsPVrfA.exeBinary or memory string: WIN_81
          Source: VsTfsPVrfA.exeBinary or memory string: WIN_XP
          Source: VsTfsPVrfA.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
          Source: VsTfsPVrfA.exeBinary or memory string: WIN_XPe
          Source: VsTfsPVrfA.exeBinary or memory string: WIN_VISTA
          Source: VsTfsPVrfA.exeBinary or memory string: WIN_7
          Source: VsTfsPVrfA.exeBinary or memory string: WIN_8

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.610000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.610000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1541751055.0000000002B80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1541510302.0000000000610000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001C1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_001C1204
          Source: C:\Users\user\Desktop\VsTfsPVrfA.exeCode function: 0_2_001C1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_001C1806
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          1
          Native API
          2
          Valid Accounts
          2
          Valid Accounts
          2
          Valid Accounts
          21
          Input Capture
          2
          System Time Discovery
          Remote Services21
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          LSASS Memory24
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
          Access Token Manipulation
          12
          Virtualization/Sandbox Evasion
          Security Account Manager12
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares3
          Clipboard Data
          SteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook212
          Process Injection
          21
          Access Token Manipulation
          NTDS3
          Process Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
          DLL Side-Loading
          212
          Process Injection
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials1
          Account Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSync1
          System Owner/User Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc Filesystem1
          File and Directory Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow115
          System Information Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          VsTfsPVrfA.exe32%VirustotalBrowse
          VsTfsPVrfA.exe76%ReversingLabsWin32.Trojan.AutoitInject
          VsTfsPVrfA.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          bg.microsoft.map.fastly.net
          199.232.214.172
          truefalse
            high
            No contacted IP infos
            Joe Sandbox version:42.0.0 Malachite
            Analysis ID:1587723
            Start date and time:2025-01-10 17:24:03 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 58s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:4
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:VsTfsPVrfA.exe
            renamed because original name is a hash value
            Original Sample Name:d1465fbe175c0599d01bd7187d5acc41bb386baf783167a7faaa98467fe9e270.exe
            Detection:MAL
            Classification:mal84.troj.evad.winEXE@3/2@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 96%
            • Number of executed functions: 45
            • Number of non-executed functions: 299
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Stop behavior analysis, all processes terminated
            • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
            • Excluded IPs from analysis (whitelisted): 20.109.210.53, 20.242.39.171
            • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
            • Report size exceeded maximum capacity and may have missing disassembly code.
            TimeTypeDescription
            11:25:17API Interceptor3x Sleep call for process: svchost.exe modified
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            bg.microsoft.map.fastly.net51406528193621400.jsGet hashmaliciousStrela DownloaderBrowse
            • 199.232.210.172
            32474162872806629906.jsGet hashmaliciousStrela DownloaderBrowse
            • 199.232.214.172
            23268167561217715617.jsGet hashmaliciousStrela DownloaderBrowse
            • 199.232.210.172
            2045514992161325262.jsGet hashmaliciousStrela DownloaderBrowse
            • 199.232.210.172
            1936930021252095876.jsGet hashmaliciousStrela DownloaderBrowse
            • 199.232.210.172
            283532861321088537.jsGet hashmaliciousStrela DownloaderBrowse
            • 199.232.210.172
            launcher.exe.bin.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
            • 199.232.210.172
            10259286552329511027.jsGet hashmaliciousStrela DownloaderBrowse
            • 199.232.210.172
            30562134305434372.jsGet hashmaliciousStrela DownloaderBrowse
            • 199.232.210.172
            18559217651387524988.jsGet hashmaliciousStrela DownloaderBrowse
            • 199.232.210.172
            No context
            No context
            No context
            Process:C:\Users\user\Desktop\VsTfsPVrfA.exe
            File Type:data
            Category:dropped
            Size (bytes):288768
            Entropy (8bit):7.991823666604253
            Encrypted:true
            SSDEEP:6144:FzNM6LxNBUtN6j8Wxpn8syRqrfBgHSOEe3eNUeIAukKG:FzNM6etN0ppSHSy3eNUX4f
            MD5:5BBFBA2DBDF138A75DC898E18412FBB2
            SHA1:6D0326789928E84A003DC79660B8C3ADE7B5EBA8
            SHA-256:27745C2E5CBC0A2CB89FF6EC504B69B1B5FC7A52CA75FB183CD40826D621AE15
            SHA-512:26ADB1677A8313E8A74FE73375A5CAB5A3788C81E573DDC600AD19D9754E9A4AAAC539E34EB70C0B207A3FD27E419B12B8679E53A447A01FA92F1588D676BCE1
            Malicious:false
            Reputation:low
            Preview:...G2XQAHWGU..G1.QALWGUV.G1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1.QALYX.XA.8.p.M..t.).Bx!3#054;a$P6?.8w%0v32_x8/l...v,(U=.LA]cUVAG1XQ8M^.h6&..86.q7 .L...b1&.M...}'V.K..{51..X;9|,0.UVAG1XQA..GU.@F1.-.-WGUVAG1X.ANVLT]AGg\QALWGUVAG.KQALGGUV1C1XQ.LWWUVAE1XWALWGUVAA1XQALWGU&EG1ZQALWGUTA..XQQLWWUVAG!XQQLWGUVAW1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAiE=)5LWG..EG1HQAL.CUVQG1XQALWGUVAG1XqAL7GUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALW
            Process:C:\Users\user\Desktop\VsTfsPVrfA.exe
            File Type:data
            Category:dropped
            Size (bytes):288768
            Entropy (8bit):7.991823666604253
            Encrypted:true
            SSDEEP:6144:FzNM6LxNBUtN6j8Wxpn8syRqrfBgHSOEe3eNUeIAukKG:FzNM6etN0ppSHSy3eNUX4f
            MD5:5BBFBA2DBDF138A75DC898E18412FBB2
            SHA1:6D0326789928E84A003DC79660B8C3ADE7B5EBA8
            SHA-256:27745C2E5CBC0A2CB89FF6EC504B69B1B5FC7A52CA75FB183CD40826D621AE15
            SHA-512:26ADB1677A8313E8A74FE73375A5CAB5A3788C81E573DDC600AD19D9754E9A4AAAC539E34EB70C0B207A3FD27E419B12B8679E53A447A01FA92F1588D676BCE1
            Malicious:false
            Reputation:low
            Preview:...G2XQAHWGU..G1.QALWGUV.G1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1.QALYX.XA.8.p.M..t.).Bx!3#054;a$P6?.8w%0v32_x8/l...v,(U=.LA]cUVAG1XQ8M^.h6&..86.q7 .L...b1&.M...}'V.K..{51..X;9|,0.UVAG1XQA..GU.@F1.-.-WGUVAG1X.ANVLT]AGg\QALWGUVAG.KQALGGUV1C1XQ.LWWUVAE1XWALWGUVAA1XQALWGU&EG1ZQALWGUTA..XQQLWWUVAG!XQQLWGUVAW1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAiE=)5LWG..EG1HQAL.CUVQG1XQALWGUVAG1XqAL7GUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALWGUVAG1XQALW
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):7.147543581755613
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:VsTfsPVrfA.exe
            File size:1'261'568 bytes
            MD5:e946aea01243abbc72c6341437172647
            SHA1:517db53281b8a901f9693caa98ee2e4980377fef
            SHA256:d1465fbe175c0599d01bd7187d5acc41bb386baf783167a7faaa98467fe9e270
            SHA512:5d8af2fe8092edf9a13869b675c7f004d45822f59a67bcec639f9a996e000940c6a5ba77c793090c8457d313f85b720cd1af14ffa8eedc2c6ce47aca4b2a12e2
            SSDEEP:24576:YqDEvCTbMWu7rQYlBQcBiT6rprG8aEKFUP0iV5iZ+UVBitiOEgr:YTvC/MTQYxsWR7aEKuPyZpnityg
            TLSH:7545CF0273C1D062FFAB92734B5AF6115BBC69260123E61F13A81D79BE701B1563E7A3
            File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
            Icon Hash:aaf3e3e3938382a0
            Entrypoint:0x420577
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
            Time Stamp:0x67689BA1 [Sun Dec 22 23:07:13 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:1
            File Version Major:5
            File Version Minor:1
            Subsystem Version Major:5
            Subsystem Version Minor:1
            Import Hash:948cc502fe9226992dce9417f952fce3
            Instruction
            call 00007F2B506BDF33h
            jmp 00007F2B506BD83Fh
            push ebp
            mov ebp, esp
            push esi
            push dword ptr [ebp+08h]
            mov esi, ecx
            call 00007F2B506BDA1Dh
            mov dword ptr [esi], 0049FDF0h
            mov eax, esi
            pop esi
            pop ebp
            retn 0004h
            and dword ptr [ecx+04h], 00000000h
            mov eax, ecx
            and dword ptr [ecx+08h], 00000000h
            mov dword ptr [ecx+04h], 0049FDF8h
            mov dword ptr [ecx], 0049FDF0h
            ret
            push ebp
            mov ebp, esp
            push esi
            push dword ptr [ebp+08h]
            mov esi, ecx
            call 00007F2B506BD9EAh
            mov dword ptr [esi], 0049FE0Ch
            mov eax, esi
            pop esi
            pop ebp
            retn 0004h
            and dword ptr [ecx+04h], 00000000h
            mov eax, ecx
            and dword ptr [ecx+08h], 00000000h
            mov dword ptr [ecx+04h], 0049FE14h
            mov dword ptr [ecx], 0049FE0Ch
            ret
            push ebp
            mov ebp, esp
            push esi
            mov esi, ecx
            lea eax, dword ptr [esi+04h]
            mov dword ptr [esi], 0049FDD0h
            and dword ptr [eax], 00000000h
            and dword ptr [eax+04h], 00000000h
            push eax
            mov eax, dword ptr [ebp+08h]
            add eax, 04h
            push eax
            call 00007F2B506C05DDh
            pop ecx
            pop ecx
            mov eax, esi
            pop esi
            pop ebp
            retn 0004h
            lea eax, dword ptr [ecx+04h]
            mov dword ptr [ecx], 0049FDD0h
            push eax
            call 00007F2B506C0628h
            pop ecx
            ret
            push ebp
            mov ebp, esp
            push esi
            mov esi, ecx
            lea eax, dword ptr [esi+04h]
            mov dword ptr [esi], 0049FDD0h
            push eax
            call 00007F2B506C0611h
            test byte ptr [ebp+08h], 00000001h
            pop ecx
            Programming Language:
            • [ C ] VS2008 SP1 build 30729
            • [IMP] VS2008 SP1 build 30729
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x5d460.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1320000x7594.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0xd40000x5d4600x5d600ba537675f38477f92747e4ad25860bf2False0.9291724188420348data7.897905034982669IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x1320000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
            RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
            RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
            RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
            RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
            RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
            RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
            RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
            RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
            RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
            RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
            RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
            RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
            RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
            RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
            RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
            RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
            RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
            RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
            RT_RCDATA0xdc7b80x54725data1.0003353638263857
            RT_GROUP_ICON0x130ee00x76dataEnglishGreat Britain0.6610169491525424
            RT_GROUP_ICON0x130f580x14dataEnglishGreat Britain1.25
            RT_GROUP_ICON0x130f6c0x14dataEnglishGreat Britain1.15
            RT_GROUP_ICON0x130f800x14dataEnglishGreat Britain1.25
            RT_VERSION0x130f940xdcdataEnglishGreat Britain0.6181818181818182
            RT_MANIFEST0x1310700x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
            DLLImport
            WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
            VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
            MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
            WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
            PSAPI.DLLGetProcessMemoryInfo
            IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
            USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
            UxTheme.dllIsThemeActive
            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
            USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
            GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
            COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
            SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
            OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
            Language of compilation systemCountry where language is spokenMap
            EnglishGreat Britain
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jan 10, 2025 17:25:25.717740059 CET1.1.1.1192.168.2.90xcaddNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
            Jan 10, 2025 17:25:25.717740059 CET1.1.1.1192.168.2.90xcaddNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:11:25:09
            Start date:10/01/2025
            Path:C:\Users\user\Desktop\VsTfsPVrfA.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\VsTfsPVrfA.exe"
            Imagebase:0x140000
            File size:1'261'568 bytes
            MD5 hash:E946AEA01243ABBC72C6341437172647
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:2
            Start time:11:25:10
            Start date:10/01/2025
            Path:C:\Windows\SysWOW64\svchost.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\VsTfsPVrfA.exe"
            Imagebase:0xb70000
            File size:46'504 bytes
            MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1541751055.0000000002B80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1541510302.0000000000610000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:3%
              Dynamic/Decrypted Code Coverage:1%
              Signature Coverage:5.2%
              Total number of Nodes:1863
              Total number of Limit Nodes:40
              execution_graph 97246 143156 97249 143170 97246->97249 97250 143187 97249->97250 97251 14318c 97250->97251 97252 1431eb 97250->97252 97288 1431e9 97250->97288 97255 143265 PostQuitMessage 97251->97255 97256 143199 97251->97256 97253 182dfb 97252->97253 97254 1431f1 97252->97254 97298 1418e2 10 API calls 97253->97298 97258 14321d SetTimer RegisterWindowMessageW 97254->97258 97259 1431f8 97254->97259 97290 14316a 97255->97290 97261 1431a4 97256->97261 97262 182e7c 97256->97262 97257 1431d0 DefWindowProcW 97257->97290 97266 143246 CreatePopupMenu 97258->97266 97258->97290 97263 182d9c 97259->97263 97264 143201 KillTimer 97259->97264 97267 182e68 97261->97267 97268 1431ae 97261->97268 97313 1abf30 34 API calls ___scrt_fastfail 97262->97313 97276 182da1 97263->97276 97277 182dd7 MoveWindow 97263->97277 97294 1430f2 Shell_NotifyIconW ___scrt_fastfail 97264->97294 97265 182e1c 97299 15e499 42 API calls 97265->97299 97266->97290 97312 1ac161 27 API calls ___scrt_fastfail 97267->97312 97273 182e4d 97268->97273 97274 1431b9 97268->97274 97273->97257 97311 1a0ad7 22 API calls 97273->97311 97279 143253 97274->97279 97286 1431c4 97274->97286 97275 182e8e 97275->97257 97275->97290 97280 182dc6 SetFocus 97276->97280 97281 182da7 97276->97281 97277->97290 97278 143214 97295 143c50 DeleteObject DestroyWindow 97278->97295 97296 14326f 44 API calls ___scrt_fastfail 97279->97296 97280->97290 97282 182db0 97281->97282 97281->97286 97297 1418e2 10 API calls 97282->97297 97286->97257 97300 1430f2 Shell_NotifyIconW ___scrt_fastfail 97286->97300 97288->97257 97289 143263 97289->97290 97292 182e41 97301 143837 97292->97301 97294->97278 97295->97290 97296->97289 97297->97290 97298->97265 97299->97286 97300->97292 97302 143862 ___scrt_fastfail 97301->97302 97314 144212 97302->97314 97306 143906 Shell_NotifyIconW 97318 143923 97306->97318 97307 183386 Shell_NotifyIconW 97308 1438e8 97308->97306 97308->97307 97310 14391c 97310->97288 97311->97288 97312->97289 97313->97275 97315 1438b7 97314->97315 97316 1835a4 97314->97316 97315->97308 97340 1ac874 42 API calls _strftime 97315->97340 97316->97315 97317 1835ad DestroyIcon 97316->97317 97317->97315 97319 143a13 97318->97319 97320 14393f 97318->97320 97319->97310 97341 146270 97320->97341 97323 183393 LoadStringW 97326 1833ad 97323->97326 97324 14395a 97346 146b57 97324->97346 97334 143994 ___scrt_fastfail 97326->97334 97367 14a8c7 97326->97367 97327 14396f 97328 1833c9 97327->97328 97329 14397c 97327->97329 97332 146350 22 API calls 97328->97332 97329->97326 97331 143986 97329->97331 97358 146350 97331->97358 97335 1833d7 97332->97335 97337 1439f9 Shell_NotifyIconW 97334->97337 97335->97334 97371 1433c6 97335->97371 97337->97319 97338 1833f9 97339 1433c6 22 API calls 97338->97339 97339->97334 97340->97308 97380 15fe0b 97341->97380 97343 146295 97390 15fddb 97343->97390 97345 14394d 97345->97323 97345->97324 97347 146b67 _wcslen 97346->97347 97348 184ba1 97346->97348 97351 146ba2 97347->97351 97352 146b7d 97347->97352 97416 1493b2 97348->97416 97350 184baa 97350->97350 97354 15fddb 22 API calls 97351->97354 97415 146f34 22 API calls 97352->97415 97356 146bae 97354->97356 97355 146b85 __fread_nolock 97355->97327 97357 15fe0b 22 API calls 97356->97357 97357->97355 97359 146362 97358->97359 97360 184a51 97358->97360 97426 146373 97359->97426 97436 144a88 22 API calls __fread_nolock 97360->97436 97363 184a5b 97365 184a67 97363->97365 97366 14a8c7 22 API calls 97363->97366 97364 14636e 97364->97334 97366->97365 97368 14a8ea __fread_nolock 97367->97368 97369 14a8db 97367->97369 97368->97334 97369->97368 97370 15fe0b 22 API calls 97369->97370 97370->97368 97372 1830bb 97371->97372 97373 1433dd 97371->97373 97375 15fddb 22 API calls 97372->97375 97442 1433ee 97373->97442 97377 1830c5 _wcslen 97375->97377 97376 1433e8 97376->97338 97378 15fe0b 22 API calls 97377->97378 97379 1830fe __fread_nolock 97378->97379 97382 15fddb 97380->97382 97383 15fdfa 97382->97383 97386 15fdfc 97382->97386 97400 16ea0c 97382->97400 97407 164ead 7 API calls 2 library calls 97382->97407 97383->97343 97385 16066d 97409 1632a4 RaiseException 97385->97409 97386->97385 97408 1632a4 RaiseException 97386->97408 97388 16068a 97388->97343 97392 15fde0 97390->97392 97391 16ea0c ___std_exception_copy 21 API calls 97391->97392 97392->97391 97393 15fdfa 97392->97393 97396 15fdfc 97392->97396 97412 164ead 7 API calls 2 library calls 97392->97412 97393->97345 97395 16066d 97414 1632a4 RaiseException 97395->97414 97396->97395 97413 1632a4 RaiseException 97396->97413 97398 16068a 97398->97345 97405 173820 _abort 97400->97405 97401 17385e 97411 16f2d9 20 API calls _abort 97401->97411 97402 173849 RtlAllocateHeap 97404 17385c 97402->97404 97402->97405 97404->97382 97405->97401 97405->97402 97410 164ead 7 API calls 2 library calls 97405->97410 97407->97382 97408->97385 97409->97388 97410->97405 97411->97404 97412->97392 97413->97395 97414->97398 97415->97355 97417 1493c9 __fread_nolock 97416->97417 97418 1493c0 97416->97418 97417->97350 97418->97417 97420 14aec9 97418->97420 97421 14aedc 97420->97421 97422 14aed9 __fread_nolock 97420->97422 97423 15fddb 22 API calls 97421->97423 97422->97417 97424 14aee7 97423->97424 97425 15fe0b 22 API calls 97424->97425 97425->97422 97427 146382 97426->97427 97432 1463b6 __fread_nolock 97426->97432 97428 184a82 97427->97428 97429 1463a9 97427->97429 97427->97432 97431 15fddb 22 API calls 97428->97431 97437 14a587 97429->97437 97433 184a91 97431->97433 97432->97364 97434 15fe0b 22 API calls 97433->97434 97435 184ac5 __fread_nolock 97434->97435 97436->97363 97438 14a59d 97437->97438 97441 14a598 __fread_nolock 97437->97441 97439 15fe0b 22 API calls 97438->97439 97440 18f80f 97438->97440 97439->97441 97441->97432 97443 1433fe _wcslen 97442->97443 97444 18311d 97443->97444 97445 143411 97443->97445 97447 15fddb 22 API calls 97444->97447 97446 14a587 22 API calls 97445->97446 97448 14341e __fread_nolock 97446->97448 97449 183127 97447->97449 97448->97376 97450 15fe0b 22 API calls 97449->97450 97451 183157 __fread_nolock 97450->97451 97452 142e37 97531 14a961 97452->97531 97456 142e6b 97550 143a5a 97456->97550 97458 142e7f 97557 149cb3 97458->97557 97463 182cb0 97601 1b2cf9 97463->97601 97464 142ead 97467 14a8c7 22 API calls 97464->97467 97466 182cc3 97468 182ccf 97466->97468 97627 144f39 97466->97627 97469 142ec3 97467->97469 97472 144f39 68 API calls 97468->97472 97585 146f88 22 API calls 97469->97585 97474 182ce5 97472->97474 97473 142ecf 97475 149cb3 22 API calls 97473->97475 97633 143084 22 API calls 97474->97633 97476 142edc 97475->97476 97586 14a81b 41 API calls 97476->97586 97479 142eec 97481 149cb3 22 API calls 97479->97481 97480 182d02 97634 143084 22 API calls 97480->97634 97482 142f12 97481->97482 97587 14a81b 41 API calls 97482->97587 97485 182d1e 97486 143a5a 24 API calls 97485->97486 97487 182d44 97486->97487 97635 143084 22 API calls 97487->97635 97488 142f21 97491 14a961 22 API calls 97488->97491 97490 182d50 97492 14a8c7 22 API calls 97490->97492 97493 142f3f 97491->97493 97494 182d5e 97492->97494 97588 143084 22 API calls 97493->97588 97636 143084 22 API calls 97494->97636 97497 142f4b 97589 164a28 40 API calls 3 library calls 97497->97589 97498 182d6d 97503 14a8c7 22 API calls 97498->97503 97500 142f59 97500->97474 97501 142f63 97500->97501 97590 164a28 40 API calls 3 library calls 97501->97590 97505 182d83 97503->97505 97504 142f6e 97504->97480 97506 142f78 97504->97506 97637 143084 22 API calls 97505->97637 97591 164a28 40 API calls 3 library calls 97506->97591 97509 182d90 97510 142f83 97510->97485 97511 142f8d 97510->97511 97592 164a28 40 API calls 3 library calls 97511->97592 97513 142f98 97514 142fdc 97513->97514 97593 143084 22 API calls 97513->97593 97514->97498 97515 142fe8 97514->97515 97515->97509 97595 1463eb 22 API calls 97515->97595 97518 142fbf 97520 14a8c7 22 API calls 97518->97520 97519 142ff8 97596 146a50 22 API calls 97519->97596 97522 142fcd 97520->97522 97594 143084 22 API calls 97522->97594 97523 143006 97597 1470b0 23 API calls 97523->97597 97528 143021 97529 143065 97528->97529 97598 146f88 22 API calls 97528->97598 97599 1470b0 23 API calls 97528->97599 97600 143084 22 API calls 97528->97600 97532 15fe0b 22 API calls 97531->97532 97533 14a976 97532->97533 97534 15fddb 22 API calls 97533->97534 97535 142e4d 97534->97535 97536 144ae3 97535->97536 97537 144af0 __wsopen_s 97536->97537 97538 146b57 22 API calls 97537->97538 97539 144b22 97537->97539 97538->97539 97544 144b58 97539->97544 97638 144c6d 97539->97638 97541 149cb3 22 API calls 97543 144c52 97541->97543 97542 149cb3 22 API calls 97542->97544 97545 14515f 22 API calls 97543->97545 97544->97542 97546 144c6d 22 API calls 97544->97546 97549 144c29 97544->97549 97641 14515f 97544->97641 97548 144c5e 97545->97548 97546->97544 97548->97456 97549->97541 97549->97548 97647 181f50 97550->97647 97553 149cb3 22 API calls 97554 143a8d 97553->97554 97649 143aa2 97554->97649 97556 143a97 97556->97458 97558 149cc2 _wcslen 97557->97558 97559 15fe0b 22 API calls 97558->97559 97560 149cea __fread_nolock 97559->97560 97561 15fddb 22 API calls 97560->97561 97562 142e8c 97561->97562 97563 144ecb 97562->97563 97669 144e90 LoadLibraryA 97563->97669 97568 144ef6 LoadLibraryExW 97677 144e59 LoadLibraryA 97568->97677 97569 183ccf 97571 144f39 68 API calls 97569->97571 97572 183cd6 97571->97572 97574 144e59 3 API calls 97572->97574 97576 183cde 97574->97576 97699 1450f5 97576->97699 97577 144f20 97577->97576 97578 144f2c 97577->97578 97580 144f39 68 API calls 97578->97580 97582 142ea5 97580->97582 97582->97463 97582->97464 97584 183d05 97585->97473 97586->97479 97587->97488 97588->97497 97589->97500 97590->97504 97591->97510 97592->97513 97593->97518 97594->97514 97595->97519 97596->97523 97597->97528 97598->97528 97599->97528 97600->97528 97602 1b2d15 97601->97602 97603 14511f 64 API calls 97602->97603 97604 1b2d29 97603->97604 97849 1b2e66 97604->97849 97607 1450f5 40 API calls 97608 1b2d56 97607->97608 97609 1450f5 40 API calls 97608->97609 97610 1b2d66 97609->97610 97611 1450f5 40 API calls 97610->97611 97612 1b2d81 97611->97612 97613 1450f5 40 API calls 97612->97613 97614 1b2d9c 97613->97614 97615 14511f 64 API calls 97614->97615 97616 1b2db3 97615->97616 97617 16ea0c ___std_exception_copy 21 API calls 97616->97617 97618 1b2dba 97617->97618 97619 16ea0c ___std_exception_copy 21 API calls 97618->97619 97620 1b2dc4 97619->97620 97621 1450f5 40 API calls 97620->97621 97622 1b2dd8 97621->97622 97623 1b28fe 27 API calls 97622->97623 97625 1b2dee 97623->97625 97624 1b2d3f 97624->97466 97625->97624 97855 1b22ce 79 API calls 97625->97855 97628 144f43 97627->97628 97630 144f4a 97627->97630 97856 16e678 97628->97856 97631 144f59 97630->97631 97632 144f6a FreeLibrary 97630->97632 97631->97468 97632->97631 97633->97480 97634->97485 97635->97490 97636->97498 97637->97509 97639 14aec9 22 API calls 97638->97639 97640 144c78 97639->97640 97640->97539 97642 14516e 97641->97642 97646 14518f __fread_nolock 97641->97646 97645 15fe0b 22 API calls 97642->97645 97643 15fddb 22 API calls 97644 1451a2 97643->97644 97644->97544 97645->97646 97646->97643 97648 143a67 GetModuleFileNameW 97647->97648 97648->97553 97650 181f50 __wsopen_s 97649->97650 97651 143aaf GetFullPathNameW 97650->97651 97652 143ace 97651->97652 97653 143ae9 97651->97653 97654 146b57 22 API calls 97652->97654 97663 14a6c3 97653->97663 97656 143ada 97654->97656 97659 1437a0 97656->97659 97660 1437ae 97659->97660 97661 1493b2 22 API calls 97660->97661 97662 1437c2 97661->97662 97662->97556 97664 14a6d0 97663->97664 97665 14a6dd 97663->97665 97664->97656 97666 15fddb 22 API calls 97665->97666 97667 14a6e7 97666->97667 97668 15fe0b 22 API calls 97667->97668 97668->97664 97670 144ec6 97669->97670 97671 144ea8 GetProcAddress 97669->97671 97674 16e5eb 97670->97674 97672 144eb8 97671->97672 97672->97670 97673 144ebf FreeLibrary 97672->97673 97673->97670 97707 16e52a 97674->97707 97676 144eea 97676->97568 97676->97569 97678 144e8d 97677->97678 97679 144e6e GetProcAddress 97677->97679 97682 144f80 97678->97682 97680 144e7e 97679->97680 97680->97678 97681 144e86 FreeLibrary 97680->97681 97681->97678 97683 15fe0b 22 API calls 97682->97683 97684 144f95 97683->97684 97775 145722 97684->97775 97686 144fa1 __fread_nolock 97687 1450a5 97686->97687 97688 183d1d 97686->97688 97698 144fdc 97686->97698 97778 1442a2 CreateStreamOnHGlobal 97687->97778 97789 1b304d 74 API calls 97688->97789 97691 183d22 97693 14511f 64 API calls 97691->97693 97692 1450f5 40 API calls 97692->97698 97694 183d45 97693->97694 97695 1450f5 40 API calls 97694->97695 97697 14506e messages 97695->97697 97697->97577 97698->97691 97698->97692 97698->97697 97784 14511f 97698->97784 97700 145107 97699->97700 97701 183d70 97699->97701 97811 16e8c4 97700->97811 97704 1b28fe 97832 1b274e 97704->97832 97706 1b2919 97706->97584 97710 16e536 CallCatchBlock 97707->97710 97708 16e544 97732 16f2d9 20 API calls _abort 97708->97732 97710->97708 97712 16e574 97710->97712 97711 16e549 97733 1727ec 26 API calls __wsopen_s 97711->97733 97714 16e586 97712->97714 97715 16e579 97712->97715 97724 178061 97714->97724 97734 16f2d9 20 API calls _abort 97715->97734 97718 16e58f 97719 16e595 97718->97719 97721 16e5a2 97718->97721 97735 16f2d9 20 API calls _abort 97719->97735 97736 16e5d4 LeaveCriticalSection __fread_nolock 97721->97736 97723 16e554 __wsopen_s 97723->97676 97725 17806d CallCatchBlock 97724->97725 97737 172f5e EnterCriticalSection 97725->97737 97727 17807b 97738 1780fb 97727->97738 97731 1780ac __wsopen_s 97731->97718 97732->97711 97733->97723 97734->97723 97735->97723 97736->97723 97737->97727 97745 17811e 97738->97745 97739 178088 97751 1780b7 97739->97751 97740 178177 97756 174c7d 97740->97756 97745->97739 97745->97740 97754 16918d EnterCriticalSection 97745->97754 97755 1691a1 LeaveCriticalSection 97745->97755 97746 178189 97746->97739 97769 173405 11 API calls 2 library calls 97746->97769 97749 1781a8 97770 16918d EnterCriticalSection 97749->97770 97774 172fa6 LeaveCriticalSection 97751->97774 97753 1780be 97753->97731 97754->97745 97755->97745 97761 174c8a _abort 97756->97761 97757 174cca 97772 16f2d9 20 API calls _abort 97757->97772 97758 174cb5 RtlAllocateHeap 97759 174cc8 97758->97759 97758->97761 97763 1729c8 97759->97763 97761->97757 97761->97758 97771 164ead 7 API calls 2 library calls 97761->97771 97764 1729d3 RtlFreeHeap 97763->97764 97765 1729fc _free 97763->97765 97764->97765 97766 1729e8 97764->97766 97765->97746 97773 16f2d9 20 API calls _abort 97766->97773 97768 1729ee GetLastError 97768->97765 97769->97749 97770->97739 97771->97761 97772->97759 97773->97768 97774->97753 97776 15fddb 22 API calls 97775->97776 97777 145734 97776->97777 97777->97686 97779 1442bc FindResourceExW 97778->97779 97783 1442d9 97778->97783 97780 1835ba LoadResource 97779->97780 97779->97783 97781 1835cf SizeofResource 97780->97781 97780->97783 97782 1835e3 LockResource 97781->97782 97781->97783 97782->97783 97783->97698 97785 183d90 97784->97785 97786 14512e 97784->97786 97790 16ece3 97786->97790 97789->97691 97793 16eaaa 97790->97793 97792 14513c 97792->97698 97794 16eab6 CallCatchBlock 97793->97794 97795 16eac2 97794->97795 97797 16eae8 97794->97797 97806 16f2d9 20 API calls _abort 97795->97806 97808 16918d EnterCriticalSection 97797->97808 97799 16eac7 97807 1727ec 26 API calls __wsopen_s 97799->97807 97800 16eaf4 97809 16ec0a 62 API calls 2 library calls 97800->97809 97803 16eb08 97810 16eb27 LeaveCriticalSection __fread_nolock 97803->97810 97805 16ead2 __wsopen_s 97805->97792 97806->97799 97807->97805 97808->97800 97809->97803 97810->97805 97814 16e8e1 97811->97814 97813 145118 97813->97704 97815 16e8ed CallCatchBlock 97814->97815 97816 16e900 ___scrt_fastfail 97815->97816 97817 16e92d 97815->97817 97818 16e925 __wsopen_s 97815->97818 97827 16f2d9 20 API calls _abort 97816->97827 97829 16918d EnterCriticalSection 97817->97829 97818->97813 97821 16e937 97830 16e6f8 38 API calls 4 library calls 97821->97830 97822 16e91a 97828 1727ec 26 API calls __wsopen_s 97822->97828 97825 16e94e 97831 16e96c LeaveCriticalSection __fread_nolock 97825->97831 97827->97822 97828->97818 97829->97821 97830->97825 97831->97818 97835 16e4e8 97832->97835 97834 1b275d 97834->97706 97838 16e469 97835->97838 97837 16e505 97837->97834 97839 16e478 97838->97839 97840 16e48c 97838->97840 97846 16f2d9 20 API calls _abort 97839->97846 97844 16e488 __alldvrm 97840->97844 97848 17333f 11 API calls 2 library calls 97840->97848 97843 16e47d 97847 1727ec 26 API calls __wsopen_s 97843->97847 97844->97837 97846->97843 97847->97844 97848->97844 97854 1b2e7a 97849->97854 97850 1450f5 40 API calls 97850->97854 97851 1b2d3b 97851->97607 97851->97624 97852 1b28fe 27 API calls 97852->97854 97853 14511f 64 API calls 97853->97854 97854->97850 97854->97851 97854->97852 97854->97853 97855->97624 97857 16e684 CallCatchBlock 97856->97857 97858 16e695 97857->97858 97859 16e6aa 97857->97859 97886 16f2d9 20 API calls _abort 97858->97886 97868 16e6a5 __wsopen_s 97859->97868 97869 16918d EnterCriticalSection 97859->97869 97861 16e69a 97887 1727ec 26 API calls __wsopen_s 97861->97887 97864 16e6c6 97870 16e602 97864->97870 97866 16e6d1 97888 16e6ee LeaveCriticalSection __fread_nolock 97866->97888 97868->97630 97869->97864 97871 16e624 97870->97871 97872 16e60f 97870->97872 97879 16e61f 97871->97879 97889 16dc0b 97871->97889 97921 16f2d9 20 API calls _abort 97872->97921 97874 16e614 97922 1727ec 26 API calls __wsopen_s 97874->97922 97879->97866 97882 16e646 97906 17862f 97882->97906 97885 1729c8 _free 20 API calls 97885->97879 97886->97861 97887->97868 97888->97868 97890 16dc1f 97889->97890 97891 16dc23 97889->97891 97895 174d7a 97890->97895 97891->97890 97892 16d955 __fread_nolock 26 API calls 97891->97892 97893 16dc43 97892->97893 97923 1759be 97893->97923 97896 16e640 97895->97896 97897 174d90 97895->97897 97899 16d955 97896->97899 97897->97896 97898 1729c8 _free 20 API calls 97897->97898 97898->97896 97900 16d976 97899->97900 97901 16d961 97899->97901 97900->97882 98055 16f2d9 20 API calls _abort 97901->98055 97903 16d966 98056 1727ec 26 API calls __wsopen_s 97903->98056 97905 16d971 97905->97882 97907 17863e 97906->97907 97912 178653 97906->97912 98060 16f2c6 20 API calls _abort 97907->98060 97909 17868e 98062 16f2c6 20 API calls _abort 97909->98062 97911 178643 98061 16f2d9 20 API calls _abort 97911->98061 97912->97909 97915 17867a 97912->97915 97913 178693 98063 16f2d9 20 API calls _abort 97913->98063 98057 178607 97915->98057 97918 16e64c 97918->97879 97918->97885 97919 17869b 98064 1727ec 26 API calls __wsopen_s 97919->98064 97921->97874 97922->97879 97924 1759ca CallCatchBlock 97923->97924 97925 1759d2 97924->97925 97926 1759ea 97924->97926 98002 16f2c6 20 API calls _abort 97925->98002 97927 175a88 97926->97927 97932 175a1f 97926->97932 98007 16f2c6 20 API calls _abort 97927->98007 97930 1759d7 98003 16f2d9 20 API calls _abort 97930->98003 97948 175147 EnterCriticalSection 97932->97948 97933 175a8d 98008 16f2d9 20 API calls _abort 97933->98008 97936 175a25 97938 175a56 97936->97938 97939 175a41 97936->97939 97937 175a95 98009 1727ec 26 API calls __wsopen_s 97937->98009 97949 175aa9 97938->97949 98004 16f2d9 20 API calls _abort 97939->98004 97942 1759df __wsopen_s 97942->97890 97944 175a46 98005 16f2c6 20 API calls _abort 97944->98005 97945 175a51 98006 175a80 LeaveCriticalSection __wsopen_s 97945->98006 97948->97936 97950 175ad7 97949->97950 97977 175ad0 97949->97977 97951 175adb 97950->97951 97952 175afa 97950->97952 98017 16f2c6 20 API calls _abort 97951->98017 97956 175b4b 97952->97956 97957 175b2e 97952->97957 97955 175ae0 98018 16f2d9 20 API calls _abort 97955->98018 97960 175b61 97956->97960 98023 179424 28 API calls __wsopen_s 97956->98023 98020 16f2c6 20 API calls _abort 97957->98020 97958 175cb1 97958->97945 98010 17564e 97960->98010 97962 175ae7 98019 1727ec 26 API calls __wsopen_s 97962->98019 97965 175b33 98021 16f2d9 20 API calls _abort 97965->98021 97969 175b6f 97975 175b95 97969->97975 97976 175b73 97969->97976 97970 175ba8 97973 175c02 WriteFile 97970->97973 97974 175bbc 97970->97974 97971 175b3b 98022 1727ec 26 API calls __wsopen_s 97971->98022 97978 175c25 GetLastError 97973->97978 97983 175b8b 97973->97983 97980 175bc4 97974->97980 97981 175bf2 97974->97981 98025 17542e 45 API calls 3 library calls 97975->98025 97982 175c69 97976->97982 98024 1755e1 GetLastError WriteConsoleW CreateFileW __wsopen_s 97976->98024 98034 160a8c 97977->98034 97978->97983 97984 175be2 97980->97984 97985 175bc9 97980->97985 98028 1756c4 7 API calls 2 library calls 97981->98028 97982->97977 98032 16f2d9 20 API calls _abort 97982->98032 97983->97977 97983->97982 97993 175c45 97983->97993 98027 175891 8 API calls 2 library calls 97984->98027 97985->97982 97989 175bd2 97985->97989 98026 1757a3 7 API calls 2 library calls 97989->98026 97991 175be0 97991->97983 97992 175c8e 98033 16f2c6 20 API calls _abort 97992->98033 97996 175c60 97993->97996 97997 175c4c 97993->97997 98031 16f2a3 20 API calls 2 library calls 97996->98031 98029 16f2d9 20 API calls _abort 97997->98029 98000 175c51 98030 16f2c6 20 API calls _abort 98000->98030 98002->97930 98003->97942 98004->97944 98005->97945 98006->97942 98007->97933 98008->97937 98009->97942 98041 17f89b 98010->98041 98012 17565e 98014 175663 98012->98014 98050 172d74 38 API calls 2 library calls 98012->98050 98014->97969 98014->97970 98015 175686 98015->98014 98016 1756a4 GetConsoleMode 98015->98016 98016->98014 98017->97955 98018->97962 98019->97977 98020->97965 98021->97971 98022->97977 98023->97960 98024->97983 98025->97983 98026->97991 98027->97991 98028->97991 98029->98000 98030->97977 98031->97977 98032->97992 98033->97977 98035 160a97 IsProcessorFeaturePresent 98034->98035 98036 160a95 98034->98036 98038 160c5d 98035->98038 98036->97958 98054 160c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 98038->98054 98040 160d40 98040->97958 98042 17f8b5 98041->98042 98043 17f8a8 98041->98043 98046 17f8c1 98042->98046 98052 16f2d9 20 API calls _abort 98042->98052 98051 16f2d9 20 API calls _abort 98043->98051 98045 17f8ad 98045->98012 98046->98012 98048 17f8e2 98053 1727ec 26 API calls __wsopen_s 98048->98053 98050->98015 98051->98045 98052->98048 98053->98045 98054->98040 98055->97903 98056->97905 98065 178585 98057->98065 98059 17862b 98059->97918 98060->97911 98061->97918 98062->97913 98063->97919 98064->97918 98066 178591 CallCatchBlock 98065->98066 98076 175147 EnterCriticalSection 98066->98076 98068 17859f 98069 1785c6 98068->98069 98070 1785d1 98068->98070 98077 1786ae 98069->98077 98092 16f2d9 20 API calls _abort 98070->98092 98073 1785cc 98093 1785fb LeaveCriticalSection __wsopen_s 98073->98093 98075 1785ee __wsopen_s 98075->98059 98076->98068 98094 1753c4 98077->98094 98079 1786c4 98107 175333 21 API calls 3 library calls 98079->98107 98081 1786be 98081->98079 98084 1753c4 __wsopen_s 26 API calls 98081->98084 98091 1786f6 98081->98091 98082 1753c4 __wsopen_s 26 API calls 98085 178702 CloseHandle 98082->98085 98083 17871c 98089 17873e 98083->98089 98108 16f2a3 20 API calls 2 library calls 98083->98108 98086 1786ed 98084->98086 98085->98079 98087 17870e GetLastError 98085->98087 98090 1753c4 __wsopen_s 26 API calls 98086->98090 98087->98079 98089->98073 98090->98091 98091->98079 98091->98082 98092->98073 98093->98075 98095 1753e6 98094->98095 98096 1753d1 98094->98096 98100 17540b 98095->98100 98111 16f2c6 20 API calls _abort 98095->98111 98109 16f2c6 20 API calls _abort 98096->98109 98099 1753d6 98110 16f2d9 20 API calls _abort 98099->98110 98100->98081 98101 175416 98112 16f2d9 20 API calls _abort 98101->98112 98104 17541e 98113 1727ec 26 API calls __wsopen_s 98104->98113 98105 1753de 98105->98081 98107->98083 98108->98089 98109->98099 98110->98105 98111->98101 98112->98104 98113->98105 98114 141033 98119 144c91 98114->98119 98118 141042 98120 14a961 22 API calls 98119->98120 98121 144cff 98120->98121 98127 143af0 98121->98127 98123 144d9c 98124 141038 98123->98124 98130 1451f7 22 API calls __fread_nolock 98123->98130 98126 1600a3 29 API calls __onexit 98124->98126 98126->98118 98131 143b1c 98127->98131 98130->98123 98132 143b0f 98131->98132 98133 143b29 98131->98133 98132->98123 98133->98132 98134 143b30 RegOpenKeyExW 98133->98134 98134->98132 98135 143b4a RegQueryValueExW 98134->98135 98136 143b80 RegCloseKey 98135->98136 98137 143b6b 98135->98137 98136->98132 98137->98136 98138 14f7bf 98139 14fcb6 98138->98139 98140 14f7d3 98138->98140 98230 14aceb 23 API calls messages 98139->98230 98142 14fcc2 98140->98142 98143 15fddb 22 API calls 98140->98143 98231 14aceb 23 API calls messages 98142->98231 98145 14f7e5 98143->98145 98145->98142 98146 14f83e 98145->98146 98147 14fd3d 98145->98147 98171 14ed9d messages 98146->98171 98173 151310 98146->98173 98232 1b1155 22 API calls 98147->98232 98150 15fddb 22 API calls 98170 14ec76 messages 98150->98170 98151 14fef7 98157 14a8c7 22 API calls 98151->98157 98151->98171 98154 194600 98160 14a8c7 22 API calls 98154->98160 98154->98171 98155 194b0b 98234 1b359c 82 API calls __wsopen_s 98155->98234 98156 14a8c7 22 API calls 98156->98170 98157->98171 98160->98171 98162 160242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 98162->98170 98163 14fbe3 98165 194bdc 98163->98165 98163->98171 98172 14f3ae messages 98163->98172 98164 14a961 22 API calls 98164->98170 98235 1b359c 82 API calls __wsopen_s 98165->98235 98167 194beb 98236 1b359c 82 API calls __wsopen_s 98167->98236 98168 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 98168->98170 98169 1600a3 29 API calls pre_c_initialization 98169->98170 98170->98150 98170->98151 98170->98154 98170->98155 98170->98156 98170->98162 98170->98163 98170->98164 98170->98167 98170->98168 98170->98169 98170->98171 98170->98172 98228 1501e0 235 API calls 2 library calls 98170->98228 98229 1506a0 41 API calls messages 98170->98229 98172->98171 98233 1b359c 82 API calls __wsopen_s 98172->98233 98174 151376 98173->98174 98175 1517b0 98173->98175 98177 196331 98174->98177 98237 151940 98174->98237 98374 160242 5 API calls __Init_thread_wait 98175->98374 98379 1c709c 235 API calls 98177->98379 98178 1517ba 98181 1517fb 98178->98181 98184 149cb3 22 API calls 98178->98184 98187 196346 98181->98187 98189 15182c 98181->98189 98182 19633d 98182->98170 98193 1517d4 98184->98193 98185 151940 9 API calls 98186 1513b6 98185->98186 98186->98181 98188 1513ec 98186->98188 98380 1b359c 82 API calls __wsopen_s 98187->98380 98188->98187 98212 151408 __fread_nolock 98188->98212 98376 14aceb 23 API calls messages 98189->98376 98192 151839 98377 15d217 235 API calls 98192->98377 98375 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98193->98375 98196 19636e 98381 1b359c 82 API calls __wsopen_s 98196->98381 98197 15152f 98199 1963d1 98197->98199 98200 15153c 98197->98200 98383 1c5745 54 API calls _wcslen 98199->98383 98202 151940 9 API calls 98200->98202 98204 151549 98202->98204 98203 15fddb 22 API calls 98203->98212 98209 151940 9 API calls 98204->98209 98219 1515c7 messages 98204->98219 98205 151872 98205->98177 98378 15faeb 23 API calls 98205->98378 98206 15fe0b 22 API calls 98206->98212 98207 15171d 98207->98170 98213 151563 98209->98213 98212->98192 98212->98196 98212->98197 98212->98203 98212->98206 98214 1963b2 98212->98214 98212->98219 98247 14ec40 98212->98247 98213->98219 98220 14a8c7 22 API calls 98213->98220 98382 1b359c 82 API calls __wsopen_s 98214->98382 98216 151940 9 API calls 98216->98219 98218 15167b messages 98218->98207 98373 15ce17 22 API calls messages 98218->98373 98219->98205 98219->98216 98219->98218 98226 144f39 68 API calls 98219->98226 98271 1c958b 98219->98271 98274 1c959f 98219->98274 98277 1bf0ec 98219->98277 98286 1ad4ce 98219->98286 98289 1b6ef1 98219->98289 98369 1b1e96 98219->98369 98384 1b359c 82 API calls __wsopen_s 98219->98384 98220->98219 98226->98219 98228->98170 98229->98170 98230->98142 98231->98147 98232->98171 98233->98171 98234->98171 98235->98167 98236->98171 98238 151981 98237->98238 98245 15195d 98237->98245 98385 160242 5 API calls __Init_thread_wait 98238->98385 98240 1513a0 98240->98185 98241 15198b 98241->98245 98386 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98241->98386 98243 158727 98243->98240 98388 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98243->98388 98245->98240 98387 160242 5 API calls __Init_thread_wait 98245->98387 98254 14ec76 messages 98247->98254 98248 15fddb 22 API calls 98248->98254 98249 1600a3 29 API calls pre_c_initialization 98249->98254 98250 194beb 98394 1b359c 82 API calls __wsopen_s 98250->98394 98251 14fef7 98258 14a8c7 22 API calls 98251->98258 98264 14ed9d messages 98251->98264 98254->98248 98254->98249 98254->98250 98254->98251 98255 194600 98254->98255 98256 194b0b 98254->98256 98257 14a8c7 22 API calls 98254->98257 98261 160242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 98254->98261 98254->98264 98265 14fbe3 98254->98265 98266 14a961 22 API calls 98254->98266 98269 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 98254->98269 98270 14f3ae messages 98254->98270 98389 1501e0 235 API calls 2 library calls 98254->98389 98390 1506a0 41 API calls messages 98254->98390 98262 14a8c7 22 API calls 98255->98262 98255->98264 98392 1b359c 82 API calls __wsopen_s 98256->98392 98257->98254 98258->98264 98261->98254 98262->98264 98264->98212 98265->98264 98267 194bdc 98265->98267 98265->98270 98266->98254 98393 1b359c 82 API calls __wsopen_s 98267->98393 98269->98254 98270->98264 98391 1b359c 82 API calls __wsopen_s 98270->98391 98395 1c7f59 98271->98395 98273 1c959b 98273->98219 98275 1c7f59 120 API calls 98274->98275 98276 1c95af 98275->98276 98276->98219 98278 147510 53 API calls 98277->98278 98279 1bf126 98278->98279 98528 149e90 98279->98528 98281 1bf136 98282 1bf15b 98281->98282 98283 14ec40 235 API calls 98281->98283 98285 1bf15f 98282->98285 98556 149c6e 22 API calls 98282->98556 98283->98282 98285->98219 98572 1adbbe lstrlenW 98286->98572 98290 14a961 22 API calls 98289->98290 98291 1b6f1d 98290->98291 98292 14a961 22 API calls 98291->98292 98293 1b6f26 98292->98293 98294 1b6f3a 98293->98294 98728 14b567 39 API calls 98293->98728 98296 147510 53 API calls 98294->98296 98303 1b6f57 _wcslen 98296->98303 98297 1b70bf 98300 144ecb 94 API calls 98297->98300 98298 1b6fbc 98299 147510 53 API calls 98298->98299 98301 1b6fc8 98299->98301 98302 1b70d0 98300->98302 98306 14a8c7 22 API calls 98301->98306 98310 1b6fdb 98301->98310 98304 1b70e5 98302->98304 98307 144ecb 94 API calls 98302->98307 98303->98297 98303->98298 98368 1b70e9 98303->98368 98305 14a961 22 API calls 98304->98305 98304->98368 98308 1b711a 98305->98308 98306->98310 98307->98304 98309 14a961 22 API calls 98308->98309 98313 1b7126 98309->98313 98311 1b7027 98310->98311 98314 1b7005 98310->98314 98317 14a8c7 22 API calls 98310->98317 98312 147510 53 API calls 98311->98312 98315 1b7034 98312->98315 98316 14a961 22 API calls 98313->98316 98318 1433c6 22 API calls 98314->98318 98319 1b703d 98315->98319 98320 1b7047 98315->98320 98321 1b712f 98316->98321 98317->98314 98322 1b700f 98318->98322 98323 14a8c7 22 API calls 98319->98323 98729 1ae199 GetFileAttributesW 98320->98729 98325 14a961 22 API calls 98321->98325 98326 147510 53 API calls 98322->98326 98323->98320 98329 1b7138 98325->98329 98327 1b701b 98326->98327 98330 146350 22 API calls 98327->98330 98328 1b7050 98331 1b7063 98328->98331 98334 144c6d 22 API calls 98328->98334 98332 147510 53 API calls 98329->98332 98330->98311 98333 147510 53 API calls 98331->98333 98340 1b7069 98331->98340 98335 1b7145 98332->98335 98336 1b70a0 98333->98336 98334->98331 98577 14525f 98335->98577 98730 1ad076 57 API calls 98336->98730 98339 1b7166 98341 144c6d 22 API calls 98339->98341 98340->98368 98342 1b7175 98341->98342 98343 1b71a9 98342->98343 98344 144c6d 22 API calls 98342->98344 98345 14a8c7 22 API calls 98343->98345 98346 1b7186 98344->98346 98347 1b71ba 98345->98347 98346->98343 98349 146b57 22 API calls 98346->98349 98348 146350 22 API calls 98347->98348 98350 1b71c8 98348->98350 98351 1b719b 98349->98351 98352 146350 22 API calls 98350->98352 98353 146b57 22 API calls 98351->98353 98354 1b71d6 98352->98354 98353->98343 98355 146350 22 API calls 98354->98355 98356 1b71e4 98355->98356 98357 147510 53 API calls 98356->98357 98358 1b71f0 98357->98358 98619 1ad7bc 98358->98619 98360 1b7201 98361 1ad4ce 4 API calls 98360->98361 98362 1b720b 98361->98362 98363 147510 53 API calls 98362->98363 98367 1b7239 98362->98367 98364 1b7229 98363->98364 98673 1b2947 98364->98673 98366 144f39 68 API calls 98366->98368 98367->98366 98368->98219 98370 1b1e9f 98369->98370 98372 1b1ea4 98369->98372 98796 1b0f67 98370->98796 98372->98219 98373->98218 98374->98178 98375->98181 98376->98192 98377->98205 98378->98205 98379->98182 98380->98219 98381->98219 98382->98219 98383->98213 98384->98219 98385->98241 98386->98245 98387->98243 98388->98240 98389->98254 98390->98254 98391->98264 98392->98264 98393->98250 98394->98264 98433 147510 98395->98433 98399 1c8281 98400 1c844f 98399->98400 98406 1c828f 98399->98406 98497 1c8ee4 60 API calls 98400->98497 98403 1c845e 98405 1c846a 98403->98405 98403->98406 98404 147510 53 API calls 98423 1c8049 98404->98423 98421 1c7fd5 messages 98405->98421 98469 1c7e86 98406->98469 98411 1c82c8 98484 15fc70 98411->98484 98414 1c82e8 98490 1b359c 82 API calls __wsopen_s 98414->98490 98415 1c8302 98491 1463eb 22 API calls 98415->98491 98418 1c82f3 GetCurrentProcess TerminateProcess 98418->98415 98419 1c8311 98492 146a50 22 API calls 98419->98492 98421->98273 98422 1c832a 98431 1c8352 98422->98431 98493 1504f0 22 API calls 98422->98493 98423->98399 98423->98404 98423->98421 98488 1a417d 22 API calls __fread_nolock 98423->98488 98489 1c851d 42 API calls _strftime 98423->98489 98424 1c84c5 98424->98421 98429 1c84d9 FreeLibrary 98424->98429 98426 1c8341 98494 1c8b7b 75 API calls 98426->98494 98429->98421 98431->98424 98495 1504f0 22 API calls 98431->98495 98496 14aceb 23 API calls messages 98431->98496 98498 1c8b7b 75 API calls 98431->98498 98434 147525 98433->98434 98435 147522 98433->98435 98436 14752d 98434->98436 98437 14755b 98434->98437 98435->98421 98456 1c8cd3 98435->98456 98499 1651c6 26 API calls 98436->98499 98439 1850f6 98437->98439 98442 14756d 98437->98442 98447 18500f 98437->98447 98502 165183 26 API calls 98439->98502 98440 14753d 98446 15fddb 22 API calls 98440->98446 98500 15fb21 51 API calls 98442->98500 98443 18510e 98443->98443 98448 147547 98446->98448 98450 15fe0b 22 API calls 98447->98450 98455 185088 98447->98455 98449 149cb3 22 API calls 98448->98449 98449->98435 98451 185058 98450->98451 98452 15fddb 22 API calls 98451->98452 98453 18507f 98452->98453 98454 149cb3 22 API calls 98453->98454 98454->98455 98501 15fb21 51 API calls 98455->98501 98457 14aec9 22 API calls 98456->98457 98458 1c8cee CharLowerBuffW 98457->98458 98503 1a8e54 98458->98503 