Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1430667
MD5:c6d4e7a7751714cacc798033a7405b3f
SHA1:c7a4c20ed1ff6b6eb9c6cc0d1388c05cb67a3be1
SHA256:c6ff8e76f68ee14c4c68827ad1eb0b49fbc2180c5ba1b44e85464c51469a2460
Tags:exe
Infos:

Detection

RisePro Stealer
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RisePro Stealer
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found potential dummy code loops (likely to delay analysis)
Found stalling execution ending in API Sleep call
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Potential thread-based time evasion detected
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7044 cmdline: "C:\Users\user\Desktop\file.exe" MD5: C6D4E7A7751714CACC798033A7405B3F)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 7044JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    No Sigma rule has matched
    Timestamp:04/24/24-02:13:59.503423
    SID:2049060
    Source Port:49732
    Destination Port:50500
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/24/24-02:18:00.111924
    SID:2046269
    Source Port:49732
    Destination Port:50500
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:04/24/24-02:13:59.816392
    SID:2046266
    Source Port:50500
    Destination Port:49732
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeVirustotal: Detection: 20%Perma Link
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

    Networking

    barindex
    Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.4:49732 -> 193.233.132.47:50500
    Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 193.233.132.47:50500 -> 192.168.2.4:49732
    Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49732 -> 193.233.132.47:50500
    Source: global trafficTCP traffic: 192.168.2.4:49732 -> 193.233.132.47:50500
    Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.47
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E14EB0 recv,recv,recv,recv,setsockopt,recv,recv,recv,__Xtime_get_ticks,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,Sleep,Sleep,0_2_00E14EB0
    Source: file.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
    Source: file.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
    Source: file.exeString found in binary or memory: http://ocsp.sectigo.com0
    Source: file.exe, 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
    Source: file.exe, 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
    Source: file.exeString found in binary or memory: https://sectigo.com/CPS0
    Source: file.exe, 00000000.00000002.4096544778.0000000000B5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
    Source: file.exe, 00000000.00000002.4096544778.0000000000B5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTlLHT
    Source: C:\Users\user\Desktop\file.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F32D850_2_00F32D85
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E940A00_2_00E940A0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D9001D0_2_00D9001D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E881A00_2_00E881A0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_011AC3160_2_011AC316
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E542200_2_00E54220
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E642200_2_00E64220
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D9035F0_2_00D9035F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E403500_2_00E40350
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E505200_2_00E50520
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DA47AD0_2_00DA47AD
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E8C8D00_2_00E8C8D0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D8C9500_2_00D8C950
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E94AE00_2_00E94AE0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E44AA00_2_00E44AA0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_01040B690_2_01040B69
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E44CD00_2_00E44CD0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_01130D7A0_2_01130D7A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E3CD200_2_00E3CD20
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DA8E200_2_00DA8E20
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E3CFC00_2_00E3CFC0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E44F700_2_00E44F70
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0118D1450_2_0118D145
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E450700_2_00E45070
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E510400_2_00E51040
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D5D1990_2_00D5D199
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D611350_2_00D61135
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E4D3200_2_00E4D320
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E554A00_2_00E554A0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E3D7D00_2_00E3D7D0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F557C30_2_00F557C3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D617430_2_00D61743
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E618D00_2_00E618D0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E459600_2_00E45960
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E95A400_2_00E95A40
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D9DA740_2_00D9DA74
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D59C900_2_00D59C90
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E45EB00_2_00E45EB0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E4DF200_2_00E4DF20
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E820C00_2_00E820C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0116A5B50_2_0116A5B5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF269F0_2_00EF269F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D8A9180_2_00D8A918
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E86B300_2_00E86B30
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00D84370 appears 39 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00E94890 appears 52 times
    Source: file.exeStatic PE information: invalid certificate
    Source: file.exe, 00000000.00000000.1640274378.000000000148D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSetup.exe@ vs file.exe
    Source: file.exeBinary or memory string: OriginalFilenameSetup.exe@ vs file.exe
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal88.troj.evad.winEXE@1/0@0/1
    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\trixyJzclrbU7IL69Jump to behavior
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: file.exe, file.exe, 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
    Source: file.exe, 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
    Source: file.exeVirustotal: Detection: 20%
    Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: d3d10warp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: dxcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: devobj.dllJump to behavior
    Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: file.exeStatic file information: File size 4019448 > 1048576
    Source: file.exeStatic PE information: Raw size of .vmp is bigger than: 0x100000 < 0x3a7e00
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E1C630 LoadLibraryA,GetProcAddress,0_2_00E1C630
    Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp
    Source: file.exeStatic PE information: section name: .vmp
    Source: file.exeStatic PE information: section name: .vmp
    Source: file.exeStatic PE information: section name: .vmp
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_01014B01 pushad ; iretd 0_2_01014B7F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_010B0CD0 push edx; ret 0_2_010B0CE4
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FD4E38 push eax; ret 0_2_00FD4E55
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_011992A3 push ss; iretd 0_2_011992F5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FED780 push eax; ret 0_2_00FED836
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0110996D push ebx; ret 0_2_010E6B57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00D762CE push ds; retf 0_2_00D762CF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F6E854 push esp; ret 0_2_00F6E85F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0110E9E3 push eax; retf 0_2_0117CFFE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_010E6B26 push ebx; ret 0_2_010E6B57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0108AD93 pushfd ; ret 0_2_0102181F

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\Desktop\file.exeMemory written: PID: 7044 base: 7F0005 value: E9 2B BA 6D 76 Jump to behavior
    Source: C:\Users\user\Desktop\file.exeMemory written: PID: 7044 base: 76ECBA30 value: E9 DA 45 92 89 Jump to behavior
    Source: C:\Users\user\Desktop\file.exeMemory written: PID: 7044 base: B40008 value: E9 8B 8E 3D 76 Jump to behavior
    Source: C:\Users\user\Desktop\file.exeMemory written: PID: 7044 base: 76F18E90 value: E9 80 71 C2 89 Jump to behavior
    Source: C:\Users\user\Desktop\file.exeMemory written: PID: 7044 base: C60005 value: E9 8B 4D F9 74 Jump to behavior
    Source: C:\Users\user\Desktop\file.exeMemory written: PID: 7044 base: 75BF4D90 value: E9 7A B2 06 8B Jump to behavior
    Source: C:\Users\user\Desktop\file.exeMemory written: PID: 7044 base: C70005 value: E9 EB EB F9 74 Jump to behavior
    Source: C:\Users\user\Desktop\file.exeMemory written: PID: 7044 base: 75C0EBF0 value: E9 1A 14 06 8B Jump to behavior
    Source: C:\Users\user\Desktop\file.exeMemory written: PID: 7044 base: C90005 value: E9 8B 8A 34 74 Jump to behavior
    Source: C:\Users\user\Desktop\file.exeMemory written: PID: 7044 base: 74FD8A90 value: E9 7A 75 CB 8B Jump to behavior
    Source: C:\Users\user\Desktop\file.exeMemory written: PID: 7044 base: CA0005 value: E9 2B 02 36 74 Jump to behavior
    Source: C:\Users\user\Desktop\file.exeMemory written: PID: 7044 base: 75000230 value: E9 DA FD C9 8B Jump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetCursorPos, DecisionNode, Sleepgraph_0-60787
    Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_0-60789
