Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Uqt8tDIQYk.exe

Overview

General Information

Sample name:Uqt8tDIQYk.exe
renamed because original name is a hash value
Original sample name:26422abceca3d5ce14d064e290678221.exe
Analysis ID:1430596
MD5:26422abceca3d5ce14d064e290678221
SHA1:9bde1cf1e554872705cc38c9591b77b59c3aa597
SHA256:495a744f783348c8a6ef1c048ea3e62d3903b00c66e9be21bb374d59d18b682e
Tags:exeLummaStealer
Infos:

Detection

LummaC Stealer
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Found API chain indicative of sandbox detection
Machine Learning detection for sample
PE file contains section with special chars
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query network adapater information
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
Program does not show much activity (idle)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Uqt8tDIQYk.exe (PID: 6628 cmdline: "C:\Users\user\Desktop\Uqt8tDIQYk.exe" MD5: 26422ABCECA3D5CE14D064E290678221)
  • cleanup
{"C2 url": ["blockbeerman.fun"], "Build Id": "GRAKRA--SHELL"}
SourceRuleDescriptionAuthorStrings
Uqt8tDIQYk.exeJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2877797183.00000000007FE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.Uqt8tDIQYk.exe.400000.0.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
        0.0.Uqt8tDIQYk.exe.400000.0.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Uqt8tDIQYk.exeAvira: detected
          Source: blockbeerman.funAvira URL Cloud: Label: malware
          Source: Uqt8tDIQYk.exeMalware Configuration Extractor: LummaC {"C2 url": ["blockbeerman.fun"], "Build Id": "GRAKRA--SHELL"}
          Source: Uqt8tDIQYk.exeReversingLabs: Detection: 84%
          Source: Uqt8tDIQYk.exeJoe Sandbox ML: detected
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00439948 _strlen,CryptStringToBinaryA,CryptStringToBinaryA,0_2_00439948
          Source: Uqt8tDIQYk.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: Binary string: storagewmi_passthru.pdbGCTL source: Uqt8tDIQYk.exe
          Source: Binary string: storagewmi_passthru.pdb source: Uqt8tDIQYk.exe
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00457BCC FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00457BCC

          Networking

          barindex
          Source: Malware configuration extractorURLs: blockbeerman.fun
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0043A3A3 GetProcAddress,InternetQueryDataAvailable,GetProcAddress,GetProcAddress,InternetReadFile,GetModuleHandleW,GetProcAddress,GetProcAddress,_strlen,InternetQueryDataAvailable,GetProcAddress,GetProcAddress,0_2_0043A3A3

          System Summary

          barindex
          Source: Uqt8tDIQYk.exeStatic PE information: section name: .'w(
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0040B3D2 LoadLibraryA,GetProcAddress,NtRaiseHardError,ExitProcess,0_2_0040B3D2
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004258A10_2_004258A1
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0040AAA80_2_0040AAA8
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0040B3D20_2_0040B3D2
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004170590_2_00417059
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0045E0000_2_0045E000
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0041980D0_2_0041980D
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004118280_2_00411828
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0041B0E30_2_0041B0E3
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0041494F0_2_0041494F
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0044E9600_2_0044E960
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004149180_2_00414918
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0042313B0_2_0042313B
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004351E00_2_004351E0
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004309FA0_2_004309FA
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0043D1950_2_0043D195
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00440A500_2_00440A50
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00431A180_2_00431A18
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004242CB0_2_004242CB
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00421AEE0_2_00421AEE
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004632E80_2_004632E8
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00403AEF0_2_00403AEF
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004472930_2_00447293
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0044F2BB0_2_0044F2BB
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0043EB690_2_0043EB69
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0040C3320_2_0040C332
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004063F80_2_004063F8
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004253830_2_00425383
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0043A3A30_2_0043A3A3
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0040E3BC0_2_0040E3BC
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00420C540_2_00420C54
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00444C740_2_00444C74
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00426C700_2_00426C70
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004284D00_2_004284D0
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00439CD60_2_00439CD6
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004044DC0_2_004044DC
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00433C900_2_00433C90
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00418D430_2_00418D43
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0040EDD30_2_0040EDD3
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004165A50_2_004165A5
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00454E540_2_00454E54
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0043DE6F0_2_0043DE6F
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004466CF0_2_004466CF
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004186EB0_2_004186EB
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_004226F80_2_004226F8
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00411E8E0_2_00411E8E
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0045BF5E0_2_0045BF5E
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00413F740_2_00413F74
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00415F390_2_00415F39
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00419FE10_2_00419FE1
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0040D78C0_2_0040D78C
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00443FB40_2_00443FB4
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: String function: 00440310 appears 50 times
          Source: Uqt8tDIQYk.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: classification engineClassification label: mal96.troj.evad.winEXE@1/0@0/0
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCommand line argument: ~&E0_2_004525D0
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Uqt8tDIQYk.exeReversingLabs: Detection: 84%
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeFile read: C:\Users\user\Desktop\Uqt8tDIQYk.exeJump to behavior
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeSection loaded: wininet.dllJump to behavior
          Source: Binary string: storagewmi_passthru.pdbGCTL source: Uqt8tDIQYk.exe
          Source: Binary string: storagewmi_passthru.pdb source: Uqt8tDIQYk.exe
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0040B3D2 LoadLibraryA,GetProcAddress,NtRaiseHardError,ExitProcess,0_2_0040B3D2
          Source: Uqt8tDIQYk.exeStatic PE information: section name: .'w(
          Source: Uqt8tDIQYk.exeStatic PE information: section name: ucnttp
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0040192C push eax; mov dword ptr [esp], 00000000h0_2_00401931
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00458378 push ecx; ret 0_2_0045838B
          Source: Uqt8tDIQYk.exeStatic PE information: section name: .text entropy: 6.8318134628828755
          Source: Uqt8tDIQYk.exeStatic PE information: section name: .'w( entropy: 7.197097448912549

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeSandbox detection routine: GetCursorPos, DecisionNode, Sleepgraph_0-36389
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: Sleep,Sleep,GetCursorPos,Sleep,GetCursorPos,GetCursorPos,GetCursorPos,0_2_004258A1
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: GetAdaptersInfo,GetAdaptersInfo,0_2_004226F8
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeAPI coverage: 2.7 %
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00457BCC FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00457BCC
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeAPI call chain: ExitProcess graph end nodegraph_0-36405
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeAPI call chain: ExitProcess graph end nodegraph_0-36394
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00440135 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00440135
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0040B3D2 LoadLibraryA,GetProcAddress,NtRaiseHardError,ExitProcess,0_2_0040B3D2
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0043EB69 mov eax, dword ptr fs:[00000030h]0_2_0043EB69
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00449B9A mov ecx, dword ptr fs:[00000030h]0_2_00449B9A
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00455725 mov eax, dword ptr fs:[00000030h]0_2_00455725
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00431A18 GetProcessHeap,GetDIBits,ReleaseDC,GetProcessHeap,GetObjectW,GetProcessHeap,HeapAlloc,GetDC,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,HeapFree,HeapFree,GetProcessHeap,HeapFree,0_2_00431A18
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00440129 SetUnhandledExceptionFilter,0_2_00440129
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00440135 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00440135
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00440640 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00440640
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00453F4B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00453F4B
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00440358 cpuid 0_2_00440358
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_0044C351 GetSystemTimeAsFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_0044C351
          Source: C:\Users\user\Desktop\Uqt8tDIQYk.exeCode function: 0_2_00459824 GetTimeZoneInformation,0_2_00459824

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Uqt8tDIQYk.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.Uqt8tDIQYk.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.Uqt8tDIQYk.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.2877797183.00000000007FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Uqt8tDIQYk.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.Uqt8tDIQYk.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.Uqt8tDIQYk.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.2877797183.00000000007FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Command and Scripting Interpreter
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Virtualization/Sandbox Evasion
          OS Credential Dumping2
          System Time Discovery
          Remote Services1
          Archive Collected Data
          2
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Native API
          Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Deobfuscate/Decode Files or Information
          LSASS Memory13
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
          Obfuscated Files or Information
          Security Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Software Packing
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          DLL Side-Loading
          LSA Secrets1
          System Network Configuration Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
          File and Directory Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync13
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Uqt8tDIQYk.exe84%ReversingLabsWin32.Trojan.Lumma
          Uqt8tDIQYk.exe100%AviraTR/Spy.Agent.npisw
          Uqt8tDIQYk.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          blockbeerman.fun100%Avira URL Cloudmalware
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          blockbeerman.funtrue
          • Avira URL Cloud: malware
          unknown
          No contacted IP infos
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1430596
          Start date and time:2024-04-23 23:16:05 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 11s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:6
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:Uqt8tDIQYk.exe
          renamed because original name is a hash value
          Original Sample Name:26422abceca3d5ce14d064e290678221.exe
          Detection:MAL
          Classification:mal96.troj.evad.winEXE@1/0@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 4
          • Number of non-executed functions: 90
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • VT rate limit hit for: Uqt8tDIQYk.exe
          No simulations
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):6.755955465919674
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:Uqt8tDIQYk.exe
          File size:468'992 bytes
          MD5:26422abceca3d5ce14d064e290678221
          SHA1:9bde1cf1e554872705cc38c9591b77b59c3aa597
          SHA256:495a744f783348c8a6ef1c048ea3e62d3903b00c66e9be21bb374d59d18b682e
          SHA512:c42c47ee1a54d684e179aa03a07c8912900c2e8c7fa85d4591f1e3616099bbc36c4517c5ca0f959ac4e153ced6a011cb8d54b146af24f5ab50e87308d701fdf6
          SSDEEP:6144:PVrxFkLFRewJDAA9gJX4Lbsi0tgSh7Z2cEnMBmXgmmA5ab1v5tUmfqlJFKe7RiXI:PORRjW7dVBcTn5ab1htUKqlJFMDEt
          TLSH:62A4AE11B9D2C0F1D823153101A9EB779A79B931CD719CCBFBD41D7CAA3A2C0972A61E
          File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......N.................,..........,.............@..........................P..............................................p......
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x43fd2c
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:TERMINAL_SERVER_AWARE
          Time Stamp:0x4ED8D106 [Fri Dec 2 13:22:14 2011 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:f4a5c656336c7917052b7f56b0f839f4
          Instruction
          call 00007F42E0C9165Bh
          jmp 00007F42E0C9127Fh
          push ebp
          mov ebp, esp
          push dword ptr [ebp+08h]
          call 00007F42E0C9140Fh
          neg eax
          pop ecx
          sbb eax, eax
          neg eax
          dec eax
          pop ebp
          ret
          push ebp
          mov ebp, esp
          cmp dword ptr [00471304h], FFFFFFFFh
          push dword ptr [ebp+08h]
          jne 00007F42E0C91409h
          call 00007F42E0C9BD55h
          jmp 00007F42E0C9140Dh
          push 00471304h
          call 00007F42E0C9BCD8h
          pop ecx
          neg eax
          pop ecx
          sbb eax, eax
          not eax
          and eax, dword ptr [ebp+08h]
          pop ebp
          ret
          push 00000008h
          push 0046F408h
          call 00007F42E0C91991h
          and dword ptr [ebp-04h], 00000000h
          mov eax, 00005A4Dh
          cmp word ptr [00400000h], ax
          jne 00007F42E0C9145Fh
          mov eax, dword ptr [0040003Ch]
          cmp dword ptr [eax+00400000h], 00004550h
          jne 00007F42E0C9144Eh
          mov ecx, 0000010Bh
          cmp word ptr [eax+00400018h], cx
          jne 00007F42E0C91440h
          mov eax, dword ptr [ebp+08h]
          mov ecx, 00400000h
          sub eax, ecx
          push eax
          push ecx
          call 00007F42E0C91582h
          pop ecx
          pop ecx
          test eax, eax
          je 00007F42E0C91429h
          cmp dword ptr [eax+24h], 00000000h
          jl 00007F42E0C91423h
          mov dword ptr [ebp-04h], FFFFFFFEh
          mov al, 01h
          jmp 00007F42E0C91421h
          mov eax, dword ptr [ebp-14h]
          mov eax, dword ptr [eax]
          xor ecx, ecx
          cmp dword ptr [eax], C0000005h
          sete cl
          mov eax, ecx
          ret
          mov esp, dword ptr [ebp-18h]
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x6e4700xc8.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x66db80xc0.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x6e7740x23c.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x62adc0x62c00491034f9253c14f48853797a3e39002eFalse0.5850178006329114data6.8318134628828755IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x640000xbc840xbe0008a3cbdd913d9f5270e8667cc5da496dFalse0.5384046052631579data5.803243867262695IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x700000x20460x220015b62468664188a856243dd886546d96False0.28239889705882354data3.061137691854057IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .'w(0x730000x7000x800f4ab99cd6abd7835a7a147673f8d60ebFalse0.8525390625data7.197097448912549IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          ucnttp0x740000x10000x1000e566b9122d5d315a56e4910dcab70db3False0.532470703125data5.315801635866745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          DLLImport
          KERNEL32.dllCloseHandle, CompareStringW, CreateFileA, CreateFileW, CreateProcessW, DecodePointer, DeleteCriticalSection, DeleteFileW, EncodePointer, EnterCriticalSection, ExitProcess, ExpandEnvironmentStringsW, FileTimeToSystemTime, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetComputerNameExA, GetComputerNameW, GetConsoleMode, GetConsoleOutputCP, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetDriveTypeW, GetEnvironmentStringsW, GetFileInformationByHandle, GetFileSizeEx, GetFileType, GetFullPathNameW, GetLastError, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetTimeZoneInformation, GetVolumeInformationW, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, K32EnumProcesses, LCMapStringW, LeaveCriticalSection, LoadLibraryA, LoadLibraryExW, LoadLibraryW, MultiByteToWideChar, PeekNamedPipe, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, RtlUnwind, SetEndOfFile, SetEnvironmentVariableW, SetFilePointerEx, SetFileTime, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, Sleep, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TzSpecificLocalTimeToSystemTime, UnhandledExceptionFilter, WideCharToMultiByte, WinExec, WriteConsoleW, WriteFile, lstrcatW, lstrcmpW, lstrcmpiW, lstrlenW
          USER32.dllEnumDisplayDevicesA, GetCursorPos, GetDC, GetDesktopWindow, GetSystemMetrics, ReleaseDC, SystemParametersInfoW, wsprintfW
          ADVAPI32.dllGetCurrentHwProfileW, RegCloseKey, RegEnumKeyExW, RegOpenKeyExW, RegQueryValueExW
          GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, CreateDCW, DeleteDC, DeleteObject, GetDIBits, GetObjectW, SelectObject
          SHLWAPI.dllPathFileExistsW
          WINHTTP.dllWinHttpCloseHandle, WinHttpConnect, WinHttpCrackUrl, WinHttpOpen, WinHttpOpenRequest, WinHttpQueryDataAvailable, WinHttpReadData, WinHttpReceiveResponse, WinHttpSendRequest
          IPHLPAPI.DLLGetAdaptersInfo
          WININET.dllInternetQueryDataAvailable, InternetReadFile
          CRYPT32.dllCryptStringToBinaryA
          No network behavior found

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:23:16:52
          Start date:23/04/2024
          Path:C:\Users\user\Desktop\Uqt8tDIQYk.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\Uqt8tDIQYk.exe"
          Imagebase:0x400000
          File size:468'992 bytes
          MD5 hash:26422ABCECA3D5CE14D064E290678221
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.2877797183.00000000007FE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          Reputation:low
          Has exited:false