98462 14a961 22 API calls 98463 1c8d2a 98462->98463 98510 146d25 98463->98510 98465 1c8d3e 98466 1493b2 22 API calls 98465->98466 98468 1c8d48 _wcslen 98466->98468 98467 1c8e5e _wcslen 98467->98423 98468->98467 98523 1c851d 42 API calls _strftime 98468->98523 98470 1c7ea1 98469->98470 98474 1c7eec 98469->98474 98471 15fe0b 22 API calls 98470->98471 98472 1c7ec3 98471->98472 98473 15fddb 22 API calls 98472->98473 98472->98474 98473->98472 98475 1c9096 98474->98475 98476 1c92ab messages 98475->98476 98482 1c90ba _strcat _wcslen 98475->98482 98476->98411 98477 14b567 39 API calls 98477->98482 98478 14b38f 39 API calls 98478->98482 98479 14b6b5 39 API calls 98479->98482 98480 147510 53 API calls 98480->98482 98481 16ea0c 21 API calls ___std_exception_copy 98481->98482 98482->98476 98482->98477 98482->98478 98482->98479 98482->98480 98482->98481 98527 1aefae 24 API calls _wcslen 98482->98527 98485 15fc85 98484->98485 98486 15fd1d VirtualProtect 98485->98486 98487 15fceb 98485->98487 98486->98487 98487->98414 98487->98415 98488->98423 98489->98423 98490->98418 98491->98419 98492->98422 98493->98426 98494->98431 98495->98431 98496->98431 98497->98403 98498->98431 98499->98440 98500->98440 98501->98439 98502->98443 98504 1a8e74 _wcslen 98503->98504 98505 1a8f63 98504->98505 98507 1a8ea9 98504->98507 98509 1a8f68 98504->98509 98505->98462 98505->98468 98507->98505 98524 15ce60 41 API calls 98507->98524 98509->98505 98525 15ce60 41 API calls 98509->98525 98511 146d34 98510->98511 98512 146d91 98510->98512 98511->98512 98513 146d3f 98511->98513 98514 1493b2 22 API calls 98512->98514 98516 184c9d 98513->98516 98517 146d5a 98513->98517 98515 146d62 __fread_nolock 98514->98515 98515->98465 98519 15fddb 22 API calls 98516->98519 98526 146f34 22 API calls 98517->98526 98520 184ca7 98519->98520 98521 15fe0b 22 API calls 98520->98521 98522 184cda 98521->98522 98523->98467 98524->98507 98525->98509 98526->98515 98527->98482 98529 146270 22 API calls 98528->98529 98535 149eb5 98529->98535 98530 149fd2 98558 14a4a1 98530->98558 98532 149fec 98532->98281 98535->98530 98536 14a12c __fread_nolock 98535->98536 98537 18f7c4 98535->98537 98539 18f699 98535->98539 98540 14a405 98535->98540 98543 14a6c3 22 API calls 98535->98543 98551 14a587 22 API calls 98535->98551 98552 14aec9 22 API calls 98535->98552 98555 14a4a1 22 API calls 98535->98555 98557 144573 41 API calls _wcslen 98535->98557 98567 1448c8 23 API calls 98535->98567 98568 1449bd 22 API calls __fread_nolock 98535->98568 98569 14a673 22 API calls 98535->98569 98536->98537 98536->98540 98570 1a96e2 84 API calls __wsopen_s 98537->98570 98544 15fddb 22 API calls 98539->98544 98540->98532 98571 1a96e2 84 API calls __wsopen_s 98540->98571 98543->98535 98546 18f754 98544->98546 98545 18f7d2 98547 14a4a1 22 API calls 98545->98547 98549 15fe0b 22 API calls 98546->98549 98548 18f7e8 98547->98548 98548->98532 98549->98536 98551->98535 98553 14a0db CharUpperBuffW 98552->98553 98566 14a673 22 API calls 98553->98566 98555->98535 98556->98285 98557->98535 98559 14a4b1 __fread_nolock 98558->98559 98560 14a52b 98558->98560 98561 15fddb 22 API calls 98559->98561 98563 15fe0b 22 API calls 98560->98563 98562 14a4b8 98561->98562 98564 15fddb 22 API calls 98562->98564 98565 14a4d6 98562->98565 98563->98559 98564->98565 98565->98532 98566->98535 98567->98535 98568->98535 98569->98535 98570->98545 98571->98532 98573 1adbdc GetFileAttributesW 98572->98573 98574 1ad4d5 98572->98574 98573->98574 98575 1adbe8 FindFirstFileW 98573->98575 98574->98219 98575->98574 98576 1adbf9 FindClose 98575->98576 98576->98574 98578 14a961 22 API calls 98577->98578 98579 145275 98578->98579 98580 14a961 22 API calls 98579->98580 98581 14527d 98580->98581 98582 14a961 22 API calls 98581->98582 98583 145285 98582->98583 98584 14a961 22 API calls 98583->98584 98585 14528d 98584->98585 98586 1452c1 98585->98586 98587 183df5 98585->98587 98589 146d25 22 API calls 98586->98589 98588 14a8c7 22 API calls 98587->98588 98590 183dfe 98588->98590 98591 1452cf 98589->98591 98592 14a6c3 22 API calls 98590->98592 98593 1493b2 22 API calls 98591->98593 98596 145304 98592->98596 98594 1452d9 98593->98594 98594->98596 98597 146d25 22 API calls 98594->98597 98595 145349 98599 146d25 22 API calls 98595->98599 98596->98595 98598 145325 98596->98598 98614 183e20 98596->98614 98600 1452fa 98597->98600 98598->98595 98603 144c6d 22 API calls 98598->98603 98601 14535a 98599->98601 98602 1493b2 22 API calls 98600->98602 98604 145370 98601->98604 98608 14a8c7 22 API calls 98601->98608 98602->98596 98606 145332 98603->98606 98605 145384 98604->98605 98610 14a8c7 22 API calls 98604->98610 98609 14538f 98605->98609 98612 14a8c7 22 API calls 98605->98612 98606->98595 98611 146d25 22 API calls 98606->98611 98607 146b57 22 API calls 98616 183ee0 98607->98616 98608->98604 98613 14a8c7 22 API calls 98609->98613 98617 14539a 98609->98617 98610->98605 98611->98595 98612->98609 98613->98617 98614->98607 98615 144c6d 22 API calls 98615->98616 98616->98595 98616->98615 98731 1449bd 22 API calls __fread_nolock 98616->98731 98617->98339 98620 1ad7d8 98619->98620 98621 1ad7dd 98620->98621 98622 1ad7f3 98620->98622 98625 14a8c7 22 API calls 98621->98625 98672 1ad7ee 98621->98672 98623 14a961 22 API calls 98622->98623 98624 1ad7fb 98623->98624 98626 14a961 22 API calls 98624->98626 98625->98672 98627 1ad803 98626->98627 98628 14a961 22 API calls 98627->98628 98629 1ad80e 98628->98629 98630 14a961 22 API calls 98629->98630 98631 1ad816 98630->98631 98632 14a961 22 API calls 98631->98632 98633 1ad81e 98632->98633 98634 14a961 22 API calls 98633->98634 98635 1ad826 98634->98635 98636 14a961 22 API calls 98635->98636 98637 1ad82e 98636->98637 98638 14a961 22 API calls 98637->98638 98639 1ad836 98638->98639 98640 14525f 22 API calls 98639->98640 98641 1ad84d 98640->98641 98642 14525f 22 API calls 98641->98642 98643 1ad866 98642->98643 98644 144c6d 22 API calls 98643->98644 98645 1ad872 98644->98645 98646 1ad885 98645->98646 98647 1493b2 22 API calls 98645->98647 98648 144c6d 22 API calls 98646->98648 98647->98646 98649 1ad88e 98648->98649 98650 1ad89e 98649->98650 98651 1493b2 22 API calls 98649->98651 98652 1ad8b0 98650->98652 98653 14a8c7 22 API calls 98650->98653 98651->98650 98654 146350 22 API calls 98652->98654 98653->98652 98655 1ad8bb 98654->98655 98732 1ad978 22 API calls 98655->98732 98657 1ad8ca 98733 1ad978 22 API calls 98657->98733 98659 1ad8dd 98660 144c6d 22 API calls 98659->98660 98661 1ad8e7 98660->98661 98662 1ad8fe 98661->98662 98663 1ad8ec 98661->98663 98665 144c6d 22 API calls 98662->98665 98664 1433c6 22 API calls 98663->98664 98666 1ad8f9 98664->98666 98667 1ad907 98665->98667 98670 146350 22 API calls 98666->98670 98668 1ad925 98667->98668 98669 1433c6 22 API calls 98667->98669 98671 146350 22 API calls 98668->98671 98669->98666 98670->98668 98671->98672 98672->98360 98674 1b2954 __wsopen_s 98673->98674 98675 15fe0b 22 API calls 98674->98675 98676 1b2971 98675->98676 98677 145722 22 API calls 98676->98677 98678 1b297b 98677->98678 98679 1b274e 27 API calls 98678->98679 98680 1b2986 98679->98680 98681 14511f 64 API calls 98680->98681 98682 1b299b 98681->98682 98683 1b29bf 98682->98683 98684 1b2a6c 98682->98684 98685 1b2e66 75 API calls 98683->98685 98686 1b2e66 75 API calls 98684->98686 98687 1b29c4 98685->98687 98701 1b2a38 98686->98701 98691 1b2a75 messages 98687->98691 98747 16d583 26 API calls 98687->98747 98689 1450f5 40 API calls 98690 1b2a91 98689->98690 98692 1450f5 40 API calls 98690->98692 98691->98367 98694 1b2aa1 98692->98694 98693 1b29ed 98748 16d583 26 API calls 98693->98748 98695 1450f5 40 API calls 98694->98695 98697 1b2abc 98695->98697 98698 1450f5 40 API calls 98697->98698 98699 1b2acc 98698->98699 98700 1450f5 40 API calls 98699->98700 98702 1b2ae7 98700->98702 98701->98689 98701->98691 98703 1450f5 40 API calls 98702->98703 98704 1b2af7 98703->98704 98705 1450f5 40 API calls 98704->98705 98706 1b2b07 98705->98706 98707 1450f5 40 API calls 98706->98707 98708 1b2b17 98707->98708 98734 1b3017 GetTempPathW GetTempFileNameW 98708->98734 98710 1b2b22 98711 16e5eb 29 API calls 98710->98711 98722 1b2b33 98711->98722 98712 1b2bed 98713 16e678 67 API calls 98712->98713 98714 1b2bf8 98713->98714 98716 1b2bfe DeleteFileW 98714->98716 98717 1b2c12 98714->98717 98715 1450f5 40 API calls 98715->98722 98716->98691 98718 1b2c91 CopyFileW 98717->98718 98724 1b2c18 98717->98724 98719 1b2cb9 DeleteFileW 98718->98719 98720 1b2ca7 DeleteFileW 98718->98720 98744 1b2fd8 CreateFileW 98719->98744 98720->98691 98722->98691 98722->98712 98722->98715 98735 16dbb3 98722->98735 98749 1b22ce 79 API calls 98724->98749 98726 1b2c7c 98726->98719 98727 1b2c80 DeleteFileW 98726->98727 98727->98691 98728->98294 98729->98328 98730->98340 98731->98616 98732->98657 98733->98659 98734->98710 98736 16dbc1 98735->98736 98737 16dbdd 98735->98737 98736->98737 98738 16dbe3 98736->98738 98739 16dbcd 98736->98739 98737->98722 98750 16d9cc 98738->98750 98753 16f2d9 20 API calls _abort 98739->98753 98742 16dbd2 98754 1727ec 26 API calls __wsopen_s 98742->98754 98745 1b2fff SetFileTime CloseHandle 98744->98745 98746 1b3013 98744->98746 98745->98746 98746->98691 98747->98693 98748->98701 98749->98726 98755 16d97b 98750->98755 98752 16d9f0 98752->98737 98753->98742 98754->98737 98756 16d987 CallCatchBlock 98755->98756 98763 16918d EnterCriticalSection 98756->98763 98758 16d995 98764 16d9f4 98758->98764 98762 16d9b3 __wsopen_s 98762->98752 98763->98758 98772 1749a1 98764->98772 98770 16d9a2 98771 16d9c0 LeaveCriticalSection __fread_nolock 98770->98771 98771->98762 98773 16d955 __fread_nolock 26 API calls 98772->98773 98774 1749b0 98773->98774 98775 17f89b __fread_nolock 26 API calls 98774->98775 98776 1749b6 98775->98776 98780 16da09 98776->98780 98793 173820 21 API calls 2 library calls 98776->98793 98778 174a15 98779 1729c8 _free 20 API calls 98778->98779 98779->98780 98781 16da3a 98780->98781 98782 16da4c 98781->98782 98787 16da24 98781->98787 98783 16da5a 98782->98783 98782->98787 98791 16da85 __fread_nolock 98782->98791 98794 16f2d9 20 API calls _abort 98783->98794 98785 16da5f 98795 1727ec 26 API calls __wsopen_s 98785->98795 98792 174a56 62 API calls 98787->98792 98788 16dc0b 62 API calls 98788->98791 98789 16d955 __fread_nolock 26 API calls 98789->98791 98790 1759be __wsopen_s 62 API calls 98790->98791 98791->98787 98791->98788 98791->98789 98791->98790 98792->98770 98793->98778 98794->98785 98795->98787 98797 1b0f7e 98796->98797 98812 1b1097 98796->98812 98798 1b0f9e 98797->98798 98799 1b0fcb 98797->98799 98801 1b0fe2 98797->98801 98798->98799 98803 1b0fb2 98798->98803 98800 15fe0b 22 API calls 98799->98800 98805 1b0fc0 __fread_nolock 98800->98805 98802 15fe0b 22 API calls 98801->98802 98813 1b0fff 98801->98813 98802->98813 98806 15fe0b 22 API calls 98803->98806 98804 1b1026 98807 15fe0b 22 API calls 98804->98807 98808 15fddb 22 API calls 98805->98808 98806->98805 98809 1b102c 98807->98809 98808->98812 98815 15f1d8 22 API calls 98809->98815 98811 1b1038 98816 15f6c9 24 API calls 98811->98816 98812->98372 98813->98803 98813->98804 98813->98805 98815->98811 98816->98805 98817 141098 98822 1442de 98817->98822 98821 1410a7 98823 14a961 22 API calls 98822->98823 98824 1442f5 GetVersionExW 98823->98824 98825 146b57 22 API calls 98824->98825 98826 144342 98825->98826 98827 1493b2 22 API calls 98826->98827 98831 144378 98826->98831 98828 14436c 98827->98828 98830 1437a0 22 API calls 98828->98830 98829 14441b GetCurrentProcess IsWow64Process 98832 144437 98829->98832 98830->98831 98831->98829 98837 1837df 98831->98837 98833 14444f LoadLibraryA 98832->98833 98834 183824 GetSystemInfo 98832->98834 98835 144460 GetProcAddress 98833->98835 98836 14449c GetSystemInfo 98833->98836 98835->98836 98838 144470 GetNativeSystemInfo 98835->98838 98839 144476 98836->98839 98838->98839 98840 14109d 98839->98840 98841 14447a FreeLibrary 98839->98841 98842 1600a3 29 API calls __onexit 98840->98842 98841->98840 98842->98821 98843 193f75 98854 15ceb1 98843->98854 98845 193f8b 98847 194006 98845->98847 98921 15e300 23 API calls 98845->98921 98863 14bf40 98847->98863 98850 194052 98851 194a88 98850->98851 98923 1b359c 82 API calls __wsopen_s 98850->98923 98852 193fe6 98852->98850 98922 1b1abf 22 API calls 98852->98922 98855 15ced2 98854->98855 98856 15cebf 98854->98856 98858 15cf05 98855->98858 98859 15ced7 98855->98859 98924 14aceb 23 API calls messages 98856->98924 98925 14aceb 23 API calls messages 98858->98925 98860 15fddb 22 API calls 98859->98860 98862 15cec9 98860->98862 98862->98845 98926 14adf0 98863->98926 98865 14bf9d 98866 14bfa9 98865->98866 98867 1904b6 98865->98867 98869 1904c6 98866->98869 98870 14c01e 98866->98870 98945 1b359c 82 API calls __wsopen_s 98867->98945 98946 1b359c 82 API calls __wsopen_s 98869->98946 98931 14ac91 98870->98931 98873 1904f5 98874 19055a 98873->98874 98947 15d217 235 API calls 98873->98947 98907 14c603 98874->98907 98948 1b359c 82 API calls __wsopen_s 98874->98948 98876 14c7da 98881 15fe0b 22 API calls 98876->98881 98877 1a7120 22 API calls 98880 14c039 __fread_nolock messages 98877->98880 98880->98873 98880->98874 98880->98876 98880->98877 98885 14af8a 22 API calls 98880->98885 98887 19091a 98880->98887 98889 14c808 __fread_nolock 98880->98889 98891 14ec40 235 API calls 98880->98891 98892 1908a5 98880->98892 98896 190591 98880->98896 98897 1908f6 98880->98897 98901 14bbe0 40 API calls 98880->98901 98904 14c237 98880->98904 98880->98907 98908 15fddb 22 API calls 98880->98908 98915 1909bf 98880->98915 98919 15fe0b 22 API calls 98880->98919 98935 14ad81 98880->98935 98950 1a7099 22 API calls __fread_nolock 98880->98950 98951 1c5745 54 API calls _wcslen 98880->98951 98952 15aa42 22 API calls messages 98880->98952 98953 1af05c 40 API calls 98880->98953 98954 14a993 41 API calls 98880->98954 98955 14aceb 23 API calls messages 98880->98955 98881->98889 98885->98880 98886 15fe0b 22 API calls 98918 14c350 __fread_nolock messages 98886->98918 98958 1b3209 23 API calls 98887->98958 98889->98886 98891->98880 98893 14ec40 235 API calls 98892->98893 98895 1908cf 98893->98895 98895->98907 98956 14a81b 41 API calls 98895->98956 98949 1b359c 82 API calls __wsopen_s 98896->98949 98957 1b359c 82 API calls __wsopen_s 98897->98957 98901->98880 98905 14c253 98904->98905 98906 14a8c7 22 API calls 98904->98906 98909 190976 98905->98909 98912 14c297 messages 98905->98912 98906->98905 98907->98850 98908->98880 98959 14aceb 23 API calls messages 98909->98959 98912->98915 98942 14aceb 23 API calls messages 98912->98942 98914 14c335 98914->98915 98916 14c342 98914->98916 98915->98907 98960 1b359c 82 API calls __wsopen_s 98915->98960 98943 14a704 22 API calls messages 98916->98943 98920 14c3ac 98918->98920 98944 15ce17 22 API calls messages 98918->98944 98919->98880 98920->98850 98921->98852 98922->98847 98923->98851 98924->98862 98925->98862 98927 14ae01 98926->98927 98930 14ae1c messages 98926->98930 98928 14aec9 22 API calls 98927->98928 98929 14ae09 CharUpperBuffW 98928->98929 98929->98930 98930->98865 98932 14acae 98931->98932 98933 14acd1 98932->98933 98961 1b359c 82 API calls __wsopen_s 98932->98961 98933->98880 98936 18fadb 98935->98936 98937 14ad92 98935->98937 98938 15fddb 22 API calls 98937->98938 98939 14ad99 98938->98939 98962 14adcd 98939->98962 98942->98914 98943->98918 98944->98918 98945->98869 98946->98907 98947->98874 98948->98907 98949->98907 98950->98880 98951->98880 98952->98880 98953->98880 98954->98880 98955->98880 98956->98897 98957->98907 98958->98904 98959->98915 98960->98907 98961->98933 98966 14addd 98962->98966 98963 14adb6 98963->98880 98964 15fddb 22 API calls 98964->98966 98965 14a961 22 API calls 98965->98966 98966->98963 98966->98964 98966->98965 98967 14a8c7 22 API calls 98966->98967 98968 14adcd 22 API calls 98966->98968 98967->98966 98968->98966 98969 1603fb 98970 160407 CallCatchBlock 98969->98970 98998 15feb1 98970->98998 98972 16040e 98973 160561 98972->98973 98976 160438 98972->98976 99025 16083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 98973->99025 98975 160568 99026 164e52 28 API calls _abort 98975->99026 98985 160477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 98976->98985 99009 17247d 98976->99009 98978 16056e 99027 164e04 28 API calls _abort 98978->99027 98982 160576 98983 160457 98989 1604d8 98985->98989 99021 164e1a 38 API calls 3 library calls 98985->99021 98988 1604de 98990 1604f3 98988->98990 99017 160959 98989->99017 99022 160992 GetModuleHandleW 98990->99022 98992 1604fa 98992->98975 98993 1604fe 98992->98993 98994 160507 98993->98994 99023 164df5 28 API calls _abort 98993->99023 99024 160040 13 API calls 2 library calls 98994->99024 98997 16050f 98997->98983 98999 15feba 98998->98999 99028 160698 IsProcessorFeaturePresent 98999->99028 99001 15fec6 99029 162c94 10 API calls 3 library calls 99001->99029 99003 15fecb 99004 15fecf 99003->99004 99030 172317 99003->99030 99004->98972 99007 15fee6 99007->98972 99010 172494 99009->99010 99011 160a8c CatchGuardHandler 5 API calls 99010->99011 99012 160451 99011->99012 99012->98983 99013 172421 99012->99013 99014 172450 99013->99014 99015 160a8c CatchGuardHandler 5 API calls 99014->99015 99016 172479 99015->99016 99016->98985 99081 162340 99017->99081 99020 16097f 99020->98988 99021->98989 99022->98992 99023->98994 99024->98997 99025->98975 99026->98978 99027->98982 99028->99001 99029->99003 99034 17d1f6 99030->99034 99033 162cbd 8 API calls 3 library calls 99033->99004 99035 17d213 99034->99035 99038 17d20f 99034->99038 99035->99038 99040 174bfb 99035->99040 99036 160a8c CatchGuardHandler 5 API calls 99037 15fed8 99036->99037 99037->99007 99037->99033 99038->99036 99041 174c07 CallCatchBlock 99040->99041 99052 172f5e EnterCriticalSection 99041->99052 99043 174c0e 99053 1750af 99043->99053 99045 174c1d 99046 174c2c 99045->99046 99066 174a8f 29 API calls 99045->99066 99068 174c48 LeaveCriticalSection _abort 99046->99068 99049 174c27 99067 174b45 GetStdHandle GetFileType 99049->99067 99050 174c3d __wsopen_s 99050->99035 99052->99043 99054 1750bb CallCatchBlock 99053->99054 99055 1750df 99054->99055 99056 1750c8 99054->99056 99069 172f5e EnterCriticalSection 99055->99069 99077 16f2d9 20 API calls _abort 99056->99077 99059 1750cd 99078 1727ec 26 API calls __wsopen_s 99059->99078 99062 1750eb 99065 175117 99062->99065 99070 175000 99062->99070 99063 1750d7 __wsopen_s 99063->99045 99079 17513e LeaveCriticalSection _abort 99065->99079 99066->99049 99067->99046 99068->99050 99069->99062 99071 174c7d _abort 20 API calls 99070->99071 99076 175012 99071->99076 99072 17501f 99073 1729c8 _free 20 API calls 99072->99073 99075 175071 99073->99075 99075->99062 99076->99072 99080 173405 11 API calls 2 library calls 99076->99080 99077->99059 99078->99063 99079->99063 99080->99076 99082 16096c GetStartupInfoW 99081->99082 99082->99020 99083 14105b 99088 14344d 99083->99088 99085 14106a 99119 1600a3 29 API calls __onexit 99085->99119 99087 141074 99089 14345d __wsopen_s 99088->99089 99090 14a961 22 API calls 99089->99090 99091 143513 99090->99091 99092 143a5a 24 API calls 99091->99092 99093 14351c 99092->99093 99120 143357 99093->99120 99096 1433c6 22 API calls 99097 143535 99096->99097 99098 14515f 22 API calls 99097->99098 99099 143544 99098->99099 99100 14a961 22 API calls 99099->99100 99101 14354d 99100->99101 99102 14a6c3 22 API calls 99101->99102 99103 143556 RegOpenKeyExW 99102->99103 99104 183176 RegQueryValueExW 99103->99104 99109 143578 99103->99109 99105 18320c RegCloseKey 99104->99105 99106 183193 99104->99106 99105->99109 99118 18321e _wcslen 99105->99118 99107 15fe0b 22 API calls 99106->99107 99108 1831ac 99107->99108 99111 145722 22 API calls 99108->99111 99109->99085 99110 144c6d 22 API calls 99110->99118 99112 1831b7 RegQueryValueExW 99111->99112 99113 1831d4 99112->99113 99115 1831ee messages 99112->99115 99114 146b57 22 API calls 99113->99114 99114->99115 99115->99105 99116 149cb3 22 API calls 99116->99118 99117 14515f 22 API calls 99117->99118 99118->99109 99118->99110 99118->99116 99118->99117 99119->99087 99121 181f50 __wsopen_s 99120->99121 99122 143364 GetFullPathNameW 99121->99122 99123 143386 99122->99123 99124 146b57 22 API calls 99123->99124 99125 1433a4 99124->99125 99125->99096 99126 141044 99131 1410f3 99126->99131 99128 14104a 99167 1600a3 29 API calls __onexit 99128->99167 99130 141054 99168 141398 99131->99168 99135 14116a 99136 14a961 22 API calls 99135->99136 99137 141174 99136->99137 99138 14a961 22 API calls 99137->99138 99139 14117e 99138->99139 99140 14a961 22 API calls 99139->99140 99141 141188 99140->99141 99142 14a961 22 API calls 99141->99142 99143 1411c6 99142->99143 99144 14a961 22 API calls 99143->99144 99145 141292 99144->99145 99178 14171c 99145->99178 99149 1412c4 99150 14a961 22 API calls 99149->99150 99151 1412ce 99150->99151 99152 151940 9 API calls 99151->99152 99153 1412f9 99152->99153 99199 141aab 99153->99199 99155 141315 99156 141325 GetStdHandle 99155->99156 99157 182485 99156->99157 99158 14137a 99156->99158 99157->99158 99159 18248e 99157->99159 99161 141387 OleInitialize 99158->99161 99160 15fddb 22 API calls 99159->99160 99162 182495 99160->99162 99161->99128 99206 1b011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 99162->99206 99164 18249e 99207 1b0944 CreateThread 99164->99207 99166 1824aa CloseHandle 99166->99158 99167->99130 99208 1413f1 99168->99208 99171 1413f1 22 API calls 99172 1413d0 99171->99172 99173 14a961 22 API calls 99172->99173 99174 1413dc 99173->99174 99175 146b57 22 API calls 99174->99175 99176 141129 99175->99176 99177 141bc3 6 API calls 99176->99177 99177->99135 99179 14a961 22 API calls 99178->99179 99180 14172c 99179->99180 99181 14a961 22 API calls 99180->99181 99182 141734 99181->99182 99183 14a961 22 API calls 99182->99183 99184 14174f 99183->99184 99185 15fddb 22 API calls 99184->99185 99186 14129c 99185->99186 99187 141b4a 99186->99187 99188 141b58 99187->99188 99189 14a961 22 API calls 99188->99189 99190 141b63 99189->99190 99191 14a961 22 API calls 99190->99191 99192 141b6e 99191->99192 99193 14a961 22 API calls 99192->99193 99194 141b79 99193->99194 99195 14a961 22 API calls 99194->99195 99196 141b84 99195->99196 99197 15fddb 22 API calls 99196->99197 99198 141b96 RegisterWindowMessageW 99197->99198 99198->99149 99200 18272d 99199->99200 99201 141abb 99199->99201 99215 1b3209 23 API calls 99200->99215 99202 15fddb 22 API calls 99201->99202 99204 141ac3 99202->99204 99204->99155 99205 182738 99206->99164 99207->99166 99216 1b092a 28 API calls 99207->99216 99209 14a961 22 API calls 99208->99209 99210 1413fc 99209->99210 99211 14a961 22 API calls 99210->99211 99212 141404 99211->99212 99213 14a961 22 API calls 99212->99213 99214 1413c6 99213->99214 99214->99171 99215->99205 99217 14dee5 99220 14b710 99217->99220 99221 14b72b 99220->99221 99222 1900f8 99221->99222 99223 190146 99221->99223 99250 14b750 99221->99250 99226 190102 99222->99226 99229 19010f 99222->99229 99222->99250 99262 1c58a2 235 API calls 2 library calls 99223->99262 99260 1c5d33 235 API calls 99226->99260 99242 14ba20 99229->99242 99261 1c61d0 235 API calls 2 library calls 99229->99261 99233 14bbe0 40 API calls 99233->99250 99234 1903d9 99234->99234 99236 14ba4e 99238 190322 99265 1c5c0c 82 API calls 99238->99265 99242->99236 99266 1b359c 82 API calls __wsopen_s 99242->99266 99246 15d336 40 API calls 99246->99250 99247 14ec40 235 API calls 99247->99250 99248 14a8c7 22 API calls 99248->99250 99250->99233 99250->99236 99250->99238 99250->99242 99250->99246 99250->99247 99250->99248 99251 14a81b 41 API calls 99250->99251 99252 15d2f0 40 API calls 99250->99252 99253 15a01b 235 API calls 99250->99253 99254 160242 5 API calls __Init_thread_wait 99250->99254 99255 15edcd 22 API calls 99250->99255 99256 1600a3 29 API calls __onexit 99250->99256 99257 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 99250->99257 99258 15ee53 82 API calls 99250->99258 99259 15e5ca 235 API calls 99250->99259 99263 14aceb 23 API calls messages 99250->99263 99264 19f6bf 23 API calls 99250->99264 99251->99250 99252->99250 99253->99250 99254->99250 99255->99250 99256->99250 99257->99250 99258->99250 99259->99250 99260->99229 99261->99242 99262->99250 99263->99250 99264->99250 99265->99242 99266->99234 99267 178402 99268 178418 99267->99268 99270 17842a 99268->99270 99271 180984 99268->99271 99274 180081 99271->99274 99273 18099f 99273->99270 99277 18008d CallCatchBlock 99274->99277 99275 18009b 99332 16f2d9 20 API calls _abort 99275->99332 99277->99275 99279 1800d4 99277->99279 99278 1800a0 99333 1727ec 26 API calls __wsopen_s 99278->99333 99285 18065b 99279->99285 99284 1800aa __wsopen_s 99284->99273 99335 18042f 99285->99335 99288 18068d 99367 16f2c6 20 API calls _abort 99288->99367 99289 1806a6 99353 175221 99289->99353 99292 1806ab 99294 1806cb 99292->99294 99295 1806b4 99292->99295 99293 180692 99368 16f2d9 20 API calls _abort 99293->99368 99366 18039a CreateFileW 99294->99366 99369 16f2c6 20 API calls _abort 99295->99369 99299 1806b9 99370 16f2d9 20 API calls _abort 99299->99370 99301 180781 GetFileType 99302 18078c GetLastError 99301->99302 99303 1807d3 99301->99303 99373 16f2a3 20 API calls 2 library calls 99302->99373 99375 17516a 21 API calls 3 library calls 99303->99375 99304 180756 GetLastError 99372 16f2a3 20 API calls 2 library calls 99304->99372 99307 180704 99307->99301 99307->99304 99371 18039a CreateFileW 99307->99371 99309 18079a CloseHandle 99309->99293 99312 1807c3 99309->99312 99310 180749 99310->99301 99310->99304 99374 16f2d9 20 API calls _abort 99312->99374 99314 1807f4 99315 180840 99314->99315 99376 1805ab 72 API calls 4 library calls 99314->99376 99320 18086d 99315->99320 99377 18014d 72 API calls 4 library calls 99315->99377 99316 1807c8 99316->99293 99319 180866 99319->99320 99321 18087e 99319->99321 99322 1786ae __wsopen_s 29 API calls 99320->99322 99323 1800f8 99321->99323 99324 1808fc CloseHandle 99321->99324 99322->99323 99334 180121 LeaveCriticalSection __wsopen_s 99323->99334 99378 18039a CreateFileW 99324->99378 99326 180927 99327 180931 GetLastError 99326->99327 99328 18095d 99326->99328 99379 16f2a3 20 API calls 2 library calls 99327->99379 99328->99323 99330 18093d 99380 175333 21 API calls 3 library calls 99330->99380 99332->99278 99333->99284 99334->99284 99336 180450 99335->99336 99337 18046a 99335->99337 99336->99337 99388 16f2d9 20 API calls _abort 99336->99388 99381 1803bf 99337->99381 99340 18045f 99389 1727ec 26 API calls __wsopen_s 99340->99389 99342 1804a2 99343 1804d1 99342->99343 99390 16f2d9 20 API calls _abort 99342->99390 99350 180524 99343->99350 99392 16d70d 26 API calls 2 library calls 99343->99392 99346 18051f 99348 18059e 99346->99348 99346->99350 99347 1804c6 99391 1727ec 26 API calls __wsopen_s 99347->99391 99393 1727fc 11 API calls _abort 99348->99393 99350->99288 99350->99289 99352 1805aa 99354 17522d CallCatchBlock 99353->99354 99396 172f5e EnterCriticalSection 99354->99396 99356 17527b 99397 17532a 99356->99397 99357 175259 99359 175000 __wsopen_s 21 API calls 99357->99359 99362 17525e 99359->99362 99360 1752a4 __wsopen_s 99360->99292 99361 175234 99361->99356 99361->99357 99363 1752c7 EnterCriticalSection 99361->99363 99362->99356 99400 175147 EnterCriticalSection 99362->99400 99363->99356 99364 1752d4 LeaveCriticalSection 99363->99364 99364->99361 99366->99307 99367->99293 99368->99323 99369->99299 99370->99293 99371->99310 99372->99293 99373->99309 99374->99316 99375->99314 99376->99315 99377->99319 99378->99326 99379->99330 99380->99328 99383 1803d7 99381->99383 99382 1803f2 99382->99342 99383->99382 99394 16f2d9 20 API calls _abort 99383->99394 99385 180416 99395 1727ec 26 API calls __wsopen_s 99385->99395 99387 180421 99387->99342 99388->99340 99389->99337 99390->99347 99391->99343 99392->99346 99393->99352 99394->99385 99395->99387 99396->99361 99401 172fa6 LeaveCriticalSection 99397->99401 99399 175331 99399->99360 99400->99356 99401->99399 99402 11d5288 99416 11d2ed8 99402->99416 99404 11d5320 99419 11d5178 99404->99419 99406 11d5349 CreateFileW 99408 11d539d 99406->99408 99409 11d5398 99406->99409 99408->99409 99410 11d53b4 VirtualAlloc 99408->99410 99410->99409 99411 11d53d2 ReadFile 99410->99411 99411->99409 99412 11d53ed 99411->99412 99413 11d4178 13 API calls 99412->99413 99414 11d5420 99413->99414 99415 11d5443 ExitProcess 99414->99415 99415->99409 99422 11d6348 GetPEB 99416->99422 99418 11d3563 99418->99404 99420 11d5181 Sleep 99419->99420 99421 11d518f 99420->99421 99423 11d6372 99422->99423 99423->99418 99424 142de3 99425 142df0 __wsopen_s 99424->99425 99426 182c2b ___scrt_fastfail 99425->99426 99427 142e09 99425->99427 99429 182c47 GetOpenFileNameW 99426->99429 99428 143aa2 23 API calls 99427->99428 99430 142e12 99428->99430 99431 182c96 99429->99431 99440 142da5 99430->99440 99433 146b57 22 API calls 99431->99433 99435 182cab 99433->99435 99435->99435 99437 142e27 99458 1444a8 99437->99458 99441 181f50 __wsopen_s 99440->99441 99442 142db2 GetLongPathNameW 99441->99442 99443 146b57 22 API calls 99442->99443 99444 142dda 99443->99444 99445 143598 99444->99445 99446 14a961 22 API calls 99445->99446 99447 1435aa 99446->99447 99448 143aa2 23 API calls 99447->99448 99449 1435b5 99448->99449 99450 1435c0 99449->99450 99456 1832eb 99449->99456 99451 14515f 22 API calls 99450->99451 99453 1435cc 99451->99453 99488 1435f3 99453->99488 99455 18330d 99456->99455 99494 15ce60 41 API calls 99456->99494 99457 1435df 99457->99437 99459 144ecb 94 API calls 99458->99459 99460 1444cd 99459->99460 99461 183833 99460->99461 99463 144ecb 94 API calls 99460->99463 99462 1b2cf9 80 API calls 99461->99462 99464 183848 99462->99464 99465 1444e1 99463->99465 99466 183869 99464->99466 99467 18384c 99464->99467 99465->99461 99468 1444e9 99465->99468 99470 15fe0b 22 API calls 99466->99470 99469 144f39 68 API calls 99467->99469 99471 1444f5 99468->99471 99472 183854 99468->99472 99469->99472 99481 1838ae 99470->99481 99501 14940c 136 API calls 2 library calls 99471->99501 99502 1ada5a 82 API calls 99472->99502 99475 183862 99475->99466 99476 142e31 99477 183a5f 99479 183a67 99477->99479 99478 144f39 68 API calls 99478->99479 99479->99478 99506 1a989b 82 API calls __wsopen_s 99479->99506 99480 14a4a1 22 API calls 99480->99481 99481->99477 99481->99479 99481->99480 99485 149cb3 22 API calls 99481->99485 99495 143ff7 99481->99495 99503 1a967e 22 API calls __fread_nolock 99481->99503 99504 1a95ad 42 API calls _wcslen 99481->99504 99505 1b0b5a 22 API calls 99481->99505 99485->99481 99489 143605 99488->99489 99493 143624 __fread_nolock 99488->99493 99491 15fe0b 22 API calls 99489->99491 99490 15fddb 22 API calls 99492 14363b 99490->99492 99491->99493 99492->99457 99493->99490 99494->99456 99496 14400a 99495->99496 99499 1440ae 99495->99499 99498 15fe0b 22 API calls 99496->99498 99500 14403c 99496->99500 99497 15fddb 22 API calls 99497->99500 99498->99500 99499->99481 99500->99497 99500->99499 99501->99476 99502->99475 99503->99481 99504->99481 99505->99481 99506->99479 99507 193a41 99511 1b10c0 99507->99511 99509 193a4c 99510 1b10c0 53 API calls 99509->99510 99510->99509 99512 1b10fa 99511->99512 99517 1b10cd 99511->99517 99512->99509 99513 1b10fc 99523 15fa11 53 API calls 99513->99523 99515 1b1101 99516 147510 53 API calls 99515->99516 99518 1b1108 99516->99518 99517->99512 99517->99513 99517->99515 99520 1b10f4 99517->99520 99519 146350 22 API calls 99518->99519 99519->99512 99522 14b270 39 API calls 99520->99522 99522->99512 99523->99515 99524 192a00 99528 14d7b0 messages 99524->99528 99525 14d9d5 99526 14db11 PeekMessageW 99526->99528 99527 14d807 GetInputState 99527->99526 99527->99528 99528->99525 99528->99526 99528->99527 99530 191cbe TranslateAcceleratorW 99528->99530 99531 14da04 timeGetTime 99528->99531 99532 14db73 TranslateMessage DispatchMessageW 99528->99532 99533 14db8f PeekMessageW 99528->99533 99534 14dbaf Sleep 99528->99534 99535 192b74 Sleep 99528->99535 99537 191dda timeGetTime 99528->99537 99552 14ec40 235 API calls 99528->99552 99553 151310 235 API calls 99528->99553 99554 14bf40 235 API calls 99528->99554 99556 14dd50 99528->99556 99563 14dfd0 99528->99563 99586 15edf6 IsDialogMessageW GetClassLongW 99528->99586 99588 1b3a2a 23 API calls 99528->99588 99589 1b359c 82 API calls __wsopen_s 99528->99589 99530->99528 99531->99528 99532->99533 99533->99528 99547 14dbc0 99534->99547 99535->99547 99536 15e551 timeGetTime 99536->99547 99587 15e300 23 API calls 99537->99587 99540 192c0b GetExitCodeProcess 99541 192c21 WaitForSingleObject 99540->99541 99542 192c37 CloseHandle 99540->99542 99541->99528 99541->99542 99542->99547 99543 192a31 99543->99525 99544 1d29bf GetForegroundWindow 99544->99547 99546 192ca9 Sleep 99546->99528 99547->99525 99547->99528 99547->99536 99547->99540 99547->99543 99547->99544 99547->99546 99590 1c5658 23 API calls 99547->99590 99591 1ae97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 99547->99591 99592 1ad4dc 47 API calls 99547->99592 99552->99528 99553->99528 99554->99528 99557 14dd83 99556->99557 99558 14dd6f 99556->99558 99594 1b359c 82 API calls __wsopen_s 99557->99594 99593 14d260 235 API calls 2 library calls 99558->99593 99560 14dd7a 99560->99528 99562 192f75 99562->99562 99564 14e010 99563->99564 99579 14e0dc messages 99564->99579 99597 160242 5 API calls __Init_thread_wait 99564->99597 99567 192fca 99569 14a961 22 API calls 99567->99569 99567->99579 99568 14a961 22 API calls 99568->99579 99570 192fe4 99569->99570 99598 1600a3 29 API calls __onexit 99570->99598 99574 192fee 99599 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 99574->99599 99576 14ec40 235 API calls 99576->99579 99579->99568 99579->99576 99580 14a8c7 22 API calls 99579->99580 99581 1504f0 22 API calls 99579->99581 99582 1b359c 82 API calls 99579->99582 99583 14e3e1 99579->99583 99595 14a81b 41 API calls 99579->99595 99596 15a308 235 API calls 99579->99596 99600 160242 5 API calls __Init_thread_wait 99579->99600 99601 1600a3 29 API calls __onexit 99579->99601 99602 1601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 99579->99602 99603 1c47d4 235 API calls 99579->99603 99604 1c68c1 235 API calls 99579->99604 99580->99579 99581->99579 99582->99579 99583->99528 99586->99528 99587->99528 99588->99528 99589->99528 99590->99547 99591->99547 99592->99547 99593->99560 99594->99562 99595->99579 99596->99579 99597->99567 99598->99574 99599->99579 99600->99579 99601->99579 99602->99579 99603->99579 99604->99579 99605 141cad SystemParametersInfoW 99606 182ba5 99607 142b25 99606->99607 99608 182baf 99606->99608 99634 142b83 7 API calls 99607->99634 99610 143a5a 24 API calls 99608->99610 99612 182bb8 99610->99612 99614 149cb3 22 API calls 99612->99614 99615 182bc6 99614->99615 99617 182bce 99615->99617 99618 182bf5 99615->99618 99616 142b2f 99620 143837 49 API calls 99616->99620 99622 142b44 99616->99622 99619 1433c6 22 API calls 99617->99619 99621 1433c6 22 API calls 99618->99621 99623 182bd9 99619->99623 99620->99622 99624 182bf1 GetForegroundWindow ShellExecuteW 99621->99624 99627 142b5f 99622->99627 99638 1430f2 Shell_NotifyIconW ___scrt_fastfail 99622->99638 99625 146350 22 API calls 99623->99625 99629 182c26 99624->99629 99628 182be7 99625->99628 99631 142b66 SetCurrentDirectoryW 99627->99631 99632 1433c6 22 API calls 99628->99632 99629->99627 99633 142b7a 99631->99633 99632->99624 99639 142cd4 7 API calls 99634->99639 99636 142b2a 99637 142c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 99636->99637 99637->99616 99638->99627 99639->99636

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 234 1442de-14434d call 14a961 GetVersionExW call 146b57 239 144353 234->239 240 183617-18362a 234->240 241 144355-144357 239->241 242 18362b-18362f 240->242 243 14435d-1443bc call 1493b2 call 1437a0 241->243 244 183656 241->244 245 183631 242->245 246 183632-18363e 242->246 262 1443c2-1443c4 243->262 263 1837df-1837e6 243->263 249 18365d-183660 244->249 245->246 246->242 248 183640-183642 246->248 248->241 251 183648-18364f 248->251 252 183666-1836a8 249->252 253 14441b-144435 GetCurrentProcess IsWow64Process 249->253 251->240 255 183651 251->255 252->253 256 1836ae-1836b1 252->256 258 144494-14449a 253->258 259 144437 253->259 255->244 260 1836db-1836e5 256->260 261 1836b3-1836bd 256->261 264 14443d-144449 258->264 259->264 270 1836f8-183702 260->270 271 1836e7-1836f3 260->271 267 1836ca-1836d6 261->267 268 1836bf-1836c5 261->268 262->249 269 1443ca-1443dd 262->269 272 1837e8 263->272 273 183806-183809 263->273 265 14444f-14445e LoadLibraryA 264->265 266 183824-183828 GetSystemInfo 264->266 274 144460-14446e GetProcAddress 265->274 275 14449c-1444a6 GetSystemInfo 265->275 267->253 268->253 276 1443e3-1443e5 269->276 277 183726-18372f 269->277 279 183704-183710 270->279 280 183715-183721 270->280 271->253 278 1837ee 272->278 281 18380b-18381a 273->281 282 1837f4-1837fc 273->282 274->275 283 144470-144474 GetNativeSystemInfo 274->283 284 144476-144478 275->284 285 18374d-183762 276->285 286 1443eb-1443ee 276->286 287 18373c-183748 277->287 288 183731-183737 277->288 278->282 279->253 280->253 281->278 289 18381c-183822 281->289 282->273 283->284 292 144481-144493 284->292 293 14447a-14447b FreeLibrary 284->293 290 18376f-18377b 285->290 291 183764-18376a 285->291 294 1443f4-14440f 286->294 295 183791-183794 286->295 287->253 288->253 289->282 290->253 291->253 293->292 297 144415 294->297 298 183780-18378c 294->298 295->253 296 18379a-1837c1 295->296 299 1837ce-1837da 296->299 300 1837c3-1837c9 296->300 297->253 298->253 299->253 300->253
              APIs
              • GetVersionExW.KERNEL32(?), ref: 0014430D
                • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
              • GetCurrentProcess.KERNEL32(?,001DCB64,00000000,?,?), ref: 00144422
              • IsWow64Process.KERNEL32(00000000,?,?), ref: 00144429
              • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00144454
              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00144466
              • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00144474
              • FreeLibrary.KERNEL32(00000000,?,?), ref: 0014447B
              • GetSystemInfo.KERNEL32(?,?,?), ref: 001444A0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
              • String ID: GetNativeSystemInfo$kernel32.dll$|O
              • API String ID: 3290436268-3101561225
              • Opcode ID: b1ad9c8795d6014eb96b83267237341a534f071edab4a02c9d9efb826878949f
              • Instruction ID: 74a03edb0a0015d1920fcd8189615d1a0b2f188872c7bce5a95707bfeeba449e
              • Opcode Fuzzy Hash: b1ad9c8795d6014eb96b83267237341a534f071edab4a02c9d9efb826878949f
              • Instruction Fuzzy Hash: 0BA1D46190A2D4CFCB15D7687C4C3D97FA46B36700B1CC8DAE27193A79DB3146A4CB61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1270 1442a2-1442ba CreateStreamOnHGlobal 1271 1442bc-1442d3 FindResourceExW 1270->1271 1272 1442da-1442dd 1270->1272 1273 1835ba-1835c9 LoadResource 1271->1273 1274 1442d9 1271->1274 1273->1274 1275 1835cf-1835dd SizeofResource 1273->1275 1274->1272 1275->1274 1276 1835e3-1835ee LockResource 1275->1276 1276->1274 1277 1835f4-183612 1276->1277 1277->1274
              APIs
              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,001450AA,?,?,00000000,00000000), ref: 001442B2
              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,001450AA,?,?,00000000,00000000), ref: 001442C9
              • LoadResource.KERNEL32(?,00000000,?,?,001450AA,?,?,00000000,00000000,?,?,?,?,?,?,00144F20), ref: 001835BE
              • SizeofResource.KERNEL32(?,00000000,?,?,001450AA,?,?,00000000,00000000,?,?,?,?,?,?,00144F20), ref: 001835D3
              • LockResource.KERNEL32(001450AA,?,?,001450AA,?,?,00000000,00000000,?,?,?,?,?,?,00144F20,?), ref: 001835E6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
              • String ID: SCRIPT
              • API String ID: 3051347437-3967369404
              • Opcode ID: f0ec60015a511fb7322c291f0113e54b8e48c2face4de46b32436dacd25ed868
              • Instruction ID: b830b4bb7428af1d13fb697ab4139691a0ca3471ae15e9ebb2317921b9a543d8
              • Opcode Fuzzy Hash: f0ec60015a511fb7322c291f0113e54b8e48c2face4de46b32436dacd25ed868
              • Instruction Fuzzy Hash: A1118EB0202701BFDB218BA5EC48F677BB9EBC5B51F14456EF442D66A0DBB1DC41CA60

              Control-flow Graph

              APIs
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00142B6B
                • Part of subcall function 00143A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00211418,?,00142E7F,?,?,?,00000000), ref: 00143A78
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
              • GetForegroundWindow.USER32(runas,?,?,?,?,?,00202224), ref: 00182C10
              • ShellExecuteW.SHELL32(00000000,?,?,00202224), ref: 00182C17
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
              • String ID: runas
              • API String ID: 448630720-4000483414
              • Opcode ID: c9089c3c50e6eb11715ac9bd6a862af367df573d40957dcd0bedcae210857dd8
              • Instruction ID: c5f9640444f3808b05de9fbc0ddf77db07d28595759662aa469e6f1400564307
              • Opcode Fuzzy Hash: c9089c3c50e6eb11715ac9bd6a862af367df573d40957dcd0bedcae210857dd8
              • Instruction Fuzzy Hash: 42110331209306AAC704FF60E8559AEB7A4AFB1700F84042DF196130B3CF318A99C752
              APIs
              • lstrlenW.KERNEL32(?,00185222), ref: 001ADBCE
              • GetFileAttributesW.KERNELBASE(?), ref: 001ADBDD
              • FindFirstFileW.KERNELBASE(?,?), ref: 001ADBEE
              • FindClose.KERNEL32(00000000), ref: 001ADBFA
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: FileFind$AttributesCloseFirstlstrlen
              • String ID:
              • API String ID: 2695905019-0
              • Opcode ID: ae002422ecffec8c64097ae954572e9abd3a19118f75b27373efa784f302b656
              • Instruction ID: 7e36bb20015d51904a3908a75ac94ac23edfad18cfab676dfb3c8092ea877029
              • Opcode Fuzzy Hash: ae002422ecffec8c64097ae954572e9abd3a19118f75b27373efa784f302b656
              • Instruction Fuzzy Hash: 61F0A0308129215782206B78EC0D8AA376D9F03334B904B1BF876C28E0EBB45D94C6D5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: BuffCharUpper
              • String ID: p#!
              • API String ID: 3964851224-1500567165
              • Opcode ID: 6a8e3493adf0e28c42b52917bd46f2d3fe6c1cdd477a58f51a17016d3c67fa2a
              • Instruction ID: be1d87cac44743f0337c6b08bfdca5122dfadd09cd94943726ff704d17feb550
              • Opcode Fuzzy Hash: 6a8e3493adf0e28c42b52917bd46f2d3fe6c1cdd477a58f51a17016d3c67fa2a
              • Instruction Fuzzy Hash: ABA25970608301DFDB65CF18C480B6ABBE1BF99304F15896DE99A8B362D771EC45CB92
              APIs
              • GetInputState.USER32 ref: 0014D807
              • timeGetTime.WINMM ref: 0014DA07
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0014DB28
              • TranslateMessage.USER32(?), ref: 0014DB7B
              • DispatchMessageW.USER32(?), ref: 0014DB89
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0014DB9F
              • Sleep.KERNEL32(0000000A), ref: 0014DBB1
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
              • String ID:
              • API String ID: 2189390790-0
              • Opcode ID: 0880f67b5f92c1b264290b0f283c662ba498be8b198cc8e6ee0c469589f66dcf
              • Instruction ID: 35bd73503aba653dad6c34fdd03a75bdd7385fba166a76968859282d0e8c44d5
              • Opcode Fuzzy Hash: 0880f67b5f92c1b264290b0f283c662ba498be8b198cc8e6ee0c469589f66dcf
              • Instruction Fuzzy Hash: 3342D130604342EFEF28CF24D889BAAB7E1FF56314F55855DE466872A1D770E884CB92

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 00142D07
              • RegisterClassExW.USER32(00000030), ref: 00142D31
              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00142D42
              • InitCommonControlsEx.COMCTL32(?), ref: 00142D5F
              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00142D6F
              • LoadIconW.USER32(000000A9), ref: 00142D85
              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00142D94
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
              • API String ID: 2914291525-1005189915
              • Opcode ID: 071ca7cb5caddd635e1fefcd16f41e9d7bff53223f9d201984eaa0498af64087
              • Instruction ID: be970012decfd0d3f55c93d3912a25682f92e352ad7c97aeb0c961ddd479c093
              • Opcode Fuzzy Hash: 071ca7cb5caddd635e1fefcd16f41e9d7bff53223f9d201984eaa0498af64087
              • Instruction Fuzzy Hash: B121C7B5902319EFDB00DFA4ED49BDDBBB8FB08705F00851AF621A62A0DBB54554CF91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 302 18065b-18068b call 18042f 305 18068d-180698 call 16f2c6 302->305 306 1806a6-1806b2 call 175221 302->306 313 18069a-1806a1 call 16f2d9 305->313 311 1806cb-180714 call 18039a 306->311 312 1806b4-1806c9 call 16f2c6 call 16f2d9 306->312 322 180781-18078a GetFileType 311->322 323 180716-18071f 311->323 312->313 320 18097d-180983 313->320 324 18078c-1807bd GetLastError call 16f2a3 CloseHandle 322->324 325 1807d3-1807d6 322->325 327 180721-180725 323->327 328 180756-18077c GetLastError call 16f2a3 323->328 324->313 341 1807c3-1807ce call 16f2d9 324->341 331 1807d8-1807dd 325->331 332 1807df-1807e5 325->332 327->328 333 180727-180754 call 18039a 327->333 328->313 337 1807e9-180837 call 17516a 331->337 332->337 338 1807e7 332->338 333->322 333->328 344 180839-180845 call 1805ab 337->344 345 180847-18086b call 18014d 337->345 338->337 341->313 344->345 351 18086f-180879 call 1786ae 344->351 352 18086d 345->352 353 18087e-1808c1 345->353 351->320 352->351 355 1808e2-1808f0 353->355 356 1808c3-1808c7 353->356 357 18097b 355->357 358 1808f6-1808fa 355->358 356->355 360 1808c9-1808dd 356->360 357->320 358->357 361 1808fc-18092f CloseHandle call 18039a 358->361 360->355 364 180931-18095d GetLastError call 16f2a3 call 175333 361->364 365 180963-180977 361->365 364->365 365->357
              APIs
                • Part of subcall function 0018039A: CreateFileW.KERNELBASE(00000000,00000000,?,00180704,?,?,00000000,?,00180704,00000000,0000000C), ref: 001803B7
              • GetLastError.KERNEL32 ref: 0018076F
              • __dosmaperr.LIBCMT ref: 00180776
              • GetFileType.KERNELBASE(00000000), ref: 00180782
              • GetLastError.KERNEL32 ref: 0018078C
              • __dosmaperr.LIBCMT ref: 00180795
              • CloseHandle.KERNEL32(00000000), ref: 001807B5
              • CloseHandle.KERNEL32(?), ref: 001808FF
              • GetLastError.KERNEL32 ref: 00180931
              • __dosmaperr.LIBCMT ref: 00180938
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
              • String ID: H
              • API String ID: 4237864984-2852464175
              • Opcode ID: 06d4e71afce8f837d2a4df43e05c23aa22d688b847b9fcf38d785f3fd1f81467
              • Instruction ID: 6174ac79a36075fd76cff8b962cc09c35afabc9019e42a57b06dcf0f9f581ddb
              • Opcode Fuzzy Hash: 06d4e71afce8f837d2a4df43e05c23aa22d688b847b9fcf38d785f3fd1f81467
              • Instruction Fuzzy Hash: 12A12932A001089FDF1AAF68DC967AD7BA0AB1A320F24415DF8159B3D1DB319E57CF91

              Control-flow Graph

              APIs
                • Part of subcall function 00143A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00211418,?,00142E7F,?,?,?,00000000), ref: 00143A78
                • Part of subcall function 00143357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00143379
              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0014356A
              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0018318D
              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 001831CE
              • RegCloseKey.ADVAPI32(?), ref: 00183210
              • _wcslen.LIBCMT ref: 00183277
              • _wcslen.LIBCMT ref: 00183286
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
              • API String ID: 98802146-2727554177
              • Opcode ID: 385bb71609817d5c073220b3795d782b74511f75ffac8a652695a34b49ff6b41
              • Instruction ID: 95e938aeb7315032f519daae46a82d76581e84b55849a23ad47db056ba58c2be
              • Opcode Fuzzy Hash: 385bb71609817d5c073220b3795d782b74511f75ffac8a652695a34b49ff6b41
              • Instruction Fuzzy Hash: D0719D71405305DEC314EF29EC869ABBBE8FFA4740F40482EF565971B1EB309A58CB92

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 00142B8E
              • LoadCursorW.USER32(00000000,00007F00), ref: 00142B9D
              • LoadIconW.USER32(00000063), ref: 00142BB3
              • LoadIconW.USER32(000000A4), ref: 00142BC5
              • LoadIconW.USER32(000000A2), ref: 00142BD7
              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00142BEF
              • RegisterClassExW.USER32(?), ref: 00142C40
                • Part of subcall function 00142CD4: GetSysColorBrush.USER32(0000000F), ref: 00142D07
                • Part of subcall function 00142CD4: RegisterClassExW.USER32(00000030), ref: 00142D31
                • Part of subcall function 00142CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00142D42
                • Part of subcall function 00142CD4: InitCommonControlsEx.COMCTL32(?), ref: 00142D5F
                • Part of subcall function 00142CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00142D6F
                • Part of subcall function 00142CD4: LoadIconW.USER32(000000A9), ref: 00142D85
                • Part of subcall function 00142CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00142D94
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
              • String ID: #$0$AutoIt v3
              • API String ID: 423443420-4155596026
              • Opcode ID: 3e0c959d06d48fb1c3eb13acd035ed84af3a04a5421d3c9e0e98e97b26a9fea6
              • Instruction ID: 9757f2bc64a2c0886aab0693405d45996ca3f8e2b0c6523b546fb2b9e128e33a
              • Opcode Fuzzy Hash: 3e0c959d06d48fb1c3eb13acd035ed84af3a04a5421d3c9e0e98e97b26a9fea6
              • Instruction Fuzzy Hash: 4C214C70E02314ABDB109FA5FC59AD9BFB4FB18B50F10849AF620A66A4DBB10560CF90
              APIs
              • __Init_thread_footer.LIBCMT ref: 0014BB4E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Init_thread_footer
              • String ID: p#!$p#!$p#!$p#!$p%!$p%!$x#!$x#!