    Source: C:\Users\user\Desktop\file.exeStalling execution: Execution stalls by calling Sleepgraph_0-60821
    Source: Initial fileSignature Results: Thread-based counter
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FB8A20 rdtsc 0_2_00FB8A20
    Source: C:\Users\user\Desktop\file.exeCode function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,GetCursorPos,Sleep,GetCursorPos,0_2_00DADA50
    Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 2988Jump to behavior
    Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 6871Jump to behavior
    Source: C:\Users\user\Desktop\file.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-60821
    Source: C:\Users\user\Desktop\file.exeAPI coverage: 9.7 %
    Source: C:\Users\user\Desktop\file.exe TID: 7072Thread sleep count: 2988 > 30Jump to behavior
    Source: C:\Users\user\Desktop\file.exe TID: 7072Thread sleep time: -301788s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\file.exe TID: 7072Thread sleep count: 6871 > 30Jump to behavior
    Source: C:\Users\user\Desktop\file.exe TID: 7072Thread sleep time: -693971s >= -30000sJump to behavior
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
    Source: file.exe, 00000000.00000002.4096544778.0000000000B50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
    Source: file.exe, 00000000.00000003.1661389596.0000000000BBF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
    Source: file.exe, 00000000.00000002.4096544778.0000000000BAA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}s
    Source: file.exe, 00000000.00000003.1661389596.0000000000BBF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
    Source: file.exe, 00000000.00000002.4096544778.0000000000BAA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\file.exeProcess Stats: CPU usage > 42% for more than 60s
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FB8A20 rdtsc 0_2_00FB8A20
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E1C630 LoadLibraryA,GetProcAddress,0_2_00E1C630
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DADA50 mov eax, dword ptr fs:[00000030h]0_2_00DADA50
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DADA50 mov eax, dword ptr fs:[00000030h]0_2_00DADA50
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7044, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 7044, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    211
    Virtualization/Sandbox Evasion
    1
    Credential API Hooking
    321
    Security Software Discovery
    Remote Services1
    Credential API Hooking
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Deobfuscate/Decode Files or Information
    LSASS Memory211
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
    Obfuscated Files or Information
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive1
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets113
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe20%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
    https://sectigo.com/CPS00%URL Reputationsafe
    http://ocsp.sectigo.com00%URL Reputationsafe
    http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllfile.exe, 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpfalse
      high
      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tfile.exefalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.winimage.com/zLibDllfile.exe, 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpfalse
        high
        https://t.me/RiseProSUPPORTfile.exe, 00000000.00000002.4096544778.0000000000B5E000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://sectigo.com/CPS0file.exefalse
          • URL Reputation: safe
          unknown
          http://ocsp.sectigo.com0file.exefalse
          • URL Reputation: safe
          unknown
          http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#file.exefalse
          • URL Reputation: safe
          unknown
          https://t.me/RiseProSUPPORTlLHTfile.exe, 00000000.00000002.4096544778.0000000000B5E000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            193.233.132.47
            unknownRussian Federation
            2895FREE-NET-ASFREEnetEUtrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1430667
            Start date and time:2024-04-24 02:13:08 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 20s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:5
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:file.exe
            Detection:MAL
            Classification:mal88.troj.evad.winEXE@1/0@0/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            TimeTypeDescription
            02:14:34API Interceptor994672x Sleep call for process: file.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            193.233.132.47file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
              file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                  file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    FREE-NET-ASFREEnetEUfile.exeGet hashmaliciousRisePro StealerBrowse
                    • 147.45.47.93
                    file.exeGet hashmaliciousGlupteba, Mars Stealer, PureLog Stealer, Stealc, Vidar, zgRATBrowse
                    • 193.233.132.234
                    file.exeGet hashmaliciousGlupteba, Mars Stealer, PureLog Stealer, Vidar, zgRATBrowse
                    • 193.233.132.234
                    file.exeGet hashmaliciousAmadey, PureLog Stealer, RedLine, RisePro Stealer, zgRATBrowse
                    • 193.233.132.167
                    c3nBx2HQG2.exeGet hashmaliciousGlupteba, Mars Stealer, Phorpiex, PureLog Stealer, Stealc, Vidar, zgRATBrowse
                    • 193.233.132.234
                    file.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                    • 193.233.132.169
                    MOD.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                    • 147.45.47.64
                    ygm2mXUReY.exeGet hashmaliciousRisePro StealerBrowse
                    • 147.45.47.93
                    file.exeGet hashmaliciousRisePro StealerBrowse
                    • 147.45.47.93
                    file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                    • 193.233.132.175
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.95741990316148
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:file.exe
                    File size:4'019'448 bytes
                    MD5:c6d4e7a7751714cacc798033a7405b3f
                    SHA1:c7a4c20ed1ff6b6eb9c6cc0d1388c05cb67a3be1
                    SHA256:c6ff8e76f68ee14c4c68827ad1eb0b49fbc2180c5ba1b44e85464c51469a2460
                    SHA512:ae47d59925256b1925ea0bdb646e2983057b61a89005b0423aa682b382333c80134ff58adcf3c8279d984e479a7cd878a94f3e2b42f2fdce48823355e253fb28
                    SSDEEP:98304://yhdds+FCQdZP8vabXFKW0e67+KIJGL:SddFFlZkmXFKL57Z6G
                    TLSH:D016339D6BE71116C41AA2744B12F9BD34791AD903248E267838FDC69EF33906DF62C3
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...^.%f...............'............ .r...........@...........................v.....Q.=...@................................
                    Icon Hash:544c78797264bc98
                    Entrypoint:0xb2f720
                    Entrypoint Section:.vmp
                    Digitally signed:true
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                    Time Stamp:0x6625EF5E [Mon Apr 22 05:02:22 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:fce2185f86316405847dae4f4adccdc7
                    Signature Valid:false
                    Signature Issuer:CN=AVG Technologies USA LLC \u2122\u2030\u2122\u2030\u2122\u2030
                    Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                    Error Number:-2146762487
                    Not Before, Not After
                    • 06/01/2024 10:14:42 07/01/2034 10:14:42
                    Subject Chain
                    • CN=AVG Technologies USA LLC \u2122\u2030\u2122\u2030\u2122\u2030
                    Version:3
                    Thumbprint MD5:27F5DD79C86B9255242DDB29A51B691E
                    Thumbprint SHA-1:44268FBAA5D87BA1717C7237701B06FA20E9AF66
                    Thumbprint SHA-256:1C39A7BBBC7445339DEFD55E21DFA65CDEB9037F0FD33140759077C31CB40BE0
                    Serial:59AE1233E1806897438DF0EEC7051E17
                    Instruction
                    call 00007FB1245BD35Eh
                    mov ecx, DBAB1CA8h
                    mov eax, ecx
                    mov eax, dword ptr [esi]
                    and ecx, FFB00A27h
                    mov ecx, dword ptr [esi+04h]
                    ja 00007FB12455E833h
                    rcl edx, cl
                    arpl word ptr [edx], di
                    xor eax, A1523741h
                    cmc
                    xor byte ptr [edx], al
                    and ebx, dword ptr [edx+12F74176h]
                    xchg eax, edx
                    sbb ebx, dword ptr [edx-4Ah]
                    sbb eax, 9C10C92Ch
                    jmp 00007FB1248335DAh
                    sbb al, F3h
                    enter 861Dh, 24h
                    mov eax, dword ptr [064466F2h]
                    add byte ptr [ebp-4D096B09h], dh
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [edi], dh
                    jl 00007FB124833577h
                    aas
                    fild word ptr [esi+736E1972h]
                    cmp al, 49h
                    rol bl, 1
                    fst dword ptr [ebp+72h]
                    pop edx
                    mov esi, D74585CFh
                    sbb dl, byte ptr [ebp+6B4D6CFBh]
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x46531c0x140.vmp
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x73f0000x2958d.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x3d3c000x18f8.vmp
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x73d0000x1a10.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x4308980x18.vmp
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x73c4800x40.vmp
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x3940000x8c.vmp
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x40f8d00x40.vmp