          Reset < >

            Execution Graph

            Execution Coverage:0.4%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:29.9%
            Total number of Nodes:87
            Total number of Limit Nodes:2
            execution_graph 36475 454546 15 API calls 3 library calls 36476 45bf40 15 API calls 36477 459740 43 API calls 2 library calls 36479 459949 42 API calls 2 library calls 36427 440253 51 API calls _unexpected 36428 45285b FreeLibrary 36429 457a5b 11 API calls __wfreopen_s 36459 452cdb 7 API calls __wsopen_s 36379 42fbe4 36384 4258a1 36379->36384 36383 42fbee 36388 4258c4 36384->36388 36385 425a74 36385->36388 36394 424da0 K32EnumProcesses ExitProcess 36385->36394 36396 4258a1 22 API calls 36385->36396 36412 424dd8 28 API calls 36385->36412 36413 425383 28 API calls 36385->36413 36386 426634 GetCursorPos 36386->36388 36387 4267ce GetCursorPos 36387->36388 36388->36385 36388->36386 36388->36387 36389 426545 Sleep GetCursorPos 36388->36389 36391 425fe5 GetCursorPos 36388->36391 36392 425ad2 Sleep 36388->36392 36393 426c67 36388->36393 36395 424dd8 22 API calls 36388->36395 36397 4258a1 22 API calls 36388->36397 36398 425383 22 API calls 36388->36398 36389->36388 36391->36388 36392->36388 36400 40aaa8 36393->36400 36394->36385 36395->36388 36396->36385 36397->36388 36398->36388 36410 40aabb _wctomb_s 36400->36410 36401 40b156 CloseHandle 36401->36410 36402 40afc6 ReadFile FindCloseChangeNotification 36402->36410 36403 40b22e GetFileSizeEx 36403->36410 36404 40b3d2 19 API calls 36404->36410 36405 40b388 ExitProcess 36406 40ace4 GetModuleFileNameW CreateFileW 36406->36410 36408 40b37b 36408->36383 36410->36401 36410->36402 36410->36403 36410->36404 36410->36405 36410->36406 36410->36408 36411 40aaa8 19 API calls 36410->36411 36414 44e074 36410->36414 36421 44dccc 14 API calls ___free_lconv_mon 36410->36421 36411->36410 36412->36385 36413->36385 36420 45477f _unexpected 36414->36420 36415 4547bd 36423 44a9a6 14 API calls __dosmaperr 36415->36423 36417 4547a8 RtlAllocateHeap 36418 4547bb 36417->36418 36417->36420 36418->36410 36420->36415 36420->36417 36422 454170 EnterCriticalSection LeaveCriticalSection _unexpected 36420->36422 36421->36410 36422->36420 36423->36418 36460 43fce5 24 API calls CallUnexpected 36431 453662 51 API calls 36461 43faeb 50 API calls __RTC_Initialize 36432 44306d 7 API calls ___scrt_uninitialize_crt 36434 44b668 49 API calls 36484 41cd6c 104 API calls 36462 4408f0 6 API calls 3 library calls 36495 41c1fd 70 API calls 36485 452d7b GetProcessHeap 36441 453a04 LeaveCriticalSection CallUnexpected 36496 449d85 41 API calls _unexpected 36497 44b580 32 API calls ___free_lconv_mon 36499 452d8d 16 API calls __dosmaperr 36443 45460e 75 API calls 3 library calls 36500 457b49 32 API calls ___free_lconv_mon 36444 41780f 72 API calls 36486 41c512 98 API calls 36445 414015 15 API calls ___std_exception_copy 36465 419494 71 API calls 36503 419f94 96 API calls 36504 455f9d 66 API calls __wfreopen_s 36446 45341f 15 API calls 36447 44c21f 29 API calls 2 library calls 36505 43fb9e 30 API calls 36449 459824 42 API calls 2 library calls 36487 418120 78 API calls __fread_nolock 36506 45f7a6 30 API calls std::exception::exception 36468 4408a0 5 API calls TranslatorGuardHandler 36450 418c24 43 API calls 36469 45f8a3 57 API calls 3 library calls 36470 41cca6 117 API calls 2 library calls 36451 414028 14 API calls ___std_exception_destroy 36507 4597ac WideCharToMultiByte __wfreopen_s 36508 419dac 36 API calls _wctomb_s 36488 43fd2c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 36510 43fbb0 108 API calls 4 library calls 36452 414035 16 API calls 36453 45be31 20 API calls 36511 4535b1 GetCommandLineA GetCommandLineW 36489 419d36 72 API calls 36513 4533bf 34 API calls 2 library calls 36514 457bbf 33 API calls 2 library calls 36455 455a3e 56 API calls TranslatorGuardHandler
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: Cursor$Sleep
            • String ID: "*2y$"*2y$D@D$D@D
            • API String ID: 1847515627-1961528830
            • Opcode ID: 7d208546aa7372ec9cda2454a3750df24d0b09df75eabd327da6626289fa60cf
            • Instruction ID: 36a8b34e5a8a4bf1e9d918135b26f6c6ed7c0c893caca49331eddd75843c55c4
            • Opcode Fuzzy Hash: 7d208546aa7372ec9cda2454a3750df24d0b09df75eabd327da6626289fa60cf
            • Instruction Fuzzy Hash: D0A2FB70700B218BC7389F29E59552A77E1EF44300BA58D1FD4DBCBBA0D67CE8959B0A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: ExitLibraryLoadProcess
            • String ID: (y$)y$=9$=9$=9
            • API String ID: 2206315515-2863778377
            • Opcode ID: 59fd08bb195867e467f9ab2f55d3156aed2ae4208ecfac142941998f14155073
            • Instruction ID: d9d9974ce218a68a4ec360943db58de04a453fd01b206e408f3160920bf8324f
            • Opcode Fuzzy Hash: 59fd08bb195867e467f9ab2f55d3156aed2ae4208ecfac142941998f14155073
            • Instruction Fuzzy Hash: C1529E71E05209CBDF24DB98C9C55AEBAB0EB14304F24452BE915FB3D1E3799A418BCE
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 0040ACF5
            • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0040AD0F
            • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0040AFDE
            • FindCloseChangeNotification.KERNELBASE(?), ref: 0040AFE8
            • ExitProcess.KERNEL32 ref: 0040B3A6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: File$ChangeCloseCreateExitFindModuleNameNotificationProcessRead
            • String ID: f)=$f)=
            • API String ID: 334541424-683314369
            • Opcode ID: 7412decdecfea77165534239207f6d139f09c8bf7037708802802b27c4e0a769
            • Instruction ID: 36b19d474cf83a8e84833a5a4cd8e8b4b818bbaf8670955f1133408452245f2f
            • Opcode Fuzzy Hash: 7412decdecfea77165534239207f6d139f09c8bf7037708802802b27c4e0a769
            • Instruction Fuzzy Hash: 4012D3716493058BD7249F18C98552EB6D1EB94310F25493FE48AEB3E0E778C891EB4F
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 750 45477f-45478b 751 4547bd-4547c8 call 44a9a6 750->751 752 45478d-45478f 750->752 760 4547ca-4547cc 751->760 754 454791-454792 752->754 755 4547a8-4547b9 RtlAllocateHeap 752->755 754->755 756 454794-45479b call 44c31b 755->756 757 4547bb 755->757 756->751 762 45479d-4547a6 call 454170 756->762 757->760 762->751 762->755
            APIs
            • RtlAllocateHeap.NTDLL(00000000,0040E684,?,?,0040E684,00000018,?,?,?,?,?,?,?,?,?,00000000), ref: 004547B1
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: AllocateHeap
            • String ID:
            • API String ID: 1279760036-0
            • Opcode ID: 2051ef454142b9c719e65dbadabdd5f24a6bb581d06d07ab3bc9835502e74267
            • Instruction ID: 6fac073c6cfc7c0a25c64c14d3e37d538a53716d2e1191aa653a6e1be1f2e80b
            • Opcode Fuzzy Hash: 2051ef454142b9c719e65dbadabdd5f24a6bb581d06d07ab3bc9835502e74267
            • Instruction Fuzzy Hash: C4E0653514561057E72136669C04B5B36C89BCB7AFF164123EC059F2D2EB5CCCC581AE
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ExpandEnvironmentStringsW.KERNEL32(?,?,00000200), ref: 00429DC1
            • LoadLibraryW.KERNEL32(?), ref: 0042A2EE
            • _strlen.LIBCMT ref: 0042ADE5
            • _strlen.LIBCMT ref: 0042B2B7
            • _strlen.LIBCMT ref: 0042E10B
            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0042E2E7
            • CloseHandle.KERNEL32(?), ref: 0042E2F2
            • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0042EFB1
            • CloseHandle.KERNEL32(?), ref: 0042EFBC
            • _strlen.LIBCMT ref: 0042F11C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: _strlen$CloseCreateHandleProcess$EnvironmentExpandLibraryLoadStrings
            • String ID: Z`Y$!*2y$!Z`Y$!Z`Y$"*2y$"*2y$"*2y$"*2y$"*2y$"*2y$#<4S$$<gg$$<gg$-p(R$>h.x$?h.x$?h.x$C@D$D;0$D@D$E;0$Pc>2$Pc>2$Sw;$Tw;$U%3j$Zc$Zc$gfff$vTT$vTT$}C?g$Yu<
            • API String ID: 4049275943-957601847
            • Opcode ID: 2683371ac047e3aaa10475918fabcbdffd6a8598984ad170ebe2df58e43a3be3
            • Instruction ID: 60bdfde20bb21090f5db709c388c41fb5c0c33a226f09a740ac59f9d55d07230
            • Opcode Fuzzy Hash: 2683371ac047e3aaa10475918fabcbdffd6a8598984ad170ebe2df58e43a3be3
            • Instruction Fuzzy Hash: 14C31871701B118BD7349F29E98562B77E0AB54304FA4C82FE45BDB7A0E638E845CB4B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: lstrcat$lstrlen
            • String ID: ,Q=$,Q=$,Q=$,Q=$,Q=$5}L$5}L$D#b$D#b$D#b$K\eW$L\eW$g/2Xs$k>`5$k>`5$p9lY$p9lY$p9lY$p9lY$p9lY$p9lY$p9lY$y+B*$z+B*$z+B*$z+B*$8U[$8U[$]z6$]z6$]z6
            • API String ID: 751011610-3334075263
            • Opcode ID: 2053d8b5c02679e3cce0c9dc2c7c81f7a196dc212a1eaa284665b7a7adfc8312
            • Instruction ID: 29d8e477c7ee15bb013927451de4879324014eba4a79fc1a37501d3d49276190
            • Opcode Fuzzy Hash: 2053d8b5c02679e3cce0c9dc2c7c81f7a196dc212a1eaa284665b7a7adfc8312
            • Instruction Fuzzy Hash: E4130971E002069BDF289F59C8456FE76B5EF55304F24092BE606FB3E0D37889919B8B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetProcAddress.KERNEL32(?,?), ref: 0043B97D
              • Part of subcall function 00439948: _strlen.LIBCMT ref: 00439A8B
            • GetProcAddress.KERNEL32(?,?), ref: 0043BDC6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: AddressProc$_strlen
            • String ID: )$*$*$*$*$3e77fd4ee81c8ba7166e0052a4ba579d$GRAKRA--SHELL$K]T$K]T$Pcz$Qcz$Qcz$Qcz$Qcz$S_(v$S_(v$[X$[Q$[Q$\X$\X$`z5T$az5T$eA/,$eA/,$xG%$xk]S$e_$e_
            • API String ID: 3492427664-118966181
            • Opcode ID: 57f0007741709a615ce01329de2a0422a5e3eb82ceab0e13ce6937a72f4af21c
            • Instruction ID: 55d063d2b1dacadc73ba57abae9bb67512cd7f599c2c52ded2cd1a32f2e06443
            • Opcode Fuzzy Hash: 57f0007741709a615ce01329de2a0422a5e3eb82ceab0e13ce6937a72f4af21c
            • Instruction Fuzzy Hash: 69230871D402198BDF24DF58C8866BEBAB1EB0C300F24552BE915FB391D7789E518B8B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: _strlen$ComputerName$DevicesDisplayEnum
            • String ID: "*2y$"*2y$D@D$GRAKRA--SHELL$Oc>2$Pc>2$Sw;$Tw;$Tw;$Tw;$Yc$Zc$uTT$vTT$}C?g
            • API String ID: 2597915589-668131169
            • Opcode ID: 33c386fb304f063266a47a4185e7d533cb780e0acaeed3c2cfaf005a9c993a58
            • Instruction ID: 1248470f6c2aae9b7cd794e544a5f23d6b51165a0772df6271fe26959d49b261
            • Opcode Fuzzy Hash: 33c386fb304f063266a47a4185e7d533cb780e0acaeed3c2cfaf005a9c993a58
            • Instruction Fuzzy Hash: 8973C7B0900B019FDB349F28C945B26B7E0FB59704F14DA1FE4ABDB791D678E8518B0A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: lstrcat
            • String ID: RDw$!RDw$!RDw$(ZSw$(ZSw$9qz$:qz$:qz$:qz$e2V^$e2V^$}u?2$~u?2$~u?2$ O$ O
            • API String ID: 4038537762-2776103441
            • Opcode ID: 6f0e3ff25f142b09a3a3306728feb65ecc1deff1eea04d338aceb14482fedf5e
            • Instruction ID: a8e017b14754d303074a60105710d0e8968a39c238a4d6c0da5f626c05c84e4f
            • Opcode Fuzzy Hash: 6f0e3ff25f142b09a3a3306728feb65ecc1deff1eea04d338aceb14482fedf5e
            • Instruction Fuzzy Hash: AEC2C5B0D042198BDF28CF58C8916BEBAB1BB44304F24453BE516FB3D1D279A9518F6B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: _strlen
            • String ID: oXs$oXs$ s-$!s-$!s-$DSg$ESg$ESg$i1Z$i1Z$i4[W$(sI$(sI$(sI
            • API String ID: 4218353326-2604516359
            • Opcode ID: 34008b0209e9c006d396b0c867ac8cf6d3fae772eb93ad17c84e6b724806ed61
            • Instruction ID: f571fa6c2a945a9a65a7a94172c501959071e976b5a509e38c11bb4b6beb5d7d
            • Opcode Fuzzy Hash: 34008b0209e9c006d396b0c867ac8cf6d3fae772eb93ad17c84e6b724806ed61
            • Instruction Fuzzy Hash: E2E2E7B0D002099BDF249F98DD8567E7AB0EB95304F24453BE606FB3E1D3788A518B5B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RegEnumKeyExW.ADVAPI32(?,?,?,?,00000000,00000000,00000000,00000000), ref: 00434128
            • RegCloseKey.ADVAPI32(?), ref: 004341B0
            • RegCloseKey.ADVAPI32(?), ref: 0043467B
            • RegCloseKey.ADVAPI32(?), ref: 00434903
            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?), ref: 00434922
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: Close$EnumQueryValue
            • String ID: BbA$1&&i$D$[-/M$`wJl$`wJl$qBhf$qBhf$t^Xr$t^Xr$t^Xr
            • API String ID: 1459336213-482656368
            • Opcode ID: b389801f49643c911d36b15eab864b021b5c3d4c71edb2e54e637dc7f68c43ab
            • Instruction ID: 6c810bf793e794518a605d234d7c09e08cac0d3976cf57b002ee6a7c4435d3e9
            • Opcode Fuzzy Hash: b389801f49643c911d36b15eab864b021b5c3d4c71edb2e54e637dc7f68c43ab
            • Instruction Fuzzy Hash: 22A2E8B1D003099BDF28CF98C9856BE7AB0BB59316F24251BE111FB351D37D9A418B8B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: lstrcat
            • String ID: !*2y$"*2y$"*2y$D@D$D@D$Pc>2$Pc>2$vTT$vTT$}C?g$}C?g$Q{Bm$:@$:@
            • API String ID: 4038537762-1767481706
            • Opcode ID: 3d8baf7dbb8f7a8e259c237f4362e8aba7691beb1c2aba0df190b62fe7bb0d03
            • Instruction ID: 0532541ee652278b232bc72844c04ff6687263447cc8b982d4e38a174d60b19c