              • API String ID: 1385522511-4272460735
              • Opcode ID: 60907567cce92638725a489af31047cc21bf031b780edf99bca09e4c0aa8aecf
              • Instruction ID: 2165d5ba08758ea8bcba404a260d04c91d206bac00c391c2145a126ee32fe529
              • Opcode Fuzzy Hash: 60907567cce92638725a489af31047cc21bf031b780edf99bca09e4c0aa8aecf
              • Instruction Fuzzy Hash: 4132CD70A08209DFCF29CF54C894ABEB7B9FF58304F158069E915AB261C774EE91CB91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 650 143170-143185 651 1431e5-1431e7 650->651 652 143187-14318a 650->652 651->652 655 1431e9 651->655 653 14318c-143193 652->653 654 1431eb 652->654 658 143265-14326d PostQuitMessage 653->658 659 143199-14319e 653->659 656 182dfb-182e23 call 1418e2 call 15e499 654->656 657 1431f1-1431f6 654->657 660 1431d0-1431d8 DefWindowProcW 655->660 696 182e28-182e2f 656->696 661 14321d-143244 SetTimer RegisterWindowMessageW 657->661 662 1431f8-1431fb 657->662 667 143219-14321b 658->667 664 1431a4-1431a8 659->664 665 182e7c-182e90 call 1abf30 659->665 666 1431de-1431e4 660->666 661->667 671 143246-143251 CreatePopupMenu 661->671 668 182d9c-182d9f 662->668 669 143201-143214 KillTimer call 1430f2 call 143c50 662->669 672 182e68-182e77 call 1ac161 664->672 673 1431ae-1431b3 664->673 665->667 689 182e96 665->689 667->666 681 182da1-182da5 668->681 682 182dd7-182df6 MoveWindow 668->682 669->667 671->667 672->667 678 182e4d-182e54 673->678 679 1431b9-1431be 673->679 678->660 683 182e5a-182e63 call 1a0ad7 678->683 687 1431c4-1431ca 679->687 688 143253-143263 call 14326f 679->688 690 182dc6-182dd2 SetFocus 681->690 691 182da7-182daa 681->691 682->667 683->660 687->660 687->696 688->667 689->660 690->667 691->687 692 182db0-182dc1 call 1418e2 691->692 692->667 696->660 700 182e35-182e48 call 1430f2 call 143837 696->700 700->660
              APIs
              • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0014316A,?,?), ref: 001431D8
              • KillTimer.USER32(?,00000001,?,?,?,?,?,0014316A,?,?), ref: 00143204
              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00143227
              • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0014316A,?,?), ref: 00143232
              • CreatePopupMenu.USER32 ref: 00143246
              • PostQuitMessage.USER32(00000000), ref: 00143267
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
              • String ID: TaskbarCreated
              • API String ID: 129472671-2362178303
              • Opcode ID: 7b420c408f00370a18c0f5c9c60411b6b1675acd57dad664572e046427afea9f
              • Instruction ID: 6ed78ae63e93be2787c63c8c024563292799a1b45960dbc48d9585dc9dae7703
              • Opcode Fuzzy Hash: 7b420c408f00370a18c0f5c9c60411b6b1675acd57dad664572e046427afea9f
              • Instruction Fuzzy Hash: E8414835210205ABDF192F78AC4DFF93B59E725700F044226FA32862B5DBB19F91DBA1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID: D%!$D%!$D%!$D%!$D%!D%!$Variable must be of type 'Object'.
              • API String ID: 0-2751283870
              • Opcode ID: 18907055072b0b47ccc69ab93e857b63a480aacd70a6da0dcf0e4bab97ab0bae
              • Instruction ID: ae38eb82494ab75f07a7b4be4d0ca191e3fa452f8a36b9d78ca89c7c7cb3a877
              • Opcode Fuzzy Hash: 18907055072b0b47ccc69ab93e857b63a480aacd70a6da0dcf0e4bab97ab0bae
              • Instruction Fuzzy Hash: A2C2AB75A00205CFCB24CFA8C885AADB7F1FF18310F258569E966AB3A1D371ED51CB91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1216 11d5498-11d5546 call 11d2ed8 1219 11d554d-11d5573 call 11d63a8 CreateFileW 1216->1219 1222 11d557a-11d558a 1219->1222 1223 11d5575 1219->1223 1230 11d558c 1222->1230 1231 11d5591-11d55ab VirtualAlloc 1222->1231 1224 11d56c5-11d56c9 1223->1224 1225 11d570b-11d570e 1224->1225 1226 11d56cb-11d56cf 1224->1226 1232 11d5711-11d5718 1225->1232 1228 11d56db-11d56df 1226->1228 1229 11d56d1-11d56d4 1226->1229 1233 11d56ef-11d56f3 1228->1233 1234 11d56e1-11d56eb 1228->1234 1229->1228 1230->1224 1235 11d55ad 1231->1235 1236 11d55b2-11d55c9 ReadFile 1231->1236 1237 11d576d-11d5782 1232->1237 1238 11d571a-11d5725 1232->1238 1243 11d56f5-11d56ff 1233->1243 1244 11d5703 1233->1244 1234->1233 1235->1224 1245 11d55cb 1236->1245 1246 11d55d0-11d5610 VirtualAlloc 1236->1246 1241 11d5784-11d578f VirtualFree 1237->1241 1242 11d5792-11d579a 1237->1242 1239 11d5729-11d5735 1238->1239 1240 11d5727 1238->1240 1247 11d5749-11d5755 1239->1247 1248 11d5737-11d5747 1239->1248 1240->1237 1241->1242 1243->1244 1244->1225 1245->1224 1249 11d5617-11d5632 call 11d65f8 1246->1249 1250 11d5612 1246->1250 1253 11d5757-11d5760 1247->1253 1254 11d5762-11d5768 1247->1254 1252 11d576b 1248->1252 1256 11d563d-11d5647 1249->1256 1250->1224 1252->1232 1253->1252 1254->1252 1257 11d5649-11d5678 call 11d65f8 1256->1257 1258 11d567a-11d568e call 11d6408 1256->1258 1257->1256 1264 11d5690 1258->1264 1265 11d5692-11d5696 1258->1265 1264->1224 1266 11d5698-11d569c CloseHandle 1265->1266 1267 11d56a2-11d56a6 1265->1267 1266->1267 1268 11d56a8-11d56b3 VirtualFree 1267->1268 1269 11d56b6-11d56bf 1267->1269 1268->1269 1269->1219 1269->1224
              APIs
              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 011D5569
              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 011D578F
              Memory Dump Source
              • Source File: 00000000.00000002.1465653293.00000000011D2000.00000040.00000020.00020000.00000000.sdmp, Offset: 011D2000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_11d2000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CreateFileFreeVirtual
              • String ID:
              • API String ID: 204039940-0
              • Opcode ID: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
              • Instruction ID: a9b0f63d869f49bb77a7be27914a69eef6e832a9fcecccb709c6dbbe0dc8c817
              • Opcode Fuzzy Hash: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
              • Instruction Fuzzy Hash: 5BA12A74E00209EBDB58CFA4C994BEEBBB6FF48304F208159E111BB281D7759A81CF65

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1280 142c63-142cd3 CreateWindowExW * 2 ShowWindow * 2
              APIs
              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00142C91
              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00142CB2
              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00141CAD,?), ref: 00142CC6
              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00141CAD,?), ref: 00142CCF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$CreateShow
              • String ID: AutoIt v3$edit
              • API String ID: 1584632944-3779509399
              • Opcode ID: 98eb3e34cd1e58c0e890594f72b606a219bd82088c682b6b97e6d1aec551d998
              • Instruction ID: c702d8f6037fe6b1c26705cf1f54a44c921ae58f2df8a44c0fbae6b58c9d5625
              • Opcode Fuzzy Hash: 98eb3e34cd1e58c0e890594f72b606a219bd82088c682b6b97e6d1aec551d998
              • Instruction Fuzzy Hash: F3F0DA755412907AEB311717BC4CEB77EBDD7D6F50B0081AAFA10A26A4CA711860DAB0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1395 11d5288-11d5396 call 11d2ed8 call 11d5178 CreateFileW 1402 11d539d-11d53ad 1395->1402 1403 11d5398 1395->1403 1406 11d53af 1402->1406 1407 11d53b4-11d53ce VirtualAlloc 1402->1407 1404 11d544d-11d5452 1403->1404 1406->1404 1408 11d53d0 1407->1408 1409 11d53d2-11d53e9 ReadFile 1407->1409 1408->1404 1410 11d53ed-11d5427 call 11d51b8 call 11d4178 1409->1410 1411 11d53eb 1409->1411 1416 11d5429-11d543e call 11d5208 1410->1416 1417 11d5443-11d544b ExitProcess 1410->1417 1411->1404 1416->1417 1417->1404
              APIs
                • Part of subcall function 011D5178: Sleep.KERNELBASE(000001F4), ref: 011D5189
              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 011D538C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1465653293.00000000011D2000.00000040.00000020.00020000.00000000.sdmp, Offset: 011D2000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_11d2000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CreateFileSleep
              • String ID: UVAG1XQALWG
              • API String ID: 2694422964-2416278638
              • Opcode ID: 0d52d39b9ec1b18eddac7b56328ed324227e5d6cc1d16f42d44f26adfe0709f0
              • Instruction ID: 7ef0e7ee631c3bd2632ec09b6e831ab255e7488667f2361cf32fa6a0680e82ae
              • Opcode Fuzzy Hash: 0d52d39b9ec1b18eddac7b56328ed324227e5d6cc1d16f42d44f26adfe0709f0
              • Instruction Fuzzy Hash: 2C519431E04249EBEF14DBA4C844BEFBB75AF58300F004199E608BB2C0E7B51B44CB66

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1419 1b2947-1b29b9 call 181f50 call 1b25d6 call 15fe0b call 145722 call 1b274e call 14511f call 165232 1434 1b29bf-1b29c6 call 1b2e66 1419->1434 1435 1b2a6c-1b2a73 call 1b2e66 1419->1435 1440 1b29cc-1b2a6a call 16d583 call 164983 call 169038 call 16d583 call 169038 * 2 1434->1440 1441 1b2a75-1b2a77 1434->1441 1435->1441 1442 1b2a7c 1435->1442 1445 1b2a7f-1b2b3a call 1450f5 * 8 call 1b3017 call 16e5eb 1440->1445 1444 1b2cb6-1b2cb7 1441->1444 1442->1445 1448 1b2cd5-1b2cdb 1444->1448 1484 1b2b3c-1b2b3e 1445->1484 1485 1b2b43-1b2b5e call 1b2792 1445->1485 1449 1b2cdd-1b2ced call 15fdcd call 15fe14 1448->1449 1450 1b2cf0-1b2cf6 1448->1450 1449->1450 1484->1444 1488 1b2bf0-1b2bfc call 16e678 1485->1488 1489 1b2b64-1b2b6c 1485->1489 1496 1b2bfe-1b2c0d DeleteFileW 1488->1496 1497 1b2c12-1b2c16 1488->1497 1490 1b2b6e-1b2b72 1489->1490 1491 1b2b74 1489->1491 1493 1b2b79-1b2b97 call 1450f5 1490->1493 1491->1493 1501 1b2b99-1b2b9e 1493->1501 1502 1b2bc1-1b2bd7 call 1b211d call 16dbb3 1493->1502 1496->1444 1499 1b2c18-1b2c7e call 1b25d6 call 16d2eb * 2 call 1b22ce 1497->1499 1500 1b2c91-1b2ca5 CopyFileW 1497->1500 1504 1b2cb9-1b2ccf DeleteFileW call 1b2fd8 1499->1504 1524 1b2c80-1b2c8f DeleteFileW 1499->1524 1500->1504 1505 1b2ca7-1b2cb4 DeleteFileW 1500->1505 1507 1b2ba1-1b2bb4 call 1b28d2 1501->1507 1519 1b2bdc-1b2be7 1502->1519 1510 1b2cd4 1504->1510 1505->1444 1517 1b2bb6-1b2bbf 1507->1517 1510->1448 1517->1502 1519->1489 1521 1b2bed 1519->1521 1521->1488 1524->1444
              APIs
              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 001B2C05
              • DeleteFileW.KERNEL32(?), ref: 001B2C87
              • CopyFileW.KERNELBASE(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 001B2C9D
              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 001B2CAE
              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 001B2CC0
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: File$Delete$Copy
              • String ID:
              • API String ID: 3226157194-0
              • Opcode ID: 1a8aded28372833442cb7098fe70be72af308f3cee83ae583d838a4a43bde7d3
              • Instruction ID: 916c5975aa783047aba904ff3f1ee10ae325f57b6b9c7ea7b80a36d4d4c7640b
              • Opcode Fuzzy Hash: 1a8aded28372833442cb7098fe70be72af308f3cee83ae583d838a4a43bde7d3
              • Instruction Fuzzy Hash: 72B16E72D00119ABDF25DBA4CC85EDEBBBDEF59340F1040A6F509E7151EB309A488FA1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1835 143b1c-143b27 1836 143b99-143b9b 1835->1836 1837 143b29-143b2e 1835->1837 1839 143b8c-143b8f 1836->1839 1837->1836 1838 143b30-143b48 RegOpenKeyExW 1837->1838 1838->1836 1840 143b4a-143b69 RegQueryValueExW 1838->1840 1841 143b80-143b8b RegCloseKey 1840->1841 1842 143b6b-143b76 1840->1842 1841->1839 1843 143b90-143b97 1842->1843 1844 143b78-143b7a 1842->1844 1845 143b7e 1843->1845 1844->1845 1845->1841
              APIs
              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00143B0F,SwapMouseButtons,00000004,?), ref: 00143B40
              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00143B0F,SwapMouseButtons,00000004,?), ref: 00143B61
              • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00143B0F,SwapMouseButtons,00000004,?), ref: 00143B83
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CloseOpenQueryValue
              • String ID: Control Panel\Mouse
              • API String ID: 3677997916-824357125
              • Opcode ID: 022867eb696bea49f260880f4ca58205ecf9351c107aacc981200d662693c84f
              • Instruction ID: 05c8c34c3dd679a1e2d532110c64d2e34b23004a63b7025dffab3d925e26d23c
              • Opcode Fuzzy Hash: 022867eb696bea49f260880f4ca58205ecf9351c107aacc981200d662693c84f
              • Instruction Fuzzy Hash: 5A1127B5611208FFDB218FA5DC84AAEBBB8EF44744B10896AB815D7120E3319E449BA0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1846 11d4178-11d4218 call 11d65d8 * 3 1853 11d422f 1846->1853 1854 11d421a-11d4224 1846->1854 1856 11d4236-11d423f 1853->1856 1854->1853 1855 11d4226-11d422d 1854->1855 1855->1856 1857 11d4246-11d48f8 1856->1857 1858 11d490b-11d4938 CreateProcessW 1857->1858 1859 11d48fa-11d48fe 1857->1859 1867 11d493a-11d493d 1858->1867 1868 11d4942 1858->1868 1860 11d4944-11d4971 1859->1860 1861 11d4900-11d4904 1859->1861 1879 11d497b 1860->1879 1880 11d4973-11d4976 1860->1880 1862 11d497d-11d49aa 1861->1862 1863 11d4906 1861->1863 1866 11d49b4-11d49ce Wow64GetThreadContext 1862->1866 1888 11d49ac-11d49af 1862->1888 1863->1866 1870 11d49d5-11d49f0 ReadProcessMemory 1866->1870 1871 11d49d0 1866->1871 1872 11d4d39-11d4d3b 1867->1872 1868->1866 1873 11d49f7-11d4a00 1870->1873 1874 11d49f2 1870->1874 1876 11d4ce2-11d4ce6 1871->1876 1877 11d4a29-11d4a48 call 11d5c58 1873->1877 1878 11d4a02-11d4a11 1873->1878 1874->1876 1881 11d4ce8-11d4cec 1876->1881 1882 11d4d37 1876->1882 1895 11d4a4f-11d4a72 call 11d5d98 1877->1895 1896 11d4a4a 1877->1896 1878->1877 1884 11d4a13-11d4a22 call 11d5ba8 1878->1884 1879->1866 1880->1872 1885 11d4cee-11d4cfa 1881->1885 1886 11d4d01-11d4d05 1881->1886 1882->1872 1884->1877 1901 11d4a24 1884->1901 1885->1886 1891 11d4d07-11d4d0a 1886->1891 1892 11d4d11-11d4d15 1886->1892 1888->1872 1891->1892 1897 11d4d17-11d4d1a 1892->1897 1898 11d4d21-11d4d25 1892->1898 1905 11d4abc-11d4add call 11d5d98 1895->1905 1906 11d4a74-11d4a7b 1895->1906 1896->1876 1897->1898 1899 11d4d27-11d4d2d call 11d5ba8 1898->1899 1900 11d4d32-11d4d35 1898->1900 1899->1900 1900->1872 1901->1876 1913 11d4adf 1905->1913 1914 11d4ae4-11d4b02 call 11d65f8 1905->1914 1908 11d4a7d-11d4aa7 call 11d5d98 1906->1908 1909 11d4ab7 1906->1909 1912 11d4aac-11d4aae 1908->1912 1909->1876 1915 11d4ab5 1912->1915 1916 11d4ab0 1912->1916 1913->1876 1919 11d4b0d-11d4b17 1914->1919 1915->1905 1916->1876 1920 11d4b4d-11d4b51 1919->1920 1921 11d4b19-11d4b4b call 11d65f8 1919->1921 1922 11d4c3c-11d4c59 call 11d57a8 1920->1922 1923 11d4b57-11d4b67 1920->1923 1921->1919 1931 11d4c5b 1922->1931 1932 11d4c60-11d4c7f Wow64SetThreadContext 1922->1932 1923->1922 1926 11d4b6d-11d4b7d 1923->1926 1926->1922 1929 11d4b83-11d4ba7 1926->1929 1933 11d4baa-11d4bae 1929->1933 1931->1876 1934 11d4c81 1932->1934 1935 11d4c83-11d4c8e call 11d5ad8 1932->1935 1933->1922 1936 11d4bb4-11d4bc9 1933->1936 1934->1876 1942 11d4c90 1935->1942 1943 11d4c92-11d4c96 1935->1943 1938 11d4bdd-11d4be1 1936->1938 1940 11d4c1f-11d4c37 1938->1940 1941 11d4be3-11d4bef 1938->1941 1940->1933 1944 11d4c1d 1941->1944 1945 11d4bf1-11d4c1b 1941->1945 1942->1876 1946 11d4c98-11d4c9b 1943->1946 1947 11d4ca2-11d4ca6 1943->1947 1944->1938 1945->1944 1946->1947 1949 11d4ca8-11d4cab 1947->1949 1950 11d4cb2-11d4cb6 1947->1950 1949->1950 1951 11d4cb8-11d4cbb 1950->1951 1952 11d4cc2-11d4cc6 1950->1952 1951->1952 1953 11d4cc8-11d4cce call 11d5ba8 1952->1953 1954 11d4cd3-11d4cdc 1952->1954 1953->1954 1954->1857 1954->1876
              APIs
              • CreateProcessW.KERNELBASE(?,00000000), ref: 011D4933
              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 011D49C9
              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 011D49EB
              Memory Dump Source
              • Source File: 00000000.00000002.1465653293.00000000011D2000.00000040.00000020.00020000.00000000.sdmp, Offset: 011D2000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_11d2000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Process$ContextCreateMemoryReadThreadWow64
              • String ID:
              • API String ID: 2438371351-0
              • Opcode ID: 4a62210935fbc19ac52c28b7856ac9112c9a9e608a38d15f0a7da1a89c903d0f
              • Instruction ID: 2f6336c0842c687f3b600ab8b926f7e80d49a14750f718abda426b24845a9cea
              • Opcode Fuzzy Hash: 4a62210935fbc19ac52c28b7856ac9112c9a9e608a38d15f0a7da1a89c903d0f
              • Instruction Fuzzy Hash: 74620B30A146589BEB28CFA4C840BDEB776FF58300F1091A9D20DEB794E7759E81CB59
              APIs
              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 001833A2
                • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00143A04
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: IconLoadNotifyShell_String_wcslen
              • String ID: Line:
              • API String ID: 2289894680-1585850449
              • Opcode ID: f55588e338d14f0c8f41ea946772f8ae4c9e860efb6a22b3ab653b9bcb20f302
              • Instruction ID: 81110704e350a6b4b1baeef3ac90c5834fc29471585895165c33ad2552354d52
              • Opcode Fuzzy Hash: f55588e338d14f0c8f41ea946772f8ae4c9e860efb6a22b3ab653b9bcb20f302
              • Instruction Fuzzy Hash: 0631D471408301AAD725EB20DC49BEBB7D8AF65714F10492AF5A9831E1DF709758C7C3
              APIs
              • GetOpenFileNameW.COMDLG32(?), ref: 00182C8C
                • Part of subcall function 00143AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00143A97,?,?,00142E7F,?,?,?,00000000), ref: 00143AC2
                • Part of subcall function 00142DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00142DC4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Name$Path$FileFullLongOpen
              • String ID: X$`e
              • API String ID: 779396738-2317500276
              • Opcode ID: 336dfa3ceb6bac2fd25ff9c912dda595ccffe57d0520d7dcbd20beab474e227b
              • Instruction ID: 9da59205d3814f4b84aa35fe828db8ea1ee6616943ff8b0c8a7dfe2fb11d8cc6
              • Opcode Fuzzy Hash: 336dfa3ceb6bac2fd25ff9c912dda595ccffe57d0520d7dcbd20beab474e227b
              • Instruction Fuzzy Hash: 7121A571A102589FCB01EF94C849BEE7BFCAF59314F008059F505B7291DBB45A99CFA1
              APIs
              • __CxxThrowException@8.LIBVCRUNTIME ref: 00160668
                • Part of subcall function 001632A4: RaiseException.KERNEL32(?,?,?,0016068A,?,00211444,?,?,?,?,?,?,0016068A,00141129,00208738,00141129), ref: 00163304
              • __CxxThrowException@8.LIBVCRUNTIME ref: 00160685
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Exception@8Throw$ExceptionRaise
              • String ID: Unknown exception
              • API String ID: 3476068407-410509341
              • Opcode ID: 3744b88de5deb821c00e3318495352f089615b8a4dad965ff872666fae1560e6
              • Instruction ID: 2585f8eee538a08e19a4bd40b75c0c5592a7a4af6d6b1bc37809aded8bf6d051
              • Opcode Fuzzy Hash: 3744b88de5deb821c00e3318495352f089615b8a4dad965ff872666fae1560e6
              • Instruction Fuzzy Hash: FFF0C23490030DB7CB05BAA4DC46C9F7B7C5E14310B604539BD249A5D2EF71DA7AC581
              APIs
              • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 001B302F
              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 001B3044
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Temp$FileNamePath
              • String ID: aut
              • API String ID: 3285503233-3010740371
              • Opcode ID: d8b45ffe04d28ffa3b87e8a504a23131f6e6b4ab44c5777c589b08136eef225f
              • Instruction ID: 099ac8ea2b148826340cfc260353ff582d930e8149904b942d67048d3a9c6c08
              • Opcode Fuzzy Hash: d8b45ffe04d28ffa3b87e8a504a23131f6e6b4ab44c5777c589b08136eef225f
              • Instruction Fuzzy Hash: CBD05B7150131467DB20A7949C0DFC77B7CD705750F000652B655D24D1DAB09584CAD0
              APIs
              • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 001C82F5
              • TerminateProcess.KERNEL32(00000000), ref: 001C82FC
              • FreeLibrary.KERNEL32(?,?,?,?), ref: 001C84DD
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Process$CurrentFreeLibraryTerminate
              • String ID:
              • API String ID: 146820519-0
              • Opcode ID: 90d5cd2158b41b5fa0728f28b407cf0960a534d6ab8d9fee4e4a6ff6a9b0b004
              • Instruction ID: 2ae0f9d9357655028efddbd40659a56274d71d8126a0dd08beed543e1a0e1509
              • Opcode Fuzzy Hash: 90d5cd2158b41b5fa0728f28b407cf0960a534d6ab8d9fee4e4a6ff6a9b0b004
              • Instruction Fuzzy Hash: 12126A719083419FC714DF28C484B6ABBE5BF99318F04895DE8998B392DB31ED45CF92
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 44032ca1bea590eaf62eafc59c151f382190c08905f054bc8d8cb09828da7671
              • Instruction ID: aa5ca69095650c344ff568096cbaead2e6746ad799143d2565b5f0e9485d596d
              • Opcode Fuzzy Hash: 44032ca1bea590eaf62eafc59c151f382190c08905f054bc8d8cb09828da7671
              • Instruction Fuzzy Hash: 1E51E071D006099FCB159FA4DC45FFE7BBAEF15310F158059F409A7291DBB19A02CB61
              APIs
                • Part of subcall function 00141BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00141BF4
                • Part of subcall function 00141BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00141BFC
                • Part of subcall function 00141BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00141C07
                • Part of subcall function 00141BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00141C12
                • Part of subcall function 00141BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00141C1A
                • Part of subcall function 00141BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00141C22
                • Part of subcall function 00141B4A: RegisterWindowMessageW.USER32(00000004,?,001412C4), ref: 00141BA2
              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0014136A
              • OleInitialize.OLE32 ref: 00141388
              • CloseHandle.KERNEL32(00000000,00000000), ref: 001824AB
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
              • String ID:
              • API String ID: 1986988660-0
              • Opcode ID: c0ca979e099a39ac393e86f6dc4f48c061205afefcfc6f5f0f7653b4df5241c3
              • Instruction ID: 7918de0e5dee6fd50aa8001c640f892856d01649ae258b52ffa407ad9ccc3375
              • Opcode Fuzzy Hash: c0ca979e099a39ac393e86f6dc4f48c061205afefcfc6f5f0f7653b4df5241c3
              • Instruction Fuzzy Hash: 1271CCB4912201AED788DF79B9496D57BE6FBB8344395C22AD20AC7371EF304461CF84
              APIs
              • CloseHandle.KERNELBASE(00000000,00000000,?,?,001785CC,?,00208CC8,0000000C), ref: 00178704
              • GetLastError.KERNEL32(?,001785CC,?,00208CC8,0000000C), ref: 0017870E
              • __dosmaperr.LIBCMT ref: 00178739
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CloseErrorHandleLast__dosmaperr
              • String ID:
              • API String ID: 2583163307-0
              • Opcode ID: 4ec592fc25d98bbefa69ffd4faf057bd59d02dc65a4e8f4f3b891256e0737c7f
              • Instruction ID: 4bbf35634205e431151b91b1eb9d6a99bedba808aeaf31efbf71d60c225a6e22
              • Opcode Fuzzy Hash: 4ec592fc25d98bbefa69ffd4faf057bd59d02dc65a4e8f4f3b891256e0737c7f
              • Instruction Fuzzy Hash: C3010432E4562036D6286234A84EB6E677B5BA2774F39C119F81C8B1E2DFF09CC18190
              APIs
              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,001B2CD4,?,?,?,00000004,00000001), ref: 001B2FF2
              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,001B2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 001B3006
              • CloseHandle.KERNEL32(00000000,?,001B2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 001B300D
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: File$CloseCreateHandleTime
              • String ID:
              • API String ID: 3397143404-0
              • Opcode ID: 2ae34317c01c3b331568c77a03fff5522ba61a49582ca818ca62209ab846dcda
              • Instruction ID: a6fd19ce422e1e18617013ac7a5900b09d88acd5238d5bad508693b50cbdc457
              • Opcode Fuzzy Hash: 2ae34317c01c3b331568c77a03fff5522ba61a49582ca818ca62209ab846dcda
              • Instruction Fuzzy Hash: EDE0863228222177D6302759BC0DFCB3B1CDB86B71F104611F729750D087A01541C2E8
              APIs
              • __Init_thread_footer.LIBCMT ref: 001517F6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Init_thread_footer
              • String ID: CALL
              • API String ID: 1385522511-4196123274
              • Opcode ID: 5da6965ba47e9143575a39f3231a27d041a352762113f7a956b4fac69fdfbe15
              • Instruction ID: d48d9ec6863c544d75128a64984a79e5ee85a17114b60794709e7c9a6a64b0b9
              • Opcode Fuzzy Hash: 5da6965ba47e9143575a39f3231a27d041a352762113f7a956b4fac69fdfbe15
              • Instruction Fuzzy Hash: D0229B70608201EFCB15DF14C480B2ABBF1BF99315F15891DF8AA8B3A1D771E949CB92
              APIs
              • _wcslen.LIBCMT ref: 001B6F6B
                • Part of subcall function 00144ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144EFD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: LibraryLoad_wcslen
              • String ID: >>>AUTOIT SCRIPT<<<
              • API String ID: 3312870042-2806939583
              • Opcode ID: ccb5c7d2e5678e4209cb267ffd2c0007e673b178e7ea7245564a0c593c9b1f5b
              • Instruction ID: 0d1fcd0a2edf9a8f3fc545a56fc1bc52dfaf943088c8b15a9728874798980303
              • Opcode Fuzzy Hash: ccb5c7d2e5678e4209cb267ffd2c0007e673b178e7ea7245564a0c593c9b1f5b
              • Instruction Fuzzy Hash: 0DB182315082018FCB14EF24D4919AEB7E5FFA5314F44895DF49A9B2B2EB30ED49CB92
              APIs
              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00143908
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: IconNotifyShell_
              • String ID:
              • API String ID: 1144537725-0
              • Opcode ID: aab16b3b30b57e62e47cb3bb349f9861b6bcf864598d8bf45c06c8c784d49e88
              • Instruction ID: 9411a5b253101be341d46321de6befe05518de3dd0355abdef6061c2b6f043d7
              • Opcode Fuzzy Hash: aab16b3b30b57e62e47cb3bb349f9861b6bcf864598d8bf45c06c8c784d49e88
              • Instruction Fuzzy Hash: 2031A2B05057019FD720DF24D8857D7FBE8FB59708F00096EFAA983250EB71AA54CB92
              APIs
              • CreateProcessW.KERNELBASE(?,00000000), ref: 011D4933
              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 011D49C9
              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 011D49EB
              Memory Dump Source
              • Source File: 00000000.00000002.1465653293.00000000011D2000.00000040.00000020.00020000.00000000.sdmp, Offset: 011D2000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_11d2000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Process$ContextCreateMemoryReadThreadWow64
              • String ID:
              • API String ID: 2438371351-0
              • Opcode ID: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
              • Instruction ID: dd57213d913b3f0a0d27a0ea688c5acf0bdbab89d9568e73252f0157880fb21d
              • Opcode Fuzzy Hash: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
              • Instruction Fuzzy Hash: 7812CD24E24658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ProtectVirtual
              • String ID:
              • API String ID: 544645111-0
              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
              • Instruction ID: a8f6e7be758d27c7d486a8d94182f75aac87acbb571e27998b88723ad2c5d872
              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
              • Instruction Fuzzy Hash: D7310074A00109DBC718CF99D480969FBB2FB49302B6486B9E819CF656D731EDCADBC0
              APIs
                • Part of subcall function 00144E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00144EDD,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144E9C
                • Part of subcall function 00144E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00144EAE
                • Part of subcall function 00144E90: FreeLibrary.KERNEL32(00000000,?,?,00144EDD,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144EC0
              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144EFD
                • Part of subcall function 00144E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00183CDE,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144E62
                • Part of subcall function 00144E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00144E74
                • Part of subcall function 00144E59: FreeLibrary.KERNEL32(00000000,?,?,00183CDE,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144E87
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Library$Load$AddressFreeProc
              • String ID:
              • API String ID: 2632591731-0
              • Opcode ID: b5285c84fa827cbede6fa58e8496f36df2f1e342002e6482f25cd5c2c5b33625
              • Instruction ID: a4aa1862ad92137c0a85e13f3992fee2b44a760dede1f04af7f7d0f325fea66c
              • Opcode Fuzzy Hash: b5285c84fa827cbede6fa58e8496f36df2f1e342002e6482f25cd5c2c5b33625
              • Instruction Fuzzy Hash: 4E11E332600205ABDF14BB64DC02FAD77A5AF60B10F10882EF542B61E1EF759A499B90
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: __wsopen_s
              • String ID:
              • API String ID: 3347428461-0
              • Opcode ID: d612ad91ba4fe8eec4871fd71cf52115811780082cd4112405490dbcacefd360
              • Instruction ID: 594a49c1b32aa92fca752eeb5f2722b3f5da8ed7bba543b7b1da96cbc26c1c9f
              • Opcode Fuzzy Hash: d612ad91ba4fe8eec4871fd71cf52115811780082cd4112405490dbcacefd360
              • Instruction Fuzzy Hash: 7111487190810AAFCB05DF58E944A9A7BF4EF48314F108059F809AB312DB70EA11CBA4
              APIs
                • Part of subcall function 00174C7D: RtlAllocateHeap.NTDLL(00000008,00141129,00000000,?,00172E29,00000001,00000364,?,?,?,0016F2DE,00173863,00211444,?,0015FDF5,?), ref: 00174CBE
              • _free.LIBCMT ref: 0017506C
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: AllocateHeap_free
              • String ID:
              • API String ID: 614378929-0
              • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
              • Instruction ID: c6b0e97005bb097bc09479a45bcf41d0f0afd96596ed0a0f532df9eda933734a
              • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
              • Instruction Fuzzy Hash: 550126722047086BE3218E659881A5AFBF9FB89370F25451DF19883280EB70A805C6B4
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
              • Instruction ID: c1ea313cb3774b737b3be2df8261359b3ea34258dfcead8edd5c43737755358c
              • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
              • Instruction Fuzzy Hash: A1F02836910A24ABC7313A79DC05B9A33E89F72334F104719F428931D2DB70D8128AA6
              APIs
              • RtlAllocateHeap.NTDLL(00000008,00141129,00000000,?,00172E29,00000001,00000364,?,?,?,0016F2DE,00173863,00211444,?,0015FDF5,?), ref: 00174CBE
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: bb59b219a21df14828178fc8661ffb297078275a5d542256e29b77733a85e138
              • Instruction ID: 547e0c8cf05e84190e67337b3ea12b595278b0d1d6acd138f603f7a2d6323be2
              • Opcode Fuzzy Hash: bb59b219a21df14828178fc8661ffb297078275a5d542256e29b77733a85e138
              • Instruction Fuzzy Hash: 17F0E931603224A7DB235F629C09B5A37A8BF517A0B19C515FD1DA61C4CB30DC1196E0
              APIs
              • RtlAllocateHeap.NTDLL(00000000,?,00211444,?,0015FDF5,?,?,0014A976,00000010,00211440,001413FC,?,001413C6,?,00141129), ref: 00173852
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: 812f083da1367f407daeba73e9299c55a921428dbb80a105c6d2592700a5a109
              • Instruction ID: 3b23d3ba147a3b449f34fdcd8a37c9c489372a684e45fedcd1fb4df464786819
              • Opcode Fuzzy Hash: 812f083da1367f407daeba73e9299c55a921428dbb80a105c6d2592700a5a109
              • Instruction Fuzzy Hash: B7E0E53110122597D7212A669C04F9A3768AB527B0F158326BC3C929D5CB31DD11A1E2
              APIs
              • FreeLibrary.KERNEL32(?,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144F6D
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: FreeLibrary
              • String ID:
              • API String ID: 3664257935-0
              • Opcode ID: c716b89d62fd7729a1a4f7f477ebda5bc9ef5966c2d901855488d237ce227313
              • Instruction ID: dcb2052d327225042689df4894b5ba4f835fdb0f91579ace7abd540d2136860c
              • Opcode Fuzzy Hash: c716b89d62fd7729a1a4f7f477ebda5bc9ef5966c2d901855488d237ce227313
              • Instruction Fuzzy Hash: 13F03071105752CFDB389F68D490922B7E4AF143193108A7EE1EA82531C7319848DF50
              APIs
              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00142DC4
                • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: LongNamePath_wcslen
              • String ID:
              • API String ID: 541455249-0
              • Opcode ID: 6b7b017d2cc831c445b4a56803db14909f96509123d6842af102fd86e2de3527
              • Instruction ID: 7b58332a982d034d5c1443cad7ff2861919dde146e009e9ac800466e52156d1b
              • Opcode Fuzzy Hash: 6b7b017d2cc831c445b4a56803db14909f96509123d6842af102fd86e2de3527
              • Instruction Fuzzy Hash: 9DE0CD726011245BCB10A2589C05FDA77DDDFC8794F040071FD09D7258DA60AD84C691
              APIs
                • Part of subcall function 00143837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00143908
                • Part of subcall function 0014D730: GetInputState.USER32 ref: 0014D807
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00142B6B
                • Part of subcall function 001430F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0014314E
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: IconNotifyShell_$CurrentDirectoryInputState
              • String ID:
              • API String ID: 3667716007-0
              • Opcode ID: 2ed11ef1e7624d69cf48d36ef885d6dbe47a08aef9c3d6746619743bd780b835
              • Instruction ID: 5ca5d3463da08ae5ce1070a56c7c57a96e687ce5d32eebc98785916cf379bcf1
              • Opcode Fuzzy Hash: 2ed11ef1e7624d69cf48d36ef885d6dbe47a08aef9c3d6746619743bd780b835
              • Instruction Fuzzy Hash: A1E0262230020503CA04BB74B8124AEB3499BF1315F40063EF15243173CF7045958251
              APIs
              • CreateFileW.KERNELBASE(00000000,00000000,?,00180704,?,?,00000000,?,00180704,00000000,0000000C), ref: 001803B7
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 2496a1cfd18e288c6b21449ed6dcabde4280d34920d435af07548f90903a2aad
              • Instruction ID: cc8f5daa0c94d63df840f0f805e9a8a177b8b43bf6a5b6a9109cb31f1539746f
              • Opcode Fuzzy Hash: 2496a1cfd18e288c6b21449ed6dcabde4280d34920d435af07548f90903a2aad
              • Instruction Fuzzy Hash: 31D06C3204010DFBDF029F84DD06EDA3BAAFB48714F014000BE1856020C732E861EB90
              APIs
              • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00141CBC
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: InfoParametersSystem
              • String ID:
              • API String ID: 3098949447-0
              • Opcode ID: 920f538ebc21d1f25ad5ff26f5633bf5c13deca1ce2fd04f77f25179a98b3485
              • Instruction ID: fcc3d4383b3596f7fe73fa7007c1ec634076f994e0c9fa848cb374729e250db2
              • Opcode Fuzzy Hash: 920f538ebc21d1f25ad5ff26f5633bf5c13deca1ce2fd04f77f25179a98b3485
              • Instruction Fuzzy Hash: BBC09B36381305EFF6144B80BC4EF507755E358B00F44C501F709655E3C7B11470D650
              APIs
              • Sleep.KERNELBASE(000001F4), ref: 011D5189
              Memory Dump Source
              • Source File: 00000000.00000002.1465653293.00000000011D2000.00000040.00000020.00020000.00000000.sdmp, Offset: 011D2000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_11d2000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
              • Instruction ID: 5543662694afe702856b1000b79c7d56548e963298b47348dcf9eb461591a4da
              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
              • Instruction Fuzzy Hash: DBE0E67498010DDFDB00DFB4D54969E7BF4EF04301F100161FD01D2280D7709D508A62
              APIs
                • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 001D961A
              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 001D965B
              • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 001D969F
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001D96C9
              • SendMessageW.USER32 ref: 001D96F2
              • GetKeyState.USER32(00000011), ref: 001D978B
              • GetKeyState.USER32(00000009), ref: 001D9798
              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 001D97AE
              • GetKeyState.USER32(00000010), ref: 001D97B8
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001D97E9
              • SendMessageW.USER32 ref: 001D9810
              • SendMessageW.USER32(?,00001030,?,001D7E95), ref: 001D9918
              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 001D992E
              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 001D9941
              • SetCapture.USER32(?), ref: 001D994A
              • ClientToScreen.USER32(?,?), ref: 001D99AF
              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 001D99BC
              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001D99D6
              • ReleaseCapture.USER32 ref: 001D99E1
              • GetCursorPos.USER32(?), ref: 001D9A19
              • ScreenToClient.USER32(?,?), ref: 001D9A26
              • SendMessageW.USER32(?,00001012,00000000,?), ref: 001D9A80
              • SendMessageW.USER32 ref: 001D9AAE
              • SendMessageW.USER32(?,00001111,00000000,?), ref: 001D9AEB
              • SendMessageW.USER32 ref: 001D9B1A
              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 001D9B3B
              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 001D9B4A
              • GetCursorPos.USER32(?), ref: 001D9B68
              • ScreenToClient.USER32(?,?), ref: 001D9B75
              • GetParent.USER32(?), ref: 001D9B93
              • SendMessageW.USER32(?,00001012,00000000,?), ref: 001D9BFA
              • SendMessageW.USER32 ref: 001D9C2B
              • ClientToScreen.USER32(?,?), ref: 001D9C84
              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 001D9CB4
              • SendMessageW.USER32(?,00001111,00000000,?), ref: 001D9CDE
              • SendMessageW.USER32 ref: 001D9D01
              • ClientToScreen.USER32(?,?), ref: 001D9D4E
              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 001D9D82
                • Part of subcall function 00159944: GetWindowLongW.USER32(?,000000EB), ref: 00159952
              • GetWindowLongW.USER32(?,000000F0), ref: 001D9E05
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
              • String ID: @GUI_DRAGID$@U=u$F$p#!