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x158af80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x15a0000x27b5a0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x1820000x49300x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .vmp0x1870000x20c3370x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .vmp0x3940000x72c0x800d55390fa92d793fca2f4643786f0f9b6False0.0556640625data0.34656804998527746IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .vmp0x3950000x3a7d300x3a7e00311c73fe845e584807066466b5e78ff1unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .reloc0x73d0000x1a100x1c0085d05c19d2e41912662b1c769fe84f55False0.37918526785714285data5.757845403427371IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .rsrc0x73f0000x2958d0x2960049d50500fd5a2b2bade9e4f51d19f5ebFalse0.753215870468278data7.138542640397IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0x73f1d40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096FrenchFrance0.7300656660412758
                    RT_ICON0x74027c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384FrenchFrance0.6073452999527633
                    RT_ICON0x7444a40x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536FrenchFrance0.5098189991718917
                    RT_ICON0x754ccc0x13208PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedFrenchFrance1.0003956907995506
                    RT_GROUP_ICON0x767ed40x3edataFrenchFrance0.8064516129032258
                    RT_VERSION0x767f140x320dataEnglishUnited States0.4225
                    RT_MANIFEST0x7682340x359XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4644107351225204
                    DLLImport
                    KERNEL32.dllGetVersionExA
                    USER32.dllwsprintfA
                    GDI32.dllCreateCompatibleBitmap
                    ADVAPI32.dllRegQueryValueExA
                    SHELL32.dllShellExecuteA
                    ole32.dllCoInitialize
                    WS2_32.dllWSAStartup
                    CRYPT32.dllCryptUnprotectData
                    SHLWAPI.dllPathFindExtensionA
                    gdiplus.dllGdipGetImageEncoders
                    SETUPAPI.dllSetupDiEnumDeviceInfo
                    ntdll.dllRtlUnicodeStringToAnsiString
                    RstrtMgr.DLLRmStartSession
                    KERNEL32.dllGetSystemTimeAsFileTime
                    KERNEL32.dllHeapAlloc, HeapFree, ExitProcess, GetModuleHandleA, LoadLibraryA, GetProcAddress
                    Language of compilation systemCountry where language is spokenMap
                    FrenchFrance
                    EnglishUnited States
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    04/24/24-02:13:59.503423TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4973250500192.168.2.4193.233.132.47
                    04/24/24-02:18:00.111924TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973250500192.168.2.4193.233.132.47
                    04/24/24-02:13:59.816392TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)5050049732193.233.132.47192.168.2.4
                    TimestampSource PortDest PortSource IPDest IP
                    Apr 24, 2024 02:13:59.131812096 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:13:59.473968983 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:13:59.474056959 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:13:59.503422976 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:13:59.816391945 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:13:59.861840010 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:13:59.957020998 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:14:02.955728054 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:14:03.453269005 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:14:34.580651999 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:14:35.054075003 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:14:56.580620050 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:14:57.053845882 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:06.006191969 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:06.453366041 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:12.565913916 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:12.953174114 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:15.690299988 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:16.155078888 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:18.831031084 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:19.253335953 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:21.971563101 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:22.353763103 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:25.096466064 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:25.653301001 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:28.236882925 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:28.654078007 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:31.377576113 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:31.853971004 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:34.518165112 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:34.953488111 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:37.658787966 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:38.053366899 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:40.799523115 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:41.353527069 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:43.939964056 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:44.353833914 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:47.065026999 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:47.454178095 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:50.205682039 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:50.653305054 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:53.346446991 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:53.753566980 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:56.471378088 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:15:56.853070021 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:15:59.612525940 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:00.054008007 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:02.752554893 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:03.153928041 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:05.893198967 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:06.439912081 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:06.453883886 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:06.782517910 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:09.018361092 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:09.453623056 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:12.935113907 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:13.353152990 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:16.064960003 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:16.553415060 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:19.190869093 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:19.653850079 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:22.315203905 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:22.754067898 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:25.455558062 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:25.853651047 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:28.580696106 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:29.052958012 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:31.721436024 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:32.153101921 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:34.861958027 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:35.253113985 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:37.987200975 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:38.453283072 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:41.111927986 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:41.553900957 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:44.252686977 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:44.653564930 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:47.393208981 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:47.854042053 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:50.518527031 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:51.053868055 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:53.643491983 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:54.053746939 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:16:56.783888102 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:16:57.254478931 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:00.606498957 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:01.053221941 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:03.721148968 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:04.153211117 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:06.846154928 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:07.253859043 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:09.986951113 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:10.453897953 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:13.112116098 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:13.553904057 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:16.236851931 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:16.753705978 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:19.377437115 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:19.853434086 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:22.503663063 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:23.053436995 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:25.643055916 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:26.054091930 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:28.768366098 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:29.153284073 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:31.893080950 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:32.353811979 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:35.073266029 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:35.654139996 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:38.190133095 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:38.752969027 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:41.315170050 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:41.753473043 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:44.455533028 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:44.853473902 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:47.580526114 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:48.053911924 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:50.721266031 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:51.153323889 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:53.861882925 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:54.253382921 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:17:56.986840963 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:17:57.453799963 CEST5050049732193.233.132.47192.168.2.4