            • Opcode Fuzzy Hash: 3d8baf7dbb8f7a8e259c237f4362e8aba7691beb1c2aba0df190b62fe7bb0d03
            • Instruction Fuzzy Hash: C7E2E870D003199BDF249F98C945AFE7AB1AB14305F24451BEA05FB3A0D7798AC18B9F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • HeapFree.KERNEL32(?,00000000,?), ref: 00432C1B
            • GetProcessHeap.KERNEL32 ref: 00432C1D
            • HeapFree.KERNEL32(00000000,00000000,?), ref: 00432C29
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: Heap$Free$Process
            • String ID: :1x$BM$e)=$f)=$!F$
            • API String ID: 2719409998-4091005946
            • Opcode ID: 7c029beb92f0600d4e0218531521e4cd23396c6170769776977fa899a129e730
            • Instruction ID: 7c41d46b581d714237d39b704605010d922f2773ba39c601ee96b04954dfa5e4
            • Opcode Fuzzy Hash: 7c029beb92f0600d4e0218531521e4cd23396c6170769776977fa899a129e730
            • Instruction Fuzzy Hash: B482C3715093019FDB289F18C68562EB7E4FB98311F24AD1FE599CB3A0D778D8819B0B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: lstrcat$ExistsFilePath
            • String ID:
            • API String ID: 3040671737-0
            • Opcode ID: 9c649788c3d97c2546c7783bd5e216b89aa002e64b3d0159fc023ffb5e73bbef
            • Instruction ID: d0f24afad8fb4e365ddcf88971e7c02e60b68fa5009ffcf7e5143fea73b999b3
            • Opcode Fuzzy Hash: 9c649788c3d97c2546c7783bd5e216b89aa002e64b3d0159fc023ffb5e73bbef
            • Instruction Fuzzy Hash: D322C4B1E001069BDF248F98CD465BEBA74AB84304F24053BE615FB3E1D3799E508B9B
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: lstrlen$lstrcat
            • String ID: [-/M$[-/M$`wJl
            • API String ID: 493641738-1947821042
            • Opcode ID: 411f9331f7c6efd178ae3138c61ee418095919c8e561b33e63b0c6da938fb2e9
            • Instruction ID: d4ecf0d71f9aba687a304c16a1e9de49591f69cbab48592e746a56285f5178e4
            • Opcode Fuzzy Hash: 411f9331f7c6efd178ae3138c61ee418095919c8e561b33e63b0c6da938fb2e9
            • Instruction Fuzzy Hash: 8742B571D002099BDF24DB98CC866BEBAB0AB14314F24093BF511FB3D5D3798A558B9B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetAdaptersInfo.IPHLPAPI(00000000,?), ref: 00422CED
            • GetAdaptersInfo.IPHLPAPI(?,?), ref: 00422FAE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: AdaptersInfo
            • String ID: Z-/M$[-/M$[-/M$`wJl$`wJl
            • API String ID: 3177971545-2075493074
            • Opcode ID: df7775b90730e759941d23139ef8820586af53b6d198f2803dbffbed1740324d
            • Instruction ID: 23482db236c4debe6eb8582dd537a53b386d7e8a87b8b547ab47c0d402afe64e
            • Opcode Fuzzy Hash: df7775b90730e759941d23139ef8820586af53b6d198f2803dbffbed1740324d
            • Instruction Fuzzy Hash: 4232BA70E04229ABCF14CF98EA816BE77B0FB54304FA4051BE411FB354D7B99A41DB9A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: __floor_pentium4
            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
            • API String ID: 4168288129-2761157908
            • Opcode ID: f34341b29f5aea4557c68842a3917208cacaa027d08b2b5ebc253b6443867a85
            • Instruction ID: 3da354e7a80a5fd463913490483f168a8ba6a02c966666d547a6c1a3a8eeac63
            • Opcode Fuzzy Hash: f34341b29f5aea4557c68842a3917208cacaa027d08b2b5ebc253b6443867a85
            • Instruction Fuzzy Hash: 75D23E71E082289FDB29CE25CD407EAB7B5EB45306F1441EBD80DE7241E778AE898F45
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID: 0&&i$1&&i$[-/M$[-/M$`wJl$`wJl$t^Xr
            • API String ID: 0-1109958471
            • Opcode ID: d6bc17d7a9ad85df3183d0af2af6ac371b3073f612e3bb4de41f1461e085b69d
            • Instruction ID: f19ea2322cb8ccb8bd619b0daf081565c39049b94ce9c9998a1c7c463fcfeab6
            • Opcode Fuzzy Hash: d6bc17d7a9ad85df3183d0af2af6ac371b3073f612e3bb4de41f1461e085b69d
            • Instruction Fuzzy Hash: 36A24CB1F002258BEF24AB59ED4267E76B0EB14304FA5051BE505FB3E1E77C89518B8B
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID: vmz$vmz$vmz$vmz$vmz$vmz
            • API String ID: 0-2631656845
            • Opcode ID: 1afdaaae3841cfea759a3e029d5645fa2e01477f47c6c5e14a5a5b40943efff7
            • Instruction ID: 814cfd6e617f88223a1c428d37f449d9079544bee563000e8d4b46818cfec7de
            • Opcode Fuzzy Hash: 1afdaaae3841cfea759a3e029d5645fa2e01477f47c6c5e14a5a5b40943efff7
            • Instruction Fuzzy Hash: 43D27FB7B893144BD308CE59EC9129AF2D3ABD4624F1F943DE889D3301EE79D9074689
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: _strlen
            • String ID: !*2y$"*2y$C@D$D@D
            • API String ID: 4218353326-2138878619
            • Opcode ID: bf611bf3e1a8b1a20b8e4750e23f806396848a45077fdaaba05bba7a59412e8d
            • Instruction ID: f59546a1d3121b11ea93e2b7864f0d4a744313ab2bfa1412557ab64e5677a338
            • Opcode Fuzzy Hash: bf611bf3e1a8b1a20b8e4750e23f806396848a45077fdaaba05bba7a59412e8d
            • Instruction Fuzzy Hash: 24528FB090D7558FD7249F29D58162EBBE0AF98300F246D1FF499CB3A0D238D9819B5B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: _strlen
            • String ID: f)=$f)=
            • API String ID: 4218353326-683314369
            • Opcode ID: 834047686e6a86475a857cc766a9dc817c6fb6fd654ba2decd912eeb96b7d168
            • Instruction ID: b9027d619558730b84c391b855c0a5fdcb35b13cd279dbc6e1fdab09075fc041
            • Opcode Fuzzy Hash: 834047686e6a86475a857cc766a9dc817c6fb6fd654ba2decd912eeb96b7d168
            • Instruction Fuzzy Hash: 468190B1D0420D9FEF148F99C8846AEB6B5BF0C320F15262BE515EB350D3B89D41DB9A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: lstrcmpi
            • String ID: Qcz$wG%$xG%$xG%
            • API String ID: 1586166983-2700436762
            • Opcode ID: 8af76d4213850ce856a0dcaebeac49eb24a6e84b4a99dba61fdb092af06e099b
            • Instruction ID: d92dfe40a90a5d5c2db3ab84f75cee9a16e047908af538d603d3cdd89da06637
            • Opcode Fuzzy Hash: 8af76d4213850ce856a0dcaebeac49eb24a6e84b4a99dba61fdb092af06e099b
            • Instruction Fuzzy Hash: AA12A671D011098FDF24DB99C89657EBA71AF6C300F24252BE412FB7A1D3389E458B8B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: _strrchr
            • String ID:
            • API String ID: 3213747228-0
            • Opcode ID: 91e4e0450cd7f7c2b0a4103fe4eb945bef8e81c5d9e2a69fc8a02340262eab64
            • Instruction ID: d4162c583e0f5be117d7722da008214262ef1f2dbdf2460d412367f93a33d3e6
            • Opcode Fuzzy Hash: 91e4e0450cd7f7c2b0a4103fe4eb945bef8e81c5d9e2a69fc8a02340262eab64
            • Instruction Fuzzy Hash: 51B13432D006459FDB118F68C8A17FEBBA5EF45305F14816BEC05AB383D2389D49CBA9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 00457C67
            • FindNextFileW.KERNEL32(00000000,?), ref: 00457CE2
            • FindClose.KERNEL32(00000000), ref: 00457D04
            • FindClose.KERNEL32(00000000), ref: 00457D27
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: Find$CloseFile$FirstNext
            • String ID:
            • API String ID: 1164774033-0
            • Opcode ID: b3f33da593891c279bce3369291d8d5159f24b887e4b79c3adef99028769f942
            • Instruction ID: 1e113a5a77a055cf5cae008db1716c30780006d383c16b82ddf2d714e26e6f62
            • Opcode Fuzzy Hash: b3f33da593891c279bce3369291d8d5159f24b887e4b79c3adef99028769f942
            • Instruction Fuzzy Hash: 4641D871904219AEDB21DF69ED8CDBBB3B9EF44306F1041A6E80597241E7389E888B59
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: _strlen
            • String ID: 0$8
            • API String ID: 4218353326-46163386
            • Opcode ID: 89175405be11e4d77e4d9234e301a928218f5f20102cbcd9dadbcc7a411519fd
            • Instruction ID: 0805c121e974aa6a483316602e6e146a6a4096bfaf5a837403357704f790475a
            • Opcode Fuzzy Hash: 89175405be11e4d77e4d9234e301a928218f5f20102cbcd9dadbcc7a411519fd
            • Instruction Fuzzy Hash: 5F725871609340AFC714CF19C880BABBBE2AF88354F14892EF99887351D779D994CB97
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00440141
            • IsDebuggerPresent.KERNEL32 ref: 0044020D
            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0044022D
            • UnhandledExceptionFilter.KERNEL32(?), ref: 00440237
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
            • String ID:
            • API String ID: 254469556-0
            • Opcode ID: 968e97dfc20801a877cb722b9b7d5318178242d0daedda30b9775c22ad68776f
            • Instruction ID: eb7eb8a771a686bcfe83a783da0628e089ebf2bbe5bf505f3aff53d7fc40b16d
            • Opcode Fuzzy Hash: 968e97dfc20801a877cb722b9b7d5318178242d0daedda30b9775c22ad68776f
            • Instruction Fuzzy Hash: E2312D75D01218DBEB10EFA5D989BCDBBF8BF04304F1040EAE50DAB250EB755A848F45
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID: &$)y$=9$=9
            • API String ID: 0-654770253
            • Opcode ID: 5848eeced63ebf62b0da70964aae80558cb696419ca7ad14b05694af4021b354
            • Instruction ID: b4a3fee72ee0d9e6be8e90227fbd58b13d2897c0e5b4c1b325c5355384ee6baf
            • Opcode Fuzzy Hash: 5848eeced63ebf62b0da70964aae80558cb696419ca7ad14b05694af4021b354
            • Instruction Fuzzy Hash: 8982E570F002298BDF28CF98E9855BEBBB0EB54305FA4451BE515EB390D37C8B518B5A
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID: Gr.'$[/$\/$\/
            • API String ID: 0-554860034
            • Opcode ID: 30e8e77db60cbad6e89189ad58068a3bbf52ae4af6e52c211855450fb843ab09
            • Instruction ID: a0e2f22a6a3f7e206e775114c45e476e486dbe9b5451df120b99d5b913458d58
            • Opcode Fuzzy Hash: 30e8e77db60cbad6e89189ad58068a3bbf52ae4af6e52c211855450fb843ab09
            • Instruction Fuzzy Hash: 9C5209B1D002499BDF149B98DC6667EB671EB58304F281A1BE111FB3B1D37C89428F9B
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID: BbA$[-/M$[-/M$`wJl
            • API String ID: 0-3534660569
            • Opcode ID: 248a979842fdf2fc07c9d5f3878acc933eca6ed6dc1a5947e45e06975474fde8
            • Instruction ID: 63622f877ee031114859241f7e2ea447f32fa1573e39c46ad8935505619ab642
            • Opcode Fuzzy Hash: 248a979842fdf2fc07c9d5f3878acc933eca6ed6dc1a5947e45e06975474fde8
            • Instruction Fuzzy Hash: 3D42B5B1D18701CBCF14DA18E99652EBAF0ABAC314F25A81FE185CF394D738D9419B4B
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID: )y$=9$=9$=9
            • API String ID: 0-3124619640
            • Opcode ID: 677f076c12dcd144cdddcce6bd4e64de0a88b2981ba7303fe1a63ff458cbd59a
            • Instruction ID: 0df76aec36a0f41ff280b0ffb41bc72cf2dab3feac103fc5fac1a54315e14466
            • Opcode Fuzzy Hash: 677f076c12dcd144cdddcce6bd4e64de0a88b2981ba7303fe1a63ff458cbd59a
            • Instruction Fuzzy Hash: D42219B1E002099BDF249B9B8C465BE7A71AB54304F240D3BF515FB3D0E27D8A61879B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00454043
            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0045404D
            • UnhandledExceptionFilter.KERNEL32(-00000325,?,?,?,?,?,00000000), ref: 0045405A
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled$DebuggerPresent
            • String ID:
            • API String ID: 3906539128-0
            • Opcode ID: 4e43a152cfeae818d005a9bf8434bc5d4398d03ec1e88cad6466892193f3459e
            • Instruction ID: 99666442cd97fcf9f171af4d9eb5249f56363c0e72e8b283c95d7083039b1523
            • Opcode Fuzzy Hash: 4e43a152cfeae818d005a9bf8434bc5d4398d03ec1e88cad6466892193f3459e
            • Instruction Fuzzy Hash: 4531D4749012189BDB21DF25D988B9DBBF8BF08315F5041EAE80CA7291E7749F858F49
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: _wcsrchr
            • String ID: f)=$f)=$f)=
            • API String ID: 1752292252-3239493788
            • Opcode ID: ea5389d2a179444b72e9b9c1aeb74c93be843cc33b4821f8f6fbf9b85ac6235e
            • Instruction ID: 066726e2e05c43f0821209f8166b6b71d2c8d6dde72c0b842e813b26876215ff
            • Opcode Fuzzy Hash: ea5389d2a179444b72e9b9c1aeb74c93be843cc33b4821f8f6fbf9b85ac6235e
            • Instruction Fuzzy Hash: DBD106719183458BCB14AF1985800BEB6E0EB56310F55892FE6DADB370E238DDC1DB4B
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID: EM%
            • API String ID: 0-1407036242
            • Opcode ID: 67e988459a49aa939898d9ff7a43162aa5477c2edc5375f5ce44c8762a488bbc
            • Instruction ID: 75d7bf8ebae46f47138d2171ecde690c40c6dd0687ac209de1a129132d550e7d
            • Opcode Fuzzy Hash: 67e988459a49aa939898d9ff7a43162aa5477c2edc5375f5ce44c8762a488bbc
            • Instruction Fuzzy Hash: 44022671F00139CACF248A99E8456AEB674FB85300FE5051BF115EF391D7B989418BBB
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID: 3333$UUUU$UUUU
            • API String ID: 0-1588839328
            • Opcode ID: efba45d241d0f52071cda3d0870ed78c4ca8c8c9b3e851d8953339fc65376d36
            • Instruction ID: d1b7f37b2ea666f60bdfb189bbd867ea5cc85303ea493e94c66f19f49d3d4ea9
            • Opcode Fuzzy Hash: efba45d241d0f52071cda3d0870ed78c4ca8c8c9b3e851d8953339fc65376d36
            • Instruction Fuzzy Hash: 8A41B0B1A242048BCB189F19C89479277E1BF89320F59816AE9058F38AD7B9CD85CBC5
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9b2222f3a3d6a913613eae35c6862abf10bfdc6bf6cd88911747dedeb70353b5