              • API String ID: 3429851547-1027384624
              • Opcode ID: 80b02b0ed285cc368df9b30442a3354654e4ea4cb91b067e6d5725ae0c9e3e6a
              • Instruction ID: 22712d5d21ecc5f1d449b435e0e2588e40adcfa11e9820f69a3e897d642878ef
              • Opcode Fuzzy Hash: 80b02b0ed285cc368df9b30442a3354654e4ea4cb91b067e6d5725ae0c9e3e6a
              • Instruction Fuzzy Hash: 2F428D74205241AFDB24CF24CC48EAABBE5FF49310F154A1AF699973A1DB31E864CF91
              APIs
              • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 001D48F3
              • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 001D4908
              • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 001D4927
              • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 001D494B
              • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 001D495C
              • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 001D497B
              • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 001D49AE
              • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 001D49D4
              • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 001D4A0F
              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 001D4A56
              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 001D4A7E
              • IsMenu.USER32(?), ref: 001D4A97
              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001D4AF2
              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001D4B20
              • GetWindowLongW.USER32(?,000000F0), ref: 001D4B94
              • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 001D4BE3
              • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 001D4C82
              • wsprintfW.USER32 ref: 001D4CAE
              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 001D4CC9
              • GetWindowTextW.USER32(?,00000000,00000001), ref: 001D4CF1
              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 001D4D13
              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 001D4D33
              • GetWindowTextW.USER32(?,00000000,00000001), ref: 001D4D5A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
              • String ID: %d/%02d/%02d$@U=u
              • API String ID: 4054740463-2764005415
              • Opcode ID: 3b2379ab20797aa9041dd9bd82014801973cc728c91a9853918c3eea49841c5a
              • Instruction ID: 7fbb24637270aa10c47803bcb07031852d7f34274d0ea444a66e059ca0b2ffe4
              • Opcode Fuzzy Hash: 3b2379ab20797aa9041dd9bd82014801973cc728c91a9853918c3eea49841c5a
              • Instruction Fuzzy Hash: E112DD71601215ABEB248F68CC49FAE7BF8EF45710F10462AF916EB3E1DB749941CB90
              APIs
              • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0015F998
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0019F474
              • IsIconic.USER32(00000000), ref: 0019F47D
              • ShowWindow.USER32(00000000,00000009), ref: 0019F48A
              • SetForegroundWindow.USER32(00000000), ref: 0019F494
              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0019F4AA
              • GetCurrentThreadId.KERNEL32 ref: 0019F4B1
              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0019F4BD
              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0019F4CE
              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0019F4D6
              • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0019F4DE
              • SetForegroundWindow.USER32(00000000), ref: 0019F4E1
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0019F4F6
              • keybd_event.USER32(00000012,00000000), ref: 0019F501
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0019F50B
              • keybd_event.USER32(00000012,00000000), ref: 0019F510
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0019F519
              • keybd_event.USER32(00000012,00000000), ref: 0019F51E
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0019F528
              • keybd_event.USER32(00000012,00000000), ref: 0019F52D
              • SetForegroundWindow.USER32(00000000), ref: 0019F530
              • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0019F557
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
              • String ID: Shell_TrayWnd
              • API String ID: 4125248594-2988720461
              • Opcode ID: 34cef7181c4f1180d105340934ffff2537283f5302040cf1182b9201a29a70c4
              • Instruction ID: bd06cc3e7933db354b363e710678f90685a46ac18a06e140c2a8409241de2487
              • Opcode Fuzzy Hash: 34cef7181c4f1180d105340934ffff2537283f5302040cf1182b9201a29a70c4
              • Instruction Fuzzy Hash: 58315E71B41219BAEF206BB55C4AFBF7F6CEB44B50F11046AFA00E61D1C7B09941EAA0
              APIs
                • Part of subcall function 001A16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001A170D
                • Part of subcall function 001A16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001A173A
                • Part of subcall function 001A16C3: GetLastError.KERNEL32 ref: 001A174A
              • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 001A1286
              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 001A12A8
              • CloseHandle.KERNEL32(?), ref: 001A12B9
              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 001A12D1
              • GetProcessWindowStation.USER32 ref: 001A12EA
              • SetProcessWindowStation.USER32(00000000), ref: 001A12F4
              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 001A1310
                • Part of subcall function 001A10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001A11FC), ref: 001A10D4
                • Part of subcall function 001A10BF: CloseHandle.KERNEL32(?,?,001A11FC), ref: 001A10E9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
              • String ID: $default$winsta0$Z
              • API String ID: 22674027-3366205268
              • Opcode ID: 1cc1114cc26464efb4854366b9b91e98c76e08d2a8aa0430de197aafa68cdaa5
              • Instruction ID: c4fa168453d38354dfdf4c9fa5984e1e3d64aef37214109ed5a827202125bff7
              • Opcode Fuzzy Hash: 1cc1114cc26464efb4854366b9b91e98c76e08d2a8aa0430de197aafa68cdaa5
              • Instruction Fuzzy Hash: 0D819B7594120ABFDF219FA8DC49FEE7BB9EF09704F14452AF910A62A1C7308994CB60
              APIs
                • Part of subcall function 001A10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001A1114
                • Part of subcall function 001A10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A1120
                • Part of subcall function 001A10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A112F
                • Part of subcall function 001A10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A1136
                • Part of subcall function 001A10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001A114D
              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 001A0BCC
              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 001A0C00
              • GetLengthSid.ADVAPI32(?), ref: 001A0C17
              • GetAce.ADVAPI32(?,00000000,?), ref: 001A0C51
              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 001A0C6D
              • GetLengthSid.ADVAPI32(?), ref: 001A0C84
              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 001A0C8C
              • HeapAlloc.KERNEL32(00000000), ref: 001A0C93
              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 001A0CB4
              • CopySid.ADVAPI32(00000000), ref: 001A0CBB
              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 001A0CEA
              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 001A0D0C
              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 001A0D1E
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001A0D45
              • HeapFree.KERNEL32(00000000), ref: 001A0D4C
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001A0D55
              • HeapFree.KERNEL32(00000000), ref: 001A0D5C
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001A0D65
              • HeapFree.KERNEL32(00000000), ref: 001A0D6C
              • GetProcessHeap.KERNEL32(00000000,?), ref: 001A0D78
              • HeapFree.KERNEL32(00000000), ref: 001A0D7F
                • Part of subcall function 001A1193: GetProcessHeap.KERNEL32(00000008,001A0BB1,?,00000000,?,001A0BB1,?), ref: 001A11A1
                • Part of subcall function 001A1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,001A0BB1,?), ref: 001A11A8
                • Part of subcall function 001A1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,001A0BB1,?), ref: 001A11B7
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
              • String ID:
              • API String ID: 4175595110-0
              • Opcode ID: 982d1e5d97bd5f79d60d7f0e8fdbfec642382bc16a3a8d331b98f252f88a6c61
              • Instruction ID: 575d18aab3b8a2c59edfeee611f77bc42fbc8e2e83b34864a54624a206542a3c
              • Opcode Fuzzy Hash: 982d1e5d97bd5f79d60d7f0e8fdbfec642382bc16a3a8d331b98f252f88a6c61
              • Instruction Fuzzy Hash: 1B717B7A90121AEBDF11DFE4DC44FAEBBB8BF09310F044615F914A7291D771AA45CBA0
              APIs
              • OpenClipboard.USER32(001DCC08), ref: 001BEB29
              • IsClipboardFormatAvailable.USER32(0000000D), ref: 001BEB37
              • GetClipboardData.USER32(0000000D), ref: 001BEB43
              • CloseClipboard.USER32 ref: 001BEB4F
              • GlobalLock.KERNEL32(00000000), ref: 001BEB87
              • CloseClipboard.USER32 ref: 001BEB91
              • GlobalUnlock.KERNEL32(00000000), ref: 001BEBBC
              • IsClipboardFormatAvailable.USER32(00000001), ref: 001BEBC9
              • GetClipboardData.USER32(00000001), ref: 001BEBD1
              • GlobalLock.KERNEL32(00000000), ref: 001BEBE2
              • GlobalUnlock.KERNEL32(00000000), ref: 001BEC22
              • IsClipboardFormatAvailable.USER32(0000000F), ref: 001BEC38
              • GetClipboardData.USER32(0000000F), ref: 001BEC44
              • GlobalLock.KERNEL32(00000000), ref: 001BEC55
              • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 001BEC77
              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 001BEC94
              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 001BECD2
              • GlobalUnlock.KERNEL32(00000000), ref: 001BECF3
              • CountClipboardFormats.USER32 ref: 001BED14
              • CloseClipboard.USER32 ref: 001BED59
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
              • String ID:
              • API String ID: 420908878-0
              • Opcode ID: 9051d8630654b163ef58e1259a39ae3eeccd35ae787a30ae76094b4730c18988
              • Instruction ID: 8fc718e0e73b273499e13ee450636fa88d3d793f49655b059b842ae38e2b3dc4
              • Opcode Fuzzy Hash: 9051d8630654b163ef58e1259a39ae3eeccd35ae787a30ae76094b4730c18988
              • Instruction Fuzzy Hash: 6561D2352053029FD300EF64D888FAA77E8EF94714F14491EF456972A2CB71DD85CBA2
              APIs
              • FindFirstFileW.KERNEL32(?,?), ref: 001B69BE
              • FindClose.KERNEL32(00000000), ref: 001B6A12
              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 001B6A4E
              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 001B6A75
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 001B6AB2
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 001B6ADF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
              • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
              • API String ID: 3830820486-3289030164
              • Opcode ID: 9f8bf00ab914542d7427e53e30467cb8c3a9ec91ec0a88e7dbd94d2a98c4e12a
              • Instruction ID: b363b33c2f2a2b20c561079e730a94289c976e43239faa5dc57d539463a1f36a
              • Opcode Fuzzy Hash: 9f8bf00ab914542d7427e53e30467cb8c3a9ec91ec0a88e7dbd94d2a98c4e12a
              • Instruction Fuzzy Hash: 17D17271508300AFC714EBA4D891EAFB7ECAFA9704F44491DF585D71A1EB34DA48CBA2
              APIs
              • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 001B9663
              • GetFileAttributesW.KERNEL32(?), ref: 001B96A1
              • SetFileAttributesW.KERNEL32(?,?), ref: 001B96BB
              • FindNextFileW.KERNEL32(00000000,?), ref: 001B96D3
              • FindClose.KERNEL32(00000000), ref: 001B96DE
              • FindFirstFileW.KERNEL32(*.*,?), ref: 001B96FA
              • SetCurrentDirectoryW.KERNEL32(?), ref: 001B974A
              • SetCurrentDirectoryW.KERNEL32(00206B7C), ref: 001B9768
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 001B9772
              • FindClose.KERNEL32(00000000), ref: 001B977F
              • FindClose.KERNEL32(00000000), ref: 001B978F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
              • String ID: *.*
              • API String ID: 1409584000-438819550
              • Opcode ID: db18c2fa0c99ba2b717eb38ef472f5bfa9f3e0e29bacdefc11be97f87bef9ef0
              • Instruction ID: 3ec6a01ba28fd3cbdde3f344a5ba05b88bd3e501bfccb4f00e216375309551cf
              • Opcode Fuzzy Hash: db18c2fa0c99ba2b717eb38ef472f5bfa9f3e0e29bacdefc11be97f87bef9ef0
              • Instruction Fuzzy Hash: 0F31E47254221A6EDF14EFB4DC48ADE77ECAF09320F104556FA05E21A1EB30DD91CE90
              APIs
              • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 001B97BE
              • FindNextFileW.KERNEL32(00000000,?), ref: 001B9819
              • FindClose.KERNEL32(00000000), ref: 001B9824
              • FindFirstFileW.KERNEL32(*.*,?), ref: 001B9840
              • SetCurrentDirectoryW.KERNEL32(?), ref: 001B9890
              • SetCurrentDirectoryW.KERNEL32(00206B7C), ref: 001B98AE
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 001B98B8
              • FindClose.KERNEL32(00000000), ref: 001B98C5
              • FindClose.KERNEL32(00000000), ref: 001B98D5
                • Part of subcall function 001ADAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 001ADB00
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
              • String ID: *.*
              • API String ID: 2640511053-438819550
              • Opcode ID: a2660e9c33dd03fdf8231f50ddcd9de09f27a2006043955d1e2fadd560335eca
              • Instruction ID: 5ebfb528ac21e9be1df646d224f41bb4f302c31639098593abb823f61c3b8380
              • Opcode Fuzzy Hash: a2660e9c33dd03fdf8231f50ddcd9de09f27a2006043955d1e2fadd560335eca
              • Instruction Fuzzy Hash: 0031127250121E6ADF10EFB4EC48ADE77BCAF06320F104556EA00E20E1DB30DA96CAA0
              APIs
              • GetLocalTime.KERNEL32(?), ref: 001B8257
              • SystemTimeToFileTime.KERNEL32(?,?), ref: 001B8267
              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 001B8273
              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 001B8310
              • SetCurrentDirectoryW.KERNEL32(?), ref: 001B8324
              • SetCurrentDirectoryW.KERNEL32(?), ref: 001B8356
              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 001B838C
              • SetCurrentDirectoryW.KERNEL32(?), ref: 001B8395
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CurrentDirectoryTime$File$Local$System
              • String ID: *.*
              • API String ID: 1464919966-438819550
              • Opcode ID: fdd964d0929e29ca5514a5a0300a148153c204be66a397aeb15e12dc89bbc532
              • Instruction ID: 9b49178c694891e401f93924861950f2c7bacafe958dfe418cd09dc738b7247b
              • Opcode Fuzzy Hash: fdd964d0929e29ca5514a5a0300a148153c204be66a397aeb15e12dc89bbc532
              • Instruction Fuzzy Hash: F26159725083459FCB10EF64D8809AEB3ECFF99714F04491AF999C7261DB31E945CB92
              APIs
                • Part of subcall function 00143AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00143A97,?,?,00142E7F,?,?,?,00000000), ref: 00143AC2
                • Part of subcall function 001AE199: GetFileAttributesW.KERNEL32(?,001ACF95), ref: 001AE19A
              • FindFirstFileW.KERNEL32(?,?), ref: 001AD122
              • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 001AD1DD
              • MoveFileW.KERNEL32(?,?), ref: 001AD1F0
              • DeleteFileW.KERNEL32(?,?,?,?), ref: 001AD20D
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 001AD237
                • Part of subcall function 001AD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,001AD21C,?,?), ref: 001AD2B2
              • FindClose.KERNEL32(00000000,?,?,?), ref: 001AD253
              • FindClose.KERNEL32(00000000), ref: 001AD264
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
              • String ID: \*.*
              • API String ID: 1946585618-1173974218
              • Opcode ID: c2f998ab14309c5e970a323354c96b0f09db0eb663573fd08296e55ac3541a29
              • Instruction ID: e94fe19ac2b6f85d99f35bbadbaaacdeb927d10a88c753362bd079bab7d20636
              • Opcode Fuzzy Hash: c2f998ab14309c5e970a323354c96b0f09db0eb663573fd08296e55ac3541a29
              • Instruction Fuzzy Hash: 8961603580110D9FCF05EBE0E992AEDB7B5AF66304F604166E406771A2EB305F09DB60
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
              • String ID:
              • API String ID: 1737998785-0
              • Opcode ID: 2e7e903bdebf3f315500f55df17264010b5b044bd6b4ed649e38427e4a658f8e
              • Instruction ID: 2e681123ae6cfbf8ee5eb1d80282386f79ca5ccaa28f2aec17fe753a22acc445
              • Opcode Fuzzy Hash: 2e7e903bdebf3f315500f55df17264010b5b044bd6b4ed649e38427e4a658f8e
              • Instruction Fuzzy Hash: 7541BE35606612AFE720DF19E888B99BBE5EF44318F14C49AE4158FB62C775EC81CBD0
              APIs
                • Part of subcall function 001A16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001A170D
                • Part of subcall function 001A16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001A173A
                • Part of subcall function 001A16C3: GetLastError.KERNEL32 ref: 001A174A
              • ExitWindowsEx.USER32(?,00000000), ref: 001AE932
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
              • String ID: $ $@$SeShutdownPrivilege
              • API String ID: 2234035333-3163812486
              • Opcode ID: e6ad180fda822dfe47621d64569b90339bb9f75bcf578710b6e575ad2caca6b9
              • Instruction ID: 7d5f24cc18d3cf24a4cac72ab988cabe195133fd25b153d88768e39c808b3433
              • Opcode Fuzzy Hash: e6ad180fda822dfe47621d64569b90339bb9f75bcf578710b6e575ad2caca6b9
              • Instruction Fuzzy Hash: 6001D67A611311ABEB5426B89C8ABBB729CAB16758F154922F802E21D2D7A05C84C5E4
              APIs
              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 001C1276
              • WSAGetLastError.WSOCK32 ref: 001C1283
              • bind.WSOCK32(00000000,?,00000010), ref: 001C12BA
              • WSAGetLastError.WSOCK32 ref: 001C12C5
              • closesocket.WSOCK32(00000000), ref: 001C12F4
              • listen.WSOCK32(00000000,00000005), ref: 001C1303
              • WSAGetLastError.WSOCK32 ref: 001C130D
              • closesocket.WSOCK32(00000000), ref: 001C133C
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorLast$closesocket$bindlistensocket
              • String ID:
              • API String ID: 540024437-0
              • Opcode ID: 3f6a58d3e1d20f38102ad23a6be20ebe58aaeadfec7798f16f17b8e80e710bfa
              • Instruction ID: d92cc8cfa6f6d6e16bd2b72ba7efc64be6f0677521fa1c04255536caf4069e4a
              • Opcode Fuzzy Hash: 3f6a58d3e1d20f38102ad23a6be20ebe58aaeadfec7798f16f17b8e80e710bfa
              • Instruction Fuzzy Hash: 1A416E35601141AFD710DF24C488F29BBE6AF56318F28858DE8568F2A3C771EC81CBE1
              APIs
              • _free.LIBCMT ref: 0017B9D4
              • _free.LIBCMT ref: 0017B9F8
              • _free.LIBCMT ref: 0017BB7F
              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,001E3700), ref: 0017BB91
              • WideCharToMultiByte.KERNEL32(00000000,00000000,0021121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0017BC09
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00211270,000000FF,?,0000003F,00000000,?), ref: 0017BC36
              • _free.LIBCMT ref: 0017BD4B
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _free$ByteCharMultiWide$InformationTimeZone
              • String ID:
              • API String ID: 314583886-0
              • Opcode ID: 4343a6f2d91b320eb58ac05cbd318b768275657fb18bd014ca00e97e6b5a46a9
              • Instruction ID: d8e50a08684c964bd3aa1b0f7c7bfe28d868566dbcc9fba96314416af102be4c
              • Opcode Fuzzy Hash: 4343a6f2d91b320eb58ac05cbd318b768275657fb18bd014ca00e97e6b5a46a9
              • Instruction Fuzzy Hash: 59C12971908219AFCB25AF78DC85BAA7BB8EF51310F14C19AE99CD7251EB308E41C750
              APIs
                • Part of subcall function 00143AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00143A97,?,?,00142E7F,?,?,?,00000000), ref: 00143AC2
                • Part of subcall function 001AE199: GetFileAttributesW.KERNEL32(?,001ACF95), ref: 001AE19A
              • FindFirstFileW.KERNEL32(?,?), ref: 001AD420
              • DeleteFileW.KERNEL32(?,?,?,?), ref: 001AD470
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 001AD481
              • FindClose.KERNEL32(00000000), ref: 001AD498
              • FindClose.KERNEL32(00000000), ref: 001AD4A1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
              • String ID: \*.*
              • API String ID: 2649000838-1173974218
              • Opcode ID: 0c4621bc845d0176bd9c57aa882f61f601f7db38507967a7d189c3d3603f61a1
              • Instruction ID: f6ab44dc650406ffa4e0fb9360131d7211e4e47f0b97b92457efac5a86242c15
              • Opcode Fuzzy Hash: 0c4621bc845d0176bd9c57aa882f61f601f7db38507967a7d189c3d3603f61a1
              • Instruction Fuzzy Hash: 343170710093459FC304EF64D8558AF77A8BFA6314F444E1EF4D6935A1EB30AA09C763
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: __floor_pentium4
              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
              • API String ID: 4168288129-2761157908
              • Opcode ID: 44b2aba24df5de21a78a234cf013e4b0a3a59c267238b4e76a173c11773f76c9
              • Instruction ID: 587800f399d3e97c7064dddcab1d8cf1a1dbd40b6f0cd93bf47d5a76b552fe8d
              • Opcode Fuzzy Hash: 44b2aba24df5de21a78a234cf013e4b0a3a59c267238b4e76a173c11773f76c9
              • Instruction Fuzzy Hash: BCC21A71E086298FDB29CE28DD407EAB7F5EB49305F1581EAD44DE7241E774AE828F40
              APIs
              • _wcslen.LIBCMT ref: 001B64DC
              • CoInitialize.OLE32(00000000), ref: 001B6639
              • CoCreateInstance.OLE32(001DFCF8,00000000,00000001,001DFB68,?), ref: 001B6650
              • CoUninitialize.OLE32 ref: 001B68D4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CreateInitializeInstanceUninitialize_wcslen
              • String ID: .lnk
              • API String ID: 886957087-24824748
              • Opcode ID: bb53d128ff063f15dae857c3af4bf3d5e17fc517a161f32f7c283e4ca162d67f
              • Instruction ID: eba0de6e904314fba357371ac1f3a6ca80b1b6e37aa15dd3f962e3003c1fec1d
              • Opcode Fuzzy Hash: bb53d128ff063f15dae857c3af4bf3d5e17fc517a161f32f7c283e4ca162d67f
              • Instruction Fuzzy Hash: 90D139715083019FC314EF24C881DABB7E9FFA9744F10496DF5958B2A1DB71E909CB92
              APIs
              • GetForegroundWindow.USER32(?,?,00000000), ref: 001C22E8
                • Part of subcall function 001BE4EC: GetWindowRect.USER32(?,?), ref: 001BE504
              • GetDesktopWindow.USER32 ref: 001C2312
              • GetWindowRect.USER32(00000000), ref: 001C2319
              • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 001C2355
              • GetCursorPos.USER32(?), ref: 001C2381
              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 001C23DF
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$Rectmouse_event$CursorDesktopForeground
              • String ID:
              • API String ID: 2387181109-0
              • Opcode ID: fc0e4faa44738ffa557d34a0f54938c7c2d910b8745b07d304008d578674684c
              • Instruction ID: a33c9695d29398b64e4dcbe09c29d51b316a266c3045bbdf9f70cd73f7023948
              • Opcode Fuzzy Hash: fc0e4faa44738ffa557d34a0f54938c7c2d910b8745b07d304008d578674684c
              • Instruction Fuzzy Hash: 3731DC72106346ABC720DF54D808F9BBBA9FB98714F000A1EF88497181DB34EA48CBD2
              APIs
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
              • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 001B9B78
              • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 001B9C8B
                • Part of subcall function 001B3874: GetInputState.USER32 ref: 001B38CB
                • Part of subcall function 001B3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001B3966
              • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 001B9BA8
              • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 001B9C75
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
              • String ID: *.*
              • API String ID: 1972594611-438819550
              • Opcode ID: e99f56d6f64485c4e6ebbb372425d899faf294feba4221a76163c5c00a5e8196
              • Instruction ID: d78c28f151339c6dc2429afcab1b6d973d78961cca4642fa97fcd07648fae118
              • Opcode Fuzzy Hash: e99f56d6f64485c4e6ebbb372425d899faf294feba4221a76163c5c00a5e8196
              • Instruction Fuzzy Hash: 9041807194120AAFCF14DFA4C989AEEBBB4EF15310F204156F505A71A1EB309E95CFA0
              Strings
              • VUUU, xrefs: 00185DF0
              • VUUU, xrefs: 001483E8
              • _______________________________________________________________________________________________________________________________abccccccccdeefghijklmnopqrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstyzzzzzzzzzzzzzzzz{{{{, xrefs: 00185D55
              • VUUU, xrefs: 0014843C
              • VUUU, xrefs: 001483FA
              • ERCP, xrefs: 0014813C
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID: ERCP$VUUU$VUUU$VUUU$VUUU$_______________________________________________________________________________________________________________________________abccccccccdeefghijklmnopqrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstuvwxrstyzzzzzzzzzzzzzzzz{{{{
              • API String ID: 0-2009957334
              • Opcode ID: ec53f2ae3c28bea9cd28bad2d19a40c54220da0ae65aeffdb00d686f5cf7bcab
              • Instruction ID: 92b0f601a77e8414bd6f43fdfb0462bdfe0b7f87a03c407f76e8ad3d3096846a
              • Opcode Fuzzy Hash: ec53f2ae3c28bea9cd28bad2d19a40c54220da0ae65aeffdb00d686f5cf7bcab
              • Instruction Fuzzy Hash: 36A27071E0061ACBDF24DF58C8507AEB7B2FF54314F2581AAE815AB295DB709E81CF90
              APIs
                • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
              • DefDlgProcW.USER32(?,?,?,?,?), ref: 00159A4E
              • GetSysColor.USER32(0000000F), ref: 00159B23
              • SetBkColor.GDI32(?,00000000), ref: 00159B36
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Color$LongProcWindow
              • String ID:
              • API String ID: 3131106179-0
              • Opcode ID: 13c695ce5b28d92faade3b908edac03832463c2b4c9c0757ca769d781ddfe7d2
              • Instruction ID: c5fa91400d9d11c65f5f0aa0fea77c718e83bcb629c90a60bfa2ede97f53faa2
              • Opcode Fuzzy Hash: 13c695ce5b28d92faade3b908edac03832463c2b4c9c0757ca769d781ddfe7d2
              • Instruction Fuzzy Hash: C9A108B0218544EEEB2DAA3C9C4CDBB365DDF52342B16420AF922CF6D5CB259D05C273
              APIs
                • Part of subcall function 001C304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 001C307A
                • Part of subcall function 001C304E: _wcslen.LIBCMT ref: 001C309B
              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 001C185D
              • WSAGetLastError.WSOCK32 ref: 001C1884
              • bind.WSOCK32(00000000,?,00000010), ref: 001C18DB
              • WSAGetLastError.WSOCK32 ref: 001C18E6
              • closesocket.WSOCK32(00000000), ref: 001C1915
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
              • String ID:
              • API String ID: 1601658205-0
              • Opcode ID: 7872cff18f1321441e9869aeb681bde09acd3048cb7e3e298cc4a687929dcfe9
              • Instruction ID: 11b77ddfcf9cb760a82d5a948cff3556da003358e995e3a9a504b4f459c63e8f
              • Opcode Fuzzy Hash: 7872cff18f1321441e9869aeb681bde09acd3048cb7e3e298cc4a687929dcfe9
              • Instruction Fuzzy Hash: 5D519F71A40210AFDB10AF64C886F2AB7A5AB59718F18849CF9169F3D3C771ED41CBE1
              APIs
              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 001A82AA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: lstrlen
              • String ID: ($tb $|
              • API String ID: 1659193697-4033350771
              • Opcode ID: a308c0e45cb2b7408476f702342fcbef6a93f1ca568be0546fe30ed432d3169a
              • Instruction ID: d66500697d6623988cc6ac2edcbfc6b6f99b2d976c5ab7bff38acc80e188a862
              • Opcode Fuzzy Hash: a308c0e45cb2b7408476f702342fcbef6a93f1ca568be0546fe30ed432d3169a
              • Instruction Fuzzy Hash: EB322579A007059FCB28CF59C481A6AB7F0FF48710B15C56EE99ADB3A1EB70E941CB40
              APIs
              • CreateToolhelp32Snapshot.KERNEL32 ref: 001CA6AC
              • Process32FirstW.KERNEL32(00000000,?), ref: 001CA6BA
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
              • Process32NextW.KERNEL32(00000000,?), ref: 001CA79C
              • CloseHandle.KERNEL32(00000000), ref: 001CA7AB
                • Part of subcall function 0015CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00183303,?), ref: 0015CE8A
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
              • String ID:
              • API String ID: 1991900642-0
              • Opcode ID: cd89ebc77494d9b38077b1e149da42a35cd690aa6d00cf6eb588b3f6f8b94383
              • Instruction ID: 25e0c252b1dcafe970dd62e6c323252e5e04b3bf969d02e2cf2665536df96747
              • Opcode Fuzzy Hash: cd89ebc77494d9b38077b1e149da42a35cd690aa6d00cf6eb588b3f6f8b94383
              • Instruction Fuzzy Hash: 7C516C71508311AFD310EF24D886E6BBBE8FFA9754F40491DF99997262EB30D904CB92
              APIs
              • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 001AAAAC
              • SetKeyboardState.USER32(00000080), ref: 001AAAC8
              • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 001AAB36
              • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 001AAB88
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: KeyboardState$InputMessagePostSend
              • String ID:
              • API String ID: 432972143-0
              • Opcode ID: c884f0988db7a0d46db7c8cda0e38fb0eb7297fae232f2cf16fee31800fc3675
              • Instruction ID: 945d7f761514dd0eccd1ec8801f8f46e7fa3e95960c1d1325b974ab6d668b50e
              • Opcode Fuzzy Hash: c884f0988db7a0d46db7c8cda0e38fb0eb7297fae232f2cf16fee31800fc3675
              • Instruction Fuzzy Hash: 16313934A80348AEFF35CB64CC05BFA7BA6AF56320F84421BF581965D1D3759981C7B2
              APIs
              • InternetReadFile.WININET(?,?,00000400,?), ref: 001BCE89
              • GetLastError.KERNEL32(?,00000000), ref: 001BCEEA
              • SetEvent.KERNEL32(?,?,00000000), ref: 001BCEFE
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorEventFileInternetLastRead
              • String ID:
              • API String ID: 234945975-0
              • Opcode ID: eea850e30bc5a6fd5b2a360c9f9eed60f62147a8124913271187af00f9e59a9c
              • Instruction ID: 613448248fd67da98a0fa9c2b8ddae2ff9a7363e3a92511bc51978b7ac994e05
              • Opcode Fuzzy Hash: eea850e30bc5a6fd5b2a360c9f9eed60f62147a8124913271187af00f9e59a9c
              • Instruction Fuzzy Hash: B9219D71601306EBDB20DFA5C948BA77BF8EB50354F10481EE546D2151E770EE44CBE0
              APIs
              • IsDebuggerPresent.KERNEL32 ref: 0017271A
              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00172724
              • UnhandledExceptionFilter.KERNEL32(?), ref: 00172731
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled$DebuggerPresent
              • String ID:
              • API String ID: 3906539128-0
              • Opcode ID: c28f90e5547ad01b9c5c45a6c6d2290355540a9941381c3e590f898ed917b119
              • Instruction ID: 65f14d8c88032bfa191fe82adb4c55660c5b10cfa77ef393bddbb5befb921bfc
              • Opcode Fuzzy Hash: c28f90e5547ad01b9c5c45a6c6d2290355540a9941381c3e590f898ed917b119
              • Instruction Fuzzy Hash: 5431B774911218ABCB21DF64DD8979DB7B8BF18310F5082DAE81CA7261E7309F818F45
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 001B51DA
              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 001B5238
              • SetErrorMode.KERNEL32(00000000), ref: 001B52A1
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorMode$DiskFreeSpace
              • String ID:
              • API String ID: 1682464887-0
              • Opcode ID: fe6bcac8bb77a6fd12a7168ea9fda1c052f73df93a7b47eaf5bc82d445c73430
              • Instruction ID: 8b9761ed8d2a404a2e9df131e8770008c49f2c292c0d3081ca397eb39efe9393
              • Opcode Fuzzy Hash: fe6bcac8bb77a6fd12a7168ea9fda1c052f73df93a7b47eaf5bc82d445c73430
              • Instruction Fuzzy Hash: DB314C75A01519DFDB00DF54D884FAEBBB5FF49314F048499E805AB3A2DB31E856CB90
              APIs
                • Part of subcall function 0015FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00160668
                • Part of subcall function 0015FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00160685
              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 001A170D
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 001A173A
              • GetLastError.KERNEL32 ref: 001A174A
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
              • String ID:
              • API String ID: 577356006-0
              • Opcode ID: ebdc164fd2ae19b97101242c38dfbcee8641fc5af46684840ba1dde1b7b73add
              • Instruction ID: 0c7efa09d2386b4e6044002b97e336ee09943d6589d4f849a804450a971dd34c
              • Opcode Fuzzy Hash: ebdc164fd2ae19b97101242c38dfbcee8641fc5af46684840ba1dde1b7b73add
              • Instruction Fuzzy Hash: DA11C1B2400305BFD7189F94DC86D6BB7B9EB04714B20852EF45697641EB70BC41CA60
              APIs
              • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 001AD608
              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 001AD645
              • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 001AD650
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CloseControlCreateDeviceFileHandle
              • String ID:
              • API String ID: 33631002-0
              • Opcode ID: aeb102ba6de4ef79fe641ec145d98cfacfa37c4674b577186dd8730ce9323df9
              • Instruction ID: ffefc15db580afc6e3d5c1be1b9d8d7ad316ed9ac9462a3dc20681e822a381aa
              • Opcode Fuzzy Hash: aeb102ba6de4ef79fe641ec145d98cfacfa37c4674b577186dd8730ce9323df9
              • Instruction Fuzzy Hash: EA113C75E06228BBDB148F99AC45FAFBBBCEB45B50F108516F908E7290D6704A058BA1
              APIs
              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 001A168C
              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 001A16A1
              • FreeSid.ADVAPI32(?), ref: 001A16B1
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: AllocateCheckFreeInitializeMembershipToken
              • String ID:
              • API String ID: 3429775523-0
              • Opcode ID: 65d880585bdf11a094556d211ec86fb8d43b94949b6c43823b8a6bae734b9254
              • Instruction ID: 74ecceacf4b9803e4b65106b4e7acee4883419c181fc15b77b789cdcd05e3f69
              • Opcode Fuzzy Hash: 65d880585bdf11a094556d211ec86fb8d43b94949b6c43823b8a6bae734b9254
              • Instruction Fuzzy Hash: 47F0F475952309FBDF00DFE49C89AAEBBBCFB08604F504965E501E2181E774AA44CA90
              APIs
              • GetCurrentProcess.KERNEL32(001728E9,?,00164CBE,001728E9,002088B8,0000000C,00164E15,001728E9,00000002,00000000,?,001728E9), ref: 00164D09
              • TerminateProcess.KERNEL32(00000000,?,00164CBE,001728E9,002088B8,0000000C,00164E15,001728E9,00000002,00000000,?,001728E9), ref: 00164D10
              • ExitProcess.KERNEL32 ref: 00164D22
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Process$CurrentExitTerminate
              • String ID:
              • API String ID: 1703294689-0
              • Opcode ID: c659413c85bebc965496659b0888e639e42f12162296d28bfb0d9f5f03e9bf31
              • Instruction ID: 8eb4d42b98b506fd8f863f45cb945d3d62c296a58e97778ee5cb531dfa3a4aae
              • Opcode Fuzzy Hash: c659413c85bebc965496659b0888e639e42f12162296d28bfb0d9f5f03e9bf31
              • Instruction Fuzzy Hash: D0E0B631402149BBCF11AF94DD09A583B69FB61782F108415FC198B522CB35DE92DA80
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID: /
              • API String ID: 0-2043925204
              • Opcode ID: fb8fb6cc299fb2f25afe35fb47c143a57b13983a342a5ec9a030bfc2de553a91
              • Instruction ID: ed3a48c8eeedf0dcaffc16e425551259084871958a9f441dbdd5b8ee32d0a667
              • Opcode Fuzzy Hash: fb8fb6cc299fb2f25afe35fb47c143a57b13983a342a5ec9a030bfc2de553a91
              • Instruction Fuzzy Hash: 3B412876500619ABCB249FB9DC49EAB77B8FB84314F10866DF909D7181E7709D81CB90
              APIs
              • GetUserNameW.ADVAPI32(?,?), ref: 0019D28C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: NameUser
              • String ID: X64
              • API String ID: 2645101109-893830106
              • Opcode ID: 4679aca7d1abc07294e902dfdbdb84ec943f95fad2a82139104b8a946f8bdaf1
              • Instruction ID: bc0570dbce24718aea1d5b7ed4dda982ccd64425deb66a5418ab0114c171608b
              • Opcode Fuzzy Hash: 4679aca7d1abc07294e902dfdbdb84ec943f95fad2a82139104b8a946f8bdaf1
              • Instruction Fuzzy Hash: 72D0C9B480211DEACF94CB90EC88DDAB37CBB04305F100552F506A2080DB3095488F10
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
              • Instruction ID: d74d4d19bb408f285b5ee52a8c8f45d19c558f8887941f339f9b4dca24924b09
              • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
              • Instruction Fuzzy Hash: 53022C72E002199BDF14CFA9C8906ADFBF1EF88314F25816AD859E7380D731AA51CBD4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID: Variable is not of type 'Object'.$p#!
              • API String ID: 0-498771827
              • Opcode ID: 3d567cb0fecabe0f0c45aeed37b17b70db6f06725e889276fdb4c87f3c41834a
              • Instruction ID: e8dfe3b64cb414df2e8e8dae16c5a54b5d9f002467c8934f60e3e23f2fc4d33b
              • Opcode Fuzzy Hash: 3d567cb0fecabe0f0c45aeed37b17b70db6f06725e889276fdb4c87f3c41834a
              • Instruction Fuzzy Hash: D632B174901218DFCF54DF94C885BEDB7B5FF19304F148069E806AB2A2DB35AE49CBA0
              APIs
              • FindFirstFileW.KERNEL32(?,?), ref: 001B6918
              • FindClose.KERNEL32(00000000), ref: 001B6961
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Find$CloseFileFirst
              • String ID:
              • API String ID: 2295610775-0
              • Opcode ID: 1d16ffce118e1468067dba131ccd6f7a345086399086b375b3089eeac4ec4858
              • Instruction ID: d1f0710eee54dd9bc7ccf6dc3a11a898b4b9315c57577081668337eb1a06d037
              • Opcode Fuzzy Hash: 1d16ffce118e1468067dba131ccd6f7a345086399086b375b3089eeac4ec4858
              • Instruction Fuzzy Hash: 2D11D0316042119FC710CF29D484A16BBE1FF94328F04C699F8698F6A2C734EC45CBD0
              APIs
              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,001C4891,?,?,00000035,?), ref: 001B37E4
              • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,001C4891,?,?,00000035,?), ref: 001B37F4
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorFormatLastMessage
              • String ID:
              • API String ID: 3479602957-0
              • Opcode ID: 8d1656e7ae3264112a5bd703c9c8d95f035cfc3b508291e2938204a14851475d
              • Instruction ID: 181431fb81d216e60e80ac6ff1e5fc00aaae73c626c95027e9948a3d0aa10a67
              • Opcode Fuzzy Hash: 8d1656e7ae3264112a5bd703c9c8d95f035cfc3b508291e2938204a14851475d
              • Instruction Fuzzy Hash: 31F0E5B16062297AE72027669C4DFEB3BAEEFC4761F000265F509D2291DB609944C7F0
              APIs
              • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 001AB25D
              • keybd_event.USER32(?,753DC0D0,?,00000000), ref: 001AB270
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: InputSendkeybd_event
              • String ID:
              • API String ID: 3536248340-0
              • Opcode ID: 3b7ce98068a06247dd9f966b8d21bc0a6e6b92df52350b43a21520c3ca3325cb
              • Instruction ID: 4b022e199f0c81c92a41e5a4c8c94218f43922c9c7b0bb9c2e2b28fbd7e14877
              • Opcode Fuzzy Hash: 3b7ce98068a06247dd9f966b8d21bc0a6e6b92df52350b43a21520c3ca3325cb
              • Instruction Fuzzy Hash: F9F0177590428EABDB059FA0C806BAE7BB4FF09309F00844AF965A61A2C3799651DF94
              APIs
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001A11FC), ref: 001A10D4
              • CloseHandle.KERNEL32(?,?,001A11FC), ref: 001A10E9
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: AdjustCloseHandlePrivilegesToken
              • String ID:
              • API String ID: 81990902-0
              • Opcode ID: db204f65e524e2dc636d9d624359399192af53d5cbc3716768ace5015d51bcf1
              • Instruction ID: abb4fa19f4c0f144d4f4190745f4a868e90c245555971a36b96474166b5bef9c
              • Opcode Fuzzy Hash: db204f65e524e2dc636d9d624359399192af53d5cbc3716768ace5015d51bcf1
              • Instruction Fuzzy Hash: 17E04F72005601FEE7252B51FC06F7377A9EB04311F10882EF8A5844B1DB626CD0DB50
              APIs
              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00176766,?,?,00000008,?,?,0017FEFE,00000000), ref: 00176998
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ExceptionRaise
              • String ID:
              • API String ID: 3997070919-0
              • Opcode ID: 4c7ec43f57d194eb5991212e79e9231efe18bf36c56838513a315c1f787ebb02
              • Instruction ID: 6f000df0bcc62ea39bd610a19982691989ef2d069ab1d9db378187b5dbbd8306
              • Opcode Fuzzy Hash: 4c7ec43f57d194eb5991212e79e9231efe18bf36c56838513a315c1f787ebb02
              • Instruction Fuzzy Hash: 52B12931610A099FD719CF28C48AB657BB0FF45368F25C698E99DCF2A2C335E995CB40
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: c2c50ac9a83e1c4662e9f979807399735548f3383686bcb77786b98e00a1fb5c
              • Instruction ID: e91e4945e1bf1a2c3ba3518efafd517b3755ba2ce7726efc5cacc1ad85d88a15
              • Opcode Fuzzy Hash: c2c50ac9a83e1c4662e9f979807399735548f3383686bcb77786b98e00a1fb5c
              • Instruction Fuzzy Hash: 17126D71904229DFCF24CF58C880AEEB7F5FF48710F15819AE859EB255EB309A85CB90
              APIs
              • BlockInput.USER32(00000001), ref: 001BEABD
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: BlockInput
              • String ID:
              • API String ID: 3456056419-0
              • Opcode ID: 743806e2cdeea054bb6eb6514c2eed248bdf92f90e5426142f7b363d25ddf5d9
              • Instruction ID: 0f2744a009a2816a044936346b9b7f75e2a311ab3303a78a654966337c58ec35
              • Opcode Fuzzy Hash: 743806e2cdeea054bb6eb6514c2eed248bdf92f90e5426142f7b363d25ddf5d9
              • Instruction Fuzzy Hash: 91E04F312012049FC710EF69D844EDAF7EDAFA8760F008816FC49CB3A1DB70E8408B90
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,001603EE), ref: 001609DA
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: 8496916e2031d0d86dee912fa1534a16462d435cdd112a5848de3db6c116e6a2
              • Instruction ID: 53ee51feeaf869dc32dce88c387522920ce8648cae3afb2c0f42e35868e70501
              • Opcode Fuzzy Hash: 8496916e2031d0d86dee912fa1534a16462d435cdd112a5848de3db6c116e6a2
              • Instruction Fuzzy Hash:
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID: 0
              • API String ID: 0-4108050209
              • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
              • Instruction ID: 418aae584077b7f435f1242f9378701294227c45e8482d7e16ebf2a245c28f45
              • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
              • Instruction Fuzzy Hash: 4D51777160C7059BDB3889788C5EBBE63DD9B2235CF180A09E882D72C2CB15EE71D356
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID: 0&!
              • API String ID: 0-1419620344
              • Opcode ID: 43469d8c244f55b32967cbe7189211f24f8883fcc5b04a1932687fa1acc781e6
              • Instruction ID: f83aad06b7056ae799c8af964916890489c292ccbf61485bfdff114e1f6493c7
              • Opcode Fuzzy Hash: 43469d8c244f55b32967cbe7189211f24f8883fcc5b04a1932687fa1acc781e6
              • Instruction Fuzzy Hash: 7321A8326205158BD728CE79C8166BA73E5A764310F15862EF4A7C37D0DF35A908C740
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a18eb8aefda32e9f2cd9994f7d70d92970e4a52fbce395a90b4c2ae266b0437b
              • Instruction ID: 6300bcb1ee5865f4feafc62022c314af71245c680f04150fb822a920c4795eeb
              • Opcode Fuzzy Hash: a18eb8aefda32e9f2cd9994f7d70d92970e4a52fbce395a90b4c2ae266b0437b
              • Instruction Fuzzy Hash: 8932F022D29F414DD7239634CC72339A69DAFB73C5F15D727E81AB9DAAEB2984C34100
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9c35bbaf75acc9f5407b43b23d9eac2dbb820a9f8bb7e1af56421969bd5092b1
              • Instruction ID: 2c93529c94911d5230de55de92e1e3da821f6e75faa36e66dfa8b187cc9ed387
              • Opcode Fuzzy Hash: 9c35bbaf75acc9f5407b43b23d9eac2dbb820a9f8bb7e1af56421969bd5092b1
              • Instruction Fuzzy Hash: 55324831A00255CFDF28CF68C4946BD7BA1EB45355F29816AD8EACB292E330DD85DBC1
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 94cd8aa7561e03236420860383581ecc9d5f567e5b30bc204d3bb354d936fc11
              • Instruction ID: d8aece26733260cc8be88075c7a8c31e179b13d78f54f192c37b848b133ee278
              • Opcode Fuzzy Hash: 94cd8aa7561e03236420860383581ecc9d5f567e5b30bc204d3bb354d936fc11
              • Instruction Fuzzy Hash: E522A270A04609DFDF14DF64D881AAEB7F6FF54300F244529E816E72A1EB369E15CB50
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 708acfea16953aaff483c47b3697636efa58d6042dde55ff8ef4db047a5b087a
              • Instruction ID: 7a8b27500df56ac18505e8cb6a5a82c5d8080611502b77bee8000e3541fa717a
              • Opcode Fuzzy Hash: 708acfea16953aaff483c47b3697636efa58d6042dde55ff8ef4db047a5b087a
              • Instruction Fuzzy Hash: 4C0295B1E00205EFDB04EF64D881AAEB7F5FF54300F118169E816DB291EB71AA65CF91
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
              • Instruction ID: 6bbbf60e94c3df67cdbc3714a9ff1c3ce6f27c1f8b007afa81bf017022a85110
              • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
              • Instruction Fuzzy Hash: EE913F722090E35ADB6D467A897403EFEF15A923A631E479ED4F2CB1C1FF248574E620
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8b3f9e476ef45f889762b840d682d2d264a9b8c80951358764e0511bd22aac0a
              • Instruction ID: 579f48a34205f4943f764b5e11bcb6a5cf0a7ac56d41965876cecde91d000803
              • Opcode Fuzzy Hash: 8b3f9e476ef45f889762b840d682d2d264a9b8c80951358764e0511bd22aac0a
              • Instruction Fuzzy Hash: 90616B7120870996DE38AA6C8DA5BBE6394DF5170CF280A1AEC43DB2C1DB51DE72C355
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
              • Instruction ID: fb07e7584644e0f371780fb448f8157c4635b63a77c4e1de14408719270aac4b
              • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
              • Instruction Fuzzy Hash: 7D8161736090E35ADB6D863A893447EFFE15A923A531E079ED4F2CB1C1EF248574E620
              APIs
              • DeleteObject.GDI32(00000000), ref: 001C2B30
              • DeleteObject.GDI32(00000000), ref: 001C2B43
              • DestroyWindow.USER32 ref: 001C2B52
              • GetDesktopWindow.USER32 ref: 001C2B6D
              • GetWindowRect.USER32(00000000), ref: 001C2B74
              • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 001C2CA3
              • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 001C2CB1
              • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2CF8
              • GetClientRect.USER32(00000000,?), ref: 001C2D04
              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 001C2D40
              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2D62
              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2D75
              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2D80
              • GlobalLock.KERNEL32(00000000), ref: 001C2D89
              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2D98
              • GlobalUnlock.KERNEL32(00000000), ref: 001C2DA1
              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2DA8
              • GlobalFree.KERNEL32(00000000), ref: 001C2DB3
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2DC5
              • OleLoadPicture.OLEAUT32(?,00000000,00000000,001DFC38,00000000), ref: 001C2DDB
              • GlobalFree.KERNEL32(00000000), ref: 001C2DEB
              • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 001C2E11
              • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 001C2E30
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C2E52
              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001C303F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
              • String ID: $@U=u$AutoIt v3$DISPLAY$static
              • API String ID: 2211948467-3613752883
              • Opcode ID: 8146bf7c11a5c19e0220cf7c8a80cb2381445aac4a34373ab09afd608f0a5e0d
              • Instruction ID: 6b11f97b9be6f70c9187a0a5c41605fae505077e6a5bd8de4dea5317da30caa0
              • Opcode Fuzzy Hash: 8146bf7c11a5c19e0220cf7c8a80cb2381445aac4a34373ab09afd608f0a5e0d
              • Instruction Fuzzy Hash: 87027C71901219EFDB14DF64DC89FAEBBB9EB58310F008559F915AB2A1CB70ED41CBA0
              APIs
              • SetTextColor.GDI32(?,00000000), ref: 001D712F
              • GetSysColorBrush.USER32(0000000F), ref: 001D7160
              • GetSysColor.USER32(0000000F), ref: 001D716C
              • SetBkColor.GDI32(?,000000FF), ref: 001D7186
              • SelectObject.GDI32(?,?), ref: 001D7195
              • InflateRect.USER32(?,000000FF,000000FF), ref: 001D71C0
              • GetSysColor.USER32(00000010), ref: 001D71C8
              • CreateSolidBrush.GDI32(00000000), ref: 001D71CF
              • FrameRect.USER32(?,?,00000000), ref: 001D71DE
              • DeleteObject.GDI32(00000000), ref: 001D71E5
              • InflateRect.USER32(?,000000FE,000000FE), ref: 001D7230
              • FillRect.USER32(?,?,?), ref: 001D7262
              • GetWindowLongW.USER32(?,000000F0), ref: 001D7284
                • Part of subcall function 001D73E8: GetSysColor.USER32(00000012), ref: 001D7421
                • Part of subcall function 001D73E8: SetTextColor.GDI32(?,?), ref: 001D7425
                • Part of subcall function 001D73E8: GetSysColorBrush.USER32(0000000F), ref: 001D743B
                • Part of subcall function 001D73E8: GetSysColor.USER32(0000000F), ref: 001D7446
                • Part of subcall function 001D73E8: GetSysColor.USER32(00000011), ref: 001D7463
                • Part of subcall function 001D73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 001D7471
                • Part of subcall function 001D73E8: SelectObject.GDI32(?,00000000), ref: 001D7482
                • Part of subcall function 001D73E8: SetBkColor.GDI32(?,00000000), ref: 001D748B
                • Part of subcall function 001D73E8: SelectObject.GDI32(?,?), ref: 001D7498
                • Part of subcall function 001D73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 001D74B7
                • Part of subcall function 001D73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001D74CE
                • Part of subcall function 001D73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 001D74DB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
              • String ID: @U=u
              • API String ID: 4124339563-2594219639
              • Opcode ID: d88b1d56664f90aacbb2eddace4631470b7aa15059a751f635792e8a66e66348
              • Instruction ID: 6ef2aa0c0fe5f2ee0fdb3bdc05e4841a27ddfd5486aaa62378ea042723fbc2c2
              • Opcode Fuzzy Hash: d88b1d56664f90aacbb2eddace4631470b7aa15059a751f635792e8a66e66348
              • Instruction Fuzzy Hash: 2BA1947210A312FFDB009F60DC48A5BB7A9FB49321F100F1AF962961E1D771E944CB91
              APIs
              • DestroyWindow.USER32(?,?), ref: 00158E14
              • SendMessageW.USER32(?,00001308,?,00000000), ref: 00196AC5
              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00196AFE
              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00196F43
                • Part of subcall function 00158F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00158BE8,?,00000000,?,?,?,?,00158BBA,00000000,?), ref: 00158FC5
              • SendMessageW.USER32(?,00001053), ref: 00196F7F
              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00196F96
              • ImageList_Destroy.COMCTL32(00000000,?), ref: 00196FAC
              • ImageList_Destroy.COMCTL32(00000000,?), ref: 00196FB7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
              • String ID: 0$@U=u
              • API String ID: 2760611726-975001249
              • Opcode ID: eccfaca5ccd03fb50cce06ae38c4a12a804c6ad563e5e837155452e5ffc68a04
              • Instruction ID: b79f2a0aef5ed522a1130d013fcc53c33f4ea8661f13797afc3f73e3e88253e7
              • Opcode Fuzzy Hash: eccfaca5ccd03fb50cce06ae38c4a12a804c6ad563e5e837155452e5ffc68a04
              • Instruction Fuzzy Hash: 0A12BD34201201DFDB25CF24D899BAAB7F1FF54301F148469F9A59B661CB31ECA6CBA1
              APIs
              • DestroyWindow.USER32(00000000), ref: 001C273E
              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 001C286A
              • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 001C28A9
              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 001C28B9
              • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 001C2900
              • GetClientRect.USER32(00000000,?), ref: 001C290C
              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 001C2955
              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 001C2964
              • GetStockObject.GDI32(00000011), ref: 001C2974
              • SelectObject.GDI32(00000000,00000000), ref: 001C2978
              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 001C2988
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001C2991
              • DeleteDC.GDI32(00000000), ref: 001C299A
              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 001C29C6
              • SendMessageW.USER32(00000030,00000000,00000001), ref: 001C29DD
              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 001C2A1D
              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 001C2A31
              • SendMessageW.USER32(00000404,00000001,00000000), ref: 001C2A42
              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 001C2A77
              • GetStockObject.GDI32(00000011), ref: 001C2A82
              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 001C2A8D
              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 001C2A97
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
              • String ID: @U=u$AutoIt v3$DISPLAY$msctls_progress32$static
              • API String ID: 2910397461-2771358697
              • Opcode ID: 41e491f1f23630f45ea3f38a4fce2cce568c25db581805a047b51d25abf2ea41
              • Instruction ID: 6b40c7f923c8513d05b0b77fdbd53e3d421a92608f4f94f4dc54e451b65dec1c
              • Opcode Fuzzy Hash: 41e491f1f23630f45ea3f38a4fce2cce568c25db581805a047b51d25abf2ea41
              • Instruction Fuzzy Hash: 61B16071A01215AFDB14DF68DC89FAEBBA9EF14710F008559FA14EB2A0DB70ED40CB90
              APIs
              • GetSysColor.USER32(00000012), ref: 001D7421
              • SetTextColor.GDI32(?,?), ref: 001D7425
              • GetSysColorBrush.USER32(0000000F), ref: 001D743B
              • GetSysColor.USER32(0000000F), ref: 001D7446
              • CreateSolidBrush.GDI32(?), ref: 001D744B
              • GetSysColor.USER32(00000011), ref: 001D7463
              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 001D7471
              • SelectObject.GDI32(?,00000000), ref: 001D7482
              • SetBkColor.GDI32(?,00000000), ref: 001D748B
              • SelectObject.GDI32(?,?), ref: 001D7498
              • InflateRect.USER32(?,000000FF,000000FF), ref: 001D74B7
              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001D74CE
              • GetWindowLongW.USER32(00000000,000000F0), ref: 001D74DB
              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 001D752A
              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 001D7554
              • InflateRect.USER32(?,000000FD,000000FD), ref: 001D7572
              • DrawFocusRect.USER32(?,?), ref: 001D757D
              • GetSysColor.USER32(00000011), ref: 001D758E
              • SetTextColor.GDI32(?,00000000), ref: 001D7596
              • DrawTextW.USER32(?,001D70F5,000000FF,?,00000000), ref: 001D75A8
              • SelectObject.GDI32(?,?), ref: 001D75BF
              • DeleteObject.GDI32(?), ref: 001D75CA
              • SelectObject.GDI32(?,?), ref: 001D75D0
              • DeleteObject.GDI32(?), ref: 001D75D5
              • SetTextColor.GDI32(?,?), ref: 001D75DB
              • SetBkColor.GDI32(?,?), ref: 001D75E5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
              • String ID: @U=u
              • API String ID: 1996641542-2594219639
              • Opcode ID: e9875deb2259a8205b5b77a44c752534fe0a0e2d112667e1cf1d805559695c44
              • Instruction ID: 81869771981bf9151ade3fe621ed14d87cfd55d82cc5476544baaa6953ef62eb
              • Opcode Fuzzy Hash: e9875deb2259a8205b5b77a44c752534fe0a0e2d112667e1cf1d805559695c44
              • Instruction Fuzzy Hash: 1A615072902219EFDF019FA4DC49EEEBF79EB08320F114616F915AB2E1D7749980CB90
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 001B4AED
              • GetDriveTypeW.KERNEL32(?,001DCB68,?,\\.\,001DCC08), ref: 001B4BCA
              • SetErrorMode.KERNEL32(00000000,001DCB68,?,\\.\,001DCC08), ref: 001B4D36
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorMode$DriveType
              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
              • API String ID: 2907320926-4222207086
              • Opcode ID: e8daedb8ae2184135d312c6d6ffacd38da8da57d52e17cf0941a893d090f0240
              • Instruction ID: 8f36e95d265733f882c9d82598a744b70a7ab5b0c9cf26ebc1a17f1aefc31118
              • Opcode Fuzzy Hash: e8daedb8ae2184135d312c6d6ffacd38da8da57d52e17cf0941a893d090f0240
              • Instruction Fuzzy Hash: 7561C330615206DBCB08EF64CA8A9FD7BB0EF15B00B24C416F806AB693DB31ED65DB41
              APIs
              • CharUpperBuffW.USER32(?,?), ref: 001D02E5
              • _wcslen.LIBCMT ref: 001D031F
              • _wcslen.LIBCMT ref: 001D0389
              • _wcslen.LIBCMT ref: 001D03F1
              • _wcslen.LIBCMT ref: 001D0475
              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 001D04C5
              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 001D0504
                • Part of subcall function 0015F9F2: _wcslen.LIBCMT ref: 0015F9FD
                • Part of subcall function 001A223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 001A2258
                • Part of subcall function 001A223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 001A228A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen$MessageSend$BuffCharUpper
              • String ID: @U=u$DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
              • API String ID: 1103490817-1753161424
              • Opcode ID: 48860f35190414b9760058f6ea2d0f69d666a876ef397762bb64e166c86c723e
              • Instruction ID: 1ad9732f1e381611df20db7101d2ce20edf08bfdda120bfabfde680e92f66b8d
              • Opcode Fuzzy Hash: 48860f35190414b9760058f6ea2d0f69d666a876ef397762bb64e166c86c723e
              • Instruction Fuzzy Hash: 71E1AF316183019FC715DF28C590A2AB3E6BF9C314F15495EF8969B3A2DB30ED45CB91
              APIs
              • GetCursorPos.USER32(?), ref: 001D1128
              • GetDesktopWindow.USER32 ref: 001D113D
              • GetWindowRect.USER32(00000000), ref: 001D1144
              • GetWindowLongW.USER32(?,000000F0), ref: 001D1199
              • DestroyWindow.USER32(?), ref: 001D11B9
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 001D11ED
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001D120B
              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 001D121D
              • SendMessageW.USER32(00000000,00000421,?,?), ref: 001D1232
              • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 001D1245
              • IsWindowVisible.USER32(00000000), ref: 001D12A1
              • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 001D12BC
              • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 001D12D0
              • GetWindowRect.USER32(00000000,?), ref: 001D12E8
              • MonitorFromPoint.USER32(?,?,00000002), ref: 001D130E
              • GetMonitorInfoW.USER32(00000000,?), ref: 001D1328
              • CopyRect.USER32(?,?), ref: 001D133F
              • SendMessageW.USER32(00000000,00000412,00000000), ref: 001D13AA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
              • String ID: ($0$tooltips_class32
              • API String ID: 698492251-4156429822
              • Opcode ID: 1e97c4f3ab642458f38a2368b89293f7a85467963939a08af89323d7f44fd81f
              • Instruction ID: 68f16e45cac65653b4ca2b8b14b4896b52e81113ce647a93f8ffed85fa620009
              • Opcode Fuzzy Hash: 1e97c4f3ab642458f38a2368b89293f7a85467963939a08af89323d7f44fd81f
              • Instruction Fuzzy Hash: B9B16B71608341BFDB14DF64D884B6BBBE5FF98350F00891AF9999B2A1CB71E844CB91
              APIs
              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00158968
              • GetSystemMetrics.USER32(00000007), ref: 00158970
              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0015899B
              • GetSystemMetrics.USER32(00000008), ref: 001589A3
              • GetSystemMetrics.USER32(00000004), ref: 001589C8
              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 001589E5
              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 001589F5
              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00158A28
              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00158A3C
              • GetClientRect.USER32(00000000,000000FF), ref: 00158A5A
              • GetStockObject.GDI32(00000011), ref: 00158A76
              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00158A81
                • Part of subcall function 0015912D: GetCursorPos.USER32(?), ref: 00159141
                • Part of subcall function 0015912D: ScreenToClient.USER32(00000000,?), ref: 0015915E
                • Part of subcall function 0015912D: GetAsyncKeyState.USER32(00000001), ref: 00159183
                • Part of subcall function 0015912D: GetAsyncKeyState.USER32(00000002), ref: 0015919D
              • SetTimer.USER32(00000000,00000000,00000028,001590FC), ref: 00158AA8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
              • String ID: @U=u$AutoIt v3 GUI
              • API String ID: 1458621304-2077007950
              • Opcode ID: defc1fd92438b3045b25c8c9ce42e4607261de283ed5c9d1406330da76edff6a
              • Instruction ID: e49e1a5c7cf48571bb7a6d3c848cfac700362ed900580c1e0190e70899a7dbe7
              • Opcode Fuzzy Hash: defc1fd92438b3045b25c8c9ce42e4607261de283ed5c9d1406330da76edff6a
              • Instruction Fuzzy Hash: 45B16C31A0120ADFDF14DFA8DC49BEA7BB5FB48315F11461AFA25AB290DB30A851CB51
              APIs
              • LoadIconW.USER32(00000063), ref: 001A5A2E
              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 001A5A40
              • SetWindowTextW.USER32(?,?), ref: 001A5A57
              • GetDlgItem.USER32(?,000003EA), ref: 001A5A6C
              • SetWindowTextW.USER32(00000000,?), ref: 001A5A72
              • GetDlgItem.USER32(?,000003E9), ref: 001A5A82
              • SetWindowTextW.USER32(00000000,?), ref: 001A5A88
              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 001A5AA9
              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 001A5AC3
              • GetWindowRect.USER32(?,?), ref: 001A5ACC
              • _wcslen.LIBCMT ref: 001A5B33
              • SetWindowTextW.USER32(?,?), ref: 001A5B6F
              • GetDesktopWindow.USER32 ref: 001A5B75
              • GetWindowRect.USER32(00000000), ref: 001A5B7C
              • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 001A5BD3
              • GetClientRect.USER32(?,?), ref: 001A5BE0
              • PostMessageW.USER32(?,00000005,00000000,?), ref: 001A5C05
              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 001A5C2F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
              • String ID: @U=u
              • API String ID: 895679908-2594219639
              • Opcode ID: f0df1450584d64e2a4f9e92005d250b6d09bcb090f8adf691e588628ebb489c5
              • Instruction ID: de46000023134d12b05844a6bb561e597328f17b6d0850c58d8b645edd1f34c7
              • Opcode Fuzzy Hash: f0df1450584d64e2a4f9e92005d250b6d09bcb090f8adf691e588628ebb489c5
              • Instruction Fuzzy Hash: 0C718135905B05EFDB20DFA8CD85AAEBBF6FF48705F104919E142A35A0D774E944CB60
              APIs
              • CharUpperBuffW.USER32(?,?), ref: 001D09C6
              • _wcslen.LIBCMT ref: 001D0A01
              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 001D0A54
              • _wcslen.LIBCMT ref: 001D0A8A
              • _wcslen.LIBCMT ref: 001D0B06
              • _wcslen.LIBCMT ref: 001D0B81
                • Part of subcall function 0015F9F2: _wcslen.LIBCMT ref: 0015F9FD
                • Part of subcall function 001A2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001A2BFA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen$MessageSend$BuffCharUpper
              • String ID: @U=u$CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
              • API String ID: 1103490817-383632319
              • Opcode ID: b652f3fe417f09f484b25c9906d7951f962cba3f0b76a3061466460dd2eec9b4
              • Instruction ID: f613344b22f84bbe827fb7213f0ab866ce8cd8c9cb5b817583b41635d6ab27ee
              • Opcode Fuzzy Hash: b652f3fe417f09f484b25c9906d7951f962cba3f0b76a3061466460dd2eec9b4
              • Instruction Fuzzy Hash: 91E1D1356087118FC715DF24C450A2AB7E2FFA8318F15895EF89A9B3A2D731ED45CB81
              APIs
                • Part of subcall function 001A10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001A1114
                • Part of subcall function 001A10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A1120
                • Part of subcall function 001A10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A112F
                • Part of subcall function 001A10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A1136
                • Part of subcall function 001A10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001A114D
              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 001A0DF5
              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 001A0E29
              • GetLengthSid.ADVAPI32(?), ref: 001A0E40
              • GetAce.ADVAPI32(?,00000000,?), ref: 001A0E7A
              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 001A0E96
              • GetLengthSid.ADVAPI32(?), ref: 001A0EAD
              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 001A0EB5
              • HeapAlloc.KERNEL32(00000000), ref: 001A0EBC
              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 001A0EDD
              • CopySid.ADVAPI32(00000000), ref: 001A0EE4
              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 001A0F13
              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 001A0F35
              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 001A0F47
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001A0F6E
              • HeapFree.KERNEL32(00000000), ref: 001A0F75
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001A0F7E
              • HeapFree.KERNEL32(00000000), ref: 001A0F85
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001A0F8E
              • HeapFree.KERNEL32(00000000), ref: 001A0F95
              • GetProcessHeap.KERNEL32(00000000,?), ref: 001A0FA1
              • HeapFree.KERNEL32(00000000), ref: 001A0FA8
                • Part of subcall function 001A1193: GetProcessHeap.KERNEL32(00000008,001A0BB1,?,00000000,?,001A0BB1,?), ref: 001A11A1
                • Part of subcall function 001A1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,001A0BB1,?), ref: 001A11A8
                • Part of subcall function 001A1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,001A0BB1,?), ref: 001A11B7
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
              • String ID:
              • API String ID: 4175595110-0
              • Opcode ID: 4e23ed59ee41935c5299450197e0a53c34ecfb0a5e53925c70f76261c7bef697
              • Instruction ID: a35b4354d1f988e0f65a25b07db7eefe89f66d8225e7ba28a22c3c5125e1938c
              • Opcode Fuzzy Hash: 4e23ed59ee41935c5299450197e0a53c34ecfb0a5e53925c70f76261c7bef697
              • Instruction Fuzzy Hash: F2716D7690121AEFDF219FA4DC44FAEBBB8BF09301F044516F919F6191D731A945CBA0
              APIs
              • _wcslen.LIBCMT ref: 001D835A
              • _wcslen.LIBCMT ref: 001D836E
              • _wcslen.LIBCMT ref: 001D8391
              • _wcslen.LIBCMT ref: 001D83B4
              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 001D83F2
              • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,001D361A,?), ref: 001D844E
              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 001D8487
              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 001D84CA
              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 001D8501
              • FreeLibrary.KERNEL32(?), ref: 001D850D
              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 001D851D
              • DestroyIcon.USER32(?), ref: 001D852C
              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 001D8549
              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 001D8555
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
              • String ID: .dll$.exe$.icl$@U=u
              • API String ID: 799131459-1639919054
              • Opcode ID: f08f93fc3e1db0d7b9d6928fe5a64c83686e5c2997f0a47af324e95661c58a30
              • Instruction ID: a858ec16edd9dd68c5a42c43e5d8864fd08d786f7d3768068ded747882375cf6
              • Opcode Fuzzy Hash: f08f93fc3e1db0d7b9d6928fe5a64c83686e5c2997f0a47af324e95661c58a30
              • Instruction Fuzzy Hash: 9761D071940216BBEB14DF64DC81BBF77A8FB18B11F10460AF915DA2D1DB74A990CBA0
              APIs
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001CC4BD
              • RegCreateKeyExW.ADVAPI32(?,?,00000000,001DCC08,00000000,?,00000000,?,?), ref: 001CC544
              • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 001CC5A4
              • _wcslen.LIBCMT ref: 001CC5F4
              • _wcslen.LIBCMT ref: 001CC66F
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 001CC6B2
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 001CC7C1
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 001CC84D
              • RegCloseKey.ADVAPI32(?), ref: 001CC881
              • RegCloseKey.ADVAPI32(00000000), ref: 001CC88E
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 001CC960
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Value$Close$_wcslen$ConnectCreateRegistry
              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
              • API String ID: 9721498-966354055
              • Opcode ID: dd113014fb9b425f77fbdd0258d26ebf5bbdae600b154682ec4ac650273e5352
              • Instruction ID: 84717f4f3d07245db59c44a7dd2da2215eff397ce42af090db74f39d8aa9de88
              • Opcode Fuzzy Hash: dd113014fb9b425f77fbdd0258d26ebf5bbdae600b154682ec4ac650273e5352
              • Instruction Fuzzy Hash: AD1255756042119FDB14DF28C891F2AB7E5EF98714F05889DF88A9B3A2DB31ED41CB81
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen$BuffCharUpper
              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
              • API String ID: 1256254125-909552448
              • Opcode ID: ea6126b42ff92a778d90d226aba8ce6b7e9d849aaeb82f0ac723f0f18fe44f6f
              • Instruction ID: cef471f96e38b848c485dfc7e59b594388e815fb111ae15e7194639a8cf588b9
              • Opcode Fuzzy Hash: ea6126b42ff92a778d90d226aba8ce6b7e9d849aaeb82f0ac723f0f18fe44f6f
              • Instruction Fuzzy Hash: 5B71D232A1052A8BCB20DEBC8941BBA3391ABB4794B15052CF86A9B295F731DD55C3E0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
              • API String ID: 0-1645009161
              • Opcode ID: 0a3c1fd8a6f95f5a4403ca65c6a95d989b7a020fcba37635e60bdfae9f5e2b11
              • Instruction ID: 30d857d930ef8672c757438995aa2fa9c6d368e7f858e7ac3a2e5b4cc2ba5421
              • Opcode Fuzzy Hash: 0a3c1fd8a6f95f5a4403ca65c6a95d989b7a020fcba37635e60bdfae9f5e2b11
              • Instruction Fuzzy Hash: F2812B71A44205BBDB20BF60DC46FAF37A9EF25300F054025F905AB1E6EB71DA26CB91
              APIs
              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 001D8592
              • GetFileSize.KERNEL32(00000000,00000000), ref: 001D85A2
              • GlobalAlloc.KERNEL32(00000002,00000000), ref: 001D85AD
              • CloseHandle.KERNEL32(00000000), ref: 001D85BA
              • GlobalLock.KERNEL32(00000000), ref: 001D85C8
              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 001D85D7
              • GlobalUnlock.KERNEL32(00000000), ref: 001D85E0
              • CloseHandle.KERNEL32(00000000), ref: 001D85E7
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 001D85F8
              • OleLoadPicture.OLEAUT32(?,00000000,00000000,001DFC38,?), ref: 001D8611
              • GlobalFree.KERNEL32(00000000), ref: 001D8621
              • GetObjectW.GDI32(?,00000018,000000FF), ref: 001D8641
              • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 001D8671
              • DeleteObject.GDI32(00000000), ref: 001D8699
              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 001D86AF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
              • String ID: @U=u
              • API String ID: 3840717409-2594219639
              • Opcode ID: 080598317d0fcfb8a3202022fa3a954ea1405efb9724e3d3e4b25533c00f6317
              • Instruction ID: f09034faf4d2a7d03eeca9e609346f2c0cdb198d0126c658757514b192e55805
              • Opcode Fuzzy Hash: 080598317d0fcfb8a3202022fa3a954ea1405efb9724e3d3e4b25533c00f6317
              • Instruction Fuzzy Hash: 5B412875602209AFDB119FA5DC48EAE7BBCFF89B11F10855AF909E7260DB309941CB60
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen
              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[
              • API String ID: 176396367-3679483830
              • Opcode ID: 32d383bcbd9958ed5d078f9e9fd22b6eb3d2e86b252542d7f13d5dde0dbf07e7
              • Instruction ID: 327637a4215d92fa7b6c8b1ea2cbd0bbeff46afa2e9dd221637401f4966c227e
              • Opcode Fuzzy Hash: 32d383bcbd9958ed5d078f9e9fd22b6eb3d2e86b252542d7f13d5dde0dbf07e7
              • Instruction Fuzzy Hash: 5DE1F736A006269BCB18DF78C8517EEFBB0BF16714F55811AF466E7240DB30AE85C790
              APIs
                • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
              • DragQueryPoint.SHELL32(?,?), ref: 001D9147
                • Part of subcall function 001D7674: ClientToScreen.USER32(?,?), ref: 001D769A
                • Part of subcall function 001D7674: GetWindowRect.USER32(?,?), ref: 001D7710
                • Part of subcall function 001D7674: PtInRect.USER32(?,?,001D8B89), ref: 001D7720
              • SendMessageW.USER32(?,000000B0,?,?), ref: 001D91B0
              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 001D91BB
              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 001D91DE
              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 001D9225
              • SendMessageW.USER32(?,000000B0,?,?), ref: 001D923E
              • SendMessageW.USER32(?,000000B1,?,?), ref: 001D9255
              • SendMessageW.USER32(?,000000B1,?,?), ref: 001D9277
              • DragFinish.SHELL32(?), ref: 001D927E
              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 001D9371
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$@U=u$p#!