                    Apr 24, 2024 02:18:00.111923933 CEST4973250500192.168.2.4193.233.132.47
                    Apr 24, 2024 02:18:00.553698063 CEST5050049732193.233.132.47192.168.2.4

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:02:13:56
                    Start date:24/04/2024
                    Path:C:\Users\user\Desktop\file.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\file.exe"
                    Imagebase:0xd50000
                    File size:4'019'448 bytes
                    MD5 hash:C6D4E7A7751714CACC798033A7405B3F
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:0.8%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:12.6%
                      Total number of Nodes:175
                      Total number of Limit Nodes:32
                      execution_graph 60677 d8d098 60678 d8d0ab 60677->60678 60681 d8cf73 60678->60681 60680 d8d0b7 60682 d8cf7f 60681->60682 60683 d8cf89 60682->60683 60686 d8cfac 60682->60686 60698 d88bd3 GetLastError GetLastError 60683->60698 60685 d8cfa4 60685->60680 60686->60685 60688 d8d00a 60686->60688 60689 d8d03a 60688->60689 60690 d8d017 60688->60690 60697 d8d032 60689->60697 60699 d89a81 60689->60699 60717 d88bd3 GetLastError GetLastError 60690->60717 60693 d8d052 60705 d9a1db 60693->60705 60695 d8d066 60710 d98d1c 60695->60710 60697->60685 60698->60685 60700 d89a9a 60699->60700 60704 d89ac1 60699->60704 60701 d9a1db 2 API calls 60700->60701 60700->60704 60702 d89ab6 60701->60702 60718 d99668 8 API calls 60702->60718 60704->60693 60706 d9a1fc 60705->60706 60707 d9a1e7 __dosmaperr 60705->60707 60706->60695 60719 d88c50 GetLastError GetLastError 60707->60719 60709 d9a1f7 60709->60695 60711 d98d45 60710->60711 60716 d98d2d 60710->60716 60712 d98d94 60711->60712 60714 d98d6c 60711->60714 60724 d88bd3 GetLastError GetLastError 60712->60724 60720 d98c8b 60714->60720 60716->60697 60717->60697 60718->60704 60719->60709 60721 d98c97 60720->60721 60723 d98cd6 60721->60723 60725 d98def 60721->60725 60723->60716 60724->60716 60736 d9e92e 60725->60736 60727 d98dff 60728 d9e92e 2 API calls 60727->60728 60734 d98e05 60727->60734 60735 d98e37 60727->60735 60730 d98e2e 60728->60730 60729 d9e92e 2 API calls 60731 d98e43 FindCloseChangeNotification 60729->60731 60732 d9e92e 2 API calls 60730->60732 60733 d98e4f GetLastError 60731->60733 60731->60734 60732->60735 60733->60734 60734->60723 60735->60729 60735->60734 60738 d9e950 __dosmaperr 60736->60738 60739 d9e93b __dosmaperr 60736->60739 60737 d9e975 60737->60727 60738->60737 60741 d88c50 GetLastError GetLastError 60738->60741 60739->60727 60741->60739 60817 e14eb0 60818 e14eee __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 60817->60818 60827 e1527c 60817->60827 60820 e14f5b recv 60818->60820 60821 e15267 Sleep 60818->60821 60822 e151da __Xtime_get_ticks 60818->60822 60823 e151c5 recv 60818->60823 60824 e1525f Sleep 60818->60824 60825 e14fdd recv 60818->60825 60818->60827 60828 e150b6 recv 60818->60828 60830 e15940 60818->60830 60834 e152a0 11 API calls std::_Throw_Cpp_error 60818->60834 60820->60818 60821->60818 60821->60827 60822->60818 60823->60824 60824->60821 60825->60818 60826 e14ffe recv 60825->60826 60826->60818 60828->60818 60831 e15970 60830->60831 60832 e15a36 60831->60832 60833 e15a28 closesocket 60831->60833 60832->60818 60833->60831 60833->60832 60834->60818 60835 eee07c 60836 eee08b 60835->60836 60837 eee13e 60836->60837 60841 eee10d 60836->60841 60847 eee096 60836->60847 60838 eee19c 60837->60838 60839 eee143 ___set_flsgetvalue 60837->60839 60840 eee1a1 __freeptd 60838->60840 60838->60847 60845 eee154 60839->60845 60840->60847 60841->60847 60848 ef1830 HeapFree ___freetlocinfo 60841->60848 60843 eee132 60849 ef1d64 HeapFree HeapFree 60843->60849 60845->60847 60850 eee2ca HeapFree ___lock_fhandle ___freetlocinfo 60845->60850 60848->60843 60849->60847 60850->60847 60851 f32d85 60853 e32c40 60851->60853 60852 e3303e 60853->60851 60853->60852 60855 d685d0 __EH_prolog3 60853->60855 60855->60852 60742 d9ac71 60747 d9aa47 60742->60747 60745 d9acb0 60749 d9aa66 60747->60749 60748 d9aa8e __dosmaperr 60752 d9aa89 60748->60752 60758 d88c50 GetLastError GetLastError 60748->60758 60749->60748 60750 d9aa79 __dosmaperr 60749->60750 60757 d88c50 GetLastError GetLastError 60750->60757 60752->60745 60754 d92ca3 60752->60754 60759 d9264b 60754->60759 60756 d92cbe 60756->60745 60757->60752 60758->60752 60760 d92657 60759->60760 60761 d9265e __dosmaperr 60760->60761 60762 d92689 60760->60762 60770 d88c50 GetLastError GetLastError 60761->60770 60766 d92c35 60762->60766 60765 d9266d 60765->60756 60767 d92c57 60766->60767 60771 d8d17a 60767->60771 60769 d92c64 60770->60765 60774 d8d0c8 60771->60774 60773 d8d192 60773->60769 60775 d8d0d6 __dosmaperr 60774->60775 60777 d8d0f0 60774->60777 60775->60773 60776 d8d12c GetLastError 60776->60775 60777->60775 60777->60776 60778 d89810 60781 d8974e 60778->60781 60780 d89822 60782 d8975a __dosmaperr 60781->60782 60784 d89771 __dosmaperr 60782->60784 60785 d88c50 GetLastError GetLastError 60782->60785 60784->60780 60785->60784 60856 d8d4c0 60857 d8d4d3 60856->60857 60858 d8d4e6 60856->60858 60865 d8d3e7 60858->60865 60860 d8d597 60861 d89a81 8 API calls 60863 d8d537 60861->60863 60862 d8d509 60862->60860 60862->60861 60869 d9262d 60863->60869 60866 d8d3f8 60865->60866 60868 d8d450 60865->60868 60866->60868 60872 d925ed GetLastError GetLastError GetLastError 60866->60872 60868->60862 60870 d9250c 3 API calls 60869->60870 60871 d92646 60870->60871 60871->60860 60872->60868 60786 dada50 GetCursorPos 60787 dada65 GetCursorPos 60786->60787 60788 dadb38 GetPEB 60787->60788 60792 dada77 60787->60792 60788->60792 60789 dada83 GetPEB 60789->60792 60790 dadbad Sleep 60790->60787 60791 dadaf8 Sleep GetCursorPos 60791->60788 60791->60792 60792->60788 60792->60789 60792->60790 60792->60791 60793 dadbd7 60792->60793 60794 d88f93 60795 d9a1db 2 API calls 60794->60795 60796 d88fa6 60795->60796 60797 d88ff0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 60796->60797 60801 d925cf 60796->60801 60800 d925cf 3 API calls 60800->60797 60804 d923e7 60801->60804 60803 d8904d 60803->60797 60803->60800 60805 d923f3 60804->60805 60806 d92436 60805->60806 60808 d9247c 60805->60808 60810 d923fb 60805->60810 60816 d88bd3 GetLastError GetLastError 60806->60816 60808->60810 60811 d9250c 60808->60811 60810->60803 60812 d9e92e 2 API calls 60811->60812 60813 d9251e 60812->60813 60814 d92552 GetLastError 60813->60814 60815 d92526 60813->60815 60814->60815 60815->60810 60816->60810 60873 d9c985 60874 d9c992 __dosmaperr 60873->60874 60876 d9c9aa 60873->60876 60893 d88c50 GetLastError GetLastError 60874->60893 60877 d9c9a2 60876->60877 60878 d9a1db 2 API calls 60876->60878 60879 d9ca22 60878->60879 60889 d987e7 60879->60889 60881 d9ca2a 60881->60877 60882 d9a1db 2 API calls 60881->60882 60883 d9ca5b 60882->60883 60883->60877 60884 d9a1db 2 API calls 60883->60884 60885 d9ca69 60884->60885 60885->60877 60886 d9a1db 2 API calls 60885->60886 60887 d9ca77 60886->60887 60888 d9a1db 2 API calls 60887->60888 60888->60877 60890 d987f3 __dosmaperr 60889->60890 60892 d987fb __dosmaperr 60890->60892 60894 d88c50 GetLastError GetLastError 60890->60894 60892->60881 60893->60877 60894->60892

                      Control-flow Graph

                      APIs
                      • recv.WS2_32(?,0000030C,0000FFFF,00001006), ref: 00E14F71
                      • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00E14FF3
                      • recv.WS2_32(00000000,0000000C,00000008), ref: 00E15014
                      • recv.WS2_32(00000000,?,00000008,?), ref: 00E150CB
                        • Part of subcall function 00E15940: closesocket.WS2_32(74D723A0), ref: 00E15A2D
                      • recv.WS2_32(?,00000004,00000008), ref: 00E151D3
                      • __Xtime_get_ticks.LIBCPMT ref: 00E151DA
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E151E8
                      • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00E15261
                      • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00E15269
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: recv$Sleep$Unothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocket
                      • String ID: (c
                      • API String ID: 4162995302-1781735918
                      • Opcode ID: ada5214b99b1c2f20d1cc1b3991553eb2d36261d4dca50b6d1cdeb362605244d
                      • Instruction ID: 0b0a82a49d2fd5150911cbc40d40491a3837816fdd8d7ceb56e709fddf758bc1
                      • Opcode Fuzzy Hash: ada5214b99b1c2f20d1cc1b3991553eb2d36261d4dca50b6d1cdeb362605244d