            • Instruction ID: 1379c56ca3eec02fa59c9d39c239cb0aa8bed0802506fe828fe134465fbe30e4
            • Opcode Fuzzy Hash: 9b2222f3a3d6a913613eae35c6862abf10bfdc6bf6cd88911747dedeb70353b5
            • Instruction Fuzzy Hash: C1F12F71E002199FEF14CF69D980AAEF7B1FF88314F15826AE915AB381D734AD05CB94
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetSystemTimeAsFileTime.KERNEL32(0041C7E7,FFFFFFF9,0E5CCD23,?,?,?,0041C7E7,00000000), ref: 0044C366
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0044C385
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: Time$FileSystemUnothrow_t@std@@@__ehfuncinfo$??2@
            • String ID:
            • API String ID: 1518329722-0
            • Opcode ID: 3fe40198a38a422c672ee5a5dbb90a51271e5f9400dc39d4e6b1adcb3c2a5531
            • Instruction ID: 27f698f4cdd5437931be634b194d56ca7c7a9d902b3e9012aa2ec16f7a872e06
            • Opcode Fuzzy Hash: 3fe40198a38a422c672ee5a5dbb90a51271e5f9400dc39d4e6b1adcb3c2a5531
            • Instruction Fuzzy Hash: 3FF0F4B5A02214BB9B649F6EC84489FBEE9EBC4760729825AFC09D3344E975CD01C698
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID: BbA$-V
            • API String ID: 0-3809955518
            • Opcode ID: 1b2d38d1e3b605a952596961b677f9a00d51841c5b29a9ed7cbc69f4a507caeb
            • Instruction ID: dc0b5188f1afb384efd2f348d115cc14fa508202ac94fcf1270c46230676865c
            • Opcode Fuzzy Hash: 1b2d38d1e3b605a952596961b677f9a00d51841c5b29a9ed7cbc69f4a507caeb
            • Instruction Fuzzy Hash: 8AC19F71A08B219BC714DF19D48412EBBE0EB94350F919D2FE899D73A0E778C9518F8B
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID: rA1$rA1
            • API String ID: 0-1067413765
            • Opcode ID: efbb6fb98ee96def9dd8d1e0065d46e41e3023d5ad887b9a4026ef5383adf29c
            • Instruction ID: 0f2c39b535e627a914370d6953791e0e4ce5231357eeacb8a2176ba7154c97bf
            • Opcode Fuzzy Hash: efbb6fb98ee96def9dd8d1e0065d46e41e3023d5ad887b9a4026ef5383adf29c
            • Instruction Fuzzy Hash: 8F11CA37A182B107D716CEB658D002AE752ABC731270F4276EE81AB241D160AC5182E5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: _strlen
            • String ID:
            • API String ID: 4218353326-0
            • Opcode ID: 81b6c9f8dd858e0575a21273f910148f5f9b3018c130845560e755093bb2e4d2
            • Instruction ID: c69bad69c9650cc23ecbbb10ef9dce891f31e76b51468f57f18fd9f67a02415b
            • Opcode Fuzzy Hash: 81b6c9f8dd858e0575a21273f910148f5f9b3018c130845560e755093bb2e4d2
            • Instruction Fuzzy Hash: 13822371608341AFDB14CF19C880AABBBE1FF88344F44892EF99987351D739D994CB96
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00463243,?,?,00000008,?,?,004628E0,00000000), ref: 00463515
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: ExceptionRaise
            • String ID:
            • API String ID: 3997070919-0
            • Opcode ID: 2de6cfb0ff4a72139af26f99067b21693e90c6c09101b5cfe456c9cc314c36ad
            • Instruction ID: 46e702be2e14e1c7ea3a083daac46fe654c2f59b887735ef056f0537b62b1649
            • Opcode Fuzzy Hash: 2de6cfb0ff4a72139af26f99067b21693e90c6c09101b5cfe456c9cc314c36ad
            • Instruction Fuzzy Hash: CDB18D31210644DFD715CF28C486B657BE0FF04365F258659E89ACF3A1D739EA82CB46
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID: a
            • API String ID: 0-3904355907
            • Opcode ID: 22adeaec1f4aa4427f2fd75e2a797e1863b0547b07efddce6337872882d6f34b
            • Instruction ID: fa2e706a8ce1b4874a0f7c8179fb513e0e163648afb64f82ed63889311d57075
            • Opcode Fuzzy Hash: 22adeaec1f4aa4427f2fd75e2a797e1863b0547b07efddce6337872882d6f34b
            • Instruction Fuzzy Hash: 701214706083019FD764CF19C894BABBBE2BB88304F14892EF59987390D779ED85CB56
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID: BbA
            • API String ID: 0-4129302092
            • Opcode ID: d4c306d473e9abee8ba03c08537d78c956c4b24f53863bdf1d710410e9463831
            • Instruction ID: 9b589efcd643ce06c087a3a5f1e7c205f060a46c530c5da3065031165be25a4c
            • Opcode Fuzzy Hash: d4c306d473e9abee8ba03c08537d78c956c4b24f53863bdf1d710410e9463831
            • Instruction Fuzzy Hash: 38E1D3B1E4410A8BCF248B9888815BF76B5BB6D315F24252BD442EB360D3B98D119B9F
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0044036E
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: FeaturePresentProcessor
            • String ID:
            • API String ID: 2325560087-0
            • Opcode ID: 356cedec560b61747e734f351c2d7cee1900a7d0f73b36dcc76ed125cba7798f
            • Instruction ID: a2202421c7d43c7c44685b9093a77a3869744c678983edcef80afba564b2c5d9
            • Opcode Fuzzy Hash: 356cedec560b61747e734f351c2d7cee1900a7d0f73b36dcc76ed125cba7798f
            • Instruction Fuzzy Hash: 1F514E71A01215DBFB68CF99D8857AAB7F4FB48310F24847ADA09EB360D3789990CF54
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID: a
            • API String ID: 0-3904355907
            • Opcode ID: c5ea65371dcad18d39016b021c08cdbd70822c6c2722b132fc2f5378d9cc01d2
            • Instruction ID: a1075f817fd7cc3f7814354a4a1db2357214d01691858b369329b9f05171e3ff
            • Opcode Fuzzy Hash: c5ea65371dcad18d39016b021c08cdbd70822c6c2722b132fc2f5378d9cc01d2
            • Instruction Fuzzy Hash: A6E13B716083419FD720CF19C884BABB7E1BF84354F14892EF59987350DB78E989CB5A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00453E34: HeapFree.KERNEL32(00000000,00000000,?,00457171,?,00000000,?,?,0045708D,?,00000007,?,?,004577C9,?,?), ref: 00453E4A
              • Part of subcall function 00453E34: GetLastError.KERNEL32(?,?,00457171,?,00000000,?,?,0045708D,?,00000007,?,?,004577C9,?,?), ref: 00453E55
            • GetTimeZoneInformation.KERNEL32 ref: 00459846
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: ErrorFreeHeapInformationLastTimeZone
            • String ID:
            • API String ID: 3335090040-0
            • Opcode ID: 465af64d01cb5bf269fcfe6c1cbf59db2ec674240fde68a8510aaed291382a60
            • Instruction ID: 83584015ad3354e1473e426f47074551544ae6ff77f5a2d824aafdad77519c98
            • Opcode Fuzzy Hash: 465af64d01cb5bf269fcfe6c1cbf59db2ec674240fde68a8510aaed291382a60
            • Instruction Fuzzy Hash: 7221E171910111EBDB10AFBACD4265EBF60EF05311B1481ABFC08AB2B2E7799D44CB9D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetUnhandledExceptionFilter.KERNEL32(Function_00040253,0043FBA3), ref: 0044012E
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: 5d7f60071a7a357792143b2bfc5289f02b303e810947aa6ebcae9ed27293c0d5
            • Instruction ID: f038b7e9c132db3ec742f0495448b622a0d310ee9f95716751d1e1cd1bf57bd1
            • Opcode Fuzzy Hash: 5d7f60071a7a357792143b2bfc5289f02b303e810947aa6ebcae9ed27293c0d5
            • Instruction Fuzzy Hash:
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 72d89aba4d668fce2eb44ce70dd846f8b0ff78849bd6d1151861dcef515fce1f
            • Instruction ID: a3b7084fbdfe11c8eacb09f2c79e2b3bebb649b7c631925d18ca0386633e7346
            • Opcode Fuzzy Hash: 72d89aba4d668fce2eb44ce70dd846f8b0ff78849bd6d1151861dcef515fce1f
            • Instruction Fuzzy Hash: 866280356087518FC715DF19C080AAAB7F1FF89314F158A6EE4CA8B352D739E886CB46
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b86e733c957ad818f0a5a64066e21ff8c0fd192cc6da0df8d624fb0f487f81bb
            • Instruction ID: 7f1d227e81058240fefc9ce2e7881f356ce04caaa4cd566e4625a4282b784914
            • Opcode Fuzzy Hash: b86e733c957ad818f0a5a64066e21ff8c0fd192cc6da0df8d624fb0f487f81bb
            • Instruction Fuzzy Hash: E912BF702087508FC324DF28D58066BB7E2FF95310F944E2EE5D687B92E379A845CB5A
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 344e3994ff8b8d302067ea1c434afd7038ce7f4f31709be841778334474cb02c
            • Instruction ID: f47bd9da15e5f273d482ff521561176b22dacf300fafdc73ccb339a9324ef8fc
            • Opcode Fuzzy Hash: 344e3994ff8b8d302067ea1c434afd7038ce7f4f31709be841778334474cb02c
            • Instruction Fuzzy Hash: 4C126D75A087059FC714CF29C5806AAFBE1FF88304F15892EE89987351D778EC95CB8A
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: dca4ead15992c50c81b45c437b349bc6c2ce5574fdc5981c1436be462613f052
            • Instruction ID: cf4510a9fb9a17c05484002ebd9ffdaa7b2e5eb0357794f45be513f7ec182c0a
            • Opcode Fuzzy Hash: dca4ead15992c50c81b45c437b349bc6c2ce5574fdc5981c1436be462613f052
            • Instruction Fuzzy Hash: B3020470518B508FC338CF29C6905A6BBF1FF45710B944A2EDAA787B90D739B885CB18
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 17954181ad1bfa07e195440818c843ca059a124ac0f03909e53e4f2b1a5f8e8b
            • Instruction ID: 4852fc99dede2de8c07b1ce6f38178f8f74b56e8af0a05e5bd4a490d1d0891ff
            • Opcode Fuzzy Hash: 17954181ad1bfa07e195440818c843ca059a124ac0f03909e53e4f2b1a5f8e8b
            • Instruction Fuzzy Hash: 5DE1BB706086058FEB24CF68C480AABB7F2FF45314B244A5EE8569B790D738AD43DB59
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cfa6efcdf8f36bebee9a36831b339b6fd598d102e837ebe592fc0ccf64c4c128
            • Instruction ID: 5300cd6ae49d8dbe9984fbe377353a52d1cf92bd768e72ae2b68b1244187a3f9
            • Opcode Fuzzy Hash: cfa6efcdf8f36bebee9a36831b339b6fd598d102e837ebe592fc0ccf64c4c128
            • Instruction Fuzzy Hash: 46E1BBB4A00A058FEB24CF28C180BAFB7F1FF89314B24465ED4569B791D738AD46CB59
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
            • Instruction ID: a1926ac00d3af7b2d59ac37bfc72cc0e44c362c41eb0cb9e191a4dde01baca61
            • Opcode Fuzzy Hash: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
            • Instruction Fuzzy Hash: 47E10275B043228FC714CF18D8D066AB3E2FFA9710F95892EE99587361D239EC46CB85
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7d84bca4c30aa5539cc3b23a61abace4eda1baf78668d3b6f8f4e28cd3912e37
            • Instruction ID: bb97e952bf6128600cf32c7039b0c21f980668a69e724898758963aa6774178a
            • Opcode Fuzzy Hash: 7d84bca4c30aa5539cc3b23a61abace4eda1baf78668d3b6f8f4e28cd3912e37
            • Instruction Fuzzy Hash: 63C1D170A006458FEB24CF68C49067BBBA1EF07318F16461FD896A7391C739AD46CB5B
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 480b7a3807bdec40eb1781685a0957e977cf92e650f85c080a9217fa238dc8bc
            • Instruction ID: 03e01b99a3ea4d98bd077c1f71beaba728474dfaaaff8be342414f03e7018773
            • Opcode Fuzzy Hash: 480b7a3807bdec40eb1781685a0957e977cf92e650f85c080a9217fa238dc8bc
            • Instruction Fuzzy Hash: A9C10F306006068FEB24CF68C48477FB7A1BF85304F24461FDA5697792C779AC86CB59
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 22a249e8036389ca2a94441644932b39595e3d331b0a1c1fbadceed0361bbadf
            • Instruction ID: 8de42448238a9bd9dfb0f6da8befdbe85df30ec9e27c252b50282187906eccb1
            • Opcode Fuzzy Hash: 22a249e8036389ca2a94441644932b39595e3d331b0a1c1fbadceed0361bbadf
            • Instruction Fuzzy Hash: F1C15D716087518BC728CF2DC4907AEB7E2AFC4310F19CA2EE899D7795D6389841CB96
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cbd68c9bd32a6e6089eb0a04c845385284089b00ffda1fbd1fb62c7a2d090b34
            • Instruction ID: 33d213110c5a6b565e9bda116bccd1b313e5870d458404ff94cf22743a74c644
            • Opcode Fuzzy Hash: cbd68c9bd32a6e6089eb0a04c845385284089b00ffda1fbd1fb62c7a2d090b34
            • Instruction Fuzzy Hash: 60B10020E2AF414DC6239639C871336B64CAFBB2C5F51D72BFC2670D62FBA289834145
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a39a2fe1fb783dc0ebd96aaa4b09021d3a3dec2b0e9adff76d855defd5a20da3
            • Instruction ID: 7f49d05cf51cb1df92f9f4c22161da5d1b824da537386caa73c3e113169bc4e9
            • Opcode Fuzzy Hash: a39a2fe1fb783dc0ebd96aaa4b09021d3a3dec2b0e9adff76d855defd5a20da3
            • Instruction Fuzzy Hash: 73819D716086518FC728CF2DD8906AEFBE2AFC4310F19CA2EE8D9D7795D6349841CB85
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1ac7b1aa96306a8500b12fae9c55f076ce975f64dbe0489b0a98f9252826224e
            • Instruction ID: 2a85ae27e9abd1518985109b3de5b099e6583462fcbdc878e980ebc407922004
            • Opcode Fuzzy Hash: 1ac7b1aa96306a8500b12fae9c55f076ce975f64dbe0489b0a98f9252826224e
            • Instruction Fuzzy Hash: 53517271E00219AFDF14CF99C941AAEBBB2EF88314F19806DE815AB241C7349E54CB95
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
            • Instruction ID: 04161d24e210b282f1801bcb76d898ca36c1aebdde0c8bb232035fa6fcb03425
            • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
            • Instruction Fuzzy Hash: 54115B7734038243F614C63DD4B86BBA7A5EBF532072C837BD3826B744D13AD9659A08
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5466edf919cf6453cb3fe632e64b7bc90129a20e483f7dfcae3dbb783ead61c5
            • Instruction ID: d45551658c9705659fe91fd25da5fd67e75fcf6d94e8ca675f06846c1b1ef9cc
            • Opcode Fuzzy Hash: 5466edf919cf6453cb3fe632e64b7bc90129a20e483f7dfcae3dbb783ead61c5
            • Instruction Fuzzy Hash: DDE08C32911228EBCB24DB89C904D9AF3FCEB49B56F11009BB901D3202C274DE04C7D4
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3afd9e53fbe4f72f84671ef79b91c3ecb84e580b6f34f6fcc9017cb2d47eaa73
            • Instruction ID: 9885d8effbfe0ff0fdcaaaae0265c276ac2dca6ef0719e03e370b0a5cf67cbe2