              • API String ID: 221274066-3069434366
              • Opcode ID: 8ff33cdf07a1e447a448d74c4cb7b41311329d3a0241fd71ee8944323dd9a850
              • Instruction ID: 6da27d9835edb9261ba6dda3ab6c1bc74119e8cfba8fadb0c683ca8f09b78ebc
              • Opcode Fuzzy Hash: 8ff33cdf07a1e447a448d74c4cb7b41311329d3a0241fd71ee8944323dd9a850
              • Instruction Fuzzy Hash: 88618B71109301AFD701DF64DC89DAFBBE8EF99350F000A1EF595932A1DB309A49CB92
              APIs
              • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 001600C6
                • Part of subcall function 001600ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0021070C,00000FA0,B6AF2B46,?,?,?,?,001823B3,000000FF), ref: 0016011C
                • Part of subcall function 001600ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,001823B3,000000FF), ref: 00160127
                • Part of subcall function 001600ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,001823B3,000000FF), ref: 00160138
                • Part of subcall function 001600ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0016014E
                • Part of subcall function 001600ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0016015C
                • Part of subcall function 001600ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0016016A
                • Part of subcall function 001600ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00160195
                • Part of subcall function 001600ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 001601A0
              • ___scrt_fastfail.LIBCMT ref: 001600E7
                • Part of subcall function 001600A3: __onexit.LIBCMT ref: 001600A9
              Strings
              • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00160122
              • kernel32.dll, xrefs: 00160133
              • WakeAllConditionVariable, xrefs: 00160162
              • SleepConditionVariableCS, xrefs: 00160154
              • InitializeConditionVariable, xrefs: 00160148
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
              • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
              • API String ID: 66158676-1714406822
              • Opcode ID: 2a9b3643a1705994e77e1d7de1fe7cdd23eb6782a8d0cc54157550bf91359f43
              • Instruction ID: cbcb60a25bef8deb9bb7b75d2abe73185336758b33e3f9efdad3e4200d7c6d19
              • Opcode Fuzzy Hash: 2a9b3643a1705994e77e1d7de1fe7cdd23eb6782a8d0cc54157550bf91359f43
              • Instruction Fuzzy Hash: 15212932642711ABD7126BA4AC4AB6B73D5EB1EB51F10052BFC02D67D1DFB09C81CA90
              APIs
              • CharLowerBuffW.USER32(00000000,00000000,001DCC08), ref: 001B4527
              • _wcslen.LIBCMT ref: 001B453B
              • _wcslen.LIBCMT ref: 001B4599
              • _wcslen.LIBCMT ref: 001B45F4
              • _wcslen.LIBCMT ref: 001B463F
              • _wcslen.LIBCMT ref: 001B46A7
                • Part of subcall function 0015F9F2: _wcslen.LIBCMT ref: 0015F9FD
              • GetDriveTypeW.KERNEL32(?,00206BF0,00000061), ref: 001B4743
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen$BuffCharDriveLowerType
              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
              • API String ID: 2055661098-1000479233
              • Opcode ID: a022e23234ca4ff083ba09968232bfa90f6ff14ea4cf86a9ddb3ac9cba118539
              • Instruction ID: 1a9f9f85fb66672a8ad508265bd9432e0dbee7c5e48823c4ec52127ff3121878
              • Opcode Fuzzy Hash: a022e23234ca4ff083ba09968232bfa90f6ff14ea4cf86a9ddb3ac9cba118539
              • Instruction Fuzzy Hash: 5DB1F5716083129FC724DF28C890ABEB7E5BFA9764F50891DF496C7292DB30D845CB92
              APIs
              • DestroyWindow.USER32(?,?), ref: 001D6DEB
                • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 001D6E5F
              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 001D6E81
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001D6E94
              • DestroyWindow.USER32(?), ref: 001D6EB5
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00140000,00000000), ref: 001D6EE4
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001D6EFD
              • GetDesktopWindow.USER32 ref: 001D6F16
              • GetWindowRect.USER32(00000000), ref: 001D6F1D
              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 001D6F35
              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 001D6F4D
                • Part of subcall function 00159944: GetWindowLongW.USER32(?,000000EB), ref: 00159952
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
              • String ID: 0$@U=u$tooltips_class32
              • API String ID: 2429346358-1130792468
              • Opcode ID: 7cf86ff6afdcad93a310a1d14f5f9b4f64709c5c688d0721b6a211624fd3b317
              • Instruction ID: c4056e2e89083219cd6e0184e321d4d41d12258bba41c7a706dab22b85c6f4b1
              • Opcode Fuzzy Hash: 7cf86ff6afdcad93a310a1d14f5f9b4f64709c5c688d0721b6a211624fd3b317
              • Instruction Fuzzy Hash: 68716674104245AFDB21CF18DC58EAABBF9FB99304F04491EF99987361CB70E946CB52
              APIs
              • _wcslen.LIBCMT ref: 001CB198
              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 001CB1B0
              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 001CB1D4
              • _wcslen.LIBCMT ref: 001CB200
              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 001CB214
              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 001CB236
              • _wcslen.LIBCMT ref: 001CB332
                • Part of subcall function 001B05A7: GetStdHandle.KERNEL32(000000F6), ref: 001B05C6
              • _wcslen.LIBCMT ref: 001CB34B
              • _wcslen.LIBCMT ref: 001CB366
              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 001CB3B6
              • GetLastError.KERNEL32(00000000), ref: 001CB407
              • CloseHandle.KERNEL32(?), ref: 001CB439
              • CloseHandle.KERNEL32(00000000), ref: 001CB44A
              • CloseHandle.KERNEL32(00000000), ref: 001CB45C
              • CloseHandle.KERNEL32(00000000), ref: 001CB46E
              • CloseHandle.KERNEL32(?), ref: 001CB4E3
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
              • String ID:
              • API String ID: 2178637699-0
              • Opcode ID: 542a4094442cee13826d73596fda6ffd5bd6bd8ea7033acb9dce02e2a11587e2
              • Instruction ID: c45250d5be4f05b8bb22d0bc195ca18d51145d7a9950b1d6026a047552e87b21
              • Opcode Fuzzy Hash: 542a4094442cee13826d73596fda6ffd5bd6bd8ea7033acb9dce02e2a11587e2
              • Instruction Fuzzy Hash: 50F17B315083409FD714EF24C892B6EBBE5BFA5314F14895DF8999B2A2CB31EC45CB92
              APIs
              • GetMenuItemCount.USER32(00211990), ref: 00182F8D
              • GetMenuItemCount.USER32(00211990), ref: 0018303D
              • GetCursorPos.USER32(?), ref: 00183081
              • SetForegroundWindow.USER32(00000000), ref: 0018308A
              • TrackPopupMenuEx.USER32(00211990,00000000,?,00000000,00000000,00000000), ref: 0018309D
              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 001830A9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
              • String ID: 0
              • API String ID: 36266755-4108050209
              • Opcode ID: 19fe32cbb218a5e7cd7739efecbaf07e79d973c1a65ef0e4978842710784cb66
              • Instruction ID: 9cc4581a028c204addc0e70f13d90bf1e6006de79551446c802528c9d4f46c2f
              • Opcode Fuzzy Hash: 19fe32cbb218a5e7cd7739efecbaf07e79d973c1a65ef0e4978842710784cb66
              • Instruction Fuzzy Hash: AB715D30645206BFEB259F64DC89F9ABF64FF05324F204206F624661E0C7B1AE50DF90
              APIs
              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 001BC4B0
              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 001BC4C3
              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 001BC4D7
              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 001BC4F0
              • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 001BC533
              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 001BC549
              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 001BC554
              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 001BC584
              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 001BC5DC
              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 001BC5F0
              • InternetCloseHandle.WININET(00000000), ref: 001BC5FB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
              • String ID:
              • API String ID: 3800310941-3916222277
              • Opcode ID: d351975b83d6fdc127ac14acda7ac9da6f8a4ec101694e6de40420fbf48e2cfe
              • Instruction ID: 0b19835dacb7654b6126d76cfa7bb287fb2686729b2a35ab70817f83faaf63fa
              • Opcode Fuzzy Hash: d351975b83d6fdc127ac14acda7ac9da6f8a4ec101694e6de40420fbf48e2cfe
              • Instruction Fuzzy Hash: 33513BB1601609BFDB219FA5C988AEB7BBCFF08754F00441AF945D6650DB34EA44DBE0
              APIs
              • VariantInit.OLEAUT32(00000000), ref: 001B1502
              • VariantCopy.OLEAUT32(?,?), ref: 001B150B
              • VariantClear.OLEAUT32(?), ref: 001B1517
              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 001B15FB
              • VarR8FromDec.OLEAUT32(?,?), ref: 001B1657
              • VariantInit.OLEAUT32(?), ref: 001B1708
              • SysFreeString.OLEAUT32(?), ref: 001B178C
              • VariantClear.OLEAUT32(?), ref: 001B17D8
              • VariantClear.OLEAUT32(?), ref: 001B17E7
              • VariantInit.OLEAUT32(00000000), ref: 001B1823
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
              • String ID: %4d%02d%02d%02d%02d%02d$Default
              • API String ID: 1234038744-3931177956
              • Opcode ID: 17ab7d348a248885a94b51f69d736cc7b6ee352a97376b9db52e0a11c56ddb59
              • Instruction ID: 68bca7cc80ced9700bdff747a8c219ee6b2508515bf7d0b4f679b34992a00d6c
              • Opcode Fuzzy Hash: 17ab7d348a248885a94b51f69d736cc7b6ee352a97376b9db52e0a11c56ddb59
              • Instruction Fuzzy Hash: 62D13432A00115FBCB249F64E8A4BBDB7B5BF46700F92855AF807AB190DB30DC45DBA1
              APIs
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                • Part of subcall function 001CC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001CB6AE,?,?), ref: 001CC9B5
                • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CC9F1
                • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CCA68
                • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CCA9E
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001CB6F4
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001CB772
              • RegDeleteValueW.ADVAPI32(?,?), ref: 001CB80A
              • RegCloseKey.ADVAPI32(?), ref: 001CB87E
              • RegCloseKey.ADVAPI32(?), ref: 001CB89C
              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 001CB8F2
              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 001CB904
              • RegDeleteKeyW.ADVAPI32(?,?), ref: 001CB922
              • FreeLibrary.KERNEL32(00000000), ref: 001CB983
              • RegCloseKey.ADVAPI32(00000000), ref: 001CB994
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
              • String ID: RegDeleteKeyExW$advapi32.dll
              • API String ID: 146587525-4033151799
              • Opcode ID: f00e429b0b2e8e6ce33bb7ac74b764677605d8d4837d5c16527c1764cce74471
              • Instruction ID: 8fe7c3fbcfe01bb175dfa5f10e61d8d01453aec19142123bc0919ef08619ef2d
              • Opcode Fuzzy Hash: f00e429b0b2e8e6ce33bb7ac74b764677605d8d4837d5c16527c1764cce74471
              • Instruction Fuzzy Hash: 4AC18B74209242AFD714DF24C4D6F2ABBE5BF94308F14855CF49A8B6A2CB35EC45CB92
              APIs
              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 001D5504
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001D5515
              • CharNextW.USER32(00000158), ref: 001D5544
              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 001D5585
              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 001D559B
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001D55AC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$CharNext
              • String ID: @U=u
              • API String ID: 1350042424-2594219639
              • Opcode ID: f1f8ac76efc12b8795485de61f21b56b0fa2cda16348cb2f328909bcf6602aee
              • Instruction ID: 94507905809a10cad940bf8c064fcb1596de7a94156ce33a1476f7ef96d7130a
              • Opcode Fuzzy Hash: f1f8ac76efc12b8795485de61f21b56b0fa2cda16348cb2f328909bcf6602aee
              • Instruction Fuzzy Hash: 9F618D30901609EBDF149F54DC84EFE7BBAEB09764F10854BF925A6390D7748A80DBA1
              APIs
              • GetDC.USER32(00000000), ref: 001C25D8
              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 001C25E8
              • CreateCompatibleDC.GDI32(?), ref: 001C25F4
              • SelectObject.GDI32(00000000,?), ref: 001C2601
              • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 001C266D
              • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 001C26AC
              • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 001C26D0
              • SelectObject.GDI32(?,?), ref: 001C26D8
              • DeleteObject.GDI32(?), ref: 001C26E1
              • DeleteDC.GDI32(?), ref: 001C26E8
              • ReleaseDC.USER32(00000000,?), ref: 001C26F3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
              • String ID: (
              • API String ID: 2598888154-3887548279
              • Opcode ID: eb8280496ebed931df5fe38381a4395e7e294eda81ee6fc254244a9da48371dd
              • Instruction ID: f13369aef1000663faad6eb001887ca5169d2309c974f12f2472f2ca0242da36
              • Opcode Fuzzy Hash: eb8280496ebed931df5fe38381a4395e7e294eda81ee6fc254244a9da48371dd
              • Instruction Fuzzy Hash: AE61F5B5D0121AEFCF04CFA4D885EAEBBB6FF58310F20851AE955A7250D770A941CFA0
              APIs
              • timeGetTime.WINMM ref: 001AE6B4
                • Part of subcall function 0015E551: timeGetTime.WINMM(?,?,001AE6D4), ref: 0015E555
              • Sleep.KERNEL32(0000000A), ref: 001AE6E1
              • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 001AE705
              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 001AE727
              • SetActiveWindow.USER32 ref: 001AE746
              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 001AE754
              • SendMessageW.USER32(00000010,00000000,00000000), ref: 001AE773
              • Sleep.KERNEL32(000000FA), ref: 001AE77E
              • IsWindow.USER32 ref: 001AE78A
              • EndDialog.USER32(00000000), ref: 001AE79B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
              • String ID: @U=u$BUTTON
              • API String ID: 1194449130-2582809321
              • Opcode ID: b1a64ba9812b3706cd0d254baf8531534466f5632b3eb4c095ad2ee516e94760
              • Instruction ID: 4f33a7f7e355f7da48044469011f4a819e4941f64c094b077b30ea0de6a3ca1e
              • Opcode Fuzzy Hash: b1a64ba9812b3706cd0d254baf8531534466f5632b3eb4c095ad2ee516e94760
              • Instruction Fuzzy Hash: FE21A478301255EFEB005FA0FC8DB653BADF7A6348F004826F915825E1DF71AC64CAA4
              APIs
              • ___free_lconv_mon.LIBCMT ref: 0017DAA1
                • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D659
                • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D66B
                • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D67D
                • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D68F
                • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D6A1
                • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D6B3
                • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D6C5
                • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D6D7
                • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D6E9
                • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D6FB
                • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D70D
                • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D71F
                • Part of subcall function 0017D63C: _free.LIBCMT ref: 0017D731
              • _free.LIBCMT ref: 0017DA96
                • Part of subcall function 001729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000), ref: 001729DE
                • Part of subcall function 001729C8: GetLastError.KERNEL32(00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000,00000000), ref: 001729F0
              • _free.LIBCMT ref: 0017DAB8
              • _free.LIBCMT ref: 0017DACD
              • _free.LIBCMT ref: 0017DAD8
              • _free.LIBCMT ref: 0017DAFA
              • _free.LIBCMT ref: 0017DB0D
              • _free.LIBCMT ref: 0017DB1B
              • _free.LIBCMT ref: 0017DB26
              • _free.LIBCMT ref: 0017DB5E
              • _free.LIBCMT ref: 0017DB65
              • _free.LIBCMT ref: 0017DB82
              • _free.LIBCMT ref: 0017DB9A
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
              • String ID:
              • API String ID: 161543041-0
              • Opcode ID: 98f2aa1a43219c7336b0de4df0921821873494bf3b3b19de7ca5c6d449403593
              • Instruction ID: 7b9efbe9b04109fc280035a91de74810e8c9aba553ea0c598b984e48c38ca2a8
              • Opcode Fuzzy Hash: 98f2aa1a43219c7336b0de4df0921821873494bf3b3b19de7ca5c6d449403593
              • Instruction Fuzzy Hash: 9B3149316443099FEB22AA39E845B5AB7F9FF21314F19C829E54DD7192DF31AC818B20
              APIs
              • GetClassNameW.USER32(?,?,00000100), ref: 001A369C
              • _wcslen.LIBCMT ref: 001A36A7
              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 001A3797
              • GetClassNameW.USER32(?,?,00000400), ref: 001A380C
              • GetDlgCtrlID.USER32(?), ref: 001A385D
              • GetWindowRect.USER32(?,?), ref: 001A3882
              • GetParent.USER32(?), ref: 001A38A0
              • ScreenToClient.USER32(00000000), ref: 001A38A7
              • GetClassNameW.USER32(?,?,00000100), ref: 001A3921
              • GetWindowTextW.USER32(?,?,00000400), ref: 001A395D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
              • String ID: %s%u
              • API String ID: 4010501982-679674701
              • Opcode ID: 6fc90643cc5b1c3de4783812deb9b86b0c4966a9a3a70b57ad5137f6140622be
              • Instruction ID: e9b5639df3517ff68d589fe50cddbaa4ecdd23c3471967bf91d4ab22bd805e97
              • Opcode Fuzzy Hash: 6fc90643cc5b1c3de4783812deb9b86b0c4966a9a3a70b57ad5137f6140622be
              • Instruction Fuzzy Hash: 1091E175204606AFDB08DF24C885BEBF7A8FF45354F008629F9A9C2190DB34EA56CBD1
              APIs
              • GetClassNameW.USER32(?,?,00000400), ref: 001A4994
              • GetWindowTextW.USER32(?,?,00000400), ref: 001A49DA
              • _wcslen.LIBCMT ref: 001A49EB
              • CharUpperBuffW.USER32(?,00000000), ref: 001A49F7
              • _wcsstr.LIBVCRUNTIME ref: 001A4A2C
              • GetClassNameW.USER32(00000018,?,00000400), ref: 001A4A64
              • GetWindowTextW.USER32(?,?,00000400), ref: 001A4A9D
              • GetClassNameW.USER32(00000018,?,00000400), ref: 001A4AE6
              • GetClassNameW.USER32(?,?,00000400), ref: 001A4B20
              • GetWindowRect.USER32(?,?), ref: 001A4B8B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
              • String ID: ThumbnailClass
              • API String ID: 1311036022-1241985126
              • Opcode ID: 43dec076622db6628a2a7c78ac62284ae24e2e8b119c4ad69e9af11b939757fa
              • Instruction ID: 58322c7d11103d0711d77a880469cfcd63b3d6cfec0694e83462098b75d76033
              • Opcode Fuzzy Hash: 43dec076622db6628a2a7c78ac62284ae24e2e8b119c4ad69e9af11b939757fa
              • Instruction Fuzzy Hash: DF91DF750052069FDB04CF14C981BABB7E8FFD6314F04846AFD8A9A196DBB0ED45CBA1
              APIs
                • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 001D8D5A
              • GetFocus.USER32 ref: 001D8D6A
              • GetDlgCtrlID.USER32(00000000), ref: 001D8D75
              • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 001D8E1D
              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 001D8ECF
              • GetMenuItemCount.USER32(?), ref: 001D8EEC
              • GetMenuItemID.USER32(?,00000000), ref: 001D8EFC
              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 001D8F2E
              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 001D8F70
              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 001D8FA1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
              • String ID: 0
              • API String ID: 1026556194-4108050209
              • Opcode ID: 83e96395b0364950c1bb837d7b0ccfc26bf86195019586d2bc8b3d303d907dea
              • Instruction ID: 23463da81f8931dc156315b0871799ccfa40e1521e78107108bcea3af31f9c0a
              • Opcode Fuzzy Hash: 83e96395b0364950c1bb837d7b0ccfc26bf86195019586d2bc8b3d303d907dea
              • Instruction Fuzzy Hash: E381BF715093019FDB10CF28D884AABBBE9FB98714F040A1EF99497391DB30D941CFA1
              APIs
              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 001CCC64
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 001CCC8D
              • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 001CCD48
                • Part of subcall function 001CCC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 001CCCAA
                • Part of subcall function 001CCC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 001CCCBD
                • Part of subcall function 001CCC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 001CCCCF
                • Part of subcall function 001CCC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 001CCD05
                • Part of subcall function 001CCC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 001CCD28
              • RegDeleteKeyW.ADVAPI32(?,?), ref: 001CCCF3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
              • String ID: RegDeleteKeyExW$advapi32.dll
              • API String ID: 2734957052-4033151799
              • Opcode ID: b5434ceec3ffda0fda00843b06c15c43b9c7fcce23f2e1348d1a3b013f976004
              • Instruction ID: f54b1251e240d253922d8936e4a9663c01c57f7f7837a23feadc0fb6efce0591
              • Opcode Fuzzy Hash: b5434ceec3ffda0fda00843b06c15c43b9c7fcce23f2e1348d1a3b013f976004
              • Instruction Fuzzy Hash: 3E31617590212ABBDB208B94DC88EFFBB7CEF65750F004569F90AE2141DB349E45DAE0
              APIs
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 001AEA5D
              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 001AEA73
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 001AEA84
              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 001AEA96
              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 001AEAA7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: SendString$_wcslen
              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
              • API String ID: 2420728520-1007645807
              • Opcode ID: 3cfc1402a9ca6d8a5fd2265dc955409625b8254b4779764164e84345c106f2be
              • Instruction ID: 8df496c8acaaddacd70d1ccb8936bb54f4af020428ca478795741307a43038ec
              • Opcode Fuzzy Hash: 3cfc1402a9ca6d8a5fd2265dc955409625b8254b4779764164e84345c106f2be
              • Instruction Fuzzy Hash: 22112135AA025D79E720A7A5DC4EEFF7ABCEBD2B00F440429B411A34E2EB705965C5B0
              APIs
                • Part of subcall function 00158F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00158BE8,?,00000000,?,?,?,?,00158BBA,00000000,?), ref: 00158FC5
              • DestroyWindow.USER32(?), ref: 00158C81
              • KillTimer.USER32(00000000,?,?,?,?,00158BBA,00000000,?), ref: 00158D1B
              • DestroyAcceleratorTable.USER32(00000000), ref: 00196973
              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00158BBA,00000000,?), ref: 001969A1
              • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00158BBA,00000000,?), ref: 001969B8
              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00158BBA,00000000), ref: 001969D4
              • DeleteObject.GDI32(00000000), ref: 001969E6
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
              • String ID:
              • API String ID: 641708696-0
              • Opcode ID: caf89d8f828f09cb4edccfe23153a4b52adc84bcf7b75ccc494dcd1a843e0653
              • Instruction ID: 9fc043a26e53c1f9d9860fa48f2a7d0a201ee63438a0de849424868d4363e315
              • Opcode Fuzzy Hash: caf89d8f828f09cb4edccfe23153a4b52adc84bcf7b75ccc494dcd1a843e0653
              • Instruction Fuzzy Hash: A2619D30502701DFDF259F14D948BAAB7F1FB50316F148919E562AB960CB71AC94DFA0
              APIs
                • Part of subcall function 00159944: GetWindowLongW.USER32(?,000000EB), ref: 00159952
              • GetSysColor.USER32(0000000F), ref: 00159862
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ColorLongWindow
              • String ID:
              • API String ID: 259745315-0
              • Opcode ID: 9b270f76f2299aa5234ed61c8736848aacd94a2575cf019b7cf0f37853e44fa9
              • Instruction ID: 3145128e06a9d2ac0a68cf7ed8a975e4afd45bd846a93fe9bf63b702860608cf
              • Opcode Fuzzy Hash: 9b270f76f2299aa5234ed61c8736848aacd94a2575cf019b7cf0f37853e44fa9
              • Instruction Fuzzy Hash: 1441AF31105654EFDF205F38DC88BB93BA5AB06332F154A06F9B28F2E1D7319885DB52
              APIs
              • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 001D5186
              • ShowWindow.USER32(?,00000000), ref: 001D51C7
              • ShowWindow.USER32(?,00000005,?,00000000), ref: 001D51CD
              • SetFocus.USER32(?,?,00000005,?,00000000), ref: 001D51D1
                • Part of subcall function 001D6FBA: DeleteObject.GDI32(00000000), ref: 001D6FE6
              • GetWindowLongW.USER32(?,000000F0), ref: 001D520D
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001D521A
              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 001D524D
              • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 001D5287
              • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 001D5296
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
              • String ID: @U=u
              • API String ID: 3210457359-2594219639
              • Opcode ID: e1366c15eeb5148a457c29fbab1bd895bf053c457595429a8e50497b492eacf8
              • Instruction ID: 891788b835e39e2215b7e5cc7ce40f863e150b41c662a13304e40385741cf9ab
              • Opcode Fuzzy Hash: e1366c15eeb5148a457c29fbab1bd895bf053c457595429a8e50497b492eacf8
              • Instruction Fuzzy Hash: 3951BE30A41A09FEEF249F24CC4ABD93B73EB15365F148113FA259A3E0C775A998DB41
              APIs
              • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00196890
              • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 001968A9
              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 001968B9
              • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 001968D1
              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 001968F2
              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00158874,00000000,00000000,00000000,000000FF,00000000), ref: 00196901
              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0019691E
              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00158874,00000000,00000000,00000000,000000FF,00000000), ref: 0019692D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Icon$DestroyExtractImageLoadMessageSend
              • String ID: @U=u
              • API String ID: 1268354404-2594219639
              • Opcode ID: 0d10eceb5c8b6a4178d652f233462258c4708926706952b171f5f87478e77773
              • Instruction ID: fbc9b85f2b77a9ff98548e79db188d6cb32df6ba816921c6cffb70acd8c17047
              • Opcode Fuzzy Hash: 0d10eceb5c8b6a4178d652f233462258c4708926706952b171f5f87478e77773
              • Instruction Fuzzy Hash: 86519870600309EFDF24CF24CC55FAA7BB9EB58761F104519F962AB2A0DB70E990DB50
              APIs
                • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
                • Part of subcall function 0015912D: GetCursorPos.USER32(?), ref: 00159141
                • Part of subcall function 0015912D: ScreenToClient.USER32(00000000,?), ref: 0015915E
                • Part of subcall function 0015912D: GetAsyncKeyState.USER32(00000001), ref: 00159183
                • Part of subcall function 0015912D: GetAsyncKeyState.USER32(00000002), ref: 0015919D
              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 001D8B6B
              • ImageList_EndDrag.COMCTL32 ref: 001D8B71
              • ReleaseCapture.USER32 ref: 001D8B77
              • SetWindowTextW.USER32(?,00000000), ref: 001D8C12
              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 001D8C25
              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 001D8CFF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
              • String ID: @GUI_DRAGFILE$@GUI_DROPID$@U=u$p#!
              • API String ID: 1924731296-2024131959
              • Opcode ID: 2cabaf76706698434e4184e9c443c882c6b1dcb8c663ca6d0355124a0e11d88d
              • Instruction ID: 2fd38cefc762e5a6e1cde0adf8f8417b016110b6096cd2bafb43471713bbafc5
              • Opcode Fuzzy Hash: 2cabaf76706698434e4184e9c443c882c6b1dcb8c663ca6d0355124a0e11d88d
              • Instruction Fuzzy Hash: FF51AC70205300AFD704DF14DC9AFAA77E4FB98710F000A2EF966972E1DB70A954CBA2
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0018F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 001A9717
              • LoadStringW.USER32(00000000,?,0018F7F8,00000001), ref: 001A9720
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
              • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0018F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 001A9742
              • LoadStringW.USER32(00000000,?,0018F7F8,00000001), ref: 001A9745
              • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 001A9866
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: HandleLoadModuleString$Message_wcslen
              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
              • API String ID: 747408836-2268648507
              • Opcode ID: 8579d8d00eecac72378e28ac5ab92c1957164cb9cb0c20c5c66d59b54838ddf7
              • Instruction ID: 3d48dfcb84665d631612fb0bc955c086909cef1d513bc9762e6d00c3146e313a
              • Opcode Fuzzy Hash: 8579d8d00eecac72378e28ac5ab92c1957164cb9cb0c20c5c66d59b54838ddf7
              • Instruction Fuzzy Hash: 51414E72800219AADF14EFE0DD86DEFB778AF26340F500065F605760A2EB356F59CBA1
              APIs
                • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 001A07A2
              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 001A07BE
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 001A07DA
              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 001A0804
              • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 001A082C
              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 001A0837
              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 001A083C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
              • API String ID: 323675364-22481851
              • Opcode ID: 86b084335eae5a86336d036e83b64053bb216fc7d336ebbe22043574795feff6
              • Instruction ID: 94e81a818098d30d9f7b850def59ecafadd2f0542a6f2f93212383c133d5452d
              • Opcode Fuzzy Hash: 86b084335eae5a86336d036e83b64053bb216fc7d336ebbe22043574795feff6
              • Instruction Fuzzy Hash: 4D410476C11229ABDF11EFA4DC958EEB778FF18350F45412AE901A31A1EB309E44CBA0
              APIs
              • CoInitialize.OLE32(00000000), ref: 001B7AF3
              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 001B7B8F
              • SHGetDesktopFolder.SHELL32(?), ref: 001B7BA3
              • CoCreateInstance.OLE32(001DFD08,00000000,00000001,00206E6C,?), ref: 001B7BEF
              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 001B7C74
              • CoTaskMemFree.OLE32(?,?), ref: 001B7CCC
              • SHBrowseForFolderW.SHELL32(?), ref: 001B7D57
              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 001B7D7A
              • CoTaskMemFree.OLE32(00000000), ref: 001B7D81
              • CoTaskMemFree.OLE32(00000000), ref: 001B7DD6
              • CoUninitialize.OLE32 ref: 001B7DDC
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
              • String ID:
              • API String ID: 2762341140-0
              • Opcode ID: 95af53046525620f7d9b7517353916db64f439dacae1730f85128dd4a9d548f5
              • Instruction ID: ffa5d0c71054c43b0bcd439decef4ef3c61823e6c73f53175a6699994c51014e
              • Opcode Fuzzy Hash: 95af53046525620f7d9b7517353916db64f439dacae1730f85128dd4a9d548f5
              • Instruction Fuzzy Hash: BCC11A75A05109AFCB14DFA4C894DAEBBF9FF48304B148499E81ADB7A1D730EE45CB90
              APIs
              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0019FAAF
              • SafeArrayAllocData.OLEAUT32(?), ref: 0019FB08
              • VariantInit.OLEAUT32(?), ref: 0019FB1A
              • SafeArrayAccessData.OLEAUT32(?,?), ref: 0019FB3A
              • VariantCopy.OLEAUT32(?,?), ref: 0019FB8D
              • SafeArrayUnaccessData.OLEAUT32(?), ref: 0019FBA1
              • VariantClear.OLEAUT32(?), ref: 0019FBB6
              • SafeArrayDestroyData.OLEAUT32(?), ref: 0019FBC3
              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0019FBCC
              • VariantClear.OLEAUT32(?), ref: 0019FBDE
              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0019FBE9
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
              • String ID:
              • API String ID: 2706829360-0
              • Opcode ID: ee83b951bf524f527d8543e1b5cce79d06e195eb55486dbc244082d109acd932
              • Instruction ID: 8a313359bdcd5e08dccf277eb87d808d14acfc80eba65176cfdb6a9e15ce03b8
              • Opcode Fuzzy Hash: ee83b951bf524f527d8543e1b5cce79d06e195eb55486dbc244082d109acd932
              • Instruction Fuzzy Hash: 55415F35A0121AEFCF04DF68C8549EEBBB9EF18344F008469E916E7661CB34A946CBD0
              APIs
              • WSAStartup.WSOCK32(00000101,?), ref: 001C05BC
              • inet_addr.WSOCK32(?), ref: 001C061C
              • gethostbyname.WSOCK32(?), ref: 001C0628
              • IcmpCreateFile.IPHLPAPI ref: 001C0636
              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 001C06C6
              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 001C06E5
              • IcmpCloseHandle.IPHLPAPI(?), ref: 001C07B9
              • WSACleanup.WSOCK32 ref: 001C07BF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
              • String ID: Ping
              • API String ID: 1028309954-2246546115
              • Opcode ID: 7f9a8e3d9b15529d9831da33f36427a0ffec7ac3e3fe9ebfb62735fd71f00a9d
              • Instruction ID: 3c68d58e774a66d93033247f8b87c5f5ce2f59de32947aae696fc1f3f9dceff3
              • Opcode Fuzzy Hash: 7f9a8e3d9b15529d9831da33f36427a0ffec7ac3e3fe9ebfb62735fd71f00a9d
              • Instruction Fuzzy Hash: 3E918C35609301DFD725CF15C889F1ABBE0AF58318F1589ADE4A98BAA2C730ED45CF81
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen$BuffCharLower
              • String ID: cdecl$none$stdcall$winapi
              • API String ID: 707087890-567219261
              • Opcode ID: 39faa4d8c63ad9583ae6ca829e5ac1ed4f722eaa9d0a835c83d84dbd2710f8b3
              • Instruction ID: eaf1fbe081c803483e1e15260c6dc36add7bd0b98133a2308fe51aabc882376f
              • Opcode Fuzzy Hash: 39faa4d8c63ad9583ae6ca829e5ac1ed4f722eaa9d0a835c83d84dbd2710f8b3
              • Instruction Fuzzy Hash: 8F518F31A001169BCB14DFACC991ABEB7A6BF75724B21422DE826E72C5DB31DD40C790
              APIs
              • CoInitialize.OLE32 ref: 001C3774
              • CoUninitialize.OLE32 ref: 001C377F
              • CoCreateInstance.OLE32(?,00000000,00000017,001DFB78,?), ref: 001C37D9
              • IIDFromString.OLE32(?,?), ref: 001C384C
              • VariantInit.OLEAUT32(?), ref: 001C38E4
              • VariantClear.OLEAUT32(?), ref: 001C3936
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
              • API String ID: 636576611-1287834457
              • Opcode ID: a10a1c6dacfbc288d9cbee7d884f1839ddf01871ccdb5c8def88725cf0141b97
              • Instruction ID: bf15afba8726334addbc7097291549a00c1b66dbe7a856ffedaed916f494ffbc
              • Opcode Fuzzy Hash: a10a1c6dacfbc288d9cbee7d884f1839ddf01871ccdb5c8def88725cf0141b97
              • Instruction Fuzzy Hash: 5661C370608301AFD711DF54C889F6ABBE4EF69714F00891DF9959B2A1D770EE48CB92
              APIs
              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 001B33CF
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 001B33F0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: LoadString$_wcslen
              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
              • API String ID: 4099089115-3080491070
              • Opcode ID: c3f5d74c55527c5833c9c6e8452037319ae2a211dec6a2492eebb5bcf6b7f4ae
              • Instruction ID: 62c575dc89f6ba4c62de2394e30dc384a4edf870030e7e2fc64da3955ac13335
              • Opcode Fuzzy Hash: c3f5d74c55527c5833c9c6e8452037319ae2a211dec6a2492eebb5bcf6b7f4ae
              • Instruction Fuzzy Hash: 6F51907290020AAADF15EBE0DD46EEEB778AF25340F104165F515720A2EB316FA8DB61
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen$BuffCharUpper
              • String ID: APPEND$EXISTS$KEYS$REMOVE
              • API String ID: 1256254125-769500911
              • Opcode ID: cae36faeb0112128c1b4e21a17ebeaaf5375141cf3a953a7c10d5723a8f2b109
              • Instruction ID: df4484db94f4cfb13c562dd48f70e79270ca9179c6cf0d0ee7c11439b9a26e74
              • Opcode Fuzzy Hash: cae36faeb0112128c1b4e21a17ebeaaf5375141cf3a953a7c10d5723a8f2b109
              • Instruction Fuzzy Hash: 88413936A081678BCB105F7DCCD05BEB7A1EF72754B254129E429DB282E731CC81C390
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 001B53A0
              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 001B5416
              • GetLastError.KERNEL32 ref: 001B5420
              • SetErrorMode.KERNEL32(00000000,READY), ref: 001B54A7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Error$Mode$DiskFreeLastSpace
              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
              • API String ID: 4194297153-14809454
              • Opcode ID: 56f7f78bc32b1745e098f2668714aec8049089bae6413de437770e550fcc63e1
              • Instruction ID: 644d5c97d02463f932258ad0b71a709764fb002837ae146bdc53d1a6e7eda986
              • Opcode Fuzzy Hash: 56f7f78bc32b1745e098f2668714aec8049089bae6413de437770e550fcc63e1
              • Instruction Fuzzy Hash: 9B31A135A00605DFD714DF68C488BEABBB5EF55305F148065E405CF2A2EB71ED86CBA0
              APIs
              • DeleteObject.GDI32(00000000), ref: 001D2D1B
              • GetDC.USER32(00000000), ref: 001D2D23
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001D2D2E
              • ReleaseDC.USER32(00000000,00000000), ref: 001D2D3A
              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 001D2D76
              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 001D2D87
              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,001D5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 001D2DC2
              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 001D2DE1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
              • String ID: @U=u
              • API String ID: 3864802216-2594219639
              • Opcode ID: 6ffb399079b4352ae0d7ba4c624829a2701e8db2bb8219eee24450a2a7bd5912
              • Instruction ID: 8d3825b4b0876f8611d3b2c97a73a09ca374b300fc53517c1e14e3a7d78c48a2
              • Opcode Fuzzy Hash: 6ffb399079b4352ae0d7ba4c624829a2701e8db2bb8219eee24450a2a7bd5912
              • Instruction Fuzzy Hash: 95318E76202614BFEB118F54CC8AFEB3FADEF19715F044056FE089A291D6759C90CBA4
              APIs
              • GetParent.USER32 ref: 001A20AB
              • GetClassNameW.USER32(00000000,?,00000100), ref: 001A20C0
              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 001A214D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ClassMessageNameParentSend
              • String ID: @U=u$SHELLDLL_DefView$details$largeicons$list$smallicons
              • API String ID: 1290815626-1428604138
              • Opcode ID: a9a34fb94e284435bc2e179a994ae9e97604f7d4bd95cad77888119ab81cc959
              • Instruction ID: 4fadaeb7ddad6fe93b3e58544bffd2585131c153934d40d5d1c0a493f870697e
              • Opcode Fuzzy Hash: a9a34fb94e284435bc2e179a994ae9e97604f7d4bd95cad77888119ab81cc959
              • Instruction Fuzzy Hash: E01106BE688717BAFB052228DC06DE7379CCF17328F204116FB05A50D6EF75A8625A54
              APIs
              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 001D3A9D
              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 001D3AA0
              • GetWindowLongW.USER32(?,000000F0), ref: 001D3AC7
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 001D3AEA
              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 001D3B62
              • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 001D3BAC
              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 001D3BC7
              • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 001D3BE2
              • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 001D3BF6
              • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 001D3C13
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$LongWindow
              • String ID:
              • API String ID: 312131281-0
              • Opcode ID: 5cb6f9cd3e54ac3624e50a11c91c4524dac2eeb85051e6e5a2aa85706ed33f4f
              • Instruction ID: 6ae1a3f6e54c0d606741af4f1d593ea292b855acd1c33621dcf672e7e5663d41
              • Opcode Fuzzy Hash: 5cb6f9cd3e54ac3624e50a11c91c4524dac2eeb85051e6e5a2aa85706ed33f4f
              • Instruction Fuzzy Hash: B0616A75A00208AFDB10DFA8CC85EEE77B8EB19700F10419AFA25A73A1D770AE55DB50
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 001AB151
              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,001AA1E1,?,00000001), ref: 001AB165
              • GetWindowThreadProcessId.USER32(00000000), ref: 001AB16C
              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,001AA1E1,?,00000001), ref: 001AB17B
              • GetWindowThreadProcessId.USER32(?,00000000), ref: 001AB18D
              • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,001AA1E1,?,00000001), ref: 001AB1A6
              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,001AA1E1,?,00000001), ref: 001AB1B8
              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,001AA1E1,?,00000001), ref: 001AB1FD
              • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,001AA1E1,?,00000001), ref: 001AB212
              • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,001AA1E1,?,00000001), ref: 001AB21D
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
              • String ID:
              • API String ID: 2156557900-0
              • Opcode ID: 58e3a39b7b190f30e329a5eb36b4149c095a5d905695ce1131886384092b4eb6
              • Instruction ID: a96c6b48c28b80182fd067bc2ee49e04ee36b120e1647979c332d4a140264c4f
              • Opcode Fuzzy Hash: 58e3a39b7b190f30e329a5eb36b4149c095a5d905695ce1131886384092b4eb6
              • Instruction Fuzzy Hash: 1A31BF79505344BFDB10DF24FC88BAD7BAABB66351F118407FA00D6291DBB4AA40CF60
              APIs
              • _free.LIBCMT ref: 00172C94
                • Part of subcall function 001729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000), ref: 001729DE
                • Part of subcall function 001729C8: GetLastError.KERNEL32(00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000,00000000), ref: 001729F0
              • _free.LIBCMT ref: 00172CA0
              • _free.LIBCMT ref: 00172CAB
              • _free.LIBCMT ref: 00172CB6
              • _free.LIBCMT ref: 00172CC1
              • _free.LIBCMT ref: 00172CCC
              • _free.LIBCMT ref: 00172CD7
              • _free.LIBCMT ref: 00172CE2
              • _free.LIBCMT ref: 00172CED
              • _free.LIBCMT ref: 00172CFB
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 2baf68e42677bab7ec403361dcfab9c94e36466ff95845822e41e8aa746aaee6
              • Instruction ID: 5812c7a037441d541cf340bbb0ccae2e9635aaadb43f0c079ef29f593c2aad59
              • Opcode Fuzzy Hash: 2baf68e42677bab7ec403361dcfab9c94e36466ff95845822e41e8aa746aaee6
              • Instruction Fuzzy Hash: 3D11C376100118AFCB02EF64D882CDD7BB5FF19354F4584A4FA4C9B222DB31EA919B90
              APIs
              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00141459
              • OleUninitialize.OLE32(?,00000000), ref: 001414F8
              • UnregisterHotKey.USER32(?), ref: 001416DD
              • DestroyWindow.USER32(?), ref: 001824B9
              • FreeLibrary.KERNEL32(?), ref: 0018251E
              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0018254B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
              • String ID: close all
              • API String ID: 469580280-3243417748
              • Opcode ID: 7e49a97e2828e55f09aca6a93046d95fc6e945cfae9eff24252d1613d3fabee6
              • Instruction ID: d1f67b834ec18a870cfdf7fd0dd9c75832527e6cf3f84fbaa3a2060cc3346bd4
              • Opcode Fuzzy Hash: 7e49a97e2828e55f09aca6a93046d95fc6e945cfae9eff24252d1613d3fabee6
              • Instruction Fuzzy Hash: 7FD17131702212DFCB1AEF14D499B69F7A4BF15700F2542ADE84A6B262DB30ED56CF90
              APIs
              • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 001B35E4
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
              • LoadStringW.USER32(00212390,?,00000FFF,?), ref: 001B360A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: LoadString$_wcslen
              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
              • API String ID: 4099089115-2391861430
              • Opcode ID: 77aea0a0a49e0dafacaf980bb807cd94d7b59a8019116052284cdd84d6256d20
              • Instruction ID: b8c0a9de77efae07e9a3c7d6890ad8969312bea64b2fbd8d7f776ceb25ed6541
              • Opcode Fuzzy Hash: 77aea0a0a49e0dafacaf980bb807cd94d7b59a8019116052284cdd84d6256d20
              • Instruction Fuzzy Hash: 2C51607290020ABADF14EFA0DC46EEEBB78AF25300F144165F515721A2DF311BA9DFA1
              APIs
              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 001D3925
              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 001D393A
              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 001D3954
              • _wcslen.LIBCMT ref: 001D3999
              • SendMessageW.USER32(?,00001057,00000000,?), ref: 001D39C6
              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 001D39F4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$Window_wcslen
              • String ID: @U=u$SysListView32
              • API String ID: 2147712094-1908207174
              • Opcode ID: 7040b339ec858eb8323bb222eefe301788d19d7bdbb9502214f44c36314c0fee
              • Instruction ID: 5f69437ee4b4e6081dcf38767473fea8f2fff0dbc38fe2173ce54fe80bf5ceaf
              • Opcode Fuzzy Hash: 7040b339ec858eb8323bb222eefe301788d19d7bdbb9502214f44c36314c0fee
              • Instruction Fuzzy Hash: D741A271A00219ABEF219F64CC49BEA7BA9EF18354F100527F958E7281D771DA94CB90
              APIs
              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 001D2E1C
              • GetWindowLongW.USER32(00000000,000000F0), ref: 001D2E4F
              • GetWindowLongW.USER32(00000000,000000F0), ref: 001D2E84
              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 001D2EB6
              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 001D2EE0
              • GetWindowLongW.USER32(00000000,000000F0), ref: 001D2EF1
              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 001D2F0B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: LongWindow$MessageSend
              • String ID: @U=u
              • API String ID: 2178440468-2594219639
              • Opcode ID: 7cd90f536d84bcd3963fd8dc0456b310fd7c3470d3d7e1df17ba171260ee276b
              • Instruction ID: 599472b55af0d19d54944a8898b2efecb5f8a8be3b66676a45c31f149ea7f1e9
              • Opcode Fuzzy Hash: 7cd90f536d84bcd3963fd8dc0456b310fd7c3470d3d7e1df17ba171260ee276b
              • Instruction Fuzzy Hash: DA3105306461519FDB21CF58EC88FA537E1EBAA711F1545A6FA208B3B1CB71E890DB41
              APIs
              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 001BC272
              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 001BC29A
              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 001BC2CA
              • GetLastError.KERNEL32 ref: 001BC322
              • SetEvent.KERNEL32(?), ref: 001BC336
              • InternetCloseHandle.WININET(00000000), ref: 001BC341
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
              • String ID:
              • API String ID: 3113390036-3916222277
              • Opcode ID: a599e7b3fe8cf7e937dcf8e93af8a2c9d9ebf8f4ea4b44cdf9599be449650e20
              • Instruction ID: c9e676346adff867f74b3a270fea34c6982442845a6dd7d09aabefb177a5e480
              • Opcode Fuzzy Hash: a599e7b3fe8cf7e937dcf8e93af8a2c9d9ebf8f4ea4b44cdf9599be449650e20
              • Instruction Fuzzy Hash: DF319AB1601208AFD7219FA58C88AEB7BFCFB99740B54891EF486D2210DB34DD44CBE0
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00183AAF,?,?,Bad directive syntax error,001DCC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 001A98BC
              • LoadStringW.USER32(00000000,?,00183AAF,?), ref: 001A98C3
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 001A9987
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: HandleLoadMessageModuleString_wcslen
              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
              • API String ID: 858772685-4153970271
              • Opcode ID: b3c9757dfe65d425962f8675952850799e9310db71292126ed529203fa97a7d0
              • Instruction ID: 1a07a6baaa55814c67c01e21c433dd1fdbb35f4246b88384d2da8f912bc22a31
              • Opcode Fuzzy Hash: b3c9757dfe65d425962f8675952850799e9310db71292126ed529203fa97a7d0
              • Instruction Fuzzy Hash: 99218D3280021AFBDF15AF90CC0AEEE7779BF29704F04446AF515660A2EB319668DB50
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0daef21090bf360aa3b7183bd71bc9ade8703c637bae1c342090b675022f9d58
              • Instruction ID: 05cc89f691d2fcb97b238636a798cbd9b94a6df16d0b73f8a5a5783893242972
              • Opcode Fuzzy Hash: 0daef21090bf360aa3b7183bd71bc9ade8703c637bae1c342090b675022f9d58
              • Instruction Fuzzy Hash: 6CC1F374904249AFCB11DFA8D889BADBBB4BF1A310F148099F51CA7392CB708946CB61
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
              • String ID:
              • API String ID: 1282221369-0
              • Opcode ID: cc198d2f23e4ac879480720cf3cc37887c2db0d4dc2522010a1730cbcdbf4d15
              • Instruction ID: a00a7ad7d3ba88a793a7cf96643d917b90a825c9891993c7975e17a0305d5479
              • Opcode Fuzzy Hash: cc198d2f23e4ac879480720cf3cc37887c2db0d4dc2522010a1730cbcdbf4d15
              • Instruction Fuzzy Hash: 36614571904314AFDB25AFB4BC85AAE7BB5EF16720F04C16EF94CA7281DB319D418790
              APIs
              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 001BC182
              • GetLastError.KERNEL32 ref: 001BC195
              • SetEvent.KERNEL32(?), ref: 001BC1A9
                • Part of subcall function 001BC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 001BC272
                • Part of subcall function 001BC253: GetLastError.KERNEL32 ref: 001BC322
                • Part of subcall function 001BC253: SetEvent.KERNEL32(?), ref: 001BC336
                • Part of subcall function 001BC253: InternetCloseHandle.WININET(00000000), ref: 001BC341