                      • Instruction Fuzzy Hash: 04B1BDB2D00308DFEB15DFA4DD49BADBBB1EF59304F14021AE454BB2A2D7B05988DB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 60 dada50-dada63 GetCursorPos 61 dada65-dada71 GetCursorPos 60->61 62 dadb38-dadb41 GetPEB 61->62 63 dada77-dada7d 61->63 64 dadb44-dadb58 62->64 63->62 65 dada83-dada8f GetPEB 63->65 66 dadb5a-dadb5f 64->66 67 dadba9-dadbab 64->67 68 dada90-dadaa4 65->68 66->67 69 dadb61-dadb69 66->69 67->64 70 dadaa6-dadaab 68->70 71 dadaf4-dadaf6 68->71 72 dadb70-dadb83 69->72 70->71 73 dadaad-dadab3 70->73 71->68 74 dadba2-dadba7 72->74 75 dadb85-dadb98 72->75 76 dadab5-dadac8 73->76 74->67 74->72 75->75 77 dadb9a-dadba0 75->77 78 dadaca 76->78 79 dadaed-dadaf2 76->79 77->74 80 dadbad-dadbd2 Sleep 77->80 81 dadad0-dadae3 78->81 79->71 79->76 80->61 81->81 82 dadae5-dadaeb 81->82 82->79 83 dadaf8-dadb2a Sleep GetCursorPos 82->83 83->62 84 dadb2c-dadb32 83->84 84->62 85 dadbd7-dadbe8 call e377d0 84->85 88 dadbea-dadbec 85->88 89 dadbee 85->89 90 dadbf0-dadc0d call e377d0 88->90 89->90
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: Cursor$Sleep
                      • String ID:
                      • API String ID: 1847515627-0
                      • Opcode ID: 0ee8609d3a3a47099238a4f1a8bde8db1013ac9a5ebd783567fcd8217ae923c5
                      • Instruction ID: dd941ffe40dfd2cac810b65e8d551b2ce7cbad0e452349a62cc3b153eef71e39
                      • Opcode Fuzzy Hash: 0ee8609d3a3a47099238a4f1a8bde8db1013ac9a5ebd783567fcd8217ae923c5
                      • Instruction Fuzzy Hash: FF519D35A04215CFCB14CF58C4D0EA9B7F2FF4A704B1A8199D446ABB51D731ED05CBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 158 f32d85-f32dc9 159 e32c40-e32c47 call 109ea41 158->159 160 f32dcf-f32dd4 call ef719c 158->160 167 e33084-e33098 159->167 168 e32c4d-e32cdc 159->168 165 f32dd6-f32ddf 160->165 166 f32d5f-f32d6b 160->166 169 f32de5-f32dec 165->169 166->158 170 e32ce0-e32ce5 168->170 169->169 171 f32dee-f32e0d 169->171 170->170 172 e32ce7-e32d8f call d53040 170->172 176 e32d96-e32d9b 172->176 176->176 177 e32d9d-e32dcd call d53040 176->177 180 e32dd4-e32dd9 177->180 180->180 181 e32ddb-e32e12 call d53040 call e33880 180->181 186 e32f28-e32f4c call f811d2 181->186 187 e32e18-e32eaf call d6ab20 181->187 190 e32f51-e32f53 186->190 194 e32eb1-e32eb7 187->194 195 e32f19-e32f23 call d52df0 187->195 192 e32f59-e33014 call d859a0 call d53440 190->192 193 e3302f-e33048 call d685d0 190->193 217 e33017-e3301c 192->217 208 e33072-e33080 193->208 209 e3304a-e33056 193->209 197 e32ee5-e32f16 194->197 198 e32eb9-e32ec5 194->198 195->186 197->195 202 e32ec7-e32ed5 198->202 203 e32edb-e32ee2 call d838e3 198->203 202->203 206 e33099 call d88c60 202->206 203->197 216 e3309e-e33157 call d88c60 call f8b458 206->216 208->167 213 e33068-e3306f call d838e3 209->213 214 e33058-e33066 209->214 213->208 214->213 214->216 217->217 220 e3301e-e3302a call d66130 217->220 220->193
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: v<Ea
                      • API String ID: 0-4124759590
                      • Opcode ID: 1968182d0c2279b66626e934f60e52382bbebd5d9fbd59a9db6cde57d95046de
                      • Instruction ID: 4f52cbe81d497294213dac1c7d36f348c5ed07d1223147355389b45916e4f151
                      • Opcode Fuzzy Hash: 1968182d0c2279b66626e934f60e52382bbebd5d9fbd59a9db6cde57d95046de
                      • Instruction Fuzzy Hash: 710267B0D002498BDB14CFA8C995BEEBBB0FF45304F24425DE944BB341E7716A84CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 93 eee07c-eee089 94 eee08b-eee08c call ef1d34 93->94 95 eee107-eee10b 93->95 99 eee091-eee094 94->99 97 eee13e-eee141 95->97 98 eee10d-eee113 95->98 100 eee19c-eee19f 97->100 101 eee143-eee15a ___set_flsgetvalue call ef122f 97->101 102 eee096-eee098 98->102 103 eee115-eee121 98->103 99->102 104 eee09d call eef1de 99->104 106 eee1a8-eee1aa 100->106 107 eee1a1-eee1a7 __freeptd 100->107 101->102 115 eee160-eee177 call eeeddb 101->115 105 eee1ab-eee1ae 102->105 109 eee128-eee12b 103->109 110 eee123 call ef157f 103->110 104->95 106->105 107->106 109->106 114 eee12d-eee13c call ef1830 call eeee8a call ef1d64 109->114 110->109 114->106 125 eee179-eee18e call eeeec7 call fca393 115->125 126 eee190-eee197 call eee2ca 115->126 125->106 126->102
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 943737b8470e6a7cac3f4a86bb88d9246d146cc958efc5919e36d89a806ee602
                      • Instruction ID: e5246e4c09762d96cdb9baf42d9d0aea6ba9b6084a082ba7e9d5205cbd9bdd99
                      • Opcode Fuzzy Hash: 943737b8470e6a7cac3f4a86bb88d9246d146cc958efc5919e36d89a806ee602
                      • Instruction Fuzzy Hash: 0211E7314463CD99A6357BB7BC0687E37D9EFD13A5730352AF158F0292DF3288819161
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 133 d98def-d98e03 call d9e92e 136 d98e09-d98e11 133->136 137 d98e05-d98e07 133->137 139 d98e1c-d98e1f 136->139 140 d98e13-d98e1a 136->140 138 d98e57-d98e77 call d9e89d 137->138 148 d98e89 138->148 149 d98e79-d98e87 call d916b8 138->149 142 d98e3d-d98e4d call d9e92e FindCloseChangeNotification 139->142 143 d98e21-d98e25 139->143 140->139 141 d98e27-d98e3b call d9e92e * 2 140->141 141->137 141->142 142->137 155 d98e4f-d98e55 GetLastError 142->155 143->141 143->142 153 d98e8b-d98e8e 148->153 149->153 155->138
                      APIs
                      • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00D98CD6,00000000,CF830579,00EC7178,0000000C,00D98D92,00D8D06D,?), ref: 00D98E45
                      • GetLastError.KERNEL32 ref: 00D98E4F
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: ChangeCloseErrorFindLastNotification
                      • String ID:
                      • API String ID: 1687624791-0
                      • Opcode ID: 5b589fa8502018ea748797a46c1ba62413055cde4d7d5f36dc11f7723b7c33f9
                      • Instruction ID: fd0cdcfa482a26927a3617c94ca71c6ba9a7bde6c5ffe43aa222eb8a7f665671
                      • Opcode Fuzzy Hash: 5b589fa8502018ea748797a46c1ba62413055cde4d7d5f36dc11f7723b7c33f9
                      • Instruction Fuzzy Hash: 6F116B33A042506ACF256B34EC99B7E6749CB83F34F2D0619F818972C2DF329C8092B0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 226 e15940-e1596b call fda392 228 e15970-e15972 226->228 229 e15a46-e15a4f 228->229 230 e15978-e159a2 call e377d0 * 2 228->230 235 e159a4-e159a8 230->235 236 e159ae-e159fc call 10c3818 230->236 235->229 237 e159ab-e159ad 235->237 240 e15a54-e15a5e call 1064e67 236->240 241 e159fe 236->241 237->236 246 e15a40-e15a45 call f89200 240->246 247 e15a60-e15a68 240->247 242 e15a04-e15a18 call 10a2e60 241->242 242->246 249 e15a1a-e15a26 call ff011f 242->249 246->229 249->237 254 e15a28-e15a34 closesocket 249->254 254->242 255 e15a36-e15a3b call 1055b6c 254->255 255->246
                      APIs
                      • closesocket.WS2_32(74D723A0), ref: 00E15A2D
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: closesocket
                      • String ID:
                      • API String ID: 2781271927-0
                      • Opcode ID: 2d278051b74993df46f08a7183f17db7e0b30a5e74206d90eed6b2cd3d5a871a
                      • Instruction ID: 9364e9093a6771b3128b820533329091ddef3218ba73d2b0f4df38323edd62db
                      • Opcode Fuzzy Hash: 2d278051b74993df46f08a7183f17db7e0b30a5e74206d90eed6b2cd3d5a871a
                      • Instruction Fuzzy Hash: 28312672509700AFC7219B648C40AABBBE5FFC5728F04571AF8A4A7191D371984887A2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 257 d532d0-d532e0 258 d53306-d53308 257->258 259 d532e2-d532e7 257->259 262 d53318-d5331e 258->262 263 d5330a-d53317 call d83662 258->263 260 d5331f call d52b50 259->260 261 d532e9-d532ea call d83662 259->261 269 d53324-d53329 call d88c60 260->269 267 d532ef-d532f6 261->267 267->269 270 d532f8-d53305 267->270
                      APIs
                      • Concurrency::cancel_current_task.LIBCPMT ref: 00D5331F
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: Concurrency::cancel_current_task
                      • String ID:
                      • API String ID: 118556049-0
                      • Opcode ID: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                      • Instruction ID: 25198ae3095ce88a85520be81edeae124d3d94cb8d2be08155285de4fb8e71d6
                      • Opcode Fuzzy Hash: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                      • Instruction Fuzzy Hash: 0FF0B4721001049BDF147F68D4168E9B3E8EF243A2754097AEC8DC7212FB26DA5887B0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 273 d9250c-d92524 call d9e92e 276 d9253a-d92549 call f9cdbc 273->276 277 d92526-d9252d 273->277 281 d9254e-d92550 276->281 278 d92534-d92538 277->278 280 d9258b-d9258e 278->280 282 d92552-d92563 GetLastError call d916b8 281->282 283 d92565-d9256f 281->283 282->278 283->278 285 d92571-d92586 283->285 285->280
                      APIs
                      • GetLastError.KERNEL32(00000000,?,00000000,00000000,00D8D0B7,00000000,00000002,00000000,00000000,00000000,00000000,?,00D92646,00000000,00000000,00D8D0B7), ref: 00D92555
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: ErrorLast
                      • String ID:
                      • API String ID: 1452528299-0
                      • Opcode ID: 3afe3a0f10bda36810725bc0c9cc00b78a3c4485159837cfe830d8a9614a4dda
                      • Instruction ID: c81b84027d6617f7018f12d3e856d6f6b85fd51e96e5ad9e05bc39b227e7edef
                      • Opcode Fuzzy Hash: 3afe3a0f10bda36810725bc0c9cc00b78a3c4485159837cfe830d8a9614a4dda
                      • Instruction Fuzzy Hash: 6101D233610215BFCF09CF59DC55DBE3B29EB85320B290209F811AB291E671EE429BA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 00D5D29A
                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 00D5D6F8
                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 00D5DAD7
                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 00D5DF3C
                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 00D5E6FA
                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 00D5EEEA
                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 00D5F45B
                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 00D5F525
                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 00D5F933
                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 00D61E6E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: CreateDirectory
                      • String ID: P(S$PQh$Pih$Psk$VPtm,$t=$t=$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$~$U$X$!E$.4$5H$CH$aS$tv$?