            • Opcode Fuzzy Hash: 3afd9e53fbe4f72f84671ef79b91c3ecb84e580b6f34f6fcc9017cb2d47eaa73
            • Instruction Fuzzy Hash: 67C08C34000980C6DE298911B6713BB33A5F3957CAF8004CFC8420BB83C71EAD86E644
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 8352 403596-4035ba 8353 4035bb-4035c3 8352->8353 8354 4035c5-4035ca 8353->8354 8355 40360a-40360f 8353->8355 8358 4035d0-4035d5 8354->8358 8359 403695-40369a 8354->8359 8356 403615-40361a 8355->8356 8357 4036e8-4036ed 8355->8357 8360 403620-403625 8356->8360 8361 40378f-403794 8356->8361 8362 4036f3-4036f8 8357->8362 8363 4037fc-403801 8357->8363 8364 403726-40372b 8358->8364 8365 4035db-4035e0 8358->8365 8366 4037c0-4037c5 8359->8366 8367 4036a0-4036a5 8359->8367 8370 403869-40386e 8360->8370 8371 40362b-403630 8360->8371 8368 40379a-40379f 8361->8368 8369 4039cb-403a02 call 408c20 lstrcatW 8361->8369 8374 403922-403947 8362->8374 8375 4036fe-403703 8362->8375 8376 403807-40380c 8363->8376 8377 403a5d-403a6d 8363->8377 8378 403731-403736 8364->8378 8379 403985-40398c 8364->8379 8380 403831-403836 8365->8380 8381 4035e6-4035eb 8365->8381 8372 403a21-403a28 8366->8372 8373 4037cb-4037d0 8366->8373 8382 4038c3-4038e3 lstrcatW 8367->8382 8383 4036ab-4036b0 8367->8383 8384 4037a5-4037aa 8368->8384 8385 403a07-403a1c lstrcatW 8368->8385 8369->8353 8395 403a51-403a58 8370->8395 8396 403874-403879 8370->8396 8386 403636-40363b 8371->8386 8387 4038a7-4038be lstrcatW 8371->8387 8372->8353 8388 4037d6-4037db 8373->8388 8389 403a2d-403a49 call 40298c 8373->8389 8401 403949 8374->8401 8402 40394e-403951 8374->8402 8399 403956-403976 8375->8399 8400 403709-40370e 8375->8400 8391 403a72-403a8b call 44d293 8376->8391 8392 403812-403817 8376->8392 8377->8353 8403 403991-4039c6 call 442180 call 408c20 8378->8403 8404 40373c-403741 8378->8404 8379->8353 8393 403a90-403a9f 8380->8393 8394 40383c-403841 8380->8394 8405 4035f1-4035f6 8381->8405 8406 403884-4038a2 8381->8406 8382->8353 8397 4036b6-4036bb 8383->8397 8398 4038e8-40391d call 4023fe call 402745 8383->8398 8384->8353 8409 4037b0-4037bb 8384->8409 8385->8353 8386->8353 8410 403641-403690 call 442180 call 408c20 lstrcatW * 2 call 44d293 8386->8410 8387->8353 8388->8353 8411 4037e1-4037f7 8388->8411 8426 403a4e 8389->8426 8391->8353 8392->8353 8413 40381d-40382c 8392->8413 8393->8353 8394->8353 8415 403847-403864 lstrcatW * 2 8394->8415 8395->8353 8396->8353 8417 40387f-403aee call 408c20 call 411e8e 8396->8417 8397->8353 8418 4036c1-4036d8 8397->8418 8398->8426 8422 403978 8399->8422 8423 40397d-403980 8399->8423 8400->8353 8420 403714-403721 8400->8420 8401->8402 8402->8353 8403->8353 8404->8353 8421 403747-40377f call 4024a9 8404->8421 8405->8353 8407 4035f8-403608 8405->8407 8406->8353 8407->8353 8409->8353 8410->8353 8411->8353 8413->8353 8415->8353 8418->8423 8429 4036de-4036e3 8418->8429 8420->8353 8421->8423 8441 403785-40378a 8421->8441 8422->8423 8423->8353 8426->8395 8429->8423 8441->8423
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: lstrcat
            • String ID: Qcz$Qcz$xG%$xG%
            • API String ID: 4038537762-1429512164
            • Opcode ID: 9be91e2508c1e15b1789d6a0a0412c6c219981e28901ded71ef246b491064337
            • Instruction ID: 4878c853b4d5a6c812cbc114ba151b085e6c8ba745f01b2c624c4d7a811a5224
            • Opcode Fuzzy Hash: 9be91e2508c1e15b1789d6a0a0412c6c219981e28901ded71ef246b491064337
            • Instruction Fuzzy Hash: 2BC1D471D00219EADF209F98CC85AAEBEB4AF14301F244577F511F63E0D3B98B519B9A
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 8447 42ff13-42ff2e 8448 42ff2f-42ff37 8447->8448 8449 42ff39-42ff3e 8448->8449 8450 42ff9f-42ffa4 8448->8450 8451 42ff44-42ff49 8449->8451 8452 42ffee-42fff3 8449->8452 8453 430052-430057 8450->8453 8454 42ffaa-42ffaf 8450->8454 8457 4300b9-4300be 8451->8457 8458 42ff4f-42ff54 8451->8458 8455 430147-43014c 8452->8455 8456 42fff9-42fffe 8452->8456 8459 43005d-430062 8453->8459 8460 43017c-430181 8453->8460 8461 42ffb5-42ffba 8454->8461 8462 43010f-430114 8454->8462 8471 430152-430157 8455->8471 8472 430365-43037b 8455->8472 8463 430240-43025f 8456->8463 8464 430004-430009 8456->8464 8477 4300c4-4300c9 8457->8477 8478 4302aa-4302b5 8457->8478 8467 42ff5a-42ff5f 8458->8467 8468 4301a9-4301ae 8458->8468 8469 430270-43028e lstrcatW 8459->8469 8470 430068-43006d 8459->8470 8475 430187-43018c 8460->8475 8476 430399-4303b3 lstrcatW call 40eda2 8460->8476 8473 42ffc0-42ffc5 8461->8473 8474 4301dd-4301e2 8461->8474 8465 43011a-43011f 8462->8465 8466 4302fe-430333 call 430420 call 4309fa 8462->8466 8463->8448 8495 430264-43026b 8464->8495 8496 43000f-430014 8464->8496 8481 430125-43012a 8465->8481 8482 43033c-430356 8465->8482 8507 43035d-430360 8466->8507 8538 430335-43033a 8466->8538 8484 42ff65-42ff6a 8467->8484 8485 4301fc-430224 8467->8485 8493 4303f5-430405 8468->8493 8494 4301b4-4301b9 8468->8494 8469->8448 8499 430293-4302a5 call 44dccc 8470->8499 8500 430073-430078 8470->8500 8486 430380-430394 8471->8486 8487 43015d-430162 8471->8487 8472->8448 8488 430234-43023b 8473->8488 8489 42ffcb-42ffd0 8473->8489 8497 43040a-43040f 8474->8497 8498 4301e8-4301f7 lstrcatW 8474->8498 8490 4303c2-4303f0 call 40e3bc call 41fa47 8475->8490 8491 430192-430197 8475->8491 8521 4303ba-4303bd 8476->8521 8526 4303b5 8476->8526 8479 4302ba-4302f9 lstrcatW call 431840 8477->8479 8480 4300cf-4300d4 8477->8480 8478->8448 8479->8448 8480->8448 8501 4300da-4300ff 8480->8501 8481->8448 8503 430130-430142 call 44dccc 8481->8503 8506 430358 8482->8506 8482->8507 8484->8448 8505 42ff6c-42ff9d call 431840 lstrcatW * 2 8484->8505 8485->8507 8515 43022a-43022f 8485->8515 8486->8448 8487->8448 8508 430168-430177 8487->8508 8488->8448 8489->8448 8509 42ffd6-42ffe9 8489->8509 8490->8448 8491->8448 8510 43019d-4301a4 8491->8510 8493->8448 8494->8448 8512 4301bf-4301d8 call 44d293 8494->8512 8495->8448 8496->8448 8513 43001a-43004d call 44d293 lstrcatW 8496->8513 8497->8448 8517 430415-43041f 8497->8517 8498->8448 8499->8448 8500->8448 8516 43007e-4300b4 call 431840 lstrcatW 8500->8516 8520 430105-43010a 8501->8520 8501->8521 8503->8448 8505->8448 8506->8507 8507->8448 8508->8448 8509->8448 8510->8448 8512->8448 8513->8448 8515->8507 8516->8448 8520->8521 8521->8448 8526->8521 8538->8507
            APIs
            • lstrcatW.KERNEL32(?,?), ref: 0042FF84
            • lstrcatW.KERNEL32(?,0000326A), ref: 0042FF8C
            • lstrcatW.KERNEL32(00431704,?), ref: 00430035
            • lstrcatW.KERNEL32(00431704,0000326A), ref: 004300AB
            • lstrcatW.KERNEL32(?,?), ref: 004301EE
            • lstrcatW.KERNEL32(?,?), ref: 00430276
            • lstrcatW.KERNEL32(?,?), ref: 004302C2
            • lstrcatW.KERNEL32(00431704,0000326A), ref: 0043039F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: lstrcat
            • String ID: )y$=9$=9$=9
            • API String ID: 4038537762-3124619640
            • Opcode ID: f030b9c4477342b9bdc48660ac90e06d751428325ada5cb7c4d2204976886d3f
            • Instruction ID: e519decdd3ce253de89407dbf8649a3a5ec18651a50e18e1cfbc0e89ecb9ccf7
            • Opcode Fuzzy Hash: f030b9c4477342b9bdc48660ac90e06d751428325ada5cb7c4d2204976886d3f
            • Instruction Fuzzy Hash: 54C1FFB1E102199FCF109F98DD515AEBAB4FF09304F661637E414F63A0DB798D448B8A
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 8540 41f3bb-41f3d7 8541 41f3e1-41f3e9 8540->8541 8542 41f3d9 8540->8542 8543 41f3eb-41f3f4 8541->8543 8542->8541 8544 41f444-41f449 8543->8544 8545 41f3f6-41f3fb 8543->8545 8548 41f44b-41f450 8544->8548 8549 41f4ad-41f4b2 8544->8549 8546 41f401-41f406 8545->8546 8547 41f4ec-41f4f1 8545->8547 8552 41f539-41f53e 8546->8552 8553 41f40c-41f411 8546->8553 8554 41f5c1-41f5c6 8547->8554 8555 41f4f7-41f4fc 8547->8555 8556 41f456-41f45b 8548->8556 8557 41f558-41f55d 8548->8557 8550 41f4b8-41f4bd 8549->8550 8551 41f59e-41f5a3 8549->8551 8560 41f4c3-41f4c8 8550->8560 8561 41f72d-41f747 8550->8561 8562 41f5a9-41f5ae 8551->8562 8563 41f6f8-41f71b call 44d293 8551->8563 8572 41f7a2-41f7aa 8552->8572 8573 41f544-41f549 8552->8573 8564 41f417-41f41c 8553->8564 8565 41f7af-41f7ef WideCharToMultiByte 8553->8565 8566 41f757-41f785 8554->8566 8567 41f5cc-41f5d1 8554->8567 8568 41f502-41f507 8555->8568 8569 41f795-41f79d 8555->8569 8570 41f461-41f466 8556->8570 8571 41f643-41f662 8556->8571 8558 41f563-41f568 8557->8558 8559 41f80d-41f839 8557->8559 8584 41f7f4-41f808 call 44dccc 8558->8584 8585 41f56e-41f573 8558->8585 8579 41f840-41f844 8559->8579 8586 41f83b 8559->8586 8574 41f672-41f689 8560->8574 8575 41f4ce-41f4d3 8560->8575 8561->8579 8580 41f74d-41f752 8561->8580 8562->8543 8587 41f5b4-41f5bc 8562->8587 8593 41f722-41f728 8563->8593 8610 41f71d 8563->8610 8588 41f422-41f427 8564->8588 8589 41f6e5-41f6ef 8564->8589 8565->8543 8566->8579 8581 41f78b-41f790 8566->8581 8567->8543 8590 41f5d7-41f63e call 41c241 call 41cc18 8567->8590 8577 41f50d-41f512 8568->8577 8578 41f68e-41f6d1 WideCharToMultiByte 8568->8578 8569->8543 8591 41f849-41f84e 8570->8591 8592 41f46c-41f498 8570->8592 8571->8593 8594 41f668-41f66d 8571->8594 8572->8543 8582 41f856-41f85b 8573->8582 8583 41f54f-41f553 8573->8583 8574->8543 8575->8543 8598 41f4d9-41f4e7 8575->8598 8577->8543 8600 41f518-41f529 8577->8600 8595 41f6d3 8578->8595 8596 41f6d8-41f6e0 8578->8596 8579->8543 8580->8579 8581->8579 8582->8543 8606 41f861-41f872 8582->8606 8583->8593 8584->8543 8585->8543 8602 41f579-41f599 8585->8602 8586->8579 8587->8543 8588->8543 8603 41f429-41f434 8588->8603 8589->8593 8597 41f6f1-41f6f6 8589->8597 8590->8543 8591->8543 8604 41f854-41f8b9 call 41c241 8591->8604 8607 41f49a 8592->8607 8608 41f49f-41f4a8 call 41953b 8592->8608 8593->8543 8594->8593 8595->8596 8596->8543 8597->8593 8598->8543 8600->8579 8611 41f52f-41f534 8600->8611 8602->8543 8603->8579 8613 41f43a-41f43f 8603->8613 8607->8608 8608->8543 8610->8593 8611->8579 8613->8579
            APIs
            • WideCharToMultiByte.KERNEL32 ref: 0041F6C1
            • WideCharToMultiByte.KERNEL32 ref: 0041F7DA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: ByteCharMultiWide
            • String ID: '$0N$Eb$Y<$_2$tL$:@
            • API String ID: 626452242-2264350277
            • Opcode ID: 35620b76cd7eb60ebe6dfa00f721888ff0dbdb95e30fad49da4e546f73c4563c
            • Instruction ID: 6b0cbdd544f82dc4c58476b5f157a1645fbfa2b23c24b1863356214a3f4bca1a
            • Opcode Fuzzy Hash: 35620b76cd7eb60ebe6dfa00f721888ff0dbdb95e30fad49da4e546f73c4563c
            • Instruction Fuzzy Hash: DDB18FB05087458BD7289F58C48416EBBE0BF94314F144A2FF4A9DA3A1D778C98ACB5B
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 8620 401db8-401dd3 call 401681 8623 402242 8620->8623 8624 401dd9-401ddd 8620->8624 8625 402244-40224b 8623->8625 8626 401df0-401dfb call 4013e9 8624->8626 8627 401ed1-401ef7 call 4014b0 call 4016ec call 408857 8624->8627 8628 401de4-401deb 8624->8628 8629 401e59-401e7f call 40147a call 4015df call 408857 8624->8629 8630 401f4d-401f5a call 4014e6 8624->8630 8631 401e1e-401e29 call 401444 8624->8631 8626->8623 8651 401e01-401e19 call 401416 call 4088b0 8626->8651 8627->8623 8666 401efd-401f01 8627->8666 8635 401f68 call 408857 8628->8635 8629->8623 8668 401e85-401e89 8629->8668 8648 401f63 8630->8648 8649 401f5c-401f61 8630->8649 8645 401e2b 8631->8645 8646 401e2d-401e3a 8631->8646 8650 401f6d-401f6f 8635->8650 8645->8646 8655 401e3c 8646->8655 8656 401e3e-401e54 call 40112c 8646->8656 8648->8635 8649->8635 8650->8625 8652 401f75-401f78 8650->8652 8651->8650 8652->8625 8655->8656 8656->8650 8669 401f03 8666->8669 8670 401f05-401f20 8666->8670 8671 401e8b 8668->8671 8672 401e8d-401ea8 8668->8672 8669->8670 8673 4020f5-4020fb 8670->8673 8674 401f26-401f34 call 408857 8670->8674 8671->8672 8675 401f7d-401f83 8672->8675 8676 401eae-401ebc call 408857 8672->8676 8679 402201-402208 8673->8679 8680 402101-402113 8673->8680 8674->8623 8693 401f3a-401f3e 8674->8693 8677 402229-40222b 8675->8677 8678 401f89-401f99 call 4015ee 8675->8678 8676->8623 8694 401ec2-401ec6 8676->8694 8687 402230-40223c call 408857 8677->8687 8696 4020ed-4020f0 8678->8696 8697 401f9f-401fb3 8678->8697 8679->8687 8688 40220a-40220f 8679->8688 8684 402115-402117 8680->8684 8690 402136 8684->8690 8691 402119-40212a call 408875 8684->8691 8687->8623 8706 40223e-402240 8687->8706 8688->8677 8692 402211-40221f call 408875 8688->8692 8704 40213a-40215e call 4016c2 call 401db8 8690->8704 8691->8696 8713 40212c-40212e 8691->8713 8692->8623 8714 402221-402223 8692->8714 8700 401f40 8693->8700 8701 401f42-401f48 8693->8701 8702 401ec8 8694->8702 8703 401eca-401ecc 8694->8703 8696->8623 8707 401fb5-401fba 8697->8707 8700->8701 8701->8680 8702->8703 8703->8678 8704->8696 8726 402160-402164 8704->8726 8706->8623 8711 401fd7-401fef call 44e760 call 4088b0 8707->8711 8712 401fbc-401fc9 call 408875 8707->8712 8711->8696 8734 401ff5-401ff9 8711->8734 8712->8696 8727 401fcf-401fd1 8712->8727 8717 402130 8713->8717 8718 402132-402134 8713->8718 8719 402225 8714->8719 8720 402227 8714->8720 8717->8718 8718->8704 8719->8720 8720->8677 8730 402166 8726->8730 8731 402168-40216e 8726->8731 8732 401fd3 8727->8732 8733 401fd5 8727->8733 8730->8731 8735 402170-40217e call 408857 8731->8735 8736 402192 8731->8736 8732->8733 8733->8711 8737 401ffb 8734->8737 8738 401ffd-40200b call 408857 8734->8738 8735->8696 8747 402184-402186 8735->8747 8740 402196-402198 8736->8740 8737->8738 8738->8696 8749 402011-402015 8738->8749 8743 4021c9-4021d0 8740->8743 8744 40219a-4021a8 call 408857 8740->8744 8743->8684 8745 4021d6 8743->8745 8744->8696 8755 4021ae-4021b2 8744->8755 8745->8679 8750 402188 8747->8750 8751 40218a-402190 8747->8751 8753 402017 8749->8753 8754 402019-402025 8749->8754 8750->8751 8751->8740 8753->8754 8758 402043-402067 call 401618 call 401db8 8754->8758 8759 402027-402035 call 408857 8754->8759 8756 4021b4 8755->8756 8757 4021b6-4021c1 8755->8757 8756->8757 8757->8684 8761 4021c7-4021dd 8757->8761 8758->8696 8774 40206d-402071 8758->8774 8759->8696 8769 40203b-40203d 8759->8769 8767 4021ff 8761->8767 8768 4021df-4021f1 call 408875 8761->8768 8767->8679 8768->8623 8778 4021f3-4021f7 8768->8778 8772 402041 8769->8772 8773 40203f 8769->8773 8772->8758 8773->8772 8776 402073 8774->8776 8777 402075-40207b 8774->8777 8776->8777 8779 40209b 8777->8779 8780 40207d-40208b call 408857 8777->8780 8781 4021f9 8778->8781 8782 4021fb-4021fd 8778->8782 8783 40209f-4020a1 8779->8783 8780->8696 8788 40208d-40208f 8780->8788 8781->8782 8782->8679 8786 4020a3-4020b1 call 408857 8783->8786 8787 4020cb-4020d0 8783->8787 8786->8696 8796 4020b3-4020b9 8786->8796 8787->8677 8789 4020d6-4020e7 call 4015ee 8787->8789 8792 402091 8788->8792 8793 402093-402099 8788->8793 8789->8696 8789->8707 8792->8793 8793->8783 8797 4020bb 8796->8797 8798 4020bd-4020c4 8796->8798 8797->8798 8798->8789 8799 4020c6 8798->8799 8799->8688