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
              • String ID:
              • API String ID: 337547030-0
              • Opcode ID: 5c144107d05387b8ce5aeb4f25d9084902bcc3fc2f96541063613e06b15e98e2
              • Instruction ID: 231c6ae5adc7fd5b507fa48178b057fab04c572b88c1c32aae61e84b3770f417
              • Opcode Fuzzy Hash: 5c144107d05387b8ce5aeb4f25d9084902bcc3fc2f96541063613e06b15e98e2
              • Instruction Fuzzy Hash: 6E318D71202606EFDB219FA9DC44AA6BBF9FF58300B04481EF956C6A10D730E854DBE0
              APIs
                • Part of subcall function 001A3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 001A3A57
                • Part of subcall function 001A3A3D: GetCurrentThreadId.KERNEL32 ref: 001A3A5E
                • Part of subcall function 001A3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001A25B3), ref: 001A3A65
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 001A25BD
              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 001A25DB
              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 001A25DF
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 001A25E9
              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 001A2601
              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 001A2605
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 001A260F
              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 001A2623
              • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 001A2627
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
              • String ID:
              • API String ID: 2014098862-0
              • Opcode ID: e48cab23c121a5b004a82c2d001f600ba1b6ff0044f34abc038fb8946938277d
              • Instruction ID: cc732c2c6aa210728c800c992bb64f3b7bccc98cc21e0a3e839b9c8ff411a810
              • Opcode Fuzzy Hash: e48cab23c121a5b004a82c2d001f600ba1b6ff0044f34abc038fb8946938277d
              • Instruction Fuzzy Hash: 8A01B530691320FBFF1067689C8AF993F59DB5AB11F100402F318AF1D1CAF15484CAA9
              APIs
              • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,001A1449,?,?,00000000), ref: 001A180C
              • HeapAlloc.KERNEL32(00000000,?,001A1449,?,?,00000000), ref: 001A1813
              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,001A1449,?,?,00000000), ref: 001A1828
              • GetCurrentProcess.KERNEL32(?,00000000,?,001A1449,?,?,00000000), ref: 001A1830
              • DuplicateHandle.KERNEL32(00000000,?,001A1449,?,?,00000000), ref: 001A1833
              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,001A1449,?,?,00000000), ref: 001A1843
              • GetCurrentProcess.KERNEL32(001A1449,00000000,?,001A1449,?,?,00000000), ref: 001A184B
              • DuplicateHandle.KERNEL32(00000000,?,001A1449,?,?,00000000), ref: 001A184E
              • CreateThread.KERNEL32(00000000,00000000,001A1874,00000000,00000000,00000000), ref: 001A1868
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
              • String ID:
              • API String ID: 1957940570-0
              • Opcode ID: a102f7843cb034abd52f2c94fc8eaa3a64209a55fd8df94ce8c0a5e90a33c936
              • Instruction ID: bcb703f7ff77e81b98b3af35d2f63b76765e55c4ae92252ede2cdaefb348e30d
              • Opcode Fuzzy Hash: a102f7843cb034abd52f2c94fc8eaa3a64209a55fd8df94ce8c0a5e90a33c936
              • Instruction Fuzzy Hash: 9501BF75241315FFE710AB65DC4DF573B6CEB89B11F004411FA05DB591C6749840CB60
              APIs
                • Part of subcall function 001AD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 001AD501
                • Part of subcall function 001AD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 001AD50F
                • Part of subcall function 001AD4DC: CloseHandle.KERNEL32(00000000), ref: 001AD5DC
              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 001CA16D
              • GetLastError.KERNEL32 ref: 001CA180
              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 001CA1B3
              • TerminateProcess.KERNEL32(00000000,00000000), ref: 001CA268
              • GetLastError.KERNEL32(00000000), ref: 001CA273
              • CloseHandle.KERNEL32(00000000), ref: 001CA2C4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
              • String ID: SeDebugPrivilege
              • API String ID: 2533919879-2896544425
              • Opcode ID: ddbe28237f6c3620381deb1498cf9aa600b11d6666a9970f17d0df8b2c2b127b
              • Instruction ID: 02c349e57baf5d2d2c1c88db52865dd6255bc554da7b470cb33a4df988465677
              • Opcode Fuzzy Hash: ddbe28237f6c3620381deb1498cf9aa600b11d6666a9970f17d0df8b2c2b127b
              • Instruction Fuzzy Hash: DF619E70205252AFD721DF18C494F15BBE1AF6431CF58848CE4668BBA3C776EC49CB92
              APIs
              • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0019F3AB,00000000,?,?,00000000,?,0019682C,00000004,00000000,00000000), ref: 001D824C
              • EnableWindow.USER32(00000000,00000000), ref: 001D8272
              • ShowWindow.USER32(FFFFFFFF,00000000), ref: 001D82D1
              • ShowWindow.USER32(00000000,00000004), ref: 001D82E5
              • EnableWindow.USER32(00000000,00000001), ref: 001D830B
              • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 001D832F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$Show$Enable$MessageSend
              • String ID: @U=u
              • API String ID: 642888154-2594219639
              • Opcode ID: b5d5814477cc91836cf6bd555fb2ea17b3e43efa04b5fd323e89504cc0577032
              • Instruction ID: 70b361ca79fb63bbb01dab63a1110f1b3388b43ece1a51c622d64a72028923c3
              • Opcode Fuzzy Hash: b5d5814477cc91836cf6bd555fb2ea17b3e43efa04b5fd323e89504cc0577032
              • Instruction Fuzzy Hash: 54418034602644AFDF25CF25DC99BE47BF1FB1A715F1842AAE6184B3A2CB31A851CB50
              APIs
              • IsWindowVisible.USER32(?), ref: 001A4C95
              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 001A4CB2
              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 001A4CEA
              • _wcslen.LIBCMT ref: 001A4D08
              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 001A4D10
              • _wcsstr.LIBVCRUNTIME ref: 001A4D1A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
              • String ID: @U=u
              • API String ID: 72514467-2594219639
              • Opcode ID: dae5db148b982f098406c8e1dc35a9043ae67e2dad0a073bd753b31bae0502e8
              • Instruction ID: 63bff3771583b6d758212c144afb416b464ce92d7a9fcd5a9c407969bb28dd19
              • Opcode Fuzzy Hash: dae5db148b982f098406c8e1dc35a9043ae67e2dad0a073bd753b31bae0502e8
              • Instruction Fuzzy Hash: EB213B35605201BBEB155B79DC0AEBB7B9CDF96760F10403EF809CA192DFA1DC41C2A0
              APIs
              • LoadIconW.USER32(00000000,00007F03), ref: 001AC913
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: IconLoad
              • String ID: blank$info$question$stop$warning
              • API String ID: 2457776203-404129466
              • Opcode ID: 1556e3aeb1a37c9baf2fa72bdff746e6f0ac5f266632de7210a30caace818248
              • Instruction ID: 6a6380e8b250f3e671a16afee636bbca4e7daa0a911b93c96f67da83e82c6d42
              • Opcode Fuzzy Hash: 1556e3aeb1a37c9baf2fa72bdff746e6f0ac5f266632de7210a30caace818248
              • Instruction Fuzzy Hash: 2F11273A689307BAE7059B549C83DAB67DCDF27328B20402EF500A62C2E7A49E1052E5
              APIs
              • GetClientRect.USER32(?), ref: 00197452
              • SendMessageW.USER32(?,00001328,00000000,?), ref: 00197469
              • GetWindowDC.USER32(?), ref: 00197475
              • GetPixel.GDI32(00000000,?,?), ref: 00197484
              • ReleaseDC.USER32(?,00000000), ref: 00197496
              • GetSysColor.USER32(00000005), ref: 001974B0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ClientColorMessagePixelRectReleaseSendWindow
              • String ID: @U=u
              • API String ID: 272304278-2594219639
              • Opcode ID: b632e64756e5327da3dd0ddcf82d0c42b09e81f69481a02c63331aa79159ce27
              • Instruction ID: 664456e0925b76c9df05c33d9e5f479b79725a5198737c4d5b93008ecd66bf3c
              • Opcode Fuzzy Hash: b632e64756e5327da3dd0ddcf82d0c42b09e81f69481a02c63331aa79159ce27
              • Instruction Fuzzy Hash: C2018B31506216EFDB105FA4EC08BEEBBB6FF04311F110561F925A35A1CB311E91EB91
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen$LocalTime
              • String ID:
              • API String ID: 952045576-0
              • Opcode ID: 1cc5898ede9544b5b9d6159df3582d95f5ca60eb11679c3dde628dd05f4f6cea
              • Instruction ID: 6c0e3d9ca05449db28eb89b14a1f02047c63e6054ec1e9bceaf91b8261e3ac96
              • Opcode Fuzzy Hash: 1cc5898ede9544b5b9d6159df3582d95f5ca60eb11679c3dde628dd05f4f6cea
              • Instruction Fuzzy Hash: 5F41D466D1021876DB11EBF4CC8A9CFB7A8AF56310F508466F518E3121FB34E265C3E5
              APIs
              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0019682C,00000004,00000000,00000000), ref: 0015F953
              • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0019682C,00000004,00000000,00000000), ref: 0019F3D1
              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0019682C,00000004,00000000,00000000), ref: 0019F454
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ShowWindow
              • String ID:
              • API String ID: 1268545403-0
              • Opcode ID: 2b7960383591c662796030159bb268f97feac57a0bc618304f5deb646b89409f
              • Instruction ID: 55248c08639c7932a70187f7ca5e8e30bda9427bce591ab47f46afb001f0fa8f
              • Opcode Fuzzy Hash: 2b7960383591c662796030159bb268f97feac57a0bc618304f5deb646b89409f
              • Instruction Fuzzy Hash: 2C415231605A40FECB388B3DC88876A7B91BB5631AF15443DF8679B560C771A4CBC751
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _memcmp
              • String ID:
              • API String ID: 2931989736-0
              • Opcode ID: 2fe07dbba7ad236e8eeec37aa864d2012b78e55dd28c9277d265d0652131e568
              • Instruction ID: 74716c2b8114f227df25b31af76b7b15f0b1c8f80eec01d09a240a0ad510bea9
              • Opcode Fuzzy Hash: 2fe07dbba7ad236e8eeec37aa864d2012b78e55dd28c9277d265d0652131e568
              • Instruction Fuzzy Hash: 3421DB69748A0977D71855208E82FFB335FBF323A4F484025FD1A9A781F720EE3181A5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID: NULL Pointer assignment$Not an Object type
              • API String ID: 0-572801152
              • Opcode ID: 0f047d9a36478830c0ab624f5c46842cf26f51117ce9351bf758dc6d01fe6993
              • Instruction ID: c53a0d67c86415c69087cc13fdb2aea32fb4a0e0d2f11247d832910934612205
              • Opcode Fuzzy Hash: 0f047d9a36478830c0ab624f5c46842cf26f51117ce9351bf758dc6d01fe6993
              • Instruction Fuzzy Hash: EED1B075A0060A9FDF10CF98C885FAEB7B6BF58344F14856DE915AB281D770ED81CB90
              APIs
              • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,001817FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 001815CE
              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,001817FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00181651
              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,001817FB,?,001817FB,00000000,00000000,?,00000000,?,?,?,?), ref: 001816E4
              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,001817FB,00000000,00000000,?,00000000,?,?,?,?), ref: 001816FB
                • Part of subcall function 00173820: RtlAllocateHeap.NTDLL(00000000,?,00211444,?,0015FDF5,?,?,0014A976,00000010,00211440,001413FC,?,001413C6,?,00141129), ref: 00173852
              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,001817FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00181777
              • __freea.LIBCMT ref: 001817A2
              • __freea.LIBCMT ref: 001817AE
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
              • String ID:
              • API String ID: 2829977744-0
              • Opcode ID: e1a09724ebef1f38a29b79038ad0c3a4d16eb5a8024e77a84e636626c5980124
              • Instruction ID: 53f8a9fdaf598b1d3773d40e01fce10c1fdd68742a462f63e6299ccc2086b91f
              • Opcode Fuzzy Hash: e1a09724ebef1f38a29b79038ad0c3a4d16eb5a8024e77a84e636626c5980124
              • Instruction Fuzzy Hash: 1E91C773E00216BADB24AE74CC81AEE7BBDAF59310F184659E905E7141D735DE42CF60
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Variant$ClearInit
              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
              • API String ID: 2610073882-625585964
              • Opcode ID: f8f6f3bb281c25a7af897f5599f90adf5aa4fd43cca28be619ef81023a75ddc0
              • Instruction ID: fc5ac22c939f33a2c64e1c99a576e87f13b81c7fbbc6b0a749abc7d149c4dce0
              • Opcode Fuzzy Hash: f8f6f3bb281c25a7af897f5599f90adf5aa4fd43cca28be619ef81023a75ddc0
              • Instruction Fuzzy Hash: F6919C71A04319ABDF24CFA4C898FAEBBB8EF66710F10855DF505AB281D770D945CBA0
              APIs
              • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 001B125C
              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 001B1284
              • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 001B12A8
              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001B12D8
              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001B135F
              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001B13C4
              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001B1430
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ArraySafe$Data$Access$UnaccessVartype
              • String ID:
              • API String ID: 2550207440-0
              • Opcode ID: 804605ea01bd236855e8619e74c351e194b80b02ac8ab77dbe51c5636abed1e2
              • Instruction ID: c4fe7d0331b2a9220d723b435ea2f032bdb413b68016efe09b9ef8bb94099db6
              • Opcode Fuzzy Hash: 804605ea01bd236855e8619e74c351e194b80b02ac8ab77dbe51c5636abed1e2
              • Instruction Fuzzy Hash: E3910572A00219BFDB00DFA8C8A4BFE77B5FF55315F624469E900EB291D774A941CB90
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ObjectSelect$BeginCreatePath
              • String ID:
              • API String ID: 3225163088-0
              • Opcode ID: 9c89f50c51ff55d98e7f4028c034864708874e4d28d1bcd9de34b8b30e640b17
              • Instruction ID: 6add2962bbd148e63110789368eb56b361dc978ef82fe989c2b13c1c8fca83dd
              • Opcode Fuzzy Hash: 9c89f50c51ff55d98e7f4028c034864708874e4d28d1bcd9de34b8b30e640b17
              • Instruction Fuzzy Hash: 20914971D10219EFCB14CFA9CC84AEEBBB8FF48320F144556E915BB251D378AA55CB60
              APIs
              • VariantInit.OLEAUT32(?), ref: 001C396B
              • CharUpperBuffW.USER32(?,?), ref: 001C3A7A
              • _wcslen.LIBCMT ref: 001C3A8A
              • VariantClear.OLEAUT32(?), ref: 001C3C1F
                • Part of subcall function 001B0CDF: VariantInit.OLEAUT32(00000000), ref: 001B0D1F
                • Part of subcall function 001B0CDF: VariantCopy.OLEAUT32(?,?), ref: 001B0D28
                • Part of subcall function 001B0CDF: VariantClear.OLEAUT32(?), ref: 001B0D34
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
              • String ID: AUTOIT.ERROR$Incorrect Parameter format
              • API String ID: 4137639002-1221869570
              • Opcode ID: 8de2307f50a9168c69b6492555629546e2cc5426564efb041bc5fbb1f3bca61c
              • Instruction ID: 8bd070a31234bf4d48f83115c957d79c745b00f2615bf8e54267e7783fd68c95
              • Opcode Fuzzy Hash: 8de2307f50a9168c69b6492555629546e2cc5426564efb041bc5fbb1f3bca61c
              • Instruction Fuzzy Hash: 71918A75A083059FC704DF28C480A6AB7E4FFA9314F14892EF8999B351DB31EE45CB92
              APIs
                • Part of subcall function 001A000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?,?,?,001A035E), ref: 001A002B
                • Part of subcall function 001A000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?,?), ref: 001A0046
                • Part of subcall function 001A000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?,?), ref: 001A0054
                • Part of subcall function 001A000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?), ref: 001A0064
              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 001C4C51
              • _wcslen.LIBCMT ref: 001C4D59
              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 001C4DCF
              • CoTaskMemFree.OLE32(?), ref: 001C4DDA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
              • String ID: NULL Pointer assignment
              • API String ID: 614568839-2785691316
              • Opcode ID: 8b2de5f7b66792d9da824436f93ef1b41b5d8d44f0c0ba6bc97e3f2c60d7a04f
              • Instruction ID: 5d217f485b885ebc6c52522a58b3b31c5cf02bcdd3947c5d9f444d4c8a5bd60b
              • Opcode Fuzzy Hash: 8b2de5f7b66792d9da824436f93ef1b41b5d8d44f0c0ba6bc97e3f2c60d7a04f
              • Instruction Fuzzy Hash: 8D913771D0121DAFDF14DFA4D890EEEB7B8BF28304F10856AE915AB251DB349A44CFA0
              APIs
              • GetMenu.USER32(?), ref: 001D2183
              • GetMenuItemCount.USER32(00000000), ref: 001D21B5
              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 001D21DD
              • _wcslen.LIBCMT ref: 001D2213
              • GetMenuItemID.USER32(?,?), ref: 001D224D
              • GetSubMenu.USER32(?,?), ref: 001D225B
                • Part of subcall function 001A3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 001A3A57
                • Part of subcall function 001A3A3D: GetCurrentThreadId.KERNEL32 ref: 001A3A5E
                • Part of subcall function 001A3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001A25B3), ref: 001A3A65
              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 001D22E3
                • Part of subcall function 001AE97B: Sleep.KERNEL32 ref: 001AE9F3
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
              • String ID:
              • API String ID: 4196846111-0
              • Opcode ID: 9b65d4eef729c499e30184534342619f2689a0ac624f28e272e9de7ba1734e72
              • Instruction ID: 44d69e71a542ee60c58171a27f6173b919b669da198e6bec3e22411fc33bc7e7
              • Opcode Fuzzy Hash: 9b65d4eef729c499e30184534342619f2689a0ac624f28e272e9de7ba1734e72
              • Instruction Fuzzy Hash: 40719E35A00215AFCB14DFA8C845AAEB7F1FF68310F15845AE826EB351D735EE41CB90
              APIs
              • GetParent.USER32(?), ref: 001AAEF9
              • GetKeyboardState.USER32(?), ref: 001AAF0E
              • SetKeyboardState.USER32(?), ref: 001AAF6F
              • PostMessageW.USER32(?,00000101,00000010,?), ref: 001AAF9D
              • PostMessageW.USER32(?,00000101,00000011,?), ref: 001AAFBC
              • PostMessageW.USER32(?,00000101,00000012,?), ref: 001AAFFD
              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 001AB020
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessagePost$KeyboardState$Parent
              • String ID:
              • API String ID: 87235514-0
              • Opcode ID: 28ceb9a80e26647073a1757fc882646b810f48ebc67ce9139008e9381224d5e3
              • Instruction ID: 38d35a469efc56924760da17f96b60b43507851256acfe20058a3ec2933f0048
              • Opcode Fuzzy Hash: 28ceb9a80e26647073a1757fc882646b810f48ebc67ce9139008e9381224d5e3
              • Instruction Fuzzy Hash: 1E5181A46087D53DFB3A42348C85BBABEA95F07304F08858AF1D9958C3D7A9ACC4D751
              APIs
              • GetParent.USER32(00000000), ref: 001AAD19
              • GetKeyboardState.USER32(?), ref: 001AAD2E
              • SetKeyboardState.USER32(?), ref: 001AAD8F
              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 001AADBB
              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 001AADD8
              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 001AAE17
              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 001AAE38
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessagePost$KeyboardState$Parent
              • String ID:
              • API String ID: 87235514-0
              • Opcode ID: f7311172bb16626a8982aea4d6a19cdae92fef72a87e71b2d99bb23fa6f5002b
              • Instruction ID: d81f80a58caecf3445e4906ebac908720fc185a647c680b63336ae9f10a2a2a7
              • Opcode Fuzzy Hash: f7311172bb16626a8982aea4d6a19cdae92fef72a87e71b2d99bb23fa6f5002b
              • Instruction Fuzzy Hash: CE51E3A55487D53DFB3783748C95BBABEA85F47300F488489E1D5468C3D3A4EC88E762
              APIs
              • GetConsoleCP.KERNEL32(00183CD6,?,?,?,?,?,?,?,?,00175BA3,?,?,00183CD6,?,?), ref: 00175470
              • __fassign.LIBCMT ref: 001754EB
              • __fassign.LIBCMT ref: 00175506
              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00183CD6,00000005,00000000,00000000), ref: 0017552C
              • WriteFile.KERNEL32(?,00183CD6,00000000,00175BA3,00000000,?,?,?,?,?,?,?,?,?,00175BA3,?), ref: 0017554B
              • WriteFile.KERNEL32(?,?,00000001,00175BA3,00000000,?,?,?,?,?,?,?,?,?,00175BA3,?), ref: 00175584
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
              • String ID:
              • API String ID: 1324828854-0
              • Opcode ID: 6b5c45993f5f2621c874f47a1e718bd0bf23be3e24716d3633a227feeb910bd0
              • Instruction ID: a42ca37186b2e90a0e20513ada7ef88d654c8a2a57b1f2af5489fca14110fe20
              • Opcode Fuzzy Hash: 6b5c45993f5f2621c874f47a1e718bd0bf23be3e24716d3633a227feeb910bd0
              • Instruction Fuzzy Hash: 0851C6719006499FDB10CFA8D885AEEBBFAEF09300F14851AF559E7291E7709A41CB60
              APIs
              • SetWindowLongW.USER32(00000002,000000F0,?), ref: 001D6C33
              • SetWindowLongW.USER32(?,000000EC,?), ref: 001D6C4A
              • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 001D6C73
              • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,001BAB79,00000000,00000000), ref: 001D6C98
              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 001D6CC7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$Long$MessageSendShow
              • String ID: @U=u
              • API String ID: 3688381893-2594219639
              • Opcode ID: fe51cd4b2c5088998e01b1a8b84e335c581797af07b7dfdbfba988c6a800d840
              • Instruction ID: d8c08e374064cc273af92447653a93efeabeffe638020d2ded08664b64c00f6e
              • Opcode Fuzzy Hash: fe51cd4b2c5088998e01b1a8b84e335c581797af07b7dfdbfba988c6a800d840
              • Instruction Fuzzy Hash: 0E41E635614114AFDB24CF28CC98FEA7BA5EB09350F15026AF999A73E0C771ED41DA80
              APIs
              • _ValidateLocalCookies.LIBCMT ref: 00162D4B
              • ___except_validate_context_record.LIBVCRUNTIME ref: 00162D53
              • _ValidateLocalCookies.LIBCMT ref: 00162DE1
              • __IsNonwritableInCurrentImage.LIBCMT ref: 00162E0C
              • _ValidateLocalCookies.LIBCMT ref: 00162E61
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
              • String ID: csm
              • API String ID: 1170836740-1018135373
              • Opcode ID: 2b75e032e8f88fbec625ac0e66f634d498efd7cc6bfd8cc2b62d7007522a88fa
              • Instruction ID: ae4ef51556ff0a1a82be82e8a2d1c88de12c69344df9d5b8f310616fe4f4a0e4
              • Opcode Fuzzy Hash: 2b75e032e8f88fbec625ac0e66f634d498efd7cc6bfd8cc2b62d7007522a88fa
              • Instruction Fuzzy Hash: 4E41D234E00609ABCF10DFA8CC85ADEBBB5BF45324F148165E814AB392D771AA61CBD0
              APIs
                • Part of subcall function 001C304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 001C307A
                • Part of subcall function 001C304E: _wcslen.LIBCMT ref: 001C309B
              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 001C1112
              • WSAGetLastError.WSOCK32 ref: 001C1121
              • WSAGetLastError.WSOCK32 ref: 001C11C9
              • closesocket.WSOCK32(00000000), ref: 001C11F9
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
              • String ID:
              • API String ID: 2675159561-0
              • Opcode ID: 42825b03b3e9bf434311ed2c6ed0d0cae9097ca40383313ad9aa897f3af0e55f
              • Instruction ID: 0d7787d9cd48ae536eed5d370c86f43810aa1d45ee6715c4d49ca4dbb3880f2a
              • Opcode Fuzzy Hash: 42825b03b3e9bf434311ed2c6ed0d0cae9097ca40383313ad9aa897f3af0e55f
              • Instruction Fuzzy Hash: 3141E531601205AFDB109F24C884FA9B7E9FF56324F188159FD159B292C778ED81CBE1
              APIs
                • Part of subcall function 001ADDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,001ACF22,?), ref: 001ADDFD
                • Part of subcall function 001ADDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,001ACF22,?), ref: 001ADE16
              • lstrcmpiW.KERNEL32(?,?), ref: 001ACF45
              • MoveFileW.KERNEL32(?,?), ref: 001ACF7F
              • _wcslen.LIBCMT ref: 001AD005
              • _wcslen.LIBCMT ref: 001AD01B
              • SHFileOperationW.SHELL32(?), ref: 001AD061
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
              • String ID: \*.*
              • API String ID: 3164238972-1173974218
              • Opcode ID: 81d7abb1ca4bd225eac5c7c73078ee08afd2fa394dc8cf5e6924338b7b079ddc
              • Instruction ID: 22b7972cda2c5b6bb388edaf8f3b1e5f5f87b643644350c1fbae7d8076779d0d
              • Opcode Fuzzy Hash: 81d7abb1ca4bd225eac5c7c73078ee08afd2fa394dc8cf5e6924338b7b079ddc
              • Instruction Fuzzy Hash: 5A4167759452199FDF12EFA4DD81ADEB7F9AF19340F1000E6E505EB142EB34AB88CB50
              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001A7769
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001A778F
              • SysAllocString.OLEAUT32(00000000), ref: 001A7792
              • SysAllocString.OLEAUT32(?), ref: 001A77B0
              • SysFreeString.OLEAUT32(?), ref: 001A77B9
              • StringFromGUID2.OLE32(?,?,00000028), ref: 001A77DE
              • SysAllocString.OLEAUT32(?), ref: 001A77EC
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
              • String ID:
              • API String ID: 3761583154-0
              • Opcode ID: 9e5cfd2ab1e08b4dcbc1538689a921d98377c098b75b08e4bb17a468f2a6c204
              • Instruction ID: 88de10e42c907a80d393e6fed6835e77b85bad0b2f95360766c8257a8be7d223
              • Opcode Fuzzy Hash: 9e5cfd2ab1e08b4dcbc1538689a921d98377c098b75b08e4bb17a468f2a6c204
              • Instruction Fuzzy Hash: D221B27A605219AFDB10DFE8CC88CBB73ACEB0A3647008526F914DB191D770DD81C7A0
              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001A7842
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 001A7868
              • SysAllocString.OLEAUT32(00000000), ref: 001A786B
              • SysAllocString.OLEAUT32 ref: 001A788C
              • SysFreeString.OLEAUT32 ref: 001A7895
              • StringFromGUID2.OLE32(?,?,00000028), ref: 001A78AF
              • SysAllocString.OLEAUT32(?), ref: 001A78BD
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
              • String ID:
              • API String ID: 3761583154-0
              • Opcode ID: 4ac27cb77fe6ca6635e4068f1329f8dcc9006eaf349e89049a105aa6cf6f768c
              • Instruction ID: a8e81cfb9b40cd4e9fdfa3f12ac0d8572f335f68ebe95da47c56de110a16e64e
              • Opcode Fuzzy Hash: 4ac27cb77fe6ca6635e4068f1329f8dcc9006eaf349e89049a105aa6cf6f768c
              • Instruction Fuzzy Hash: DE21A135609205AFDB109FA8DC88DBA77ECEF0A3607108525F915CB2A5D778DD81CBA4
              APIs
              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 001D5745
              • SendMessageW.USER32(?,00001074,?,00000001), ref: 001D579D
              • _wcslen.LIBCMT ref: 001D57AF
              • _wcslen.LIBCMT ref: 001D57BA
              • SendMessageW.USER32(?,00001002,00000000,?), ref: 001D5816
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$_wcslen
              • String ID: @U=u
              • API String ID: 763830540-2594219639
              • Opcode ID: b0c9cfdd61e5247263a3837554f9975e1e4e07b141d6b7c9246726ab53f41fb5
              • Instruction ID: 7f5c2fcafc1bd3fdbd5c267cfe95be05df1cf6572acf9133cb035c9fc1756304
              • Opcode Fuzzy Hash: b0c9cfdd61e5247263a3837554f9975e1e4e07b141d6b7c9246726ab53f41fb5
              • Instruction Fuzzy Hash: AE218071905618DADB209FA4CC85AEE7BB9FF14724F10821BE929EA2C0E7709985CF51
              APIs
              • GetStdHandle.KERNEL32(0000000C), ref: 001B04F2
              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 001B052E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CreateHandlePipe
              • String ID: nul
              • API String ID: 1424370930-2873401336
              • Opcode ID: ee516f81dc173b006510a193077479a240b68e65e5d8811c6a61c144d5061278
              • Instruction ID: 90de4555b2270155c55be678620d056b8cee4fea00072e14af72265ad60e11fc
              • Opcode Fuzzy Hash: ee516f81dc173b006510a193077479a240b68e65e5d8811c6a61c144d5061278
              • Instruction Fuzzy Hash: A9218DB1500306AFDB319F69DC44ADB77E4BF49724F204A19F8A1D66E0D7709980CF60
              APIs
              • GetStdHandle.KERNEL32(000000F6), ref: 001B05C6
              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 001B0601
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CreateHandlePipe
              • String ID: nul
              • API String ID: 1424370930-2873401336
              • Opcode ID: 643c95bdcf0ac325b924eabc8fa3f985079c205a3f52952327a18a68902f4248
              • Instruction ID: 6096aaaf024e404108179e5c2b3a55de0286240fb15d65456655ba67c4956048
              • Opcode Fuzzy Hash: 643c95bdcf0ac325b924eabc8fa3f985079c205a3f52952327a18a68902f4248
              • Instruction Fuzzy Hash: B2214F755013169FDB219F69DC04ADB77E4BF99720F200B19F8A1E72E0E77099A0CB50
              APIs
                • Part of subcall function 0014600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0014604C
                • Part of subcall function 0014600E: GetStockObject.GDI32(00000011), ref: 00146060
                • Part of subcall function 0014600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0014606A
              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 001D4112
              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 001D411F
              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 001D412A
              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 001D4139
              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 001D4145
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$CreateObjectStockWindow
              • String ID: Msctls_Progress32
              • API String ID: 1025951953-3636473452
              • Opcode ID: 5a3680587d2b02b42eb68cb4aa0871562a94250c1586f0006afc0f3d1ee77b28
              • Instruction ID: b90a277f43429b9b3a6bcea6516d566bbd3e181a8b342f77ba2e1a06a78c2ae2
              • Opcode Fuzzy Hash: 5a3680587d2b02b42eb68cb4aa0871562a94250c1586f0006afc0f3d1ee77b28
              • Instruction Fuzzy Hash: 321190B2150219BFEF118E64CC86EE77F6DEF19798F014111BB18A2190CB72AC61DBA4
              APIs
                • Part of subcall function 0017D7A3: _free.LIBCMT ref: 0017D7CC
              • _free.LIBCMT ref: 0017D82D
                • Part of subcall function 001729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000), ref: 001729DE
                • Part of subcall function 001729C8: GetLastError.KERNEL32(00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000,00000000), ref: 001729F0
              • _free.LIBCMT ref: 0017D838
              • _free.LIBCMT ref: 0017D843
              • _free.LIBCMT ref: 0017D897
              • _free.LIBCMT ref: 0017D8A2
              • _free.LIBCMT ref: 0017D8AD
              • _free.LIBCMT ref: 0017D8B8
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
              • Instruction ID: ae259239f3e1c0009e2af7f360a4a2288260ad55ff94029eca6c7b50c8104110
              • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
              • Instruction Fuzzy Hash: 8A118171540B18AAD621BFF0DC07FCBBBFC6F60704F448825F29DA6092DB34B6464651
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 001ADA74
              • LoadStringW.USER32(00000000), ref: 001ADA7B
              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 001ADA91
              • LoadStringW.USER32(00000000), ref: 001ADA98
              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 001ADADC
              Strings
              • %s (%d) : ==> %s: %s %s, xrefs: 001ADAB9
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: HandleLoadModuleString$Message
              • String ID: %s (%d) : ==> %s: %s %s
              • API String ID: 4072794657-3128320259
              • Opcode ID: cab72ff9c0cb3ef49c13b3ec1d49de5c2dae3b5c2ccf42da388e22ddd377ec29
              • Instruction ID: 505afd17c910c338be188217bf10d8742dde712292ee7fb24846dc6b79b94105
              • Opcode Fuzzy Hash: cab72ff9c0cb3ef49c13b3ec1d49de5c2dae3b5c2ccf42da388e22ddd377ec29
              • Instruction Fuzzy Hash: 8A0186F6501219BFE7109BA0DD89EFB336CE709301F400992B706E2441EA749EC48FB4
              APIs
              • InterlockedExchange.KERNEL32(0114E370,0114E370), ref: 001B097B
              • EnterCriticalSection.KERNEL32(0114E350,00000000), ref: 001B098D
              • TerminateThread.KERNEL32(0114E368,000001F6), ref: 001B099B
              • WaitForSingleObject.KERNEL32(0114E368,000003E8), ref: 001B09A9
              • CloseHandle.KERNEL32(0114E368), ref: 001B09B8
              • InterlockedExchange.KERNEL32(0114E370,000001F6), ref: 001B09C8
              • LeaveCriticalSection.KERNEL32(0114E350), ref: 001B09CF
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
              • String ID:
              • API String ID: 3495660284-0
              • Opcode ID: 972ca35f5cf0dbbf21f57e283f0c5576fa51793031d804701e479ac399d78982
              • Instruction ID: 1aa66b7094737d2a72707e7ddb6db4fc1b9989ad2949538c9f103dc07a735176
              • Opcode Fuzzy Hash: 972ca35f5cf0dbbf21f57e283f0c5576fa51793031d804701e479ac399d78982
              • Instruction Fuzzy Hash: 8BF0C932483A13BBDB525BA4EE89BD6BB29BF05706F402526F20290CA1C77594A5CFD0
              APIs
              • __allrem.LIBCMT ref: 001700BA
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001700D6
              • __allrem.LIBCMT ref: 001700ED
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0017010B
              • __allrem.LIBCMT ref: 00170122
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00170140
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
              • String ID:
              • API String ID: 1992179935-0
              • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
              • Instruction ID: b66069b34239fb593b31ecedcfb2b6004b575121753df8204644e4c2b4274f5f
              • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
              • Instruction Fuzzy Hash: 50812972A00706EBE725AF68DC81B6B73F8AF55364F24813EF515D7281EB70DA418B50
              APIs
              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,001682D9,001682D9,?,?,?,0017644F,00000001,00000001,8BE85006), ref: 00176258
              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0017644F,00000001,00000001,8BE85006,?,?,?), ref: 001762DE
              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 001763D8
              • __freea.LIBCMT ref: 001763E5
                • Part of subcall function 00173820: RtlAllocateHeap.NTDLL(00000000,?,00211444,?,0015FDF5,?,?,0014A976,00000010,00211440,001413FC,?,001413C6,?,00141129), ref: 00173852
              • __freea.LIBCMT ref: 001763EE
              • __freea.LIBCMT ref: 00176413
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ByteCharMultiWide__freea$AllocateHeap
              • String ID:
              • API String ID: 1414292761-0
              • Opcode ID: 64689ff0d3cee6541079243c9420c965cd5b6c9e9161f84ca9c956d899a361f7
              • Instruction ID: 316cde3967b888118ab99be07172af250fed35ca6b4497814ab1978f0315ec12
              • Opcode Fuzzy Hash: 64689ff0d3cee6541079243c9420c965cd5b6c9e9161f84ca9c956d899a361f7
              • Instruction Fuzzy Hash: 2B51E072A00A16ABEB298F64CC81EAF77B9EB58710F158629FC0DD6141EB34DC40D7A0
              APIs
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                • Part of subcall function 001CC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001CB6AE,?,?), ref: 001CC9B5
                • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CC9F1
                • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CCA68
                • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CCA9E
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001CBCCA
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001CBD25
              • RegCloseKey.ADVAPI32(00000000), ref: 001CBD6A
              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 001CBD99
              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 001CBDF3
              • RegCloseKey.ADVAPI32(?), ref: 001CBDFF
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
              • String ID:
              • API String ID: 1120388591-0
              • Opcode ID: 7ce1cbb6422e9594c2880d90c4a342ed9e8fb1ee139d07aad78f268d2fb67d2d
              • Instruction ID: a14a3b0b91426a912ee9e23068e8f323c201c63893b6292622aa09a8227caf66
              • Opcode Fuzzy Hash: 7ce1cbb6422e9594c2880d90c4a342ed9e8fb1ee139d07aad78f268d2fb67d2d
              • Instruction Fuzzy Hash: 5A817A70208241AFD714DF64C8C6E2ABBE5FF94308F14895DF45A8B2A2DB31ED45CB92
              APIs
              • VariantInit.OLEAUT32(00000035), ref: 0019F7B9
              • SysAllocString.OLEAUT32(00000001), ref: 0019F860
              • VariantCopy.OLEAUT32(0019FA64,00000000), ref: 0019F889
              • VariantClear.OLEAUT32(0019FA64), ref: 0019F8AD
              • VariantCopy.OLEAUT32(0019FA64,00000000), ref: 0019F8B1
              • VariantClear.OLEAUT32(?), ref: 0019F8BB
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Variant$ClearCopy$AllocInitString
              • String ID:
              • API String ID: 3859894641-0
              • Opcode ID: 21a7fbc18639ee017a92dca59bacf3f358dbc5e4f3552c1de2af35919584506b
              • Instruction ID: fc2bc2319b07ae42df77af298a8b56f799503245bc1e1e084147d170d9d3f302
              • Opcode Fuzzy Hash: 21a7fbc18639ee017a92dca59bacf3f358dbc5e4f3552c1de2af35919584506b
              • Instruction Fuzzy Hash: 7F51C131600310FACF24AF65D895B69B3A8EF55324B24846FF806DF292DB70CC46CB96
              APIs
                • Part of subcall function 00147620: _wcslen.LIBCMT ref: 00147625
                • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
              • GetOpenFileNameW.COMDLG32(00000058), ref: 001B94E5
              • _wcslen.LIBCMT ref: 001B9506
              • _wcslen.LIBCMT ref: 001B952D
              • GetSaveFileNameW.COMDLG32(00000058), ref: 001B9585
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen$FileName$OpenSave
              • String ID: X
              • API String ID: 83654149-3081909835
              • Opcode ID: 4668873f0e45675180872bb6b7db3755847cb4606c81a810925c4fd5a0ab46b5
              • Instruction ID: 1c728d131f191dae5faaf4d4a6b96bd8241c7f3d097ef284cb9c6d713fe3ffd5
              • Opcode Fuzzy Hash: 4668873f0e45675180872bb6b7db3755847cb4606c81a810925c4fd5a0ab46b5
              • Instruction Fuzzy Hash: 0CE1AF31908341CFD724DF24C885AAEB7E0BF95314F14896DF9999B2A2DB31DD06CB92
              APIs
                • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
              • BeginPaint.USER32(?,?,?), ref: 00159241
              • GetWindowRect.USER32(?,?), ref: 001592A5
              • ScreenToClient.USER32(?,?), ref: 001592C2
              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 001592D3
              • EndPaint.USER32(?,?,?,?,?), ref: 00159321
              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 001971EA
                • Part of subcall function 00159339: BeginPath.GDI32(00000000), ref: 00159357
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
              • String ID:
              • API String ID: 3050599898-0
              • Opcode ID: 56f2443b5a2b27e95e3c2da249fb227a5a79e7e23c7562529c89cd88912b83ec
              • Instruction ID: 20186f4a64eb0482e4bc77d3d05a0de85db34e288e6a233ab7d8021b93973278
              • Opcode Fuzzy Hash: 56f2443b5a2b27e95e3c2da249fb227a5a79e7e23c7562529c89cd88912b83ec
              • Instruction Fuzzy Hash: 9E419F70105201EFDB11DF24DC88FBA7BB8EF65321F144669FA648B2E1C7319849DBA2
              APIs
              • InterlockedExchange.KERNEL32(?,000001F5), ref: 001B080C
              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 001B0847
              • EnterCriticalSection.KERNEL32(?), ref: 001B0863
              • LeaveCriticalSection.KERNEL32(?), ref: 001B08DC
              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 001B08F3
              • InterlockedExchange.KERNEL32(?,000001F6), ref: 001B0921
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
              • String ID:
              • API String ID: 3368777196-0
              • Opcode ID: 2fa4d86f812dff7366fff869e62d151aea65344f87fbe22515533d7f0530afb6
              • Instruction ID: 0dafaaaf3d78f8e631364f494d3261d669c39281e351c62efe325d4a91f05a46
              • Opcode Fuzzy Hash: 2fa4d86f812dff7366fff869e62d151aea65344f87fbe22515533d7f0530afb6
              • Instruction Fuzzy Hash: 16416771900205EFDF15AF54DC85AAAB7B8FF08300F1480A9ED04AE297DB30DE65DBA0
              APIs
                • Part of subcall function 00143AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00143A97,?,?,00142E7F,?,?,?,00000000), ref: 00143AC2
              • _wcslen.LIBCMT ref: 001B587B
              • CoInitialize.OLE32(00000000), ref: 001B5995
              • CoCreateInstance.OLE32(001DFCF8,00000000,00000001,001DFB68,?), ref: 001B59AE
              • CoUninitialize.OLE32 ref: 001B59CC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
              • String ID: .lnk
              • API String ID: 3172280962-24824748
              • Opcode ID: d92b0d2b1fc2d4c34a1f594ddceedabe74a243db25a2a09acfd0db51eb603408
              • Instruction ID: 465dcef2bec761cc446729eb2e2aaa5828e7ffa1e4fcec2ecfde571fef14fffb
              • Opcode Fuzzy Hash: d92b0d2b1fc2d4c34a1f594ddceedabe74a243db25a2a09acfd0db51eb603408
              • Instruction Fuzzy Hash: 4DD15371A087019FC714DF25C480A6ABBE2FF99714F14885DF88A9B3A1DB31ED45CB92
              APIs
                • Part of subcall function 001A0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 001A0FCA
                • Part of subcall function 001A0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 001A0FD6
                • Part of subcall function 001A0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 001A0FE5
                • Part of subcall function 001A0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 001A0FEC
                • Part of subcall function 001A0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 001A1002
              • GetLengthSid.ADVAPI32(?,00000000,001A1335), ref: 001A17AE
              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 001A17BA
              • HeapAlloc.KERNEL32(00000000), ref: 001A17C1
              • CopySid.ADVAPI32(00000000,00000000,?), ref: 001A17DA
              • GetProcessHeap.KERNEL32(00000000,00000000,001A1335), ref: 001A17EE
              • HeapFree.KERNEL32(00000000), ref: 001A17F5
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
              • String ID:
              • API String ID: 3008561057-0
              • Opcode ID: 9fc60a273891cbe8f08ba23600f910ed88e668aa4fb8ec21fff32d14ee57d3bf
              • Instruction ID: 9233824b97e43039dd6206560ed50c20bf298fa234a953557d8246b5bb7bb808
              • Opcode Fuzzy Hash: 9fc60a273891cbe8f08ba23600f910ed88e668aa4fb8ec21fff32d14ee57d3bf
              • Instruction Fuzzy Hash: 0911BB7A602216FFDF109FE4CC49FAE7BA9EB46355F104419F481A7290C736A980CBA0
              APIs
              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 001A14FF
              • OpenProcessToken.ADVAPI32(00000000), ref: 001A1506
              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 001A1515
              • CloseHandle.KERNEL32(00000004), ref: 001A1520
              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 001A154F
              • DestroyEnvironmentBlock.USERENV(00000000), ref: 001A1563
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
              • String ID:
              • API String ID: 1413079979-0
              • Opcode ID: d8770f432cfb10d96dd1f8736415a29e02b905b25c58b5ba2b393aeba456dff3
              • Instruction ID: 751cece25b181282f6cc7389158ff1a0d4f230db5077c05fa69436e24f8fad9a
              • Opcode Fuzzy Hash: d8770f432cfb10d96dd1f8736415a29e02b905b25c58b5ba2b393aeba456dff3
              • Instruction Fuzzy Hash: A311297650620ABBDF118FA8DD49BDE7BA9EF4A744F044515FA05A20A0C375CEA0DBA0
              APIs
              • GetLastError.KERNEL32(?,?,00163379,00162FE5), ref: 00163390
              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0016339E
              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001633B7
              • SetLastError.KERNEL32(00000000,?,00163379,00162FE5), ref: 00163409
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorLastValue___vcrt_
              • String ID:
              • API String ID: 3852720340-0
              • Opcode ID: de923078f5e4a79dd154428cd1fb372f698848b67b2891b13e9d865f092bf6db
              • Instruction ID: 14213ea198344c4c2d10f5439ea8380d50ec1da46598180dd96340ed6a840bcf
              • Opcode Fuzzy Hash: de923078f5e4a79dd154428cd1fb372f698848b67b2891b13e9d865f092bf6db
              • Instruction Fuzzy Hash: 0901D432609311BEEA292775BC895776A95FB25379730032AF530812F1EF114E31D594
              APIs
              • GetLastError.KERNEL32(?,?,00175686,00183CD6,?,00000000,?,00175B6A,?,?,?,?,?,0016E6D1,?,00208A48), ref: 00172D78
              • _free.LIBCMT ref: 00172DAB
              • _free.LIBCMT ref: 00172DD3
              • SetLastError.KERNEL32(00000000,?,?,?,?,0016E6D1,?,00208A48,00000010,00144F4A,?,?,00000000,00183CD6), ref: 00172DE0
              • SetLastError.KERNEL32(00000000,?,?,?,?,0016E6D1,?,00208A48,00000010,00144F4A,?,?,00000000,00183CD6), ref: 00172DEC
              • _abort.LIBCMT ref: 00172DF2
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorLast$_free$_abort
              • String ID:
              • API String ID: 3160817290-0
              • Opcode ID: bb9f149a9a5b3820d6c0cbabfdab3c3d9fa29c76c9b97387269fec732e3031f2
              • Instruction ID: ca17791e81ac7f7d876e6cb6d0ed3a49a9a2120bda4251c7a95b7cfd6ed5e23b
              • Opcode Fuzzy Hash: bb9f149a9a5b3820d6c0cbabfdab3c3d9fa29c76c9b97387269fec732e3031f2
              • Instruction Fuzzy Hash: 99F0283190660137C63223B8FC0AE5A2679BFD67A0F25C519F82C932D2EF3088835160
              APIs
                • Part of subcall function 00159639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00159693
                • Part of subcall function 00159639: SelectObject.GDI32(?,00000000), ref: 001596A2
                • Part of subcall function 00159639: BeginPath.GDI32(?), ref: 001596B9
                • Part of subcall function 00159639: SelectObject.GDI32(?,00000000), ref: 001596E2
              • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 001D8A4E
              • LineTo.GDI32(?,00000003,00000000), ref: 001D8A62
              • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 001D8A70
              • LineTo.GDI32(?,00000000,00000003), ref: 001D8A80
              • EndPath.GDI32(?), ref: 001D8A90
              • StrokePath.GDI32(?), ref: 001D8AA0
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
              • String ID:
              • API String ID: 43455801-0
              • Opcode ID: 787e76599ef28169db259e38e70c7aa8e66302af84bb37a0f8376e7d78949290
              • Instruction ID: f2454bce6cc8d2b1fc4e116792ca53115b62eb05fd2c690babb87fb12f3a3368
              • Opcode Fuzzy Hash: 787e76599ef28169db259e38e70c7aa8e66302af84bb37a0f8376e7d78949290
              • Instruction Fuzzy Hash: 8911177600114DFFEF129F90EC88EEA7F6CEB08350F008422BA199A1A1C7719D95DFA0
              APIs
              • GetDC.USER32(00000000), ref: 001A5218
              • GetDeviceCaps.GDI32(00000000,00000058), ref: 001A5229
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001A5230
              • ReleaseDC.USER32(00000000,00000000), ref: 001A5238
              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 001A524F
              • MulDiv.KERNEL32(000009EC,00000001,?), ref: 001A5261
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CapsDevice$Release
              • String ID:
              • API String ID: 1035833867-0
              • Opcode ID: 23f0b48c61f35c91e09b09e30ed5611a233648a20efd3fd474a263bffc3adbc1
              • Instruction ID: f5fa2e34d23a33b80722e441425945392f7a5c14b67d42afff1e193793b6f10d
              • Opcode Fuzzy Hash: 23f0b48c61f35c91e09b09e30ed5611a233648a20efd3fd474a263bffc3adbc1
              • Instruction Fuzzy Hash: CF018F75A02719BBEB109BA59C49B4EBFB8EF48751F044466FA04A7680D6709800CBA0
              APIs
              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00141BF4
              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00141BFC
              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00141C07
              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00141C12
              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00141C1A
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00141C22
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Virtual
              • String ID:
              • API String ID: 4278518827-0
              • Opcode ID: 3df470a4c8971bf68d764f61c102369d32f54d12e3a180597862afff246dffa6
              • Instruction ID: 04f18855b94cbeee8cff9c74a0303c482cb0212186a562249e4aa1444964351e
              • Opcode Fuzzy Hash: 3df470a4c8971bf68d764f61c102369d32f54d12e3a180597862afff246dffa6
              • Instruction Fuzzy Hash: FB016CB090275A7DE3008F5A8C85B52FFA8FF19354F00411B915C47A41C7F5A864CBE5
              APIs
              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 001AEB30
              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 001AEB46
              • GetWindowThreadProcessId.USER32(?,?), ref: 001AEB55
              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001AEB64
              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001AEB6E
              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 001AEB75
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
              • String ID:
              • API String ID: 839392675-0
              • Opcode ID: f6b43f29fd0ae545836bc3a053df73e543ec774e162d77a405ad738edfb1ba58
              • Instruction ID: 6d32b737476b859dd11ee4233c81d35ddbcd0b2afa69746fdacc5591ff5178e1
              • Opcode Fuzzy Hash: f6b43f29fd0ae545836bc3a053df73e543ec774e162d77a405ad738edfb1ba58
              • Instruction Fuzzy Hash: 79F09072143129BBEB205B529C0DEEF3B7CEFCAB11F00055AF601D1590D7A05A41C6F4
              APIs
              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 001A187F
              • UnloadUserProfile.USERENV(?,?), ref: 001A188B
              • CloseHandle.KERNEL32(?), ref: 001A1894
              • CloseHandle.KERNEL32(?), ref: 001A189C
              • GetProcessHeap.KERNEL32(00000000,?), ref: 001A18A5
              • HeapFree.KERNEL32(00000000), ref: 001A18AC
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
              • String ID:
              • API String ID: 146765662-0
              • Opcode ID: a203ea22ef358bf600f5cf768a4c904509b866a0bc5525d59ecfe0985be25ade
              • Instruction ID: eac9086b978282eb27bd35878d80d1d2663d3aa78684909bb9b9442383c5fed9
              • Opcode Fuzzy Hash: a203ea22ef358bf600f5cf768a4c904509b866a0bc5525d59ecfe0985be25ade
              • Instruction Fuzzy Hash: AAE0ED36046112FBDB016FA1ED0C905BF39FF497227108A22F225818B0CB3254A0DF90
              APIs
              • __Init_thread_footer.LIBCMT ref: 0014BEB3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Init_thread_footer
              • String ID: D%!$D%!$D%!$D%!D%!