                      • API String ID: 4241100979-2467105940
                      • Opcode ID: 823eda9a54719eec0ad367d3af9fdc853fcd1d338ddd37e3653597b173c7fcfc
                      • Instruction ID: 498d49dc7178a375ac1677306393758e19881c38858aad0b7018131e3bdfd22f
                      • Opcode Fuzzy Hash: 823eda9a54719eec0ad367d3af9fdc853fcd1d338ddd37e3653597b173c7fcfc
                      • Instruction Fuzzy Hash: 3CB3EFB4D0426D8BDF25CFA8C991AEDBBB1BF08300F148199D859B7341EB742A85CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 00D61904
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: CreateDirectory
                      • String ID: VPtm,$t=$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$v<Ea$tv
                      • API String ID: 4241100979-668254263
                      • Opcode ID: e230946b75d44c34ac16c8a8afedd8bf97d261082d1b547e611f8c288765de00
                      • Instruction ID: e2c22fcc23ea720ee4420cd60ac8786c75012663c5220169a05baa8405dac97c
                      • Opcode Fuzzy Hash: e230946b75d44c34ac16c8a8afedd8bf97d261082d1b547e611f8c288765de00
                      • Instruction Fuzzy Hash: 0CA2EEB4D0425C8BDB25CFA8C984AECBBB1AF59310F1442D9D859B7381EB712E85CF25
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: +$+Inf$-Inf$Inf$NaN$gfff
                      • API String ID: 0-2743850093
                      • Opcode ID: 98765163ef19a44c4928082a55dab36803ec8935de110636921414c5bf593c17
                      • Instruction ID: 56198cf33241457d8bf9e3c5f168be0cea89ae1bb76e0959f9f506530460c74d
                      • Opcode Fuzzy Hash: 98765163ef19a44c4928082a55dab36803ec8935de110636921414c5bf593c17
                      • Instruction Fuzzy Hash: D672E57190CB808FDB26CF29845036BBBE1AFD6344F189A5EE8D6A7252D770C945CB42
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryA.KERNEL32(?), ref: 00D59D32
                      • GetProcAddress.KERNEL32(?), ref: 00D59E3D
                      • GetProcAddress.KERNEL32(?), ref: 00D59F36
                      • GetProcAddress.KERNEL32(?), ref: 00D59FBB
                      • GetProcAddress.KERNEL32(?), ref: 00D5A055
                      • GetProcAddress.KERNEL32(?), ref: 00D5A0EF
                      • GetProcAddress.KERNEL32(?), ref: 00D5A189
                      • GetProcAddress.KERNEL32(?), ref: 00D5A223
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: AddressProc$LibraryLoad
                      • String ID: v<Ea
                      • API String ID: 2238633743-4124759590
                      • Opcode ID: 5b17feba70774a7e924d693eec6bc97ffdccd87876a1f89e9308c3b3aa1084fb
                      • Instruction ID: 3188d222f326181099158da6daedfeb5fcaf2d36b3372456cdf47268b54b0272
                      • Opcode Fuzzy Hash: 5b17feba70774a7e924d693eec6bc97ffdccd87876a1f89e9308c3b3aa1084fb
                      • Instruction Fuzzy Hash: 252265B8D0525CEFDB15CFA9D9816ECBBB1BB08310F20819AD859B7350E7702A85EF45
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 00D61904
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: CreateDirectory
                      • String ID: VPtm,$string too long$t=$v<Ea$v<Ea
                      • API String ID: 4241100979-470778155
                      • Opcode ID: 7431e0e4488a86c17715ffbe6c6cdc4f32c90fb618dafd9980c2713a0c348852
                      • Instruction ID: 4c517da503597e49ac031b8474f4fbd7d1c062d71fb8f66acb7b1509598c312e
                      • Opcode Fuzzy Hash: 7431e0e4488a86c17715ffbe6c6cdc4f32c90fb618dafd9980c2713a0c348852
                      • Instruction Fuzzy Hash: 408203B4C0529C8BDB25DFA8C9846DCBBF1AF09320F244299D859B7341EB712E85CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: __floor_pentium4
                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                      • API String ID: 4168288129-2761157908
                      • Opcode ID: a6b106ea73605939c30f8f52a6c8fa0c217cc9764403cefa31c307b7a7fa32d4
                      • Instruction ID: df1dc69037e0daa0ed3e5e987c0aec1beff17af6d6378474d8bb0d7835f2f70c
                      • Opcode Fuzzy Hash: a6b106ea73605939c30f8f52a6c8fa0c217cc9764403cefa31c307b7a7fa32d4
                      • Instruction Fuzzy Hash: C2D25971E086288FDB64CF28DC407EAB7B5EB85315F1841EAD44DE7244E778AE818F61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %d values for %d columns$OID$ROWID$_ROWID_$table %S has %d columns but %d values were supplied$table %S has no column named %s
                      • API String ID: 0-3534356592
                      • Opcode ID: 910cba5274f86a742de39be44d7746bfab2334148f81e2d023467a5118f7eb15
                      • Instruction ID: e6c87d48d2965789cf98a9a01e49a0dfec82d30fdde28ed86360afd0f67e5ce5
                      • Opcode Fuzzy Hash: 910cba5274f86a742de39be44d7746bfab2334148f81e2d023467a5118f7eb15
                      • Instruction Fuzzy Hash: B7D2B0B06047418FD724DF18D440B2BBBE1FF84788F15995DE88AAB392D771E945CB82
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %s|%s$(c$(c$(c$v<Ea
                      • API String ID: 0-2154753988
                      • Opcode ID: e35f32da48ed5f99776939967bdfce416411053bf30b86b94a7cdfe684b8c236
                      • Instruction ID: 0fc60125842a0707fd28415dd4e9bb0ed1225c5424bd08d58258c4dae7d392a4
                      • Opcode Fuzzy Hash: e35f32da48ed5f99776939967bdfce416411053bf30b86b94a7cdfe684b8c236
                      • Instruction Fuzzy Hash: 98A17AB1D002089FDB14CFA9CC85BEEBBB4FF48710F104259E959BB281D7746A85CBA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 46284e79cbb253acf149296a2f9e055bfabcba478f2dcd3cb23d94f7ca6c8d97
                      • Instruction ID: a71b7da869f19de05a2e6b915765257b60ba7616cb96460934370fc709438984
                      • Opcode Fuzzy Hash: 46284e79cbb253acf149296a2f9e055bfabcba478f2dcd3cb23d94f7ca6c8d97
                      • Instruction Fuzzy Hash: 94023C71E11219DBDF14DFA9D8806AEFBF1FF48314F248269E919E7341D731A9418BA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: WITHOUT ROWID$library routine called out of sequence$out of memory$unknown error
                      • API String ID: 0-2048571646
                      • Opcode ID: 7d01117cc8212087075d5a36a09361543783d2d98360a5c42dda930e99038b76
                      • Instruction ID: b93701db038c0621b2129ec81f905fcf7d234f0ef45dde1e5b75bb4c12d019ef
                      • Opcode Fuzzy Hash: 7d01117cc8212087075d5a36a09361543783d2d98360a5c42dda930e99038b76
                      • Instruction Fuzzy Hash: FFB2BE70A40606DFDB29CF28E880BAEB7B1FF04344F18556EE91ABB351D731A945CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: OID$ROWID$_ROWID_$no such column: %s
                      • API String ID: 0-2593059340
                      • Opcode ID: 9ef4eff329c595c75b0097a195d43f1c688aed8b4d66fc6dee67dd301d4a496a
                      • Instruction ID: 5c9827dfdf85249aa3e0aa1f5c5b6fd434d92be8ccb83bbe9c5cfc8e451608ff
                      • Opcode Fuzzy Hash: 9ef4eff329c595c75b0097a195d43f1c688aed8b4d66fc6dee67dd301d4a496a