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: _strlen
            • String ID: wr$%1.17g$[,]{: }$false$null$BF$BF
            • API String ID: 4218353326-3269087201
            • Opcode ID: 908a62677b8ca64f96e232a64f15dfa901e837643ddf367af2bc110f6864cace
            • Instruction ID: 0c250f3d4f756a126ef77eb0c0b7d1b14d5667675eaa96361a206e1d9e62a699
            • Opcode Fuzzy Hash: 908a62677b8ca64f96e232a64f15dfa901e837643ddf367af2bc110f6864cace
            • Instruction Fuzzy Hash: 98C1F3727043015BD701A66A8E4462BB2DA9FD4348F19853FED5AE33E1FABDDC01825B
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: _strlen
            • String ID: file$ykqs_jk*n}ob
            • API String ID: 4218353326-323892159
            • Opcode ID: 1c50cf2c04d4a5d951112a15154896223c931624481b2a82f6f5c9bd8b49e8f1
            • Instruction ID: 285f5179f204fbcc5615ef4ec5ecd657932cc1d2d5792005b9c654004b0af578
            • Opcode Fuzzy Hash: 1c50cf2c04d4a5d951112a15154896223c931624481b2a82f6f5c9bd8b49e8f1
            • Instruction Fuzzy Hash: 8E81E6B6900215EFD721DF25DC82A977BB4EF19318B184469FC0C9B303E235A915C7EA
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 9025 45a27d-45a2ad call 45a7be 9028 45a2af-45a2ba call 44a9b9 9025->9028 9029 45a2c8-45a2d4 call 455b76 9025->9029 9034 45a2bc-45a2c3 call 44a9a6 9028->9034 9035 45a2d6-45a2eb call 44a9b9 call 44a9a6 9029->9035 9036 45a2ed-45a336 call 45a729 9029->9036 9043 45a5a2-45a5a6 9034->9043 9035->9034 9045 45a3a3-45a3ac GetFileType 9036->9045 9046 45a338-45a341 9036->9046 9049 45a3f5-45a3f8 9045->9049 9050 45a3ae-45a3df GetLastError call 44a9cc CloseHandle 9045->9050 9047 45a343-45a347 9046->9047 9048 45a378-45a39e GetLastError call 44a9cc 9046->9048 9047->9048 9052 45a349-45a376 call 45a729 9047->9052 9048->9034 9055 45a401-45a407 9049->9055 9056 45a3fa-45a3ff 9049->9056 9050->9034 9064 45a3e5-45a3f0 call 44a9a6 9050->9064 9052->9045 9052->9048 9057 45a40b-45a459 call 455d1a 9055->9057 9058 45a409 9055->9058 9056->9057 9067 45a478-45a4a0 call 45a9e2 9057->9067 9068 45a45b-45a467 call 45a938 9057->9068 9058->9057 9064->9034 9075 45a4a5-45a4e6 9067->9075 9076 45a4a2-45a4a3 9067->9076 9068->9067 9074 45a469 9068->9074 9077 45a46b-45a473 call 45ac60 9074->9077 9078 45a507-45a515 9075->9078 9079 45a4e8-45a4ec 9075->9079 9076->9077 9077->9043 9081 45a5a0 9078->9081 9082 45a51b-45a51f 9078->9082 9079->9078 9080 45a4ee-45a502 9079->9080 9080->9078 9081->9043 9082->9081 9084 45a521-45a554 CloseHandle call 45a729 9082->9084 9088 45a556-45a582 GetLastError call 44a9cc call 455c89 9084->9088 9089 45a588-45a59c 9084->9089 9088->9089 9089->9081
            APIs
              • Part of subcall function 0045A729: CreateFileW.KERNEL32(00000000,00000000,?,0045A326,?,?,00000000,?,0045A326,00000000,0000000C), ref: 0045A746
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00001EFB), ref: 0045A391
            • __dosmaperr.LIBCMT ref: 0045A398
            • GetFileType.KERNEL32(00000000), ref: 0045A3A4
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00001EFB), ref: 0045A3AE
            • __dosmaperr.LIBCMT ref: 0045A3B7
            • CloseHandle.KERNEL32(00000000), ref: 0045A3D7
            • CloseHandle.KERNEL32(00000000), ref: 0045A524
            • GetLastError.KERNEL32 ref: 0045A556
            • __dosmaperr.LIBCMT ref: 0045A55D
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
            • String ID:
            • API String ID: 4237864984-0
            • Opcode ID: 55320916d828ae0cd40da7d50a2e62aa374f4779e3897207c8b692d5ec426c28
            • Instruction ID: d686bd5d26923eca63759877139bb571ce72897651dc559e2e2611c40fd98f83
            • Opcode Fuzzy Hash: 55320916d828ae0cd40da7d50a2e62aa374f4779e3897207c8b692d5ec426c28
            • Instruction Fuzzy Hash: 3DA16872A101149FDF099F68DC46BAE3BA0AB06315F14025EFC01DF3A2D738986AC75B
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 9495 401a6d-401a87 call 401681 9498 401c68-401c6a 9495->9498 9499 401a8d 9495->9499 9500 401c6d-401c71 9498->9500 9501 401aa0-401aa9 call 401723 9499->9501 9502 401df0-401dfb call 4013e9 9499->9502 9503 401a94-401a9a 9499->9503 9504 401de4-401f68 call 408857 9499->9504 9505 401ae5-401af9 call 401444 call 4019c3 9499->9505 9506 401ba7-401bbe call 4014b0 call 401858 9499->9506 9507 401e59-401e7f call 40147a call 4015df call 408857 9499->9507 9508 401c1c-401c2e call 4014e6 call 401a25 9499->9508 9509 401afe-401b15 call 40147a call 4017d8 9499->9509 9510 401e1e-401e29 call 401444 9499->9510 9501->9498 9532 401aaf-401abd call 401969 9501->9532 9538 401e01-401e19 call 401416 call 4088b0 9502->9538 9539 402242 9502->9539 9503->9501 9537 401f6d-401f6f 9504->9537 9505->9500 9506->9498 9553 401bc4-401bdc call 4014b0 call 4016ec 9506->9553 9507->9539 9564 401e85-401e89 9507->9564 9508->9500 9509->9498 9555 401b1b-401b34 call 40147a call 4015df 9509->9555 9534 401e2b 9510->9534 9535 401e2d-401e3a 9510->9535 9532->9498 9560 401ac3-401ad3 call 401998 9532->9560 9534->9535 9548 401e3c 9535->9548 9549 401e3e-401e54 call 40112c 9535->9549 9540 402244-40224b 9537->9540 9541 401f75-401f78 9537->9541 9538->9537 9539->9540 9541->9540 9548->9549 9549->9537 9581 401c30-401c32 9553->9581 9582 401bde-401be1 9553->9582 9555->9581 9583 401b3a-401b3e 9555->9583 9560->9498 9576 401ad9-401ae0 9560->9576 9568 401e8b 9564->9568 9569 401e8d-401ea8 9564->9569 9568->9569 9573 401f7d-401f83 9569->9573 9574 401eae-401ebc call 408857 9569->9574 9578 402229-40223c call 408857 9573->9578 9579 401f89-401f99 call 4015ee 9573->9579 9574->9539 9591 401ec2-401ec6 9574->9591 9593 401c63-401c66 9576->9593 9578->9539 9603 40223e-402240 9578->9603 9596 4020ed-4020f0 9579->9596 9597 401f9f-401fb3 9579->9597 9581->9498 9586 401be3-401bf8 call 4016c2 call 401a6d 9582->9586 9589 401b40-401b61 call 4015ee call 40134b call 401a6d 9583->9589 9614 401c34-401c37 9586->9614 9615 401bfa-401c07 call 401c72 9586->9615 9622 401b67-401b72 call 401335 9589->9622 9623 401c5a 9589->9623 9598 401ec8 9591->9598 9599 401eca-401ecc 9591->9599 9593->9498 9596->9539 9605 401fb5-401fba 9597->9605 9598->9599 9599->9579 9603->9539 9608 401fd7-401fef call 44e760 call 4088b0 9605->9608 9609 401fbc-401fc9 call 408875 9605->9609 9608->9596 9633 401ff5-401ff9 9608->9633 9609->9596 9625 401fcf-401fd1 9609->9625 9618 401c5e call 40173f 9614->9618 9628 401c39-401c45 call 40173f 9615->9628 9629 401c09-401c15 call 4016ec 9615->9629 9618->9593 9640 401c51-401c57 call 40173f 9622->9640 9641 401b78-401b8a call 401cb8 9622->9641 9623->9618 9631 401fd3 9625->9631 9632 401fd5 9625->9632 9628->9618 9629->9586 9645 401c17-401c1a 9629->9645 9631->9632 9632->9608 9637 401ffb 9633->9637 9638 401ffd-40200b call 408857 9633->9638 9637->9638 9638->9596 9650 402011-402015 9638->9650 9640->9623 9651 401b90-401b9c call 4015df 9641->9651 9652 401c47-401c4e 9641->9652 9645->9498 9653 402017 9650->9653 9654 402019-402025 9650->9654 9651->9589 9662 401b9e-401ba2 9651->9662 9652->9640 9653->9654 9657 402043-402067 call 401618 call 401db8 9654->9657 9658 402027-402035 call 408857 9654->9658 9657->9596 9670 40206d-402071 9657->9670 9658->9596 9666 40203b-40203d 9658->9666 9662->9498 9668 402041 9666->9668 9669 40203f 9666->9669 9668->9657 9669->9668 9671 402073 9670->9671 9672 402075-40207b 9670->9672 9671->9672 9673 40209b 9672->9673 9674 40207d-40208b call 408857 9672->9674 9675 40209f-4020a1 9673->9675 9674->9596 9680 40208d-40208f 9674->9680 9678 4020a3-4020b1 call 408857 9675->9678 9679 4020cb-4020d0 9675->9679 9678->9596 9688 4020b3-4020b9 9678->9688 9679->9578 9681 4020d6-4020e7 call 4015ee 9679->9681 9684 402091 9680->9684 9685 402093-402099 9680->9685 9681->9596 9681->9605 9684->9685 9685->9675 9689 4020bb 9688->9689 9690 4020bd-4020c4 9688->9690 9689->9690 9690->9681 9691 4020c6-40220f 9690->9691 9691->9578 9693 402211-40221f call 408875 9691->9693 9693->9539 9696 402221-402223 9693->9696 9697 402225 9696->9697 9698 402227 9696->9698 9697->9698 9698->9578
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: _strlen
            • String ID: wr$%1.17g$,]{: }$null$BF$BF
            • API String ID: 4218353326-2456199790
            • Opcode ID: 3dfd42b57767dc8270ba4dc7648a312b6cebebe134f354f52bc026d4dca15a1d
            • Instruction ID: 46e47a4cd59045c846db78e3bba410f39dddad80144ed0f5791ee4b301c79d68
            • Opcode Fuzzy Hash: 3dfd42b57767dc8270ba4dc7648a312b6cebebe134f354f52bc026d4dca15a1d
            • Instruction Fuzzy Hash: 94B1CDA2B043015BE70076765E8662B61DA9F90348F18453FED4AF33E2FA7DDD11829B
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 9699 45fe6f-45fe9a call 462550 9702 45fea0-45fea3 9699->9702 9703 46020e-460213 call 452344 9699->9703 9702->9703 9704 45fea9-45feb2 9702->9704 9706 45ffaf-45ffb5 9704->9706 9707 45feb8-45febc 9704->9707 9710 45ffbd-45ffcb 9706->9710 9707->9706 9709 45fec2-45fec9 9707->9709 9711 45fee1-45fee6 9709->9711 9712 45fecb-45fed2 9709->9712 9713 460177-46017a 9710->9713 9714 45ffd1-45ffd5 9710->9714 9711->9706 9716 45feec-45fef4 call 4523d6 9711->9716 9712->9711 9715 45fed4-45fedb 9712->9715 9717 46017c-46017f 9713->9717 9718 46019d-4601a6 call 4523d6 9713->9718 9714->9713 9719 45ffdb-45ffe2 9714->9719 9715->9706 9715->9711 9732 4601a8-4601ac 9716->9732 9735 45fefa-45ff13 call 4523d6 * 2 9716->9735 9717->9703 9721 460185-46019a call 460294 9717->9721 9718->9703 9718->9732 9722 45ffe4-45ffeb 9719->9722 9723 45fffa-460000 9719->9723 9721->9718 9722->9723 9727 45ffed-45fff4 9722->9727 9728 460006-46002d call 455756 9723->9728 9729 460117-46011b 9723->9729 9727->9713 9727->9723 9728->9729 9741 460033-460036 9728->9741 9733 460127-460133 9729->9733 9734 46011d-460126 call 440668 9729->9734 9733->9718 9739 460135-46013f 9733->9739 9734->9733 9735->9703 9758 45ff19-45ff1f 9735->9758 9743 460141-460143 9739->9743 9744 46014d-46014f 9739->9744 9746 460039-46004e 9741->9746 9743->9718 9747 460145-460149 9743->9747 9748 460166-460173 call 45fa26 9744->9748 9749 460151-460164 call 4523d6 * 2 9744->9749 9753 460054-460057 9746->9753 9754 4600f8-46010b 9746->9754 9747->9718 9756 46014b 9747->9756 9766 460175 9748->9766 9767 4601d2-4601e7 call 4523d6 * 2 9748->9767 9773 4601ad call 451b1a 9749->9773 9753->9754 9760 46005d-460065 9753->9760 9754->9746 9759 460111-460114 9754->9759 9756->9749 9763 45ff21-45ff25 9758->9763 9764 45ff4b-45ff53 call 4523d6 9758->9764 9759->9729 9760->9754 9765 46006b-46007f 9760->9765 9763->9764 9769 45ff27-45ff2e 9763->9769 9783 45ff55-45ff75 call 4523d6 * 2 call 45fa26 9764->9783 9784 45ffb7-45ffba 9764->9784 9770 460082-460093 9765->9770 9766->9718 9796 4601ec-460209 call 4557f6 call 45f6d1 call 45f6e9 call 45fac0 9767->9796 9797 4601e9 9767->9797 9774 45ff30-45ff37 9769->9774 9775 45ff42-45ff45 9769->9775 9776 460095-4600a6 call 45fb08 9770->9776 9777 4600b9-4600c6 9770->9777 9787 4601b2-4601cd call 440668 call 45f77d call 4625fd 9773->9787 9774->9775 9781 45ff39-45ff40 9774->9781 9775->9703 9775->9764 9793 4600ca-4600f2 call 460214 9776->9793 9794 4600a8-4600b1 9776->9794 9777->9770 9786 4600c8 9777->9786 9781->9764 9781->9775 9783->9784 9813 45ff77-45ff7c 9783->9813 9784->9710 9791 4600f5 9786->9791 9787->9767 9791->9754 9793->9791 9794->9776 9801 4600b3-4600b6 9794->9801 9796->9703 9797->9796 9801->9777 9813->9773 9815 45ff82-45ff95 call 45f7ee 9813->9815 9815->9787 9820 45ff9b-45ffa7 9815->9820 9820->9773 9821 45ffad 9820->9821 9821->9815
            APIs
            • type_info::operator==.LIBVCRUNTIME ref: 0045FF8E