              • API String ID: 1385522511-4080940547
              • Opcode ID: 00fc5db57fa7c214ee4fd5667caf830a807294ff9bae606d2a33032af49ff0e7
              • Instruction ID: 0be75612581abf159567d1f67f6ddcf56f2f15a2cc3c0d32f5593f7d56d7d80c
              • Opcode Fuzzy Hash: 00fc5db57fa7c214ee4fd5667caf830a807294ff9bae606d2a33032af49ff0e7
              • Instruction Fuzzy Hash: 8C914D75A08206DFCB18CF98C0D06A9B7F2FF68314F658169E945AB360E731ED91CB90
              APIs
                • Part of subcall function 00147620: _wcslen.LIBCMT ref: 00147625
              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001AC6EE
              • _wcslen.LIBCMT ref: 001AC735
              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001AC79C
              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 001AC7CA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ItemMenu$Info_wcslen$Default
              • String ID: 0
              • API String ID: 1227352736-4108050209
              • Opcode ID: e4eab5678fc74168b60c80201e63fce94c4e569ea39121595b9e05ac1557974d
              • Instruction ID: 76e270ea9cfa44f7fa059bc12ae472da7ccec0b29de54ffff4100a72940873a1
              • Opcode Fuzzy Hash: e4eab5678fc74168b60c80201e63fce94c4e569ea39121595b9e05ac1557974d
              • Instruction Fuzzy Hash: 895101796043019BD715DF68C885BAB77E8AF5A310F040A2DF9A5D32A0DB70D844CFD2
              APIs
              • ShellExecuteExW.SHELL32(0000003C), ref: 001CAEA3
                • Part of subcall function 00147620: _wcslen.LIBCMT ref: 00147625
              • GetProcessId.KERNEL32(00000000), ref: 001CAF38
              • CloseHandle.KERNEL32(00000000), ref: 001CAF67
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CloseExecuteHandleProcessShell_wcslen
              • String ID: <$@
              • API String ID: 146682121-1426351568
              • Opcode ID: e8b2696b3cdee596c761e8ba4358e9dab51c1527bdf97cd8dee65393ff82388e
              • Instruction ID: e315f40b1c2bf45d4567b83897d07657b9ee98fbbfb829b9705240656f771995
              • Opcode Fuzzy Hash: e8b2696b3cdee596c761e8ba4358e9dab51c1527bdf97cd8dee65393ff82388e
              • Instruction Fuzzy Hash: 87714570A00619DFCB15DFA4D485A9EBBB0FF18318F44889DE816AB3A2C774ED45CB91
              APIs
              • GetWindowRect.USER32(0115D9E8,?), ref: 001D62E2
              • ScreenToClient.USER32(?,?), ref: 001D6315
              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 001D6382
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$ClientMoveRectScreen
              • String ID: @U=u
              • API String ID: 3880355969-2594219639
              • Opcode ID: abd356eaccd988d4c34e105561bd75bc3ee036f10033c7fc6fcee41c9977729a
              • Instruction ID: b982cb899cb9af679a022a45213fc89b706688e0e672f8a7e86b6014c2347c61
              • Opcode Fuzzy Hash: abd356eaccd988d4c34e105561bd75bc3ee036f10033c7fc6fcee41c9977729a
              • Instruction Fuzzy Hash: 58512C75A00209AFCF14DF68D8849AE7BB5FF55360F10825AF959973A0D730ED91CB90
              APIs
                • Part of subcall function 001AB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001A21D0,?,?,00000034,00000800,?,00000034), ref: 001AB42D
              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 001A2760
                • Part of subcall function 001AB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001A21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 001AB3F8
                • Part of subcall function 001AB32A: GetWindowThreadProcessId.USER32(?,?), ref: 001AB355
                • Part of subcall function 001AB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,001A2194,00000034,?,?,00001004,00000000,00000000), ref: 001AB365
                • Part of subcall function 001AB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,001A2194,00000034,?,?,00001004,00000000,00000000), ref: 001AB37B
              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 001A27CD
              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 001A281A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
              • String ID: @$@U=u
              • API String ID: 4150878124-826235744
              • Opcode ID: 08d33ada49225c7ee8b6a5afa9991417f3cb84114bb28f8d03a74277def9c077
              • Instruction ID: 749c1f983208ed85fa35b5715582d1531fc416ee48ea5c42dfdef7e1f5811108
              • Opcode Fuzzy Hash: 08d33ada49225c7ee8b6a5afa9991417f3cb84114bb28f8d03a74277def9c077
              • Instruction Fuzzy Hash: FB413D76901218BFDB10DFA4CD81AEEBBB8EF1A300F004055FA55B7191DB706E85CBA0
              APIs
              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 001A7206
              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 001A723C
              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 001A724D
              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 001A72CF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorMode$AddressCreateInstanceProc
              • String ID: DllGetClassObject
              • API String ID: 753597075-1075368562
              • Opcode ID: b2ea579c56065e2fde32426f4c42fcc7eb3a74434b02ab9b7f8caede35e8b531
              • Instruction ID: aa7e0097a290af099ba0943e1f4afdafb24857302925213d5e954f4b5481cd2a
              • Opcode Fuzzy Hash: b2ea579c56065e2fde32426f4c42fcc7eb3a74434b02ab9b7f8caede35e8b531
              • Instruction Fuzzy Hash: 85417F75605204EFDB15CF54CC84BAA7BA9EF46310F1580AEBD059F28AD7B0DA45CBA0
              APIs
              • SendMessageW.USER32(?,00001024,00000000,?), ref: 001D5352
              • GetWindowLongW.USER32(?,000000F0), ref: 001D5375
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001D5382
              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001D53A8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: LongWindow$InvalidateMessageRectSend
              • String ID: @U=u
              • API String ID: 3340791633-2594219639
              • Opcode ID: 9601c154b3b1dfc2a8fdc9b8e0f832a4f2c82d3f7880e2dd8e31315c02ec4032
              • Instruction ID: ae25d632e8096a5f84f41101dc23acbaf8574e5271a1ba6bf53005bc88b44796
              • Opcode Fuzzy Hash: 9601c154b3b1dfc2a8fdc9b8e0f832a4f2c82d3f7880e2dd8e31315c02ec4032
              • Instruction Fuzzy Hash: 6631A034A56A08FFEB349E14CC46BE97767BB143D0F584103FA11963E1C7B4A990DB82
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen
              • String ID: HKEY_LOCAL_MACHINE$HKLM
              • API String ID: 176396367-4004644295
              • Opcode ID: 23babd145b554640c583cc7dc0e44af5f98f5a63d504c1b1a4cc2f3795ae5a65
              • Instruction ID: d6dd830afeab02cd03e26565f9c27452d094b78228f239482dfadbc4292316ec
              • Opcode Fuzzy Hash: 23babd145b554640c583cc7dc0e44af5f98f5a63d504c1b1a4cc2f3795ae5a65
              • Instruction Fuzzy Hash: 69312833A0056A4BCB20DF6CD844ABF33915BB1754B05402DE85EAB285FB71CD51C3E0
              APIs
              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 001D2F8D
              • LoadLibraryW.KERNEL32(?), ref: 001D2F94
              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 001D2FA9
              • DestroyWindow.USER32(?), ref: 001D2FB1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$DestroyLibraryLoadWindow
              • String ID: SysAnimate32
              • API String ID: 3529120543-1011021900
              • Opcode ID: 5b5c83e184013b0539e013550e1770318140807c8ed67a2b0488001b79f29278
              • Instruction ID: f4a21e3fae250efe555454abfa372c7e4b1ef116dab39c9baa9334b414df2060
              • Opcode Fuzzy Hash: 5b5c83e184013b0539e013550e1770318140807c8ed67a2b0488001b79f29278
              • Instruction Fuzzy Hash: 4B219D71204205AFEB104F64DC84EBB77BDEF69368F104A1AFA64D72A0D771DC91A760
              APIs
              • SendMessageW.USER32(?,00001060,?,00000004), ref: 001D56BB
              • _wcslen.LIBCMT ref: 001D56CD
              • _wcslen.LIBCMT ref: 001D56D8
              • SendMessageW.USER32(?,00001002,00000000,?), ref: 001D5816
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend_wcslen
              • String ID: @U=u
              • API String ID: 455545452-2594219639
              • Opcode ID: 7a67e468f5b02eb0d94a754705ca2e393712d5410bccd5a856be6aedceef4dae
              • Instruction ID: 62e257a65f5c3aa068c61cd54e9b63701686403b82bc5f2afe58c233a2e42568
              • Opcode Fuzzy Hash: 7a67e468f5b02eb0d94a754705ca2e393712d5410bccd5a856be6aedceef4dae
              • Instruction Fuzzy Hash: 1B11D375A0161896DF209F65CC85AEE7BBCEF21764B10852BF915D6281EB70CA84CF60
              APIs
              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0014604C
              • GetStockObject.GDI32(00000011), ref: 00146060
              • SendMessageW.USER32(00000000,00000030,00000000), ref: 0014606A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CreateMessageObjectSendStockWindow
              • String ID: @U=u
              • API String ID: 3970641297-2594219639
              • Opcode ID: 2750fbe99486142f832b1a47af18c1e6f0f3e3a547ccec292ebd17dad5c640e8
              • Instruction ID: 7cad1087c4379e5f857ffa487a2a79b1fac1f05d4f21aa3206c8b460decf9cb2
              • Opcode Fuzzy Hash: 2750fbe99486142f832b1a47af18c1e6f0f3e3a547ccec292ebd17dad5c640e8
              • Instruction Fuzzy Hash: F3116172502509BFEF125F94DC44EEABB69EF19359F040216FA1452120D736DCA0DB91
              APIs
              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00164D1E,001728E9,?,00164CBE,001728E9,002088B8,0000000C,00164E15,001728E9,00000002), ref: 00164D8D
              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00164DA0
              • FreeLibrary.KERNEL32(00000000,?,?,?,00164D1E,001728E9,?,00164CBE,001728E9,002088B8,0000000C,00164E15,001728E9,00000002,00000000), ref: 00164DC3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: AddressFreeHandleLibraryModuleProc
              • String ID: CorExitProcess$mscoree.dll
              • API String ID: 4061214504-1276376045
              • Opcode ID: e637611abeb4145332be7343c73b41216a98dd9a7a7beafe9327de555506aa3b
              • Instruction ID: 86544713685fa0ff5a29202d56e132bbbd5f18b6d60a5fb7b2e94b324188014b
              • Opcode Fuzzy Hash: e637611abeb4145332be7343c73b41216a98dd9a7a7beafe9327de555506aa3b
              • Instruction Fuzzy Hash: 89F0AF30A02219FBDB119F90DC09BEEBBB9EF58751F0001A9F805A2660CF705A90CAD0
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00144EDD,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144E9C
              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00144EAE
              • FreeLibrary.KERNEL32(00000000,?,?,00144EDD,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144EC0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Library$AddressFreeLoadProc
              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
              • API String ID: 145871493-3689287502
              • Opcode ID: f445f8c4b39db2a83dc8b67c142f883d2a9b35872534c83c37c34ee1e40313ec
              • Instruction ID: e4603957b4ea70a44fbef1215d1484e31a3027cd14164c4b9b5fd79182ab8d70
              • Opcode Fuzzy Hash: f445f8c4b39db2a83dc8b67c142f883d2a9b35872534c83c37c34ee1e40313ec
              • Instruction Fuzzy Hash: CDE08635A03633DBD22117256C1CB9B6658AF81B627050516FC00E2261DF64CD41C4E4
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00183CDE,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144E62
              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00144E74
              • FreeLibrary.KERNEL32(00000000,?,?,00183CDE,?,00211418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00144E87
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Library$AddressFreeLoadProc
              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
              • API String ID: 145871493-1355242751
              • Opcode ID: b3db7d5537931450275d3128aa5a242d7ee3cb2ae430db0c5980829f91da0558
              • Instruction ID: 416c1ee14c3a97bcd3e34482b7aa9318eb2d1228ee8edb31ab6c44eb28be443c
              • Opcode Fuzzy Hash: b3db7d5537931450275d3128aa5a242d7ee3cb2ae430db0c5980829f91da0558
              • Instruction Fuzzy Hash: 08D0123550363397AA221B256C18ECB6B1CAF85B513050A17B905F3165CF64CD41C5D0
              APIs
              • GetCurrentProcessId.KERNEL32 ref: 001CA427
              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 001CA435
              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 001CA468
              • CloseHandle.KERNEL32(?), ref: 001CA63D
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Process$CloseCountersCurrentHandleOpen
              • String ID:
              • API String ID: 3488606520-0
              • Opcode ID: cfa8482ddde0989381df944357ff9ce45107206ffa0e3b78ad22f3ce0a9c5b06
              • Instruction ID: 459b8f0e9ba944c1eed03ae40668bf748c302d47a2b2335143f54de1c30e3a31
              • Opcode Fuzzy Hash: cfa8482ddde0989381df944357ff9ce45107206ffa0e3b78ad22f3ce0a9c5b06
              • Instruction Fuzzy Hash: 2FA1B1716043019FD721DF28C886F2AB7E1AF98718F54881DF96A9B392D771EC45CB82
              APIs
              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,001E3700), ref: 0017BB91
              • WideCharToMultiByte.KERNEL32(00000000,00000000,0021121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0017BC09
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00211270,000000FF,?,0000003F,00000000,?), ref: 0017BC36
              • _free.LIBCMT ref: 0017BB7F
                • Part of subcall function 001729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000), ref: 001729DE
                • Part of subcall function 001729C8: GetLastError.KERNEL32(00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000,00000000), ref: 001729F0
              • _free.LIBCMT ref: 0017BD4B
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
              • String ID:
              • API String ID: 1286116820-0
              • Opcode ID: c98f79dc140429f3cfc5f78b6f84dc84c0220dc631eabd81b90122caea9db230
              • Instruction ID: 848cd77af235fae4ef79780425fedc6c0f43b3940f3ddfcb327472920e0b4d28
              • Opcode Fuzzy Hash: c98f79dc140429f3cfc5f78b6f84dc84c0220dc631eabd81b90122caea9db230
              • Instruction Fuzzy Hash: 53510971908219AFCB10EF65DCC5AAEB7BCEF54310F10C26AE918D7191EB305E81CB50
              APIs
                • Part of subcall function 001ADDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,001ACF22,?), ref: 001ADDFD
                • Part of subcall function 001ADDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,001ACF22,?), ref: 001ADE16
                • Part of subcall function 001AE199: GetFileAttributesW.KERNEL32(?,001ACF95), ref: 001AE19A
              • lstrcmpiW.KERNEL32(?,?), ref: 001AE473
              • MoveFileW.KERNEL32(?,?), ref: 001AE4AC
              • _wcslen.LIBCMT ref: 001AE5EB
              • _wcslen.LIBCMT ref: 001AE603
              • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 001AE650
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
              • String ID:
              • API String ID: 3183298772-0
              • Opcode ID: 2fe466882ab8938c04caf03284eefd6d8cb8f3c10a7316b4bcdc56fbc4d3958b
              • Instruction ID: c46419c78065040ceb723dfcee605ee0fc51b6527289aa40f54b454da4aef3f2
              • Opcode Fuzzy Hash: 2fe466882ab8938c04caf03284eefd6d8cb8f3c10a7316b4bcdc56fbc4d3958b
              • Instruction Fuzzy Hash: 1A5177B64083459BC724EBA4DC819DFB3ECAF95340F00491EF589D3191EF74A688C766
              APIs
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                • Part of subcall function 001CC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001CB6AE,?,?), ref: 001CC9B5
                • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CC9F1
                • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CCA68
                • Part of subcall function 001CC998: _wcslen.LIBCMT ref: 001CCA9E
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001CBAA5
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001CBB00
              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 001CBB63
              • RegCloseKey.ADVAPI32(?,?), ref: 001CBBA6
              • RegCloseKey.ADVAPI32(00000000), ref: 001CBBB3
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
              • String ID:
              • API String ID: 826366716-0
              • Opcode ID: d552b8af5698e4a5a00f29116718e6429a796deed8ee71f6da898d4f7d971c52
              • Instruction ID: 72d95ab3595897a5baead23a26cd3705e1a86980a4293510d4bbc0da26168f13
              • Opcode Fuzzy Hash: d552b8af5698e4a5a00f29116718e6429a796deed8ee71f6da898d4f7d971c52
              • Instruction Fuzzy Hash: 85614831209241AFD714DF24C4D1F2ABBE5BF94308F54895DF49A8B2A2DB31ED45CB92
              APIs
              • VariantInit.OLEAUT32(?), ref: 001A8BCD
              • VariantClear.OLEAUT32 ref: 001A8C3E
              • VariantClear.OLEAUT32 ref: 001A8C9D
              • VariantClear.OLEAUT32(?), ref: 001A8D10
              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 001A8D3B
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Variant$Clear$ChangeInitType
              • String ID:
              • API String ID: 4136290138-0
              • Opcode ID: 7ebed7fc21fc50eb0b2cc193355692db47bd7876b280dbb972aa460ee9b4a7df
              • Instruction ID: 048c8e28eb2deb29c1415dd87a6122ce19330172609013ebe90f6b3d131b5f67
              • Opcode Fuzzy Hash: 7ebed7fc21fc50eb0b2cc193355692db47bd7876b280dbb972aa460ee9b4a7df
              • Instruction Fuzzy Hash: EE516AB5A0121AEFCB14CF68C894AAAB7F8FF89310B158559F905DB354E730E911CF90
              APIs
              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 001B8BAE
              • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 001B8BDA
              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 001B8C32
              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 001B8C57
              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 001B8C5F
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: PrivateProfile$SectionWrite$String
              • String ID:
              • API String ID: 2832842796-0
              • Opcode ID: 6ae1b49de9de15bfc947cf67360fd0b5ebbd415156805793e558de621da8ec8d
              • Instruction ID: 738a4f78af8089a40e3b549cb8c7be5e98ad8a94728736a62a3a9e58922b4337
              • Opcode Fuzzy Hash: 6ae1b49de9de15bfc947cf67360fd0b5ebbd415156805793e558de621da8ec8d
              • Instruction Fuzzy Hash: C1512875A002159FCB05DF65C881AAABBF5FF48314F088459E849AB3B2DB35ED51CB90
              APIs
              • LoadLibraryW.KERNEL32(?,00000000,?), ref: 001C8F40
              • GetProcAddress.KERNEL32(00000000,?), ref: 001C8FD0
              • GetProcAddress.KERNEL32(00000000,00000000), ref: 001C8FEC
              • GetProcAddress.KERNEL32(00000000,?), ref: 001C9032
              • FreeLibrary.KERNEL32(00000000), ref: 001C9052
                • Part of subcall function 0015F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,001B1043,?,75B8E610), ref: 0015F6E6
                • Part of subcall function 0015F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0019FA64,00000000,00000000,?,?,001B1043,?,75B8E610,?,0019FA64), ref: 0015F70D
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
              • String ID:
              • API String ID: 666041331-0
              • Opcode ID: ce8d13a4050b1d7f0f5d254d45da252827499b6547bff89c8d586ae3e7067022
              • Instruction ID: 14fa0a7a4b2b2640e162c758637414073ca3406c4294e3050a6cd54f33537709
              • Opcode Fuzzy Hash: ce8d13a4050b1d7f0f5d254d45da252827499b6547bff89c8d586ae3e7067022
              • Instruction Fuzzy Hash: D2513534A05215DFCB05DF58C484DADBBB1FF69314B0980A9E80A9B762DB31ED86CB90
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _free
              • String ID:
              • API String ID: 269201875-0
              • Opcode ID: ab8ae8fc89a6dfd9b0ce37625ec2355d6c357b6f443d29ba13e3b0529de5367d
              • Instruction ID: 511fc9405644cc3c8be0d579a4c476cf79d1799ccfefca453c055531b734c222
              • Opcode Fuzzy Hash: ab8ae8fc89a6dfd9b0ce37625ec2355d6c357b6f443d29ba13e3b0529de5367d
              • Instruction Fuzzy Hash: D041C472A002009FCB24DF78C881A5DB7F5FF99314F658569EA19EB352D731AD02CB91
              APIs
              • GetCursorPos.USER32(?), ref: 00159141
              • ScreenToClient.USER32(00000000,?), ref: 0015915E
              • GetAsyncKeyState.USER32(00000001), ref: 00159183
              • GetAsyncKeyState.USER32(00000002), ref: 0015919D
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: AsyncState$ClientCursorScreen
              • String ID:
              • API String ID: 4210589936-0
              • Opcode ID: 0c78fd69e341537e95090f969521461aee359297f8da3e9c0f3de2285a32b5f6
              • Instruction ID: cf3c5d04cdf6d6649ee2d0940100e0808dd794b2e223732ec346386997748ebf
              • Opcode Fuzzy Hash: 0c78fd69e341537e95090f969521461aee359297f8da3e9c0f3de2285a32b5f6
              • Instruction Fuzzy Hash: C6413D71A0861AEBDF199F64C884BEEB774FF15321F208226E835A62D0C7306954CB91
              APIs
              • GetInputState.USER32 ref: 001B38CB
              • TranslateAcceleratorW.USER32(?,00000000,?), ref: 001B3922
              • TranslateMessage.USER32(?), ref: 001B394B
              • DispatchMessageW.USER32(?), ref: 001B3955
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001B3966
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Message$Translate$AcceleratorDispatchInputPeekState
              • String ID:
              • API String ID: 2256411358-0
              • Opcode ID: ffc6c4c8c4aca65f6e6c2dc88fb38cecc2bc6f1aadd4c6e081a5b555d55c9a92
              • Instruction ID: 6169710d6442e2d840355b458237d5f9afc364e468d29a0b7d910f21c35d30de
              • Opcode Fuzzy Hash: ffc6c4c8c4aca65f6e6c2dc88fb38cecc2bc6f1aadd4c6e081a5b555d55c9a92
              • Instruction Fuzzy Hash: E131C970905342EEEB39CB34EC4CBF637A8AB15308F44456DE572C21A0EBB5A6A5CB51
              APIs
              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,001BC21E,00000000), ref: 001BCF38
              • InternetReadFile.WININET(?,00000000,?,?), ref: 001BCF6F
              • GetLastError.KERNEL32(?,00000000,?,?,?,001BC21E,00000000), ref: 001BCFB4
              • SetEvent.KERNEL32(?,?,00000000,?,?,?,001BC21E,00000000), ref: 001BCFC8
              • SetEvent.KERNEL32(?,?,00000000,?,?,?,001BC21E,00000000), ref: 001BCFF2
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
              • String ID:
              • API String ID: 3191363074-0
              • Opcode ID: fb1c051991907e699af8912bbe281adfc880ddf74f5cc2037993b71753f07c9a
              • Instruction ID: 409c3da3017ef487ff03cd6fdf6860466e65024d0afdf95f022c9b8384eeebdb
              • Opcode Fuzzy Hash: fb1c051991907e699af8912bbe281adfc880ddf74f5cc2037993b71753f07c9a
              • Instruction Fuzzy Hash: 2A314A71A01206EFDB24DFA9C884ABBBBF9EB14351B1044AEF516D2140DB30EE41DBE0
              APIs
              • GetWindowRect.USER32(?,?), ref: 001A1915
              • PostMessageW.USER32(00000001,00000201,00000001), ref: 001A19C1
              • Sleep.KERNEL32(00000000,?,?,?), ref: 001A19C9
              • PostMessageW.USER32(00000001,00000202,00000000), ref: 001A19DA
              • Sleep.KERNEL32(00000000,?,?,?,?), ref: 001A19E2
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessagePostSleep$RectWindow
              • String ID:
              • API String ID: 3382505437-0
              • Opcode ID: 7eb3d221852dd1504be6157637e4e55cb36e725b6bb549375773801769f97274
              • Instruction ID: 7129e8bb277980fcbdf2716e68697975dffc3b8dae75db30350af627a778f020
              • Opcode Fuzzy Hash: 7eb3d221852dd1504be6157637e4e55cb36e725b6bb549375773801769f97274
              • Instruction Fuzzy Hash: 0C31BF76A0121AFFCB04CFA8CD99ADF3BB5EB05319F104629F921AB2D1C7709944CB90
              APIs
              • IsWindow.USER32(00000000), ref: 001C0951
              • GetForegroundWindow.USER32 ref: 001C0968
              • GetDC.USER32(00000000), ref: 001C09A4
              • GetPixel.GDI32(00000000,?,00000003), ref: 001C09B0
              • ReleaseDC.USER32(00000000,00000003), ref: 001C09E8
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$ForegroundPixelRelease
              • String ID:
              • API String ID: 4156661090-0
              • Opcode ID: dd68991fc65110b58f974b20f5167959b8c23c92481e12df93244074ea06b892
              • Instruction ID: 06abff5f4db7880bf46fd86864ab1dd2b96cab482a5d338267405614c1a7e305
              • Opcode Fuzzy Hash: dd68991fc65110b58f974b20f5167959b8c23c92481e12df93244074ea06b892
              • Instruction Fuzzy Hash: 5F216D35601214AFD704EF69D894AAEBBF9EF58700F04846DE84AD7762CB30EC44CB90
              APIs
              • GetEnvironmentStringsW.KERNEL32 ref: 0017CDC6
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0017CDE9
                • Part of subcall function 00173820: RtlAllocateHeap.NTDLL(00000000,?,00211444,?,0015FDF5,?,?,0014A976,00000010,00211440,001413FC,?,001413C6,?,00141129), ref: 00173852
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0017CE0F
              • _free.LIBCMT ref: 0017CE22
              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0017CE31
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
              • String ID:
              • API String ID: 336800556-0
              • Opcode ID: a6d71c3c789eb4840dc6fa0122ea8ae842e790c6e3a578a66333b14603260342
              • Instruction ID: 2896922f7597f20aead732477500c8189541378f21f8869c9c66a1f78ee66317
              • Opcode Fuzzy Hash: a6d71c3c789eb4840dc6fa0122ea8ae842e790c6e3a578a66333b14603260342
              • Instruction Fuzzy Hash: EF0184726076267F272116BA6C88D7B6E7DEFC6BA1315812EF909C7201EF618D0291F0
              APIs
              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00159693
              • SelectObject.GDI32(?,00000000), ref: 001596A2
              • BeginPath.GDI32(?), ref: 001596B9
              • SelectObject.GDI32(?,00000000), ref: 001596E2
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ObjectSelect$BeginCreatePath
              • String ID:
              • API String ID: 3225163088-0
              • Opcode ID: b5017d9f9ce28acf6cf9b66b53fdaf7e7d58804ba2aeab299a8a7e63d4b62fdf
              • Instruction ID: 4c4216d9843a8d482bf6d12be46c74766313349f713eb1e277dcaa4787e630cd
              • Opcode Fuzzy Hash: b5017d9f9ce28acf6cf9b66b53fdaf7e7d58804ba2aeab299a8a7e63d4b62fdf
              • Instruction Fuzzy Hash: 07219270802346EFDB119F24EC197E97BA9BF20316F108616F930AA1B0D77458A9CFD1
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _memcmp
              • String ID:
              • API String ID: 2931989736-0
              • Opcode ID: 2daf661379563ecf5d41d4441b0b11d30eb02da1052cb25b747733112563a002
              • Instruction ID: 1eaab63fb4e31776fdbd0f8182779a1821fed5a5ac948935331f3bd3e3c22a90
              • Opcode Fuzzy Hash: 2daf661379563ecf5d41d4441b0b11d30eb02da1052cb25b747733112563a002
              • Instruction Fuzzy Hash: 8B01F969245A05FBD31851509D42FBB735FAB323B4F844025FD16BA341F720EE2182A0
              APIs
              • GetLastError.KERNEL32(?,?,?,0016F2DE,00173863,00211444,?,0015FDF5,?,?,0014A976,00000010,00211440,001413FC,?,001413C6), ref: 00172DFD
              • _free.LIBCMT ref: 00172E32
              • _free.LIBCMT ref: 00172E59
              • SetLastError.KERNEL32(00000000,00141129), ref: 00172E66
              • SetLastError.KERNEL32(00000000,00141129), ref: 00172E6F
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorLast$_free
              • String ID:
              • API String ID: 3170660625-0
              • Opcode ID: 11bef305e79861f097167cdfa5eeb988d30b745a7be8f4db9664268ac17dbafe
              • Instruction ID: 365a92885f1505d1bea3dc619ccf034290e41947a028d632bdb814cb034c71b6
              • Opcode Fuzzy Hash: 11bef305e79861f097167cdfa5eeb988d30b745a7be8f4db9664268ac17dbafe
              • Instruction Fuzzy Hash: F901283220660077CA2367347C49D2B267DABE53B5B35C529F82DA32D3EF708C835060
              APIs
              • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?,?,?,001A035E), ref: 001A002B
              • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?,?), ref: 001A0046
              • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?,?), ref: 001A0054
              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?), ref: 001A0064
              • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0019FF41,80070057,?,?), ref: 001A0070
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: From$Prog$FreeStringTasklstrcmpi
              • String ID:
              • API String ID: 3897988419-0
              • Opcode ID: 3e1443d3ae695b44ecbc2305535419a29d1f26805d93b5360452a5e2387e7954
              • Instruction ID: d49d50932769904c480542d777875eff261b5772db05a32a7e48dfe1e1202699
              • Opcode Fuzzy Hash: 3e1443d3ae695b44ecbc2305535419a29d1f26805d93b5360452a5e2387e7954
              • Instruction Fuzzy Hash: D101F27A602205BFDB124F68DD04FAABBEEEF48391F104529F901D2210D770CD80DBA0
              APIs
              • QueryPerformanceCounter.KERNEL32(?), ref: 001AE997
              • QueryPerformanceFrequency.KERNEL32(?), ref: 001AE9A5
              • Sleep.KERNEL32(00000000), ref: 001AE9AD
              • QueryPerformanceCounter.KERNEL32(?), ref: 001AE9B7
              • Sleep.KERNEL32 ref: 001AE9F3
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: PerformanceQuery$CounterSleep$Frequency
              • String ID:
              • API String ID: 2833360925-0
              • Opcode ID: b32fc3f218b8e1b3138e89ae8873a42bcbb3fb547bc835d9c665b419d39f6e9b
              • Instruction ID: db1c8caa1e2102530ea7501b3dee6dddc860311284dbe74bec94bc30cec00fb1
              • Opcode Fuzzy Hash: b32fc3f218b8e1b3138e89ae8873a42bcbb3fb547bc835d9c665b419d39f6e9b
              • Instruction Fuzzy Hash: CA012D35C0262ADBCF04AFE5DC59AEEBBB8FF0A705F010556E502B2141CB309595CBA1
              APIs
              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 001A1114
              • GetLastError.KERNEL32(?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A1120
              • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A112F
              • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,001A0B9B,?,?,?), ref: 001A1136
              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 001A114D
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
              • String ID:
              • API String ID: 842720411-0
              • Opcode ID: cde9b4f19e60568cc8a9ed165c8b14532787b8bf578c5716537d771718e99ead
              • Instruction ID: ef5ae7a19fccac4a53a8549c562b17593cd2aff11d7541275e48e24880e3444c
              • Opcode Fuzzy Hash: cde9b4f19e60568cc8a9ed165c8b14532787b8bf578c5716537d771718e99ead
              • Instruction Fuzzy Hash: 46011D79102216FFDB114F75DC49A6A3B6EEF86364B144815FA45D7350DB31DC40DAA0
              APIs
              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 001A0FCA
              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 001A0FD6
              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 001A0FE5
              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 001A0FEC
              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 001A1002
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: HeapInformationToken$AllocErrorLastProcess
              • String ID:
              • API String ID: 44706859-0
              • Opcode ID: 7dbab17680c4c3a629cbe0d5a65dc6fa1cd06d32e488a280efcaecc1d674e19e
              • Instruction ID: 36eecdb303f24a5080bf07d7fee4d4d44e64a6f04fb4b02385b1ca37fae30a35
              • Opcode Fuzzy Hash: 7dbab17680c4c3a629cbe0d5a65dc6fa1cd06d32e488a280efcaecc1d674e19e
              • Instruction Fuzzy Hash: 42F04F39142312FBDB214FA49D49F563B6DEF8A761F114815F945C6291CA70DC80CAA0
              APIs
              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 001A102A
              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 001A1036
              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001A1045
              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 001A104C
              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001A1062
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: HeapInformationToken$AllocErrorLastProcess
              • String ID:
              • API String ID: 44706859-0
              • Opcode ID: fabe85b325c16d688c742479f256530f24b35262516c1a1a91faf79f8ad9d7bb
              • Instruction ID: 729f6a2802812dce4a6cae013d444cf7baf37c0e6f94bfc4944f4a241ab00c36
              • Opcode Fuzzy Hash: fabe85b325c16d688c742479f256530f24b35262516c1a1a91faf79f8ad9d7bb
              • Instruction Fuzzy Hash: A2F06239142312FBDB215FA4ED49F563B6DFF8A761F210815F945C7290CB70D880CAA0
              APIs
              • CloseHandle.KERNEL32(?,?,?,?,001B017D,?,001B32FC,?,00000001,00182592,?), ref: 001B0324
              • CloseHandle.KERNEL32(?,?,?,?,001B017D,?,001B32FC,?,00000001,00182592,?), ref: 001B0331
              • CloseHandle.KERNEL32(?,?,?,?,001B017D,?,001B32FC,?,00000001,00182592,?), ref: 001B033E
              • CloseHandle.KERNEL32(?,?,?,?,001B017D,?,001B32FC,?,00000001,00182592,?), ref: 001B034B
              • CloseHandle.KERNEL32(?,?,?,?,001B017D,?,001B32FC,?,00000001,00182592,?), ref: 001B0358
              • CloseHandle.KERNEL32(?,?,?,?,001B017D,?,001B32FC,?,00000001,00182592,?), ref: 001B0365
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CloseHandle
              • String ID:
              • API String ID: 2962429428-0
              • Opcode ID: 4139a9aaaeba43733d9d6db862cf46174b5ecc8183b672567fa7364dc07c1c32
              • Instruction ID: 453291862663ee58c0ed70cd700c3788c9a45f121f702e46ace81d0ab0337ce6
              • Opcode Fuzzy Hash: 4139a9aaaeba43733d9d6db862cf46174b5ecc8183b672567fa7364dc07c1c32
              • Instruction Fuzzy Hash: 6901EA72801B059FCB32AF66D880843FBF9BF603053058A3FD19252930C3B1A988CF80
              APIs
              • _free.LIBCMT ref: 0017D752
                • Part of subcall function 001729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000), ref: 001729DE
                • Part of subcall function 001729C8: GetLastError.KERNEL32(00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000,00000000), ref: 001729F0
              • _free.LIBCMT ref: 0017D764
              • _free.LIBCMT ref: 0017D776
              • _free.LIBCMT ref: 0017D788
              • _free.LIBCMT ref: 0017D79A
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: dbc1e45fc0c0881bf4e9ccf3235187f37d02c9ebddf08927e560bceabeae277d
              • Instruction ID: 91e9830c22ce2dfae0f5f954200b9d5d88e3e6221c7eddfcf762b7f6a86b3b2d
              • Opcode Fuzzy Hash: dbc1e45fc0c0881bf4e9ccf3235187f37d02c9ebddf08927e560bceabeae277d
              • Instruction Fuzzy Hash: 20F04F72540318ABC625EB78F9C6C16B7FDBF44318BA88805F14CE7502C730FC818664
              APIs
              • _free.LIBCMT ref: 001722BE
                • Part of subcall function 001729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000), ref: 001729DE
                • Part of subcall function 001729C8: GetLastError.KERNEL32(00000000,?,0017D7D1,00000000,00000000,00000000,00000000,?,0017D7F8,00000000,00000007,00000000,?,0017DBF5,00000000,00000000), ref: 001729F0
              • _free.LIBCMT ref: 001722D0
              • _free.LIBCMT ref: 001722E3
              • _free.LIBCMT ref: 001722F4
              • _free.LIBCMT ref: 00172305
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: f3f48c3bebc11e85c1243938bc4d2c1065e58b317cb11f5e8427c1262b8373c8
              • Instruction ID: 9f4cf643265d4b048a2883b88d2e7d46626ad17dcfb32c570f7eeb5e2434eafe
              • Opcode Fuzzy Hash: f3f48c3bebc11e85c1243938bc4d2c1065e58b317cb11f5e8427c1262b8373c8
              • Instruction Fuzzy Hash: ABF030B04012308BC712AF64BC4A8887B74B738750B25C606F518D32B2CF7504A39BA4
              APIs
              • EndPath.GDI32(?), ref: 001595D4
              • StrokeAndFillPath.GDI32(?,?,001971F7,00000000,?,?,?), ref: 001595F0
              • SelectObject.GDI32(?,00000000), ref: 00159603
              • DeleteObject.GDI32 ref: 00159616
              • StrokePath.GDI32(?), ref: 00159631
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Path$ObjectStroke$DeleteFillSelect
              • String ID:
              • API String ID: 2625713937-0
              • Opcode ID: d7340321d79ebb2286abc6f703fc636fc4db473c6bcdedc89a0d3abb955c1fb9
              • Instruction ID: c75c8f9f451ff6bad523055e8a3fe5321e563a94fd3cd5504cce3c80d8931b84
              • Opcode Fuzzy Hash: d7340321d79ebb2286abc6f703fc636fc4db473c6bcdedc89a0d3abb955c1fb9
              • Instruction Fuzzy Hash: 9EF03C34007385EBDB165F69FD1C7A43B61AB10322F04C215FA35594F0CB3089A9DFA1
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: __freea$_free
              • String ID: a/p$am/pm
              • API String ID: 3432400110-3206640213
              • Opcode ID: c4c50930bb9c7eb98bb061fd4971f7b9ebab1a2297cad578519205c51eaa33be
              • Instruction ID: 6c0b2c099d87182f4ff16dc7ebffa8ca8cc38285531f0bc0942887707fb801ee
              • Opcode Fuzzy Hash: c4c50930bb9c7eb98bb061fd4971f7b9ebab1a2297cad578519205c51eaa33be
              • Instruction Fuzzy Hash: 60D11231900206EADB289F6CC895BFEB7B5FF05720F29C159E90DAB651D3359D80CBA1
              APIs
                • Part of subcall function 00160242: EnterCriticalSection.KERNEL32(0021070C,00211884,?,?,0015198B,00212518,?,?,?,001412F9,00000000), ref: 0016024D
                • Part of subcall function 00160242: LeaveCriticalSection.KERNEL32(0021070C,?,0015198B,00212518,?,?,?,001412F9,00000000), ref: 0016028A
                • Part of subcall function 001600A3: __onexit.LIBCMT ref: 001600A9
              • __Init_thread_footer.LIBCMT ref: 001C6238
                • Part of subcall function 001601F8: EnterCriticalSection.KERNEL32(0021070C,?,?,00158747,00212514), ref: 00160202
                • Part of subcall function 001601F8: LeaveCriticalSection.KERNEL32(0021070C,?,00158747,00212514), ref: 00160235
                • Part of subcall function 001B359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 001B35E4
                • Part of subcall function 001B359C: LoadStringW.USER32(00212390,?,00000FFF,?), ref: 001B360A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
              • String ID: x#!$x#!$x#!
              • API String ID: 1072379062-1188481307
              • Opcode ID: 965e11a561b9f2fc4be15c527edab38eb9c4b5720245e9d458087bd95a6887da
              • Instruction ID: 6640d66aa173ab0a0f924f4637b7b6b256548efe18c225b5c36e23d2762b4752
              • Opcode Fuzzy Hash: 965e11a561b9f2fc4be15c527edab38eb9c4b5720245e9d458087bd95a6887da
              • Instruction Fuzzy Hash: E2C16971A00109ABCB24DF98C891EAEB7B9EF68340F14806DF9159B291DB70ED55CB90
              APIs
                • Part of subcall function 00160242: EnterCriticalSection.KERNEL32(0021070C,00211884,?,?,0015198B,00212518,?,?,?,001412F9,00000000), ref: 0016024D
                • Part of subcall function 00160242: LeaveCriticalSection.KERNEL32(0021070C,?,0015198B,00212518,?,?,?,001412F9,00000000), ref: 0016028A
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                • Part of subcall function 001600A3: __onexit.LIBCMT ref: 001600A9
              • __Init_thread_footer.LIBCMT ref: 001C7BFB
                • Part of subcall function 001601F8: EnterCriticalSection.KERNEL32(0021070C,?,?,00158747,00212514), ref: 00160202
                • Part of subcall function 001601F8: LeaveCriticalSection.KERNEL32(0021070C,?,00158747,00212514), ref: 00160235
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
              • String ID: 5$G$Variable must be of type 'Object'.
              • API String ID: 535116098-3733170431
              • Opcode ID: 0538d1913fc9cd931088610a91fd9318a311e1c2af9a1e1a658480f7e2bfa935
              • Instruction ID: 409989bda0903a0f302c15e717b2f7a3a37e254df0e2d2e3e9c74889ca42df0a
              • Opcode Fuzzy Hash: 0538d1913fc9cd931088610a91fd9318a311e1c2af9a1e1a658480f7e2bfa935
              • Instruction Fuzzy Hash: 77915A70A04209AFCB14EF94D891EBDB7B2AF69300F54805DF8069B292DBB1EE45DB51
              APIs
              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\VsTfsPVrfA.exe,00000104), ref: 00171769
              • _free.LIBCMT ref: 00171834
              • _free.LIBCMT ref: 0017183E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _free$FileModuleName
              • String ID: C:\Users\user\Desktop\VsTfsPVrfA.exe
              • API String ID: 2506810119-893075015
              • Opcode ID: 08d7852d25cec00e960b4283675515078ac58d08f7642d51255db3fdebae6fd8
              • Instruction ID: fce55722430450fa2887245692c80eaf782a493cd68275f2ef630f8c73db744c
              • Opcode Fuzzy Hash: 08d7852d25cec00e960b4283675515078ac58d08f7642d51255db3fdebae6fd8
              • Instruction Fuzzy Hash: 2E316F71A40218BBDB25DF999885D9EBBFCEBA5310B14816AE90897211DB708A41CB91
              APIs
              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 001AC306
              • DeleteMenu.USER32(?,00000007,00000000), ref: 001AC34C
              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00211990,011553C8), ref: 001AC395
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Menu$Delete$InfoItem
              • String ID: 0
              • API String ID: 135850232-4108050209
              • Opcode ID: 64e57ecb694033376104d46c54aa31e7701561c6e94279b43821aab5ab378cb9
              • Instruction ID: dcb35d537a9338c044de16deb91eecc945f4c4132f54ed1fb575526816807746
              • Opcode Fuzzy Hash: 64e57ecb694033376104d46c54aa31e7701561c6e94279b43821aab5ab378cb9
              • Instruction Fuzzy Hash: CA41C5352083019FDB24DF25D884B6BBBE4BF96310F008A1DF965972D1D770E904CB92
              APIs
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,001DCC08,00000000,?,?,?,?), ref: 001D44AA
              • GetWindowLongW.USER32 ref: 001D44C7
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001D44D7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$Long
              • String ID: SysTreeView32
              • API String ID: 847901565-1698111956
              • Opcode ID: f6bcb5ae5029a9092c618e4b3bdccdc48eae330685aa43be84136e485ab53025
              • Instruction ID: 8e42c2e49ac225311bd2e7b0bfa6f2bdd94db44df63a4ec09883645e99bfebeb
              • Opcode Fuzzy Hash: f6bcb5ae5029a9092c618e4b3bdccdc48eae330685aa43be84136e485ab53025
              • Instruction Fuzzy Hash: 77319E31210206AFDF208F38DC45BEA77A9EB09334F204716F975922E0D770EC909750
              APIs
                • Part of subcall function 001C335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,001C3077,?,?), ref: 001C3378
              • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 001C307A
              • _wcslen.LIBCMT ref: 001C309B
              • htons.WSOCK32(00000000,?,?,00000000), ref: 001C3106
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
              • String ID: 255.255.255.255
              • API String ID: 946324512-2422070025
              • Opcode ID: 06a0bb487772afe906e6444c99d9217cb0a448d186d216e34b932f46e3e281fc
              • Instruction ID: 173945ad76c0ba0ad476d1e40bf2277cf21ce2eb61041209446e18ccbed591fd
              • Opcode Fuzzy Hash: 06a0bb487772afe906e6444c99d9217cb0a448d186d216e34b932f46e3e281fc
              • Instruction Fuzzy Hash: 8731E7362002059FCB10CF68C485FAA77E0EF64318F29C05DE9268B792DB32DE41C761
              APIs
              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 001D4705
              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 001D4713
              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 001D471A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$DestroyWindow
              • String ID: msctls_updown32
              • API String ID: 4014797782-2298589950
              • Opcode ID: 4f4987ad6de79eb9d83c8f24e51d908e53108001302b15b80841cf8238937817
              • Instruction ID: de7d3403f66670bc92df98a2b06595a1a37971c619ebfcbacf42dd74421514e7
              • Opcode Fuzzy Hash: 4f4987ad6de79eb9d83c8f24e51d908e53108001302b15b80841cf8238937817
              • Instruction Fuzzy Hash: 0E216DB5601209AFDB10DF64DCC5DB737ADEF5A3A4B04055AFA009B3A1CB31EC61CAA0
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen
              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
              • API String ID: 176396367-2734436370
              • Opcode ID: 34fcb9ab1692cc79862a8a97a77751d04a0d9aa18255a0c7b5494787ef41afb3
              • Instruction ID: bfa7f76497f60578d843411cb2261d364b948ef7a0b605d2d22b3fe719605d73
              • Opcode Fuzzy Hash: 34fcb9ab1692cc79862a8a97a77751d04a0d9aa18255a0c7b5494787ef41afb3
              • Instruction Fuzzy Hash: F021573660422066D335AB349C03FBB73D89FA6300F11442BF94E97181EB51AED6C2D5
              APIs
              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 001D3840
              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 001D3850
              • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 001D3876
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$MoveWindow
              • String ID: Listbox
              • API String ID: 3315199576-2633736733
              • Opcode ID: 315006e30887a9a4f5ac27230553c22aa549127b93415c6da5b67dad42bd81e7
              • Instruction ID: 5887ea9ba604a68a86806f2a913e453fd3b31b56180094e4b1aeb51c1bc63702
              • Opcode Fuzzy Hash: 315006e30887a9a4f5ac27230553c22aa549127b93415c6da5b67dad42bd81e7
              • Instruction Fuzzy Hash: 8021BE72610219BBEF218F54DC85FAB376AEF89750F118126FA109B290CB71EC5297A0
              APIs
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 001A2258
                • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 001A228A
              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 001A22CA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$_wcslen
              • String ID: @U=u
              • API String ID: 763830540-2594219639
              • Opcode ID: af92841172fbeabc47d1cd144fb2a742c52ffc77f85e1579f6b9e1ecf61604a1
              • Instruction ID: 456ea3c0e53963d8a1e8fc4f358344434a8d414caa7c8c46db05704f9d234673
              • Opcode Fuzzy Hash: af92841172fbeabc47d1cd144fb2a742c52ffc77f85e1579f6b9e1ecf61604a1
              • Instruction Fuzzy Hash: A721C935701204ABDF149B598D49FEE3BA9EF5B710F044025FA05DB291DB74C945C7A1
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 001B4A08
              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 001B4A5C
              • SetErrorMode.KERNEL32(00000000,?,?,001DCC08), ref: 001B4AD0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorMode$InformationVolume
              • String ID: %lu
              • API String ID: 2507767853-685833217
              • Opcode ID: 6599b33f3124f64663e4d78b99c4bc344553561b1f02643f0e2e9d1b0fed99fb
              • Instruction ID: b31b5ab45a94ccba4ff775f5d0f440f77945fea0f93d498c7855ddd872fecf07
              • Opcode Fuzzy Hash: 6599b33f3124f64663e4d78b99c4bc344553561b1f02643f0e2e9d1b0fed99fb
              • Instruction Fuzzy Hash: 78315075A00119EFD710DF64C885EAA77F8EF05308F148495F909DB262D771ED46CBA1
              APIs
              • SendMessageW.USER32(?,000000B0,?,?), ref: 001A1B4F
              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 001A1B61
              • SendMessageW.USER32(?,0000000D,?,00000000), ref: 001A1B99
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: 2f2d7d038b7125b8cff746a5a23def573f9027f8ddb152fb4e2757629111dd18
              • Instruction ID: 63b95fc850cab565b432a954b3139e8d127481c95af0b8c5f18905468696baf2
              • Opcode Fuzzy Hash: 2f2d7d038b7125b8cff746a5a23def573f9027f8ddb152fb4e2757629111dd18
              • Instruction Fuzzy Hash: B3219036600119BFDB15DBA8C842DFEB7FEEF45344F11046AE505E72A0EB71AE448BA4
              APIs
              • SendMessageW.USER32(00000402,00000000,00000000), ref: 001C0D24
              • SendMessageW.USER32(0000000C,00000000,?), ref: 001C0D65
              • SendMessageW.USER32(0000000C,00000000,?), ref: 001C0D8D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: bc2c96b7a777b98d6808797df363db32bc36e26f79285ffb299efbc7d374a36e
              • Instruction ID: 2dd75546b70894ec338f83429b534006d01ef1dd0d59c8b9221d0b9a2c4a33f1
              • Opcode Fuzzy Hash: bc2c96b7a777b98d6808797df363db32bc36e26f79285ffb299efbc7d374a36e
              • Instruction Fuzzy Hash: CA216A35204511EFD711EBA4E985EBAB7E6FF29310B018859F91A9BA71CB30FC50CB90
              APIs
              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 001D424F
              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 001D4264
              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 001D4271
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: msctls_trackbar32
              • API String ID: 3850602802-1010561917
              • Opcode ID: f011bb83809de0c5b0c311d7096a49e06ab6e47ae2c3bcdf924b5c7a2d7bcb45
              • Instruction ID: 2e719307480e14e0b4d0381848db33416e8804f314b8ebe5ee63e306457a8b47
              • Opcode Fuzzy Hash: f011bb83809de0c5b0c311d7096a49e06ab6e47ae2c3bcdf924b5c7a2d7bcb45
              • Instruction Fuzzy Hash: 1411E072240208BFEF209E28DC06FAB3BACEF95B64F110525FA55E21A0D771D8619B20
              APIs
                • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
                • Part of subcall function 001A2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 001A2DC5
                • Part of subcall function 001A2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 001A2DD6
                • Part of subcall function 001A2DA7: GetCurrentThreadId.KERNEL32 ref: 001A2DDD
                • Part of subcall function 001A2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 001A2DE4
              • GetFocus.USER32 ref: 001A2F78
                • Part of subcall function 001A2DEE: GetParent.USER32(00000000), ref: 001A2DF9
              • GetClassNameW.USER32(?,?,00000100), ref: 001A2FC3
              • EnumChildWindows.USER32(?,001A303B), ref: 001A2FEB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
              • String ID: %s%d
              • API String ID: 1272988791-1110647743
              • Opcode ID: 710d5472d9ea923a56d2fdc177f1298bd36ceb90e5121f50aa459475b7956805
              • Instruction ID: baf566782493350b7025b0c3497a79246045fd9981e7ec0d60f3d0977a9ec3c5
              • Opcode Fuzzy Hash: 710d5472d9ea923a56d2fdc177f1298bd36ceb90e5121f50aa459475b7956805
              • Instruction Fuzzy Hash: A911A279700205ABCF147FA48C85FEE376AAFA6308F044075FD199B292DF309949CB60
              APIs
              • GetWindowTextLengthW.USER32(00000000), ref: 001D34AB
              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 001D34BA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: LengthMessageSendTextWindow
              • String ID: @U=u$edit
              • API String ID: 2978978980-590756393
              • Opcode ID: 6fb16ae88c82e252dc0f7657912d5097931449a780b19e77422f509b5ae61877
              • Instruction ID: 1f1964c8c35dc84e7e6df508088c55b38d3552c03a3f9c4bf653667300c3e960
              • Opcode Fuzzy Hash: 6fb16ae88c82e252dc0f7657912d5097931449a780b19e77422f509b5ae61877
              • Instruction Fuzzy Hash: 69118F71101108AFEF124E68EC44AEB376AEB15378F504726F971932E0C779DC91D752
              APIs
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
                • Part of subcall function 001A3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 001A3CCA
              • SendMessageW.USER32(?,00000180,00000000,?), ref: 001A1C46
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ClassMessageNameSend_wcslen
              • String ID: @U=u$ComboBox$ListBox
              • API String ID: 624084870-2258501812
              • Opcode ID: 4c4863927ae73134d95519e7f1db3e04e720c47301d38017e8de8e2204d50f66
              • Instruction ID: b3bf7d1e7e98e051b8a3d97d8da8d148f036717e3793c4cc7e78043f45ec7c27
              • Opcode Fuzzy Hash: 4c4863927ae73134d95519e7f1db3e04e720c47301d38017e8de8e2204d50f66
              • Instruction Fuzzy Hash: BE01A779AC121976CB08EBA0DD51AFF77A89F23350F14001AB416672D6EB209F18D6B1
              APIs
              • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 001D58C1
              • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 001D58EE
              • DrawMenuBar.USER32(?), ref: 001D58FD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Menu$InfoItem$Draw
              • String ID: 0
              • API String ID: 3227129158-4108050209
              • Opcode ID: 8471d87845ee56924232132d4df3f360ebc5e3831332ef188b1342ef14c8c91e
              • Instruction ID: 388d49f354aea0c43a4c3182e049f0de67b55ee934e057a3a864726af393f383
              • Opcode Fuzzy Hash: 8471d87845ee56924232132d4df3f360ebc5e3831332ef188b1342ef14c8c91e
              • Instruction Fuzzy Hash: 2101C031600218EFDB209F15EC45BAEBBB9FF45361F00809AE848DA251DB308A85DF21
              APIs
              • GetForegroundWindow.USER32(?,002118B0,001DA364,000000FC,?,00000000,00000000,?,?,?,001976CF,?,?,?,?,?), ref: 001D7805
              • GetFocus.USER32 ref: 001D780D
                • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
                • Part of subcall function 00159944: GetWindowLongW.USER32(?,000000EB), ref: 00159952
              • SendMessageW.USER32(0115D9E8,000000B0,000001BC,000001C0), ref: 001D787A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$Long$FocusForegroundMessageSend
              • String ID: @U=u
              • API String ID: 3601265619-2594219639
              • Opcode ID: 32f170457242c004778ebf8833aab0d93c4166c0f3c827e5fafc06356d0d989f
              • Instruction ID: 383ad7c75bef9ecfb45bcc2cb5a326b11280da9c15dd060a8f0446c5068a4ba1
              • Opcode Fuzzy Hash: 32f170457242c004778ebf8833aab0d93c4166c0f3c827e5fafc06356d0d989f
              • Instruction Fuzzy Hash: 50017531505140CFD725DB28F85CAA633E5EF95320F14466AE525873E0DB356C56CB80
              APIs
              • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0019D3BF
              • FreeLibrary.KERNEL32 ref: 0019D3E5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: AddressFreeLibraryProc
              • String ID: GetSystemWow64DirectoryW$X64
              • API String ID: 3013587201-2590602151
              • Opcode ID: 28feff0ee3426bfcc4d5010bd25c7d6a2f38430cb224143079815edde21938fe
              • Instruction ID: cb5326269a2c2e966aceee3a7f4d4ff281f1b98660161e2d45574c09d0915009
              • Opcode Fuzzy Hash: 28feff0ee3426bfcc4d5010bd25c7d6a2f38430cb224143079815edde21938fe
              • Instruction Fuzzy Hash: 42F02BB1406723DBDF3C6B24AD489AA3318BF11742B95875AF423F10D5DB70CE86C682
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f5c5ccb5473f9f4e7c3eee5605f9242c698286ee98afed27a0fcb4d1d3e3b258
              • Instruction ID: 1debe85afaceadc88d4a9c85c6ae1f9b2ef1a6574f129f8e36797e3d6c1f0733
              • Opcode Fuzzy Hash: f5c5ccb5473f9f4e7c3eee5605f9242c698286ee98afed27a0fcb4d1d3e3b258
              • Instruction Fuzzy Hash: 18C15B79A0020AEFDB15CFA4C894BAEB7B5FF49304F218599E505EB251D731EE81CB90