                      • Instruction Fuzzy Hash: 67C269B0604B418FC724DF18C090B2ABBE1FF84349F15995DED9A6B392D775E849CB82
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: .,+-$@$H$Q
                      • API String ID: 0-2755557186
                      • Opcode ID: f159eea2f7f6536e5ecd2ebb2e32b68161e22c62859aab79fa84aa0a75319b3f
                      • Instruction ID: cbcf199b3c6e4929ff28c566b497590873a37c0f44f5f2a7e5aaefd54ae933d7
                      • Opcode Fuzzy Hash: f159eea2f7f6536e5ecd2ebb2e32b68161e22c62859aab79fa84aa0a75319b3f
                      • Instruction Fuzzy Hash: 3DB26A70E002099FDF14DFA8D890AAEBBB2FF48304F149169E855BB392D735AD55CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: +$/$J$string too long
                      • API String ID: 0-2407699343
                      • Opcode ID: 516a1e754bc688077e9529f7c6876b896289834250be9ae073c7bfc35edb9c87
                      • Instruction ID: 548072e52d3c7c208c21574d3423df0bf82f12c5a3a918acf8d3e5d9731fd51f
                      • Opcode Fuzzy Hash: 516a1e754bc688077e9529f7c6876b896289834250be9ae073c7bfc35edb9c87
                      • Instruction Fuzzy Hash: C102D1719042459FCB05CF68C8947EEBBF5EF4A310F28426AE865A7382D7349A44CBB5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: max$min$too many terms in compound SELECT
                      • API String ID: 0-238764930
                      • Opcode ID: cbf5376050c120e587522801a01ab93cfba7f263105473f83823799712703295
                      • Instruction ID: 4f46fa1b83a0135543a3343e21a7ed8ce0bd0b3c5da8041a19e1781e11e09190
                      • Opcode Fuzzy Hash: cbf5376050c120e587522801a01ab93cfba7f263105473f83823799712703295
                      • Instruction Fuzzy Hash: D8F26970604741CFD724DF28C490B2ABBE1FF84309F15996DE9899B352EB75E909CB82
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: '$4$?$a
                      • API String ID: 0-2496703398
                      • Opcode ID: 32316e718a757849c0748b7f18aa416830173eb800411bc52a8f1b7aa6792b4f
                      • Instruction ID: 9bc8876e1ae0b4185cf20c48584172c5d6148382c0d9971159b2abe35bf7b2ea
                      • Opcode Fuzzy Hash: 32316e718a757849c0748b7f18aa416830173eb800411bc52a8f1b7aa6792b4f
                      • Instruction Fuzzy Hash: 1F51583150C791ABD71DAF24C8156AABBE1FF92320F54DA5CE4EA071D2E3359406DB42
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: @$at most %d tables in a join$cannot use index: %s
                      • API String ID: 0-1661248
                      • Opcode ID: 3cb89e5d228d70d8bf21ecf0fccf2401f2224719539d2781725883217d8ffdc0
                      • Instruction ID: 43d2ee5836fcf9fd6c6ebe4cec207a9658ef02cf4cbbb71cab886bd74d6538ed
                      • Opcode Fuzzy Hash: 3cb89e5d228d70d8bf21ecf0fccf2401f2224719539d2781725883217d8ffdc0
                      • Instruction Fuzzy Hash: 61725771A087418FD724CF28D840B2AB7E2FFC8318F159A5DE899AB351D770E945CB82
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: '$X'{$Z
                      • API String ID: 0-4276205954
                      • Opcode ID: 7dc47073ff71d3badd0ef0079de72d08779d235589716dcfdb9026319fbc0479
                      • Instruction ID: c8a7875d47551cd5d8106d74ce06d6ea4b14b3bce5822cf4abbe8413f8ea4dec
                      • Opcode Fuzzy Hash: 7dc47073ff71d3badd0ef0079de72d08779d235589716dcfdb9026319fbc0479
                      • Instruction Fuzzy Hash: 418199315187969FC7099F38C8806EABBE2FFD2324F848A2DE5E6871D6D3359406C741
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8CA85
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8CD87
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                      • String ID:
                      • API String ID: 885266447-0
                      • Opcode ID: 7643884fd159501ad21b83adce755281ab3e9a7888280cc720f3666325f71a0e
                      • Instruction ID: 1c3784c1852aa4f0955c7b542418c59fe72c69ddcc46b35b06785691e72342d6
                      • Opcode Fuzzy Hash: 7643884fd159501ad21b83adce755281ab3e9a7888280cc720f3666325f71a0e
                      • Instruction Fuzzy Hash: 3A02D470604602AFDB18EF28C840B6AB7E0BF8A318F24956DE45DE7650D774EC95CBE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E94443
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E944A1
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                      • String ID:
                      • API String ID: 885266447-0
                      • Opcode ID: fd72d836d90a6cfad1a6a999fa81fbda92248e81c5ce7c131b337026effd61df
                      • Instruction ID: 79569f1784d8f88159032528791e56af7312154d39ff2b9da0051bbc4864f016
                      • Opcode Fuzzy Hash: fd72d836d90a6cfad1a6a999fa81fbda92248e81c5ce7c131b337026effd61df
                      • Instruction Fuzzy Hash: 6402E2B1E006198BCF18CFADC890ABDFBF1BB95314F1952AAE959BB391D7344942C740
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: Wa$d
                      • API String ID: 0-563278814
                      • Opcode ID: 5c1731f4dc62e84164a98e596763b0f5c08a0bc014a8373ec83a0d8eab401c5d
                      • Instruction ID: 5b0181290706db740d26c5c0edc92accd9a5c0df70451ec126b6c498757faa77
                      • Opcode Fuzzy Hash: 5c1731f4dc62e84164a98e596763b0f5c08a0bc014a8373ec83a0d8eab401c5d
                      • Instruction Fuzzy Hash: 0DB1B1316047428FD314DF29C58056ABBE2BF99304F5885ADE89D9F343DB36E906CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: _CZ8$\K
                      • API String ID: 0-1938404051
                      • Opcode ID: 45d2e40018c0a13860ab6eed7eda0c9500f61ace60405a1136f13194e70f0c29
                      • Instruction ID: 37332fae61f10cad0a68ada44f327d3232b4b7bd562245f927c573ce35933e5f
                      • Opcode Fuzzy Hash: 45d2e40018c0a13860ab6eed7eda0c9500f61ace60405a1136f13194e70f0c29
                      • Instruction Fuzzy Hash: 9271C97750C6C2DFD72B8FB898201D57FA2EEA721071846CEC6D18B1A2D722940AC792
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: match
                      • API String ID: 0-2052834565
                      • Opcode ID: e38c5ba39e3c86c1cfb3484f3b4715c707fca6b152b31ebfcf0d6a4c18ce0fc5
                      • Instruction ID: 39b4acc7f3aa2ea3a4e7949859e46d6da17cffc4cd2ad391877d3c0a92044f14
                      • Opcode Fuzzy Hash: e38c5ba39e3c86c1cfb3484f3b4715c707fca6b152b31ebfcf0d6a4c18ce0fc5
                      • Instruction Fuzzy Hash: 2D729E706047418FD724CF24C481B2AB7E1BF88315F149A6DFC9AAB392D775E849CB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: %s-mj%08X
                      • API String ID: 0-77246884
                      • Opcode ID: c471fa593e583f4e6c3933c268b1271ac89d98a3b3f29649eee6d1263f2baac7
                      • Instruction ID: fa9127eaf440281e22ef74f6f8054588aaab4ef6ca8ccdc2542d3f87f91aeea8
                      • Opcode Fuzzy Hash: c471fa593e583f4e6c3933c268b1271ac89d98a3b3f29649eee6d1263f2baac7