            • CatchIt.LIBVCRUNTIME ref: 004600ED
            • _UnwindNestedFrames.LIBCMT ref: 004601EE
            • CallUnexpected.LIBVCRUNTIME ref: 00460209
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: CallCatchFramesNestedUnexpectedUnwindtype_info::operator==
            • String ID: csm$csm$csm
            • API String ID: 2332921423-393685449
            • Opcode ID: 2090d5bb0acad8684a595240ae2f87c6eff5326107e89bc7c1ff7f0c72ce1e33
            • Instruction ID: 2b3abcc206f024861a136704ea370c9ed85d4f450db034c067ab4b26c105e929
            • Opcode Fuzzy Hash: 2090d5bb0acad8684a595240ae2f87c6eff5326107e89bc7c1ff7f0c72ce1e33
            • Instruction Fuzzy Hash: DFB18932800209EFCF14DFA5D9819AFB7B5BF05305B14406BEC116B212E379DA59CF9A
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 9822 432e62-432e80 GetSystemMetrics 9823 432e82-432e8a 9822->9823 9824 432f07-432f0c 9823->9824 9825 432e8c-432e91 9823->9825 9826 432f12-432f17 9824->9826 9827 432fa6-432fab 9824->9827 9828 432f62-432f67 9825->9828 9829 432e97-432e9c 9825->9829 9832 43301a-43301f 9826->9832 9833 432f1d-432f22 9826->9833 9830 432fb1-432fb6 9827->9830 9831 433076-43307b 9827->9831 9834 433046-43304b 9828->9834 9835 432f6d-432f72 9828->9835 9836 432fd3-432fd8 9829->9836 9837 432ea2-432ea7 9829->9837 9838 4331cc-4331dc 9830->9838 9839 432fbc-432fc1 9830->9839 9840 433081-433086 9831->9840 9841 433219-43322b call 433261 9831->9841 9846 433025-43302a 9832->9846 9847 4331ed-4331fd 9832->9847 9842 433132-433163 CreateDCW 9833->9842 9843 432f28-432f2d 9833->9843 9850 433202-433214 GetSystemMetrics 9834->9850 9851 433051-433056 9834->9851 9848 433174-43319d 9835->9848 9849 432f78-432f7d 9835->9849 9844 4331e1-4331e8 9836->9844 9845 432fde-432fe3 9836->9845 9852 4330a9-4330d2 call 433261 9837->9852 9853 432ead-432eb2 9837->9853 9838->9823 9854 432fc7-432fce 9839->9854 9855 43323f-433244 9839->9855 9840->9823 9864 43308c-43309a 9840->9864 9873 433230-43323a 9841->9873 9842->9823 9865 432f33-432f38 9843->9865 9866 433168-43316f 9843->9866 9844->9823 9845->9823 9858 432fe9-43300b 9845->9858 9846->9823 9859 433030-433041 9846->9859 9847->9823 9856 4331a4-4331a7 9848->9856 9857 43319f 9848->9857 9868 432f83-432f88 9849->9868 9869 4331ac-4331c7 call 432c39 9849->9869 9850->9823 9851->9823 9861 43305c-433067 9851->9861 9852->9856 9887 4330d8-4330dd 9852->9887 9862 4330e2-433129 call 4337e0 call 432c39 9853->9862 9863 432eb8-432ebd 9853->9863 9854->9823 9855->9823 9877 43324a-433260 DeleteDC 9855->9877 9856->9823 9857->9856 9871 433012-433015 9858->9871 9872 43300d 9858->9872 9859->9823 9874 433069 9861->9874 9875 43306e-433071 9861->9875 9862->9856 9890 43312b-433130 9862->9890 9863->9823 9876 432ebf-432f02 call 4337e0 9863->9876 9878 4330a1-4330a4 9864->9878 9879 43309c 9864->9879 9865->9823 9880 432f3e-432f5d call 4332d1 9865->9880 9866->9823 9868->9823 9883 432f8e-432f9b 9868->9883 9869->9823 9871->9823 9872->9871 9873->9823 9874->9875 9875->9856 9876->9823 9878->9856 9879->9878 9880->9873 9889 432fa1 9883->9889 9883->9890 9887->9856 9889->9856 9890->9856
            APIs
            • GetSystemMetrics.USER32(00000000), ref: 00432E6D
            • CreateDCW.GDI32(00000000,00000000,00000000,00000000), ref: 00433153
            • GetSystemMetrics.USER32(00000001), ref: 00433204
            • DeleteDC.GDI32(?), ref: 00433250
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: MetricsSystem$CreateDelete
            • String ID: xG%$xG%$xG%
            • API String ID: 1043530637-1616704207
            • Opcode ID: 704ab9ae53338d9c11fc060a0fac058ebf6f65491b83a0fa5fa0adda410b95e9
            • Instruction ID: 809d23d9da762772d83b57479b3c5423d1b44b0536bc0b36b4e4cd74ecdcf2b6
            • Opcode Fuzzy Hash: 704ab9ae53338d9c11fc060a0fac058ebf6f65491b83a0fa5fa0adda410b95e9
            • Instruction Fuzzy Hash: 4C917871E002098BDF249F98C98657FBA71AB9C311F246517E411E7390D7BD8B40CB9B
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 9895 433918-433950 GetModuleHandleW GetModuleFileNameA 9896 433955-43395a 9895->9896 9897 433997-43399c 9896->9897 9898 43395c-433961 9896->9898 9899 4339a2-4339a7 9897->9899 9900 433a2c-433a31 9897->9900 9901 433963-433968 9898->9901 9902 4339cc-4339d1 9898->9902 9905 433aa8-433aad 9899->9905 9906 4339ad-4339b2 9899->9906 9903 433a37-433a3c 9900->9903 9904 433b5f-433b89 CreateFileA GetFileSizeEx 9900->9904 9909 43396e-433973 9901->9909 9910 433a5d-433a62 9901->9910 9907 4339d7-4339dc 9902->9907 9908 433af9-433afe 9902->9908 9911 433a42-433a47 9903->9911 9912 433b8e-433b9c CloseHandle 9903->9912 9904->9896 9919 433ab3-433ab8 9905->9919 9920 433bab-433bc1 9905->9920 9913 433b20-433b33 9906->9913 9914 4339b8-4339bd 9906->9914 9917 4339e2-4339e7 9907->9917 9918 433b38-433b5a call 424ad3 9907->9918 9921 433bc6-433bcb 9908->9921 9922 433b04-433b11 9908->9922 9923 433b16-433b1b 9909->9923 9924 433979-43397e 9909->9924 9915 433ba1-433ba6 9910->9915 9916 433a68-433a6d 9910->9916 9911->9896 9929 433a4d-433a58 9911->9929 9912->9896 9913->9896 9914->9896 9926 4339bf-4339ca GetCurrentProcessId 9914->9926 9915->9896 9916->9896 9930 433a73-433a98 9916->9930 9917->9896 9928 4339ed-433a27 call 442180 call 433bf0 call 442180 9917->9928 9918->9896 9919->9896 9931 433abe-433ae9 9919->9931 9920->9896 9921->9896 9927 433bd1-433be5 WinExec ExitProcess 9921->9927 9922->9896 9923->9896 9924->9896 9932 433980-433995 9924->9932 9926->9896 9928->9896 9929->9896 9930->9896 9934 433a9e-433aa3 9930->9934 9931->9896 9936 433aef-433af4 9931->9936 9932->9896 9934->9896 9936->9896
            APIs
            • GetModuleHandleW.KERNEL32(00000000), ref: 0043392B
            • GetModuleFileNameA.KERNEL32(00000000,?,00000200), ref: 0043393E
            • GetCurrentProcessId.KERNEL32 ref: 004339BF
            • CreateFileA.KERNEL32(?,80000000,00000007,00000000,00000003,00000000,00000000), ref: 00433B6E
            • GetFileSizeEx.KERNEL32(?,?), ref: 00433B7E
            • CloseHandle.KERNEL32(?), ref: 00433B91
            • WinExec.KERNEL32(?,00000000), ref: 00433BDE
            • ExitProcess.KERNEL32 ref: 00433BE5
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: File$HandleModuleProcess$CloseCreateCurrentExecExitNameSize
            • String ID:
            • API String ID: 3992844039-0
            • Opcode ID: 5d50565b87c74c25e674ebbb3917f5898fd203779ab18c8b2297214b87599f5b
            • Instruction ID: 42f2e7484e317dff0cded6fa20739e2dbf8c3365bc58c627dfe3ab1d9c72692e
            • Opcode Fuzzy Hash: 5d50565b87c74c25e674ebbb3917f5898fd203779ab18c8b2297214b87599f5b
            • Instruction Fuzzy Hash: 7B513FB0500702DBEF305E298C49B277AE8EB09316F10592BF56BD7661D25CEA414F4B
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 9942 452b25-452b31 9943 452bc3-452bc6 9942->9943 9944 452b36-452b47 9943->9944 9945 452bcc 9943->9945 9947 452b54-452b6d LoadLibraryExW 9944->9947 9948 452b49-452b4c 9944->9948 9946 452bce-452bd2 9945->9946 9951 452bd3-452be3 9947->9951 9952 452b6f-452b78 GetLastError 9947->9952 9949 452b52 9948->9949 9950 452bec-452bee 9948->9950 9954 452bc0 9949->9954 9950->9946 9951->9950 9953 452be5-452be6 FreeLibrary 9951->9953 9955 452bb1-452bbe 9952->9955 9956 452b7a-452b8c call 4572de 9952->9956 9953->9950 9954->9943 9955->9954 9956->9955 9959 452b8e-452ba0 call 4572de 9956->9959 9959->9955 9962 452ba2-452baf LoadLibraryExW 9959->9962 9962->9951 9962->9955
            APIs
            • FreeLibrary.KERNEL32(00000000,?,00452C32,?,004547C2,0040E684,00000000,00000000,?,004529E6,00000021,FlsSetValue,00468EBC,FlsSetValue,0040E684), ref: 00452BE6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: FreeLibrary
            • String ID: api-ms-$ext-ms-
            • API String ID: 3664257935-537541572
            • Opcode ID: 0817c6fdddb93c04141847eff1b073e1fa4e6ce4b27c88aac43368bc9e15ce19
            • Instruction ID: 6976ddfbd8caaaab8d9eba1252bcab6e0a937b58ea562e8a41fe0d7736555f76
            • Opcode Fuzzy Hash: 0817c6fdddb93c04141847eff1b073e1fa4e6ce4b27c88aac43368bc9e15ce19
            • Instruction Fuzzy Hash: 9C212772A00111ABDB219F25DD81A5B3798DB423A1F240227FD05A73D2E7F8FD09C6E9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00432C8D
            • SelectObject.GDI32(?,?), ref: 00432CA6
            • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00432CBF
            • SelectObject.GDI32(?,?), ref: 00432CCD
            • CreateCompatibleDC.GDI32(?), ref: 00432CD7
            • DeleteDC.GDI32 ref: 00432CFC
            • DeleteObject.GDI32(?), ref: 00432D06
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: Object$CompatibleCreateDeleteSelect$Bitmap
            • String ID:
            • API String ID: 1142853709-0
            • Opcode ID: 5e6de1d900ebce608c7af7884446a37b8f8acb441115ef96ab31e7277cecc51a
            • Instruction ID: b686beea4571f1d93e00d5ed4cbe06049545703ddf7aa3d0d622d75235c18fb1
            • Opcode Fuzzy Hash: 5e6de1d900ebce608c7af7884446a37b8f8acb441115ef96ab31e7277cecc51a
            • Instruction Fuzzy Hash: AB214D74008301AFCA205B16CE48C2FBFE5EF8A754F10A92AF54996230D276CC15DF5B
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e4298f341c87ad7ecc65fc2515203ce02bb884cc00d73e76c464ceaa9f44a691
            • Instruction ID: 535c8b7328ef8ee6fbffdb1d368c7309bd8b452e2aa5fc4b7a8846e5273e53cb
            • Opcode Fuzzy Hash: e4298f341c87ad7ecc65fc2515203ce02bb884cc00d73e76c464ceaa9f44a691
            • Instruction Fuzzy Hash: BFB1E6B0A40245AFDB01EF9AC880BAE7BB1FF45305F14415EE904A7353CF789949CB6A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __allrem.LIBCMT ref: 0044BAF4
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0044BB10
            • __allrem.LIBCMT ref: 0044BB27
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0044BB45
            • __allrem.LIBCMT ref: 0044BB5C
            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0044BB7A
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
            • String ID:
            • API String ID: 1992179935-0
            • Opcode ID: 42e732099961271773518375950b9bbbde2696299b357054213fd541dae8fcab
            • Instruction ID: ef365a049af607343f8be8b3212049103782158540b08e4f71d0ca1a46f63308
            • Opcode Fuzzy Hash: 42e732099961271773518375950b9bbbde2696299b357054213fd541dae8fcab
            • Instruction Fuzzy Hash: 0881E8B16007069BF7209E6ACC42B6B73A9EF44364F14452FF911D67C2E778E9048798
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: _strlen
            • String ID:
            • API String ID: 4218353326-0
            • Opcode ID: 1279646038f4eb41b2bd07993c26e31ef37e16e72cf87688ed1b97db0c92eb2e
            • Instruction ID: 31a46be2a31faabc304eb1bdf659b1fcc976e09cf6aa6257a5c0f96d6c47ac14
            • Opcode Fuzzy Hash: 1279646038f4eb41b2bd07993c26e31ef37e16e72cf87688ed1b97db0c92eb2e
            • Instruction Fuzzy Hash: 3641E8B6901615AFD711AF25EC82EAB37A4AF5A31CB040069FC0867303E7357915C7EB
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetLastError.KERNEL32(?,?,004523DB,00440746,00440297), ref: 004523F2
            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00452400
            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00452419
            • SetLastError.KERNEL32(00000000,004523DB,00440746,00440297), ref: 0045246B
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: ErrorLastValue___vcrt_
            • String ID:
            • API String ID: 3852720340-0
            • Opcode ID: 6d7a42854ded5e81f902fb76ef248f452ca56cf4c94cbb179f9564bdfd7eb750
            • Instruction ID: 597ddafc9b9e2fbb5cd57ad523608a9298ce0246d25c5e9403f95b32d94ef4aa
            • Opcode Fuzzy Hash: 6d7a42854ded5e81f902fb76ef248f452ca56cf4c94cbb179f9564bdfd7eb750
            • Instruction Fuzzy Hash: 8001F53260A6119EA729267A6E8A55B2784DB0373A720023FFD14811F3EAE95849955C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: _wcsrchr
            • String ID: .bat$.cmd$.com$.exe
            • API String ID: 1752292252-4019086052
            • Opcode ID: bf0b226e64b7cfe6f3ea0fe735921e0758539ee7ac38937f75869f14156e00cf
            • Instruction ID: 36138afea54e0842e8f31e780b47815ef1dff893f306121da2e1b7db6d1727af
            • Opcode Fuzzy Hash: bf0b226e64b7cfe6f3ea0fe735921e0758539ee7ac38937f75869f14156e00cf
            • Instruction Fuzzy Hash: 9201CE27605B6121B6545029BC43B371298CB82BB972A022FFC80F77C1FE5CED4251AD
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,A2592230,0040126C,?,00000000,00463A1B,000000FF,?,00449BE2,00449A7D,?,00449C9D,00000000), ref: 00449B4D
            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00449B5F
            • FreeLibrary.KERNEL32(00000000,?,00000000,00463A1B,000000FF,?,00449BE2,00449A7D,?,00449C9D,00000000), ref: 00449B81
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: AddressFreeHandleLibraryModuleProc
            • String ID: CorExitProcess$mscoree.dll
            • API String ID: 4061214504-1276376045
            • Opcode ID: b4d226edc4749f5c4451dcd5bd984346dff06116924e798a03c91685db550508
            • Instruction ID: 00473055117681dd4dade9d2ba92c4763d954cf16130cf2196dd6efc935b9a4d