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Variant$ClearInitInitializeUninitialize
              • String ID:
              • API String ID: 1998397398-0
              • Opcode ID: adce8c404174f8da7cd34172c1ae5eb09afb688c7a584a0007ed96f2b69e17fa
              • Instruction ID: 5a0974e35b6748edc973ba36270812cc5c5de39003b712b53f3b959dff0903d3
              • Opcode Fuzzy Hash: adce8c404174f8da7cd34172c1ae5eb09afb688c7a584a0007ed96f2b69e17fa
              • Instruction Fuzzy Hash: 1BA114756042109FCB14DF28C485E2AB7E5FF98714F05885DF99A9B3A2DB30EE05CB92
              APIs
              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,001DFC08,?), ref: 001A05F0
              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,001DFC08,?), ref: 001A0608
              • CLSIDFromProgID.OLE32(?,?,00000000,001DCC40,000000FF,?,00000000,00000800,00000000,?,001DFC08,?), ref: 001A062D
              • _memcmp.LIBVCRUNTIME ref: 001A064E
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: FromProg$FreeTask_memcmp
              • String ID:
              • API String ID: 314563124-0
              • Opcode ID: 4112446c38f2c423a1a1bbec3c8df8235400c3c71c1db751350619ea875a8c6b
              • Instruction ID: 597e065fed8a34c4878cca2b6e8af00dca11112a40910a25f5937b9328cdaf1b
              • Opcode Fuzzy Hash: 4112446c38f2c423a1a1bbec3c8df8235400c3c71c1db751350619ea875a8c6b
              • Instruction Fuzzy Hash: C7811A75A00109EFCB05DF94C988EEEB7B9FF8A315F204558E506EB250DB71AE46CB60
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _free
              • String ID:
              • API String ID: 269201875-0
              • Opcode ID: 80d969e5acbbe3072d136cdab1be6bb555934799ec456128bba353f77374e972
              • Instruction ID: c1028a7e8015a5469842e718d5686b00af1b8583a992edaeff6a5b68546b70f8
              • Opcode Fuzzy Hash: 80d969e5acbbe3072d136cdab1be6bb555934799ec456128bba353f77374e972
              • Instruction Fuzzy Hash: BF413A33A00500BBDB257BB99C45ABE3BADEF61330F144229F819D2191E7748A539F61
              APIs
              • socket.WSOCK32(00000002,00000002,00000011), ref: 001C1AFD
              • WSAGetLastError.WSOCK32 ref: 001C1B0B
              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 001C1B8A
              • WSAGetLastError.WSOCK32 ref: 001C1B94
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorLast$socket
              • String ID:
              • API String ID: 1881357543-0
              • Opcode ID: 2d628aac1900364692552d05848229afd27fe0148e6a82e36426ea5c2fda7933
              • Instruction ID: 1012104c957695cd8d7190eea263dc0d4315dcddb4132ecce167fcaa02e5e313
              • Opcode Fuzzy Hash: 2d628aac1900364692552d05848229afd27fe0148e6a82e36426ea5c2fda7933
              • Instruction Fuzzy Hash: B941B234640201AFE720AF24C886F2977E5AB55718F54844CF92A9F7D3D772DD42CB90
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e1052beb42853ecc95dea6d39624b2704f7d998e83a32dffc2011e9515d120e6
              • Instruction ID: 7e893bd5fa564953d64bedd7fa7348031a3544199d9f998c30598db354f2ac9b
              • Opcode Fuzzy Hash: e1052beb42853ecc95dea6d39624b2704f7d998e83a32dffc2011e9515d120e6
              • Instruction Fuzzy Hash: AE411B72A04704BFD7249F38CC81B6A7BF9EB98710F10852EF54BDB282D77199118B80
              APIs
              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 001B5783
              • GetLastError.KERNEL32(?,00000000), ref: 001B57A9
              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 001B57CE
              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 001B57FA
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CreateHardLink$DeleteErrorFileLast
              • String ID:
              • API String ID: 3321077145-0
              • Opcode ID: 1db8a3a8f64a913b0ed80aae8d43aad218f486822c97807e2b69e9d1b6948999
              • Instruction ID: ac4eea02900b73831ee2386fc33be73f5472c8509567f1100753ada4b29edd1c
              • Opcode Fuzzy Hash: 1db8a3a8f64a913b0ed80aae8d43aad218f486822c97807e2b69e9d1b6948999
              • Instruction Fuzzy Hash: 6B411D39600611DFCB11DF55D544A5EBBE2EF99320B198888E84AAF372CB35FD40CB91
              APIs
              • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00166D71,00000000,00000000,001682D9,?,001682D9,?,00000001,00166D71,8BE85006,00000001,001682D9,001682D9), ref: 0017D910
              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0017D999
              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0017D9AB
              • __freea.LIBCMT ref: 0017D9B4
                • Part of subcall function 00173820: RtlAllocateHeap.NTDLL(00000000,?,00211444,?,0015FDF5,?,?,0014A976,00000010,00211440,001413FC,?,001413C6,?,00141129), ref: 00173852
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
              • String ID:
              • API String ID: 2652629310-0
              • Opcode ID: 90ec978d2fc0f84f691a45b375e549cad0c8eb1893f52d9b885917cbb9c56784
              • Instruction ID: 717fb07c240f8cdacf47b091976436b71b0feff291d4613a4ab5b9803fe272da
              • Opcode Fuzzy Hash: 90ec978d2fc0f84f691a45b375e549cad0c8eb1893f52d9b885917cbb9c56784
              • Instruction Fuzzy Hash: F231CD72A0021AABDF259F64EC41EAE7BB5EF40314F158268FD08D7250EB35CD50CB90
              APIs
              • GetKeyboardState.USER32(?,753DC0D0,?,00008000), ref: 001AABF1
              • SetKeyboardState.USER32(00000080,?,00008000), ref: 001AAC0D
              • PostMessageW.USER32(00000000,00000101,00000000), ref: 001AAC74
              • SendInput.USER32(00000001,?,0000001C,753DC0D0,?,00008000), ref: 001AACC6
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: KeyboardState$InputMessagePostSend
              • String ID:
              • API String ID: 432972143-0
              • Opcode ID: b9afa054a639aade496884fe15731407f80baec0c532f73bf15424a2caca7cee
              • Instruction ID: 334beef9445980ec1954ea1bdd381796fecca5f3304c883953411ce4c7fc4b8b
              • Opcode Fuzzy Hash: b9afa054a639aade496884fe15731407f80baec0c532f73bf15424a2caca7cee
              • Instruction Fuzzy Hash: B1313934A007186FFF35CB648C087FA7BA6AF86330F84471AE481962D9C3759981C792
              APIs
              • ClientToScreen.USER32(?,?), ref: 001D769A
              • GetWindowRect.USER32(?,?), ref: 001D7710
              • PtInRect.USER32(?,?,001D8B89), ref: 001D7720
              • MessageBeep.USER32(00000000), ref: 001D778C
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Rect$BeepClientMessageScreenWindow
              • String ID:
              • API String ID: 1352109105-0
              • Opcode ID: ad8e3b1d70c8430a9b236663aa9b8335aefa9cd8de7a28242f2882166640ae8f
              • Instruction ID: 1eeaf14b54c4e8e9a833c041d864844497d18a1ee3500814a5edf8f1795d6ff1
              • Opcode Fuzzy Hash: ad8e3b1d70c8430a9b236663aa9b8335aefa9cd8de7a28242f2882166640ae8f
              • Instruction Fuzzy Hash: C641BF38A09255DFCB01CF58D898EA977F4FF58310F1585AAE5249B3A1E730E941CF90
              APIs
              • GetForegroundWindow.USER32 ref: 001D16EB
                • Part of subcall function 001A3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 001A3A57
                • Part of subcall function 001A3A3D: GetCurrentThreadId.KERNEL32 ref: 001A3A5E
                • Part of subcall function 001A3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001A25B3), ref: 001A3A65
              • GetCaretPos.USER32(?), ref: 001D16FF
              • ClientToScreen.USER32(00000000,?), ref: 001D174C
              • GetForegroundWindow.USER32 ref: 001D1752
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
              • String ID:
              • API String ID: 2759813231-0
              • Opcode ID: 6d4eaf41881ff02ebf0fe100d8779ed266834753e0243123e70b345b834c5b72
              • Instruction ID: b149354743e585cfd81a010cac04de2787e8d840bf2c9b14dee90c1b9fcc1647
              • Opcode Fuzzy Hash: 6d4eaf41881ff02ebf0fe100d8779ed266834753e0243123e70b345b834c5b72
              • Instruction Fuzzy Hash: 93317075D01249AFC700EFA9C881CEEBBF9EF59304B5080AAE415E7211D731DE45CBA0
              APIs
              • CreateToolhelp32Snapshot.KERNEL32 ref: 001AD501
              • Process32FirstW.KERNEL32(00000000,?), ref: 001AD50F
              • Process32NextW.KERNEL32(00000000,?), ref: 001AD52F
              • CloseHandle.KERNEL32(00000000), ref: 001AD5DC
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
              • String ID:
              • API String ID: 420147892-0
              • Opcode ID: 3fb3191ca27854aa311f8d0963a4cccef375fcad43dbde884772bd08b19ba109
              • Instruction ID: 38396b62cad367146a7ec13e9bd23a5c2b3ec33c5ff696117d39a27fb28a640e
              • Opcode Fuzzy Hash: 3fb3191ca27854aa311f8d0963a4cccef375fcad43dbde884772bd08b19ba109
              • Instruction Fuzzy Hash: CB31A4721083019FD301EF54D885AAFBBF8EFA9354F14092DF586861A2EB719949CB92
              APIs
                • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
              • GetCursorPos.USER32(?), ref: 001D9001
              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00197711,?,?,?,?,?), ref: 001D9016
              • GetCursorPos.USER32(?), ref: 001D905E
              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00197711,?,?,?), ref: 001D9094
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Cursor$LongMenuPopupProcTrackWindow
              • String ID:
              • API String ID: 2864067406-0
              • Opcode ID: c86bf970ccb812d098fa61fa7da794076ab099082cc9bf39025d528e09bc1f53
              • Instruction ID: ab969b958e063aed55e7c193c532e46b66267f7c0dc74ea114f5069e8e1d17d8
              • Opcode Fuzzy Hash: c86bf970ccb812d098fa61fa7da794076ab099082cc9bf39025d528e09bc1f53
              • Instruction Fuzzy Hash: FF21D131601018EFDB259F94EC58EFA3BB9EF49350F048156F9058B261C73599A0DBA0
              APIs
              • GetFileAttributesW.KERNEL32(?,001DCB68), ref: 001AD2FB
              • GetLastError.KERNEL32 ref: 001AD30A
              • CreateDirectoryW.KERNEL32(?,00000000), ref: 001AD319
              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,001DCB68), ref: 001AD376
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CreateDirectory$AttributesErrorFileLast
              • String ID:
              • API String ID: 2267087916-0
              • Opcode ID: a21036e8e5ffa5d1d2c2858a2b593536433f171c3284328963c794731703895d
              • Instruction ID: f4f5899e157f8388eedcfe4df49a5bd2898db71773b270453b86327aff61ea3d
              • Opcode Fuzzy Hash: a21036e8e5ffa5d1d2c2858a2b593536433f171c3284328963c794731703895d
              • Instruction Fuzzy Hash: 352183B45056029F8B10DF28D88146EB7E4FF57364F104A1EF4AAC76A1D731D945CB93
              APIs
                • Part of subcall function 001A1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 001A102A
                • Part of subcall function 001A1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 001A1036
                • Part of subcall function 001A1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001A1045
                • Part of subcall function 001A1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 001A104C
                • Part of subcall function 001A1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 001A1062
              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 001A15BE
              • _memcmp.LIBVCRUNTIME ref: 001A15E1
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 001A1617
              • HeapFree.KERNEL32(00000000), ref: 001A161E
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
              • String ID:
              • API String ID: 1592001646-0
              • Opcode ID: e73d0edc1abb02aff5b3685989606b3e4486fb2f3b6ff4f868146043d3f52666
              • Instruction ID: 751d3f6e0f2b61ea8d284d40f47befb184b96ff40c752c06be381aa18f7933f6
              • Opcode Fuzzy Hash: e73d0edc1abb02aff5b3685989606b3e4486fb2f3b6ff4f868146043d3f52666
              • Instruction Fuzzy Hash: B0219A75E41209FFDF00DFA4C945BEEB7B8EF46354F088859E445AB241E770AA45CBA0
              APIs
              • GetWindowLongW.USER32(?,000000EC), ref: 001D280A
              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 001D2824
              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 001D2832
              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 001D2840
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$Long$AttributesLayered
              • String ID:
              • API String ID: 2169480361-0
              • Opcode ID: 949ea264268bd0d391463c80106561ec5dee5f0a6627672b52cd146a084868b7
              • Instruction ID: d3425d8cffbc1f823f49516f34f0a7029d180c42adf815a2eb072248c6c1f39d
              • Opcode Fuzzy Hash: 949ea264268bd0d391463c80106561ec5dee5f0a6627672b52cd146a084868b7
              • Instruction Fuzzy Hash: 2421D331309111AFD7149B24D884FAA7B95EF65324F14825AF42A8B7E2C771FC82C7D0
              APIs
                • Part of subcall function 001A8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,001A790A,?,000000FF,?,001A8754,00000000,?,0000001C,?,?), ref: 001A8D8C
                • Part of subcall function 001A8D7D: lstrcpyW.KERNEL32(00000000,?,?,001A790A,?,000000FF,?,001A8754,00000000,?,0000001C,?,?,00000000), ref: 001A8DB2
                • Part of subcall function 001A8D7D: lstrcmpiW.KERNEL32(00000000,?,001A790A,?,000000FF,?,001A8754,00000000,?,0000001C,?,?), ref: 001A8DE3
              • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,001A8754,00000000,?,0000001C,?,?,00000000), ref: 001A7923
              • lstrcpyW.KERNEL32(00000000,?,?,001A8754,00000000,?,0000001C,?,?,00000000), ref: 001A7949
              • lstrcmpiW.KERNEL32(00000002,cdecl,?,001A8754,00000000,?,0000001C,?,?,00000000), ref: 001A7984
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: lstrcmpilstrcpylstrlen
              • String ID: cdecl
              • API String ID: 4031866154-3896280584
              • Opcode ID: 495b7da6d39bcbc36d385fa1289c5b2b21309fa36b2790da0b3d4c13f9e564ae
              • Instruction ID: b0f9679e31fbcca8ab186aa5f9bb4ed07c34725ed0639469fe5b70be65eaa835
              • Opcode Fuzzy Hash: 495b7da6d39bcbc36d385fa1289c5b2b21309fa36b2790da0b3d4c13f9e564ae
              • Instruction Fuzzy Hash: 3111063E201342ABCB156F34CC45D7B77A9FF56364B00402BF802CB2A4EB319911C791
              APIs
              • SendMessageW.USER32(?,000000B0,?,?), ref: 001A1A47
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001A1A59
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001A1A6F
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 001A1A8A
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: 101513a081d6ebab7764af8ea91754c1ce3ac3731eca1699b0581c54db4255cf
              • Instruction ID: 72a9af8f8fb1db717b0be27f620b0b4ae2b77884714e4b8448a25d522c4e2409
              • Opcode Fuzzy Hash: 101513a081d6ebab7764af8ea91754c1ce3ac3731eca1699b0581c54db4255cf
              • Instruction Fuzzy Hash: CE113C3AD01219FFEB10DBA4CD85FADBB79EB04750F200091E600B7290D7716E50DB94
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 001AE1FD
              • MessageBoxW.USER32(?,?,?,?), ref: 001AE230
              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 001AE246
              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 001AE24D
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
              • String ID:
              • API String ID: 2880819207-0
              • Opcode ID: d91e48f40ee49e88dbabf040b5bd7ec8589e9ae2d831e784cf3e43479b0db210
              • Instruction ID: 077a847b03c5dbc1467d8c7bf20598f3feb7611fb6913fc166ad25d6db3f0e53
              • Opcode Fuzzy Hash: d91e48f40ee49e88dbabf040b5bd7ec8589e9ae2d831e784cf3e43479b0db210
              • Instruction Fuzzy Hash: 48110876905259BBC7019FA8AC09BDE7FACEB46310F008656F925D3294D7708900C7A0
              APIs
              • CreateThread.KERNEL32(00000000,?,0016CFF9,00000000,00000004,00000000), ref: 0016D218
              • GetLastError.KERNEL32 ref: 0016D224
              • __dosmaperr.LIBCMT ref: 0016D22B
              • ResumeThread.KERNEL32(00000000), ref: 0016D249
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Thread$CreateErrorLastResume__dosmaperr
              • String ID:
              • API String ID: 173952441-0
              • Opcode ID: 34223a482e1388c2a064256b58349c974abcb1166992c9a4ccc6d1736af324d6
              • Instruction ID: 21cb7982f37cc88a7c2411b7896db8132233e347fafd999b75ea5992bd0df2ff
              • Opcode Fuzzy Hash: 34223a482e1388c2a064256b58349c974abcb1166992c9a4ccc6d1736af324d6
              • Instruction Fuzzy Hash: 4D01F536E06205BBCB115BA9EC09BAF7B69EF92330F11421DF925921D0CF71C961C6E0
              APIs
              • ___BuildCatchObject.LIBVCRUNTIME ref: 00163B56
                • Part of subcall function 00163AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00163AD2
                • Part of subcall function 00163AA3: ___AdjustPointer.LIBCMT ref: 00163AED
              • _UnwindNestedFrames.LIBCMT ref: 00163B6B
              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00163B7C
              • CallCatchBlock.LIBVCRUNTIME ref: 00163BA4
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
              • String ID:
              • API String ID: 737400349-0
              • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
              • Instruction ID: fd5582462925d18449fa0a7daaa8daf82291ba45aaa651b3f4888fe70ac4298f
              • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
              • Instruction Fuzzy Hash: EF010832100149BBDF126E95CC46EEB7F6EEFA9754F044018FE58A6121C732E971EBA0
              APIs
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,001413C6,00000000,00000000,?,0017301A,001413C6,00000000,00000000,00000000,?,0017328B,00000006,FlsSetValue), ref: 001730A5
              • GetLastError.KERNEL32(?,0017301A,001413C6,00000000,00000000,00000000,?,0017328B,00000006,FlsSetValue,001E2290,FlsSetValue,00000000,00000364,?,00172E46), ref: 001730B1
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0017301A,001413C6,00000000,00000000,00000000,?,0017328B,00000006,FlsSetValue,001E2290,FlsSetValue,00000000), ref: 001730BF
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: LibraryLoad$ErrorLast
              • String ID:
              • API String ID: 3177248105-0
              • Opcode ID: 4b22338b428c2f52aa2fe402a82fb1afbddfd39a22fb8cb037f13b248c2ac7e0
              • Instruction ID: da732492a210482fc94ce615119fa091c00f402b77a3fa111e55bbd8d14fb1b4
              • Opcode Fuzzy Hash: 4b22338b428c2f52aa2fe402a82fb1afbddfd39a22fb8cb037f13b248c2ac7e0
              • Instruction Fuzzy Hash: 3B012032353333ABCB314B789C4895777A8AF05761B118720F92DD7140DB21D981D6E0
              APIs
              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 001A747F
              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 001A7497
              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 001A74AC
              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 001A74CA
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Type$Register$FileLoadModuleNameUser
              • String ID:
              • API String ID: 1352324309-0
              • Opcode ID: 58a4140ec6c088bfb7660f6d16dbb1320d5978e8fb013305239cb622cb75cc91
              • Instruction ID: d1af6292444f21981fc726b26f53bf7ed9ec2b12b1119876212313db93c82275
              • Opcode Fuzzy Hash: 58a4140ec6c088bfb7660f6d16dbb1320d5978e8fb013305239cb622cb75cc91
              • Instruction Fuzzy Hash: 9F11C4B920A3119FE7208F14DC08FD27FFCEB05B00F10896AA616D6591D770EA44DB90
              APIs
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,001AACD3,?,00008000), ref: 001AB0C4
              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,001AACD3,?,00008000), ref: 001AB0E9
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,001AACD3,?,00008000), ref: 001AB0F3
              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,001AACD3,?,00008000), ref: 001AB126
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CounterPerformanceQuerySleep
              • String ID:
              • API String ID: 2875609808-0
              • Opcode ID: 8cc6f8a32ea1a7fde43f4d03b134c46c0efc883e69eae6f685cd22b98708fb6c
              • Instruction ID: 66d34676667986ddb3db1a4b3756674a44254dcb2f60ab69306639a72d3fb8f9
              • Opcode Fuzzy Hash: 8cc6f8a32ea1a7fde43f4d03b134c46c0efc883e69eae6f685cd22b98708fb6c
              • Instruction Fuzzy Hash: 2F116D75C0666DE7CF04AFE4E9A86EEBF78FF0A711F114496E941B2182CB305650CB91
              APIs
              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 001A2DC5
              • GetWindowThreadProcessId.USER32(?,00000000), ref: 001A2DD6
              • GetCurrentThreadId.KERNEL32 ref: 001A2DDD
              • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 001A2DE4
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
              • String ID:
              • API String ID: 2710830443-0
              • Opcode ID: af17a1000fa4928e070a51ebfaec0bfcda257eba46847e18728ab2110589c627
              • Instruction ID: 70b927f17055e72d22d9d6b5e67bbde3eeafa786b2bfa4ae85d5fcf61f57a055
              • Opcode Fuzzy Hash: af17a1000fa4928e070a51ebfaec0bfcda257eba46847e18728ab2110589c627
              • Instruction Fuzzy Hash: ADE06D71103225BADB201BA69C0DEEB3F6CEF43BA1F000416F505D15819AA4C880C6F0
              APIs
                • Part of subcall function 00159639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00159693
                • Part of subcall function 00159639: SelectObject.GDI32(?,00000000), ref: 001596A2
                • Part of subcall function 00159639: BeginPath.GDI32(?), ref: 001596B9
                • Part of subcall function 00159639: SelectObject.GDI32(?,00000000), ref: 001596E2
              • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 001D8887
              • LineTo.GDI32(?,?,?), ref: 001D8894
              • EndPath.GDI32(?), ref: 001D88A4
              • StrokePath.GDI32(?), ref: 001D88B2
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
              • String ID:
              • API String ID: 1539411459-0
              • Opcode ID: 5972598863771347024d7ecb5e83b5da2e19f153e91eedbd9d7645405c2582ab
              • Instruction ID: 9378d8a142e007910f83493a8c1b00e891066800d780456f1f2909d8200b8f03
              • Opcode Fuzzy Hash: 5972598863771347024d7ecb5e83b5da2e19f153e91eedbd9d7645405c2582ab
              • Instruction Fuzzy Hash: B4F03A3A046299FADB125F94AC0DFCA3B59AF16311F048002FA11651E1CB755561DFE5
              APIs
              • GetSysColor.USER32(00000008), ref: 001598CC
              • SetTextColor.GDI32(?,?), ref: 001598D6
              • SetBkMode.GDI32(?,00000001), ref: 001598E9
              • GetStockObject.GDI32(00000005), ref: 001598F1
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Color$ModeObjectStockText
              • String ID:
              • API String ID: 4037423528-0
              • Opcode ID: 3418e80532398347235d1ac238895dc4385aca7fbbc96b99a09d582552087ebb
              • Instruction ID: bd73a60f5cafb77630cdbaa122297ca273fc1f9e3a5397edc2a2b14d23a5b62c
              • Opcode Fuzzy Hash: 3418e80532398347235d1ac238895dc4385aca7fbbc96b99a09d582552087ebb
              • Instruction Fuzzy Hash: C8E06D31246291EAEF215B74BC0DBE83F21AB52336F04871AF6FA584E1C3714680DB11
              APIs
              • GetCurrentThread.KERNEL32 ref: 001A1634
              • OpenThreadToken.ADVAPI32(00000000,?,?,?,001A11D9), ref: 001A163B
              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,001A11D9), ref: 001A1648
              • OpenProcessToken.ADVAPI32(00000000,?,?,?,001A11D9), ref: 001A164F
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CurrentOpenProcessThreadToken
              • String ID:
              • API String ID: 3974789173-0
              • Opcode ID: 66ad14f2796259376129af5997427e640f3aee19375349e381345db5394a2b72
              • Instruction ID: 03398e7d9fc27fdaf1273539c10448ca221e33a86297dbd0844ff1dad2326a1d
              • Opcode Fuzzy Hash: 66ad14f2796259376129af5997427e640f3aee19375349e381345db5394a2b72
              • Instruction Fuzzy Hash: 6BE08635603212EBD7201FF09E0DB473B7CAF557A1F144C09F245C9080D7744480C790
              APIs
              • GetDesktopWindow.USER32 ref: 0019D858
              • GetDC.USER32(00000000), ref: 0019D862
              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0019D882
              • ReleaseDC.USER32(?), ref: 0019D8A3
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CapsDesktopDeviceReleaseWindow
              • String ID:
              • API String ID: 2889604237-0
              • Opcode ID: 2d7110bddd3612dbe3324d80481a8101e310fb9602983ec747d4b2b797cad437
              • Instruction ID: 440fbc9afcbe89b910fb8ee4d88f1fc10cf8eaeedc8292e3416fa4e7ea6b9ff9
              • Opcode Fuzzy Hash: 2d7110bddd3612dbe3324d80481a8101e310fb9602983ec747d4b2b797cad437
              • Instruction Fuzzy Hash: BAE01AB4802206DFCF419FA4D80866DBBB1FB08311F15880AF806E7750C7389985EF80
              APIs
              • GetDesktopWindow.USER32 ref: 0019D86C
              • GetDC.USER32(00000000), ref: 0019D876
              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0019D882
              • ReleaseDC.USER32(?), ref: 0019D8A3
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CapsDesktopDeviceReleaseWindow
              • String ID:
              • API String ID: 2889604237-0
              • Opcode ID: ec0e2d33c0415f80698f0f1a1646f5be5802a584069800bb54cc9b999dac4ddd
              • Instruction ID: fa30728835824eee6c17c608ebbdb1ac2f17e4b52fc3c376c1403429ec368ebd
              • Opcode Fuzzy Hash: ec0e2d33c0415f80698f0f1a1646f5be5802a584069800bb54cc9b999dac4ddd
              • Instruction Fuzzy Hash: 1FE01A74802201DFCB509FA4D80866DBBB1FB08311B14880AF806E7750C7389945DF80
              APIs
                • Part of subcall function 00147620: _wcslen.LIBCMT ref: 00147625
              • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 001B4ED4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Connection_wcslen
              • String ID: *$LPT
              • API String ID: 1725874428-3443410124
              • Opcode ID: 5fb7ff5abcd4dc2e122bdc367b0d3b39fa365e491b4243a1e3b666ba4bd4b052
              • Instruction ID: edf992a8f91b6359f39ecbf46afe38b3249f2554dbaac33e98868413c299c199
              • Opcode Fuzzy Hash: 5fb7ff5abcd4dc2e122bdc367b0d3b39fa365e491b4243a1e3b666ba4bd4b052
              • Instruction Fuzzy Hash: 73914B75A002149FDB14DF58C484EAABBF1AF49304F19C09DE84A9F3A2D735EE85CB91
              APIs
              • __startOneArgErrorHandling.LIBCMT ref: 0016E30D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: ErrorHandling__start
              • String ID: pow
              • API String ID: 3213639722-2276729525
              • Opcode ID: e53fa85134740f383c9a41b6f870271c8ef5a8a431d35bfaa7107712ee169eec
              • Instruction ID: 2c9060c557a36ac11a8cea32a0421c579a67994569cd23ad372f1f13c60e4844
              • Opcode Fuzzy Hash: e53fa85134740f383c9a41b6f870271c8ef5a8a431d35bfaa7107712ee169eec
              • Instruction Fuzzy Hash: 1D518C65A0C20296CB297764CD513BD3BF8EB50740F30CA58E0D9863E8EF308CE59A86
              APIs
              • CharUpperBuffW.USER32(0019569E,00000000,?,001DCC08,?,00000000,00000000), ref: 001C78DD
                • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
              • CharUpperBuffW.USER32(0019569E,00000000,?,001DCC08,00000000,?,00000000,00000000), ref: 001C783B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: BuffCharUpper$_wcslen
              • String ID: <s
              • API String ID: 3544283678-3981233947
              • Opcode ID: 73794bb3ba6d0fed2879eb5608b8d2d41f0d587ad6ff1f9730c5a4dd31e25bff
              • Instruction ID: 79dcd3f0ebccd62e6a4644d38705aea9e85817070d1dacfff80994505d432fe5
              • Opcode Fuzzy Hash: 73794bb3ba6d0fed2879eb5608b8d2d41f0d587ad6ff1f9730c5a4dd31e25bff
              • Instruction Fuzzy Hash: E2612C72914219AACF04EFA4DC91EFDB378BF38704B444529E642A71A1EB749A05DBA0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID:
              • String ID: #
              • API String ID: 0-1885708031
              • Opcode ID: 42fade8ab753c932c0527542617677b1c3baca34b3a32f5e0a853e85b3ebeb6e
              • Instruction ID: 4fd751cba138a7330bc0acd0be9d1aa34a5b009be2be51fcd19d8e376f29c185
              • Opcode Fuzzy Hash: 42fade8ab753c932c0527542617677b1c3baca34b3a32f5e0a853e85b3ebeb6e
              • Instruction Fuzzy Hash: A051F175904246DFDF1DDFA8C481ABA7BE8EF25310F244055ECA19B2D0D7349E86CBA1
              APIs
              • Sleep.KERNEL32(00000000), ref: 0015F2A2
              • GlobalMemoryStatusEx.KERNEL32(?), ref: 0015F2BB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: GlobalMemorySleepStatus
              • String ID: @
              • API String ID: 2783356886-2766056989
              • Opcode ID: 863f091553ad633069fae15b091466f19517cfc7ddd43567f04c4c81fda5f47b
              • Instruction ID: 659161b1cd7652ae21756b8b40f7e5be5de4ae2daea8594422abecc8d1c7ea3f
              • Opcode Fuzzy Hash: 863f091553ad633069fae15b091466f19517cfc7ddd43567f04c4c81fda5f47b
              • Instruction Fuzzy Hash: 47515671409744ABD320AF54DC86BABBBF8FF95300F81884DF1D9421A5EB318569CB67
              APIs
              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 001A29EB
              • SendMessageW.USER32(?,0000110A,00000001,?), ref: 001A2A8D
                • Part of subcall function 001A2C75: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 001A2CE0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: 8eec5d76b8f65401f2cb2f389555089c8cd4e49165ae9a9ed89ce8bc92a63dcf
              • Instruction ID: d36c27d29d4d21f1a81cce72f7763af874b35aafe4a336db51aa1180721725b5
              • Opcode Fuzzy Hash: 8eec5d76b8f65401f2cb2f389555089c8cd4e49165ae9a9ed89ce8bc92a63dcf
              • Instruction Fuzzy Hash: D5419275A00209ABEF25EF58CC45BFE7BB9EF55714F040029F906A3291DB709E45CBA2
              APIs
              • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 001C57E0
              • _wcslen.LIBCMT ref: 001C57EC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: BuffCharUpper_wcslen
              • String ID: CALLARGARRAY
              • API String ID: 157775604-1150593374
              • Opcode ID: 29541a9aacc07588b2d3e0043cc4b4fb3296117683be6cadb3d731adf42d2c05
              • Instruction ID: 379e4c822782dd35716905ba69c05f0e43dc12fd52167ab200217ec40317c00e
              • Opcode Fuzzy Hash: 29541a9aacc07588b2d3e0043cc4b4fb3296117683be6cadb3d731adf42d2c05
              • Instruction Fuzzy Hash: 0E418E31E002099FCB14DFA9C885DAEBBB6EF69354F14406DF515AB291E730ED81CBA0
              APIs
              • _wcslen.LIBCMT ref: 001BD130
              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 001BD13A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CrackInternet_wcslen
              • String ID: |
              • API String ID: 596671847-2343686810
              • Opcode ID: 6fa9f0f0f6c970f267d9c186d920203ecd45f833ada8c66928e2d97ecb5aa5e8
              • Instruction ID: 6a7bd4e7d086c8662589adf74576558c44498e963331e79414c19ebbb02d119c
              • Opcode Fuzzy Hash: 6fa9f0f0f6c970f267d9c186d920203ecd45f833ada8c66928e2d97ecb5aa5e8
              • Instruction Fuzzy Hash: D1313C71D01219ABCF15EFA4DC85AEEBFB9FF19304F100059F815B6162EB31AA56CB60
              APIs
              • DestroyWindow.USER32(?,?,?,?), ref: 001D3621
              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 001D365C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$DestroyMove
              • String ID: static
              • API String ID: 2139405536-2160076837
              • Opcode ID: dd487996f42383aededa0d7049326bff6c47e96a8f31b214ff618bdb7a80a186
              • Instruction ID: cb7f381069775604c49a01d96454f3bf01bb6bcfe29fa577e6d49c0204f64b55
              • Opcode Fuzzy Hash: dd487996f42383aededa0d7049326bff6c47e96a8f31b214ff618bdb7a80a186
              • Instruction Fuzzy Hash: 3531BC71100204AEDB209F28DC80EFB73A9FF98760F00861AF8A597290DB31ED81D7A1
              APIs
              • SendMessageW.USER32(?,00001132,00000000,?), ref: 001D461F
              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 001D4634
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: '
              • API String ID: 3850602802-1997036262
              • Opcode ID: 38ea29b4d31ddc00a1ca803a8631c5d401984aeb55b878dc4379c2779c31fd6b
              • Instruction ID: aee73bf6bab2029c860e0b673304cc6a80c798a655c974afcac832b749f32750
              • Opcode Fuzzy Hash: 38ea29b4d31ddc00a1ca803a8631c5d401984aeb55b878dc4379c2779c31fd6b
              • Instruction Fuzzy Hash: EC312574A0130A9FDB14CFA9D981BDABBB6FF09300F10406AE905AB391D770E941CF90
              APIs
              • SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 001A2884
              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 001A28B6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: de997aff6a0e759101af0e9ef7e36296cdb07d6947f3e36025b8e668f0e9b910
              • Instruction ID: 565fcc5e90692a8901639542aec8f6bdcd00ebe0cd05af334f6ba7156c2bdf70
              • Opcode Fuzzy Hash: de997aff6a0e759101af0e9ef7e36296cdb07d6947f3e36025b8e668f0e9b910
              • Instruction Fuzzy Hash: 2021383AE00215ABCB11AF98C880DFFB7B9EF9AB14F144019F915A7290EB749D41C7A0
              APIs
                • Part of subcall function 001A3D03: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 001A3D18
              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 001A3C23
              • _strlen.LIBCMT ref: 001A3C2E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$Timeout_strlen
              • String ID: @U=u
              • API String ID: 2777139624-2594219639
              • Opcode ID: 6de454e25e7d3c79e4c08033a57bc01b2584f4aff4423d8212a149bcfb02e87c
              • Instruction ID: 6c9efaafc11642f4dba6c95e2c236cab2fdb2c55e35d2d3868b3f2b50c1ae393
              • Opcode Fuzzy Hash: 6de454e25e7d3c79e4c08033a57bc01b2584f4aff4423d8212a149bcfb02e87c
              • Instruction Fuzzy Hash: 5F110D35700115678B296A7C9C92AFF77548F67B60F11003EF916AB296DF109E4286E4
              APIs
                • Part of subcall function 001AED19: GetLocalTime.KERNEL32 ref: 001AED2A
                • Part of subcall function 001AED19: _wcslen.LIBCMT ref: 001AED3B
                • Part of subcall function 001AED19: _wcslen.LIBCMT ref: 001AED79
                • Part of subcall function 001AED19: _wcslen.LIBCMT ref: 001AEDAF
                • Part of subcall function 001AED19: _wcslen.LIBCMT ref: 001AEDDF
                • Part of subcall function 001AED19: _wcslen.LIBCMT ref: 001AEDEF
                • Part of subcall function 001AED19: _wcslen.LIBCMT ref: 001AEE2B
              • SendMessageW.USER32(?,00001002,00000000,?), ref: 001D340A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen$LocalMessageSendTime
              • String ID: @U=u$SysDateTimePick32
              • API String ID: 2216836867-2530228043
              • Opcode ID: 06f3abfcfdfe0dff2b1b31d9efe927c1feda64dcdc87b4ab2be6b4ff35dc0277
              • Instruction ID: fb5e2c5c753f5d6be026f1250d6d451bae57c3ea63af9c291a8ec78db59f8244
              • Opcode Fuzzy Hash: 06f3abfcfdfe0dff2b1b31d9efe927c1feda64dcdc87b4ab2be6b4ff35dc0277
              • Instruction Fuzzy Hash: 3F21D2312502097BEF219E54DC82FEE33AAEB54754F10451AF950A72D0DBB5EC518760
              APIs
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 001A2178
                • Part of subcall function 001AB32A: GetWindowThreadProcessId.USER32(?,?), ref: 001AB355
                • Part of subcall function 001AB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,001A2194,00000034,?,?,00001004,00000000,00000000), ref: 001AB365
                • Part of subcall function 001AB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,001A2194,00000034,?,?,00001004,00000000,00000000), ref: 001AB37B
                • Part of subcall function 001AB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001A21D0,?,?,00000034,00000800,?,00000034), ref: 001AB42D
              • SendMessageW.USER32(?,00001073,00000000,?), ref: 001A21DF
                • Part of subcall function 001AB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001A21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 001AB3F8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Process$MemoryMessageSend$AllocOpenReadThreadVirtualWindowWrite
              • String ID: @U=u
              • API String ID: 1045663743-2594219639
              • Opcode ID: cb30c30afc189f13e271241fa63917f7b6852475c3af987b43551679eaade6cd
              • Instruction ID: 4c81231ddc9ec9e99be6b77c608d1937b1619f3ffc929863496c520471a37056
              • Opcode Fuzzy Hash: cb30c30afc189f13e271241fa63917f7b6852475c3af987b43551679eaade6cd
              • Instruction Fuzzy Hash: 8A217135901129ABEF11EFA8DC81FDDBBB8FF19350F100196F549A7191EB705A84CB90
              APIs
              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 001D327C
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001D3287
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: Combobox
              • API String ID: 3850602802-2096851135
              • Opcode ID: 46d1c70c3a34c8c9a761fd1e470ec8220453c5e11ee4a8d1d421fa254d1a5b35
              • Instruction ID: a694430c8b82da6dbf0c2e29f4bb3b96782ac6010dd070609ad1bdd72f90dd8b
              • Opcode Fuzzy Hash: 46d1c70c3a34c8c9a761fd1e470ec8220453c5e11ee4a8d1d421fa254d1a5b35
              • Instruction Fuzzy Hash: 7011B271B002087FFF259E54DC85EFB3B6AEB943A4F10412AF92897390D7719D518761
              APIs
                • Part of subcall function 0014600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0014604C
                • Part of subcall function 0014600E: GetStockObject.GDI32(00000011), ref: 00146060
                • Part of subcall function 0014600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0014606A
              • GetWindowRect.USER32(00000000,?), ref: 001D377A
              • GetSysColor.USER32(00000012), ref: 001D3794
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Window$ColorCreateMessageObjectRectSendStock
              • String ID: static
              • API String ID: 1983116058-2160076837
              • Opcode ID: 579583ca90fb1c9dccc968f06c04f6ed08f0e3cc4c70fe6937f5eae64e466c4d
              • Instruction ID: 0a8c7f53e4ceb40714af694478847ac6d8098c6d7ee18f057249c2e47e2994a2
              • Opcode Fuzzy Hash: 579583ca90fb1c9dccc968f06c04f6ed08f0e3cc4c70fe6937f5eae64e466c4d
              • Instruction Fuzzy Hash: 2A113AB261060AAFDF01DFA8CC46EEA7BB8FB08354F014916F965E3250D735E851DB60
              APIs
              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 001D61FC
              • SendMessageW.USER32(?,00000194,00000000,00000000), ref: 001D6225
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: cbab15216624219d6368f762a9627864e7f2f19ef854a1d4cb36ce1d8164f1e2
              • Instruction ID: 2086c796ce8081f5fce3aa9b85341736181f91db10396bc4c3f78262ddacbd06
              • Opcode Fuzzy Hash: cbab15216624219d6368f762a9627864e7f2f19ef854a1d4cb36ce1d8164f1e2
              • Instruction Fuzzy Hash: 8D11C132140214BEEB148F68DC59FFA3BA5EB0A310F004116FA16AA2E1D7B0DA50DB50
              APIs
              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 001BCD7D
              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 001BCDA6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Internet$OpenOption
              • String ID: <local>
              • API String ID: 942729171-4266983199
              • Opcode ID: ae05a815d39d979dc19507aef3a3835fe3c05545b210632ede5ecdbd8f3d1944
              • Instruction ID: d8f93eabb95142019fd16a26bf92ec38239a1e359d82f522369b809bbd949d7d
              • Opcode Fuzzy Hash: ae05a815d39d979dc19507aef3a3835fe3c05545b210632ede5ecdbd8f3d1944
              • Instruction Fuzzy Hash: 9E11C279205632BAD7384BA6CC89FE7BEACEF527A4F40422AF14983080D7709840D6F0
              APIs
              • SendMessageW.USER32(?,?,?,?), ref: 001D4FCC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: 430f3cbeeafb181b10028b35c18aec1ad9a81d01bd4ab7e1c35767113083a247
              • Instruction ID: 63c1094153f52e9594ae5f7bef8895df5478d6ad02824d38f96da6a8a06335f0
              • Opcode Fuzzy Hash: 430f3cbeeafb181b10028b35c18aec1ad9a81d01bd4ab7e1c35767113083a247
              • Instruction Fuzzy Hash: CA21D37A60011AEFCB15CFA8C940CEA7BBAFB4D340B014555FA05A7320D731E961DB90
              APIs
              • SendMessageW.USER32(?,00000401,?,00000000), ref: 001D3147
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u$button
              • API String ID: 3850602802-1762282863
              • Opcode ID: d08d6da14e930280f65cf1103c0353019b4c91f2b942ddf8399c012027e24a3a
              • Instruction ID: c8d5fad6c19c3b64e9a27a3e68f9e0ea3ed1a9c6a194375aa7a654a58b7cc2d3
              • Opcode Fuzzy Hash: d08d6da14e930280f65cf1103c0353019b4c91f2b942ddf8399c012027e24a3a
              • Instruction Fuzzy Hash: 9A11C432250206ABDF118F64DC41FEB3B6AFF18354F104215FE64A7290CB76E8A1A750
              APIs
                • Part of subcall function 00149CB3: _wcslen.LIBCMT ref: 00149CBD
              • CharUpperBuffW.USER32(?,?,?), ref: 001A6CB6
              • _wcslen.LIBCMT ref: 001A6CC2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen$BuffCharUpper
              • String ID: STOP
              • API String ID: 1256254125-2411985666
              • Opcode ID: 7ed3e84a33a13d059d72506ed13189488a9be8b49161f0dec706e7fe43d83e2b
              • Instruction ID: ac738b012c733a1938f1894a8e184de461aeac5aa144fce53687f49515b3278e
              • Opcode Fuzzy Hash: 7ed3e84a33a13d059d72506ed13189488a9be8b49161f0dec706e7fe43d83e2b
              • Instruction Fuzzy Hash: 230126366005278BCB209FFDDC808BF33B4EF727607050524E86297199EB31D900C650
              APIs
                • Part of subcall function 001AB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001A21D0,?,?,00000034,00000800,?,00000034), ref: 001AB42D
              • SendMessageW.USER32(?,0000102B,?,00000000), ref: 001A243B
              • SendMessageW.USER32(?,0000102B,?,00000000), ref: 001A245E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$MemoryProcessWrite
              • String ID: @U=u
              • API String ID: 1195347164-2594219639
              • Opcode ID: 96bfd7ceb1250089e4b8400634318137cb768bf8fdc3f81ba26f34d2887f21c7
              • Instruction ID: b46fa0c05a92bff438b040d7701c7f25295ceaf7074f8a307fe961b9e85497e2
              • Opcode Fuzzy Hash: 96bfd7ceb1250089e4b8400634318137cb768bf8fdc3f81ba26f34d2887f21c7
              • Instruction Fuzzy Hash: 2201F936900219EBEB116F68DC86FEEBB79DF29310F104026F515A61D1DB705E84CB60
              APIs
              • SendMessageW.USER32(?,0000133E,00000000,?), ref: 001D43AF
              • InvalidateRect.USER32(?,00000000,00000001,?,?), ref: 001D4408
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: InvalidateMessageRectSend
              • String ID: @U=u
              • API String ID: 909852535-2594219639
              • Opcode ID: 2caa5230af3183eb45a023796dc032fd72e5f341e65f15ac9a4557516d4b6f2b
              • Instruction ID: 8ef6c75b1fbb1c89d7d64b354e606a4fda60e95a1f8ec6a837391e8dc0f2bc77
              • Opcode Fuzzy Hash: 2caa5230af3183eb45a023796dc032fd72e5f341e65f15ac9a4557516d4b6f2b
              • Instruction Fuzzy Hash: 0A119D30500744AFE721CF28C891BE7BBE4BF05310F10891EE8AA97381CB70A941CB90
              APIs
              • SendMessageW.USER32(?,00000406,00000000,00000000), ref: 001A2531
              • SendMessageW.USER32(?,0000040D,?,00000000), ref: 001A2564
                • Part of subcall function 001AB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001A21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 001AB3F8
                • Part of subcall function 00146B57: _wcslen.LIBCMT ref: 00146B6A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend$MemoryProcessRead_wcslen
              • String ID: @U=u
              • API String ID: 1083363909-2594219639
              • Opcode ID: 1f7ea6829cd523a917c25754841950a3803a0f86e0e1fa29d01e42b401257413
              • Instruction ID: 7974525f5f5a043bec14feaefb45cecd70d948d88348ae39eec8f766c1b3f6e1
              • Opcode Fuzzy Hash: 1f7ea6829cd523a917c25754841950a3803a0f86e0e1fa29d01e42b401257413
              • Instruction Fuzzy Hash: 19015776901128AFDB50AF94CC91EE977A8FF25344F8080A6F649A6150EF705E88CB90
              APIs
                • Part of subcall function 00159BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00159BB2
              • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,0019769C,?,?,?), ref: 001D9111
                • Part of subcall function 00159944: GetWindowLongW.USER32(?,000000EB), ref: 00159952
              • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 001D90F7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: LongWindow$MessageProcSend
              • String ID: @U=u
              • API String ID: 982171247-2594219639
              • Opcode ID: 1919b94075e21a2f58c410b3d04ad0e4fd44ea471d5a7030c780bce85f60d39f
              • Instruction ID: 87a2186da3ca63e816dd2337227ba5d029e47be1b464200a341efe9b3673e577
              • Opcode Fuzzy Hash: 1919b94075e21a2f58c410b3d04ad0e4fd44ea471d5a7030c780bce85f60d39f
              • Instruction Fuzzy Hash: 9201F130201204EBDB209F14DC49EA63BA6FB95335F00021AF9151B3E0CB726851CB50
              APIs
              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00213018,0021305C), ref: 001D81BF
              • CloseHandle.KERNEL32 ref: 001D81D1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CloseCreateHandleProcess
              • String ID: \0!
              • API String ID: 3712363035-164112491
              • Opcode ID: e74e039740a4d91f20489b1c354c304c66225294e0d22c71fb63f5188a3d9d27
              • Instruction ID: 9df83eb801d096974f8937d6466b1690e5375bb548a1a16386e61746f3f64d2b
              • Opcode Fuzzy Hash: e74e039740a4d91f20489b1c354c304c66225294e0d22c71fb63f5188a3d9d27
              • Instruction Fuzzy Hash: 1FF05EB2641300BEE620AB65AC49FF73ADDEB2C750F004421FB08D51A2DB758B5082F8
              APIs
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 001A2480
              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 001A2497
                • Part of subcall function 001A23DB: SendMessageW.USER32(?,0000102B,?,00000000), ref: 001A243B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: a7f4118e0b574baf6c531b50dea37001e7c8bc7a493e50ea6c3f56822971737a
              • Instruction ID: 06e86b53565a12f89695cfaeab6cdf5b77d8db1f6c5d6880d177618f30ba227b
              • Opcode Fuzzy Hash: a7f4118e0b574baf6c531b50dea37001e7c8bc7a493e50ea6c3f56822971737a
              • Instruction Fuzzy Hash: 6DF0E234602121BAEB211B1ACC0ACDFBF6DDF5A760B100015F405A2151CAB09D81C6E0
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: _wcslen
              • String ID: 3, 3, 16, 1
              • API String ID: 176396367-3042988571
              • Opcode ID: 9219cbad763a18f53fe582cf218f58476ee704bff2619c29a94df3e727192d1f
              • Instruction ID: 31c8778d193ad774edceb5731ac2ba9c7f57cf9144b20c706d7cbf611cdeb6df
              • Opcode Fuzzy Hash: 9219cbad763a18f53fe582cf218f58476ee704bff2619c29a94df3e727192d1f
              • Instruction Fuzzy Hash: 27E02B0265472011A33512799CC1F7F568ADFF9750710182FF981C22E6EBD4CDA193A0
              APIs
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001A2BFA
              • SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 001A2C2A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: 39438a5519f224b41b71ccc8b13f04f9b8890793d81e3aeb01f7354a56bd3062
              • Instruction ID: 60ebeb9abcfa8a3ceee401f23b440afdf81abed40e6e6799b4549317457e5a15
              • Opcode Fuzzy Hash: 39438a5519f224b41b71ccc8b13f04f9b8890793d81e3aeb01f7354a56bd3062
              • Instruction Fuzzy Hash: 47F0A079340305BFFA156B84DC46FEA7B58EB2AB65F000415F7055A1E0CAE25C4097A0
              APIs
                • Part of subcall function 001A286B: SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 001A2884
                • Part of subcall function 001A286B: SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 001A28B6
              • SendMessageW.USER32(?,0000110B,00000005,00000000), ref: 001A2D80
              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 001A2D90
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: 8bcb0a7bfdec1d0fe5b905f92a6efe9cc08c0c15e380d41fef957ef4b1520e57
              • Instruction ID: 4c84194c700a191074d63053be7b3ce538279a236e17ee8bafd4c1fd38c9eea0
              • Opcode Fuzzy Hash: 8bcb0a7bfdec1d0fe5b905f92a6efe9cc08c0c15e380d41fef957ef4b1520e57
              • Instruction Fuzzy Hash: 71E0D83D3443057FF6350A959C46EE3375DD75A751F100427F30465592DFB2CC509560
              APIs
              • SendMessageW.USER32(?,0000133D,?,?), ref: 001D5855
              • InvalidateRect.USER32(?,?,00000001), ref: 001D5877
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: InvalidateMessageRectSend
              • String ID: @U=u
              • API String ID: 909852535-2594219639
              • Opcode ID: 96f2114b2e857f6408007e35bb222ce83b5f14d9fa86ee208d783ded1d139ea6
              • Instruction ID: f849827f852c8757f81c4735ea44d5d5cefa980b4a857e89df96e3714c31d6d3
              • Opcode Fuzzy Hash: 96f2114b2e857f6408007e35bb222ce83b5f14d9fa86ee208d783ded1d139ea6
              • Instruction Fuzzy Hash: 7CF0E232604044AECB208B65CC04FEEBFF8EB81365F0445B7E51AD9251D7308A81CF60
              APIs
              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 001A0B23
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Message
              • String ID: AutoIt$Error allocating memory.
              • API String ID: 2030045667-4017498283
              • Opcode ID: d908e5516e75e966dbe722015a5fa98ce5549c78d39da0fbf17f7227035ecd80
              • Instruction ID: 195a88de5975f8624879f2c016e132932459fc7a95a19e04891a9686813ee987
              • Opcode Fuzzy Hash: d908e5516e75e966dbe722015a5fa98ce5549c78d39da0fbf17f7227035ecd80
              • Instruction Fuzzy Hash: 02E0D83124531966D2143794BC03FC97B848F16B25F10082BFB58595C38BD224A086E9
              APIs
                • Part of subcall function 0015F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00160D71,?,?,?,0014100A), ref: 0015F7CE
              • IsDebuggerPresent.KERNEL32(?,?,?,0014100A), ref: 00160D75
              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0014100A), ref: 00160D84
              Strings
              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00160D7F
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
              • API String ID: 55579361-631824599
              • Opcode ID: 78630259d3aad55394a1a5f2f66189c708c4b3af4a89876acaf4adf546276de6
              • Instruction ID: 8b0d07bfc05fd925af3341857fdefebf93bd8972346b0c49060d384bd9a36091
              • Opcode Fuzzy Hash: 78630259d3aad55394a1a5f2f66189c708c4b3af4a89876acaf4adf546276de6
              • Instruction Fuzzy Hash: DAE06D742013018BD3219FB8E908342BBE5AB18745F018A2EE496C6B55DBB0E585CB91
              APIs
              • __Init_thread_footer.LIBCMT ref: 0015E3D5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: Init_thread_footer
              • String ID: 0%!$8%!
              • API String ID: 1385522511-1065198821
              • Opcode ID: 837148ef5c32b636cf358924d3da68580e2fa536bc2938f4ddbf88812af61c96
              • Instruction ID: c3f22c9e5228aa34614b65f391388ad547562bd53b1df859a7a6ad4caa45320a
              • Opcode Fuzzy Hash: 837148ef5c32b636cf358924d3da68580e2fa536bc2938f4ddbf88812af61c96
              • Instruction Fuzzy Hash: 24E02631C10910EBCA0D971CFBE8ACA33D7BB39321B904168F8228F1D1DF7029AD8644
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: LocalTime
              • String ID: %.3d$X64
              • API String ID: 481472006-1077770165
              • Opcode ID: 60798cbe7507f406b0a734a7a3379160fa831d857a87def05267856782d29101
              • Instruction ID: 638605dd74c88080b8afcde245ab66bbefd96b768a5aed5b859270ef346d07ff
              • Opcode Fuzzy Hash: 60798cbe7507f406b0a734a7a3379160fa831d857a87def05267856782d29101
              • Instruction Fuzzy Hash: 09D01275C09109E9CF5897D0EC458BAB37CAB18341F518452FC1691080D724D548A761
              APIs
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 001D232C
              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 001D233F
                • Part of subcall function 001AE97B: Sleep.KERNEL32 ref: 001AE9F3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: FindMessagePostSleepWindow
              • String ID: Shell_TrayWnd
              • API String ID: 529655941-2988720461
              • Opcode ID: 45a3655f77d9e994e6cdcbe92510fd0d71065c1ccd3c86e273eabaf9d636ce81
              • Instruction ID: 1f5c3b3dfcdc74140179a91cb3c60adf7f460ca5ea7da740c5ba58013d3e8876
              • Opcode Fuzzy Hash: 45a3655f77d9e994e6cdcbe92510fd0d71065c1ccd3c86e273eabaf9d636ce81
              • Instruction Fuzzy Hash: 41D0C9363D6311B6EA64A770AC4FFC6BA589B11B14F004916B645AA1E1CAA0A851CA94
              APIs
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 001D236C
              • PostMessageW.USER32(00000000), ref: 001D2373
                • Part of subcall function 001AE97B: Sleep.KERNEL32 ref: 001AE9F3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: FindMessagePostSleepWindow
              • String ID: Shell_TrayWnd
              • API String ID: 529655941-2988720461
              • Opcode ID: c442392a913a66af7c6099cd8c848a9489e3a1b71e291ebcf66852794659d983
              • Instruction ID: 494339cda6569f6227e580b88a0df4951fc2fbf3fb72253d93059f796da22e0a
              • Opcode Fuzzy Hash: c442392a913a66af7c6099cd8c848a9489e3a1b71e291ebcf66852794659d983
              • Instruction Fuzzy Hash: 9FD0C9363D23117AEA64A770AC4FFC6B6589B15B14F004916B645AA1E1CAA0A851CA94
              APIs
              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 001A231F
              • SendMessageW.USER32(00000000,00001200,00000000,00000000), ref: 001A232D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1464891657.0000000000141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00140000, based on PE: true
              • Associated: 00000000.00000002.1464843218.0000000000140000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.00000000001DC000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1464980162.0000000000202000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465040154.000000000020C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1465061757.0000000000214000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000_VsTfsPVrfA.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: @U=u
              • API String ID: 3850602802-2594219639
              • Opcode ID: 155c7a952e922df419cc249ec9df0394e859e1c9a4e2aa6449544fa383673afc
              • Instruction ID: d3b6b5ed2a3a0c5a9d44ea20fdabb436b8045c7352d4afc45a21b052153e4920
              • Opcode Fuzzy Hash: 155c7a952e922df419cc249ec9df0394e859e1c9a4e2aa6449544fa383673afc
              • Instruction Fuzzy Hash: 6EC08C311021C1BAF7300B23BC0CCC73F3DE7CBF01300040DB204844A58A604080C630