                      • Instruction Fuzzy Hash: 5C428974A002059FDB14EFA9D880AAAB7F1FF48308F14946EEA1EB7361D731A945CB51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: NX
                      • API String ID: 0-1533795491
                      • Opcode ID: 679fac2c59c74b1f95650f526264bd9f66ba08f8b4be776cab117ae058108006
                      • Instruction ID: 34f5cefa9011acd0240c482eab374f80deecdf23913ff6c19c22b6a0938d8d4d
                      • Opcode Fuzzy Hash: 679fac2c59c74b1f95650f526264bd9f66ba08f8b4be776cab117ae058108006
                      • Instruction Fuzzy Hash: 6D42ED72A01A49CBDB14CE78C8407ADFBB1FF46304F1486ADE4A5E7782D7749909CBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: _^
                      • API String ID: 0-595606861
                      • Opcode ID: 89db716a02e146326b243d9066911edda74ae4d7f1014736d1d635ede4752255
                      • Instruction ID: bcafcece9cf65933d3a7c20826a38e99ec23b43693efb7c379702758764f3210
                      • Opcode Fuzzy Hash: 89db716a02e146326b243d9066911edda74ae4d7f1014736d1d635ede4752255
                      • Instruction Fuzzy Hash: D8125071E006099FDF24DFA8D980AAFB7F6EF89314F104629E816A3351E731EE058B51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: GD
                      • API String ID: 0-1286887157
                      • Opcode ID: 167ef22492c207c921e56e1c20753adab6c38b6063002745a7889ef1cf7ca7c3
                      • Instruction ID: 627d2a7922fce2b06daf921634dc6a0e2ab87205db69bb5f744e50327cd12bf0
                      • Opcode Fuzzy Hash: 167ef22492c207c921e56e1c20753adab6c38b6063002745a7889ef1cf7ca7c3
                      • Instruction Fuzzy Hash: 50E17EB29092928EDF158F38C4817EDFFA2EF65304F1856A6C495AB7C2D2349A46C790
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: -
                      • API String ID: 0-2547889144
                      • Opcode ID: 380dda1ef3d93faf75dbacb9f630860303182309aaebddffecc3a3ea39fa0403
                      • Instruction ID: d0e8cbdb6f22906fc194f8d0aa5c4de998b99097d23212ab0cec396fb3e9b38b
                      • Opcode Fuzzy Hash: 380dda1ef3d93faf75dbacb9f630860303182309aaebddffecc3a3ea39fa0403
                      • Instruction Fuzzy Hash: 55C1A676900B049FDB21CFA4CC40AEEFBF5EF44310F108A59E4A6E7691D770AA45CB51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0
                      • API String ID: 0-4108050209
                      • Opcode ID: 77f26a8dea2f6029c41abbe118531b7cfb566cab24313c2f25501dc56542953c
                      • Instruction ID: dd727fa55f4e40dbb9dd874e5c535f895dc44105a405c0ac47f8bfb6c48f6cdf
                      • Opcode Fuzzy Hash: 77f26a8dea2f6029c41abbe118531b7cfb566cab24313c2f25501dc56542953c
                      • Instruction Fuzzy Hash: 15B1A170A0070A8FCF288F68E9596BEBFB5EF04304F18461AD996E7691D731E941CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: -
                      • API String ID: 0-2547889144
                      • Opcode ID: ffad52e287b60b8b48c8f6c01dcfbe838c716be90c45fb450b26370899277487
                      • Instruction ID: c55235dd8ff5a899898933e19bec1cee53a9484844d2fcf2d80197aedcd54c79
                      • Opcode Fuzzy Hash: ffad52e287b60b8b48c8f6c01dcfbe838c716be90c45fb450b26370899277487
                      • Instruction Fuzzy Hash: 66817271A51648AEEF219AB4C840BEDFFE0EF05201F1489E8E8D5E3B41D678D64AC761
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: 2
                      • API String ID: 0-450215437
                      • Opcode ID: 761b39ab4049f001374611d32ddd216a6fa552aacbd2c987adec83d97d3023a2
                      • Instruction ID: bd3da1f4354a8c73da114299ded588536c3d2b162ed5a63757dbc5fdaa02aa13
                      • Opcode Fuzzy Hash: 761b39ab4049f001374611d32ddd216a6fa552aacbd2c987adec83d97d3023a2
                      • Instruction Fuzzy Hash: 23719C725083929FC715AB38DC002AEBBE0FF96710F498A5DE9D4475A6D335980ACB82
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2e67c1ac17531a5a025ef85f890630ff36b91d86e43df02c23b2a37ca7560038
                      • Instruction ID: 721c33bcbea811e92794a0fa38afbae103531baca75d657be99c7e24e3dc6364
                      • Opcode Fuzzy Hash: 2e67c1ac17531a5a025ef85f890630ff36b91d86e43df02c23b2a37ca7560038
                      • Instruction Fuzzy Hash: 8F928C70A083518FC714DF29D480A2ABBE1FFC9304F14996EE8D9A7352E735E945CB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cfd8b1d68f7a16e38b41e5422b5b8e38dcca659e74be3dcbc866f7a1a144ec7e
                      • Instruction ID: 2798b5731163cef50a55abcf1c85e7a8744da3d8924a911c28e395694875181a
                      • Opcode Fuzzy Hash: cfd8b1d68f7a16e38b41e5422b5b8e38dcca659e74be3dcbc866f7a1a144ec7e
                      • Instruction Fuzzy Hash: BC626AB1E002059FDF18CF59D5846AEBBF1AF88308F2891A9DA54BB342C775D946CF90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7b4ba0ac1fa63b83f14caaa64dd9e0e0dde97c818dd99233cb6e5efc87cf38aa
                      • Instruction ID: a9da759fb70749233a97657780e643bd9817c864927da35a3b49489782bd24c4
                      • Opcode Fuzzy Hash: 7b4ba0ac1fa63b83f14caaa64dd9e0e0dde97c818dd99233cb6e5efc87cf38aa
                      • Instruction Fuzzy Hash: 8C427071A043418FD714CF28C480B1AFBE1BF89319F159AADED99AB351D771E849CB82
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 13db34f20032a7c6e92d0ca4e09ea16b80b58f6f7507fafc4a3215e9184e4dc6
                      • Instruction ID: 731a964b53f2ed90a8e6d51e5f5a52347e6046278b4a3810b20df2d913762e11
                      • Opcode Fuzzy Hash: 13db34f20032a7c6e92d0ca4e09ea16b80b58f6f7507fafc4a3215e9184e4dc6
                      • Instruction Fuzzy Hash: 01126634A04B008FCB24CF29D884AA6BBF1FF88318F14596EE8969B751D771F951CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1a19ae02a516b05082bc255c0b731f91b588db8e4935e9dfa7a6ebf2d2aca8ca
                      • Instruction ID: 7c648aed2208963668a204ec1952cd9a514323bd5d5e299ec30b67f571bcc362
                      • Opcode Fuzzy Hash: 1a19ae02a516b05082bc255c0b731f91b588db8e4935e9dfa7a6ebf2d2aca8ca
                      • Instruction Fuzzy Hash: BEC1CA7090060A8FCF24DF68E9846BABFB5EF45300F284619DA969B692C731ED45CF71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: db754529a7736d4ee08ddd42d57fbc670e220fd9642efe229ae09d0667b9fd83
                      • Instruction ID: 6970fa2425d605985d1031a8a92aad8b2ae6ae93a635f06822c73f9e2a1483d6
                      • Opcode Fuzzy Hash: db754529a7736d4ee08ddd42d57fbc670e220fd9642efe229ae09d0667b9fd83
                      • Instruction Fuzzy Hash: 1AB13C316106089FDB19CF28C48AB657BF1FF49364F298658E8D9CF2A1C375E991CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 21a67febc048bd5e7bed61c903892d463eae84642cc4542d2051080d3f21be36
                      • Instruction ID: df2ba5a0f1a728eaf7207f164cd15f6f85a35fb7e381b37ffc4fbba08bc2eec9
                      • Opcode Fuzzy Hash: 21a67febc048bd5e7bed61c903892d463eae84642cc4542d2051080d3f21be36
                      • Instruction Fuzzy Hash