            • Opcode Fuzzy Hash: b4d226edc4749f5c4451dcd5bd984346dff06116924e798a03c91685db550508
            • Instruction Fuzzy Hash: A301DF31940659ABDB018F50DC04FEFB7F8FB04B16F004236E812A2390EBB8AC00CA99
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7c3256c3a026bf27264cba199f2fb18a9f09c8de035dfd3c98c395692d3a7f1a
            • Instruction ID: 07b4ae62025cfa2ab7cebcdc06eacc2ede3ae4cb009f71dee31f2ce0e74a9c58
            • Opcode Fuzzy Hash: 7c3256c3a026bf27264cba199f2fb18a9f09c8de035dfd3c98c395692d3a7f1a
            • Instruction Fuzzy Hash: A951877990121DAEDF00EFE5D940AEEB7B8EF08710F14401BE915E7250E734DA41CB69
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFileType.KERNEL32(?,00000006,00000000,00004E30), ref: 0044CEF6
            • GetFileInformationByHandle.KERNEL32(?,?), ref: 0044CF50
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0044CDF9,00000006), ref: 0044CFDE
            • __dosmaperr.LIBCMT ref: 0044CFE5
            • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 0044D022
              • Part of subcall function 0044CB9B: __dosmaperr.LIBCMT ref: 0044CBD0
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
            • String ID:
            • API String ID: 1206951868-0
            • Opcode ID: 6582b9a8b11f24c48ac9f52b36256c1f576d1258e3a4620e80b8f8e1ec7abe00
            • Instruction ID: bd4d03b9a771159d5fef617030593d0560d8a05a51b5bf4aa89a7dea884668b4
            • Opcode Fuzzy Hash: 6582b9a8b11f24c48ac9f52b36256c1f576d1258e3a4620e80b8f8e1ec7abe00
            • Instruction Fuzzy Hash: 0D416175900604AFEB24DF66DC859ABBBF9EF88304B04492EF856D3650EB389845CB25
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,0046019A,?,?,00000000,00000000,00000000,?), ref: 004602B9
            • CatchIt.LIBVCRUNTIME ref: 0046039F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: CatchEncodePointer
            • String ID: MOC$RCC
            • API String ID: 1435073870-2084237596
            • Opcode ID: ac7d6af183050187c71f16ffe7246f96f2fe5b68b95ce09ed853238f4b720782
            • Instruction ID: d395cb6d3643f747b4f1ed03c217f0cf3e407a9dee712a73095eddbd861a0f34
            • Opcode Fuzzy Hash: ac7d6af183050187c71f16ffe7246f96f2fe5b68b95ce09ed853238f4b720782
            • Instruction Fuzzy Hash: 85415972900209EFCF16DF94CD81AAF7BB5BF48305F14809AFD04A7221E3799990DB5A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,0045D29D,0040126C,00000000,00000000,?,?,?,0045D0E5,00000000,FlsAlloc,00469F00,00469F08), ref: 0045D20E
            • GetLastError.KERNEL32(?,0045D29D,0040126C,00000000,00000000,?,?,?,0045D0E5,00000000,FlsAlloc,00469F00,00469F08,0040126C,?,00452392), ref: 0045D218
            • LoadLibraryExW.KERNEL32(?,00000000,00000000,0040126C,?,00452392,00452476,00000003,00452E96), ref: 0045D240
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: LibraryLoad$ErrorLast
            • String ID: api-ms-
            • API String ID: 3177248105-2084034818
            • Opcode ID: e2333dca0049899a034056aca4725402997ce5ec5efa653afd9e8b28abf10914
            • Instruction ID: 2f8e1eed1b80e3f53c297ac97a4cb6e7ce7407ae9afc80613234471b12a125ca
            • Opcode Fuzzy Hash: e2333dca0049899a034056aca4725402997ce5ec5efa653afd9e8b28abf10914
            • Instruction Fuzzy Hash: FAE04830680204B7EF302B62EC06B593B959F50B56F144171FD0CA55E1E7A5E855855E
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetConsoleOutputCP.KERNEL32(A2592230,0045A462,00000000,?), ref: 004563BD
              • Part of subcall function 00458E13: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0045DB6E,?,00000000,-00000008), ref: 00458EBF
            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00456618
            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00456660
            • GetLastError.KERNEL32 ref: 00456703
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
            • String ID:
            • API String ID: 2112829910-0
            • Opcode ID: 9688f8e74edcdb5a3ac1c3708623ac9e564f5d8f12358ac89904943cb75c7869
            • Instruction ID: 1e2e37625c27f31410b472735243b7557da6028281b411b2d6bd2d62629f044e
            • Opcode Fuzzy Hash: 9688f8e74edcdb5a3ac1c3708623ac9e564f5d8f12358ac89904943cb75c7869
            • Instruction Fuzzy Hash: 83D18AB5D00248AFCF11CFE8D8809ADBBB5FF08315F59452AE816E7352E634A946CF58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetProcessHeap.KERNEL32 ref: 00433548
            • HeapFree.KERNEL32(00000000,00000000,?), ref: 00433554
              • Part of subcall function 00432E62: GetSystemMetrics.USER32(00000000), ref: 00432E6D
              • Part of subcall function 00432D18: GetDesktopWindow.USER32 ref: 00432D5A
              • Part of subcall function 00432D18: GetDC.USER32(00000000), ref: 00432D61
              • Part of subcall function 00432D18: SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00432DAE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: HeapSystem$DesktopFreeInfoMetricsParametersProcessWindow
            • String ID: rA1$rA1
            • API String ID: 2787761496-1067413765
            • Opcode ID: 5a4700ff93160020465b4f5b8e585966a08a18ddb5dea9776d12ed82fbcf6752
            • Instruction ID: a981ae49f0fa2f3a87aaa150ee95751289bc2fc848a7d7049935d0dc7cf0988e
            • Opcode Fuzzy Hash: 5a4700ff93160020465b4f5b8e585966a08a18ddb5dea9776d12ed82fbcf6752
            • Instruction Fuzzy Hash: 02A13CB1C00309DBDF248F98CC826BE7664EB18315F24A92BE511FA391D77D9B418B5B
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: AdjustPointer
            • String ID:
            • API String ID: 1740715915-0
            • Opcode ID: cabf343da66962419476e86db718fbbbff32d26141bceb274d6e4343c333b25a
            • Instruction ID: 013a60d334ea8d57af88b4ac8e385ded791458be1aa6c3f4d8da466b4dcd3ffb
            • Opcode Fuzzy Hash: cabf343da66962419476e86db718fbbbff32d26141bceb274d6e4343c333b25a
            • Instruction Fuzzy Hash: 3251C17250020A9FEB2A8F55C841BAA73A4FF01716F14443FED1547292E739EC4DCB9A
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 069da7ea26a0592ea2c6dd369b41f9c3e03cf53d43b37528806a8031e2738322
            • Instruction ID: ebb2b29dabbf547231e61ec3e76356dd2a8ff96ace66229c97dfb8df07e710a4
            • Opcode Fuzzy Hash: 069da7ea26a0592ea2c6dd369b41f9c3e03cf53d43b37528806a8031e2738322
            • Instruction Fuzzy Hash: 92410BB2A00348FFD7259F39C841B5A7BA8EB44715F10852FF911DB282E7799D198788
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetFilePointerEx.KERNEL32(?,00000000,00000000,0044E464,00000001,?,0044E464,004011D8,?,00000000), ref: 00456B67
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,004011D8,00000000), ref: 00456B74
            • SetFilePointerEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,004011D8,00000000), ref: 00456B9A
            • SetFilePointerEx.KERNEL32(?,00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00456BC0
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: FilePointer$ErrorLast
            • String ID:
            • API String ID: 142388799-0
            • Opcode ID: 5b56bcbd4c671fecd75217bdbb02ef0464eaecf8ac0f59643d9c94699803eb38
            • Instruction ID: 23e91fdcb1a7104bc3273f7a94d4b7c242fe8f20993f077516c42dfe65022fe4
            • Opcode Fuzzy Hash: 5b56bcbd4c671fecd75217bdbb02ef0464eaecf8ac0f59643d9c94699803eb38
            • Instruction Fuzzy Hash: 66118875800128BBDB10AF5ACC089DF3FB9EF00365F404519F820972A1E7709A44DBA5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFullPathNameW.KERNEL32(00000006,?,?,00000000,0045B8AF,00000000,?,004618EC,0045B8AF,?,00000006,00000000,00000104,00004E30,00000001,00000000), ref: 0045B9CC
            • GetLastError.KERNEL32(?,004618EC,0045B8AF,?,00000006,00000000,00000104,00004E30,00000001,00000000,00000000,?,0045B8AF,00004E30,00000104,?), ref: 0045B9D6
            • __dosmaperr.LIBCMT ref: 0045B9DD
            • GetFullPathNameW.KERNEL32(00000006,?,?,00000000,?,?,004618EC,0045B8AF,?,00000006,00000000,00000104,00004E30,00000001,00000000,00000000), ref: 0045BA07
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: FullNamePath$ErrorLast__dosmaperr
            • String ID:
            • API String ID: 1391015842-0
            • Opcode ID: ba5282754d184c6d309740ce3a9511922dd35345f1b2846f54f8b262bbf2378f
            • Instruction ID: 3745931c349c579b2146f67486802c36961f4fd332943e7a4ce3e28d139d4771
            • Opcode Fuzzy Hash: ba5282754d184c6d309740ce3a9511922dd35345f1b2846f54f8b262bbf2378f
            • Instruction Fuzzy Hash: 18F0A9752002006FD7306F67DC08D577BEDEF84361710442AF959C3221E775E81087A5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetFullPathNameW.KERNEL32(00000006,?,?,00000000,0045B8AF,00000000,?,00461874,0045B8AF,0045B8AF,?,00000006,00000000,00000104,00004E30,00000001), ref: 0045BA32
            • GetLastError.KERNEL32(?,00461874,0045B8AF,0045B8AF,?,00000006,00000000,00000104,00004E30,00000001,00000000,00000000,?,0045B8AF,00004E30,00000104), ref: 0045BA3C
            • __dosmaperr.LIBCMT ref: 0045BA43
            • GetFullPathNameW.KERNEL32(00000006,?,?,00000000,?,?,00461874,0045B8AF,0045B8AF,?,00000006,00000000,00000104,00004E30,00000001,00000000), ref: 0045BA6D
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: FullNamePath$ErrorLast__dosmaperr
            • String ID:
            • API String ID: 1391015842-0
            • Opcode ID: c5caae84886f4af998c3ce600fc4c0e628b8bd820caae2ca9c51f86d4988d584
            • Instruction ID: bf923fac6c2dad86a0d2781db911c3f037527751af333c588ac22f26e7570290
            • Opcode Fuzzy Hash: c5caae84886f4af998c3ce600fc4c0e628b8bd820caae2ca9c51f86d4988d584
            • Instruction Fuzzy Hash: 83F04476200301AFEB306F62DC08E577BEDEF54361714882AF959C3121EB75EC1597A9
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WriteConsoleW.KERNEL32(00000000,0045A462,00000000,00000000,00000000,?,0046043A,00000000,00000001,00000000,?,?,00456757,?,0045A462,00000000), ref: 0046269F
            • GetLastError.KERNEL32(?,0046043A,00000000,00000001,00000000,?,?,00456757,?,0045A462,00000000,?,?,?,004560A2,00449EFD), ref: 004626AB
              • Part of subcall function 004626FC: CloseHandle.KERNEL32(FFFFFFFE,004626BB,?,0046043A,00000000,00000001,00000000,?,?,00456757,?,0045A462,00000000,?,?), ref: 0046270C
            • ___initconout.LIBCMT ref: 004626BB
              • Part of subcall function 004626DD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00462679,00460427,?,?,00456757,?,0045A462,00000000,?), ref: 004626F0
            • WriteConsoleW.KERNEL32(00000000,0045A462,00000000,00000000,?,0046043A,00000000,00000001,00000000,?,?,00456757,?,0045A462,00000000,?), ref: 004626D0
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
            • String ID:
            • API String ID: 2744216297-0
            • Opcode ID: fd83122c02efdcaed0d2a7ad9df32816af1b9b6e46a8d175793a9f330eaa0680
            • Instruction ID: 28aeb1562bf03d41762a1add2850f363bd9bcc8f1066ddcb92c024103a38fac9
            • Opcode Fuzzy Hash: fd83122c02efdcaed0d2a7ad9df32816af1b9b6e46a8d175793a9f330eaa0680
            • Instruction Fuzzy Hash: 73F03736000518BBCF122F96DD0898A3FA6FB443E1F044462FA1C96130E77188A0AF9A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ___except_validate_context_record.LIBVCRUNTIME ref: 0044092F
            • __IsNonwritableInCurrentImage.LIBCMT ref: 004409E3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: CurrentImageNonwritable___except_validate_context_record
            • String ID: csm
            • API String ID: 3480331319-1018135373
            • Opcode ID: 275c96539a70827f11ac0d50cf1574406b2bf1ea013512e04c1c8eab895d6e0e
            • Instruction ID: 2fcdaa67747dfc903c6bf25bc4b0eb5fc3ce860e0e35b7b3f6278563bb9b42c1
            • Opcode Fuzzy Hash: 275c96539a70827f11ac0d50cf1574406b2bf1ea013512e04c1c8eab895d6e0e
            • Instruction Fuzzy Hash: 1641E774A00208ABEF10DF69C880A9EBBB5BF45314F14805BEA189B352D779E915CFD5
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ___except_validate_context_record.LIBVCRUNTIME ref: 0045FD76
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2877630848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2877613708.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877671150.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877693642.0000000000470000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877714274.0000000000473000.00000020.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2877732419.0000000000474000.00000008.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_Uqt8tDIQYk.jbxd
            Similarity
            • API ID: ___except_validate_context_record
            • String ID: csm$csm
            • API String ID: 3493665558-3733052814
            • Opcode ID: 7a135f77747070d93fbe2afbb920f71193ef7bb04584a8986e17e64043826707
            • Instruction ID: c3d2d9295f435962aeb7dc978c7452de5aec3cef12e0992502e4adce58ef7be8
            • Opcode Fuzzy Hash: 7a135f77747070d93fbe2afbb920f71193ef7bb04584a8986e17e64043826707
            • Instruction Fuzzy Hash: EC31C132400218ABCF264F50D8458AA7B66FB09316B18857BFC4449223D37AD86EDB8B
            Uniqueness

            Uniqueness Score: -1.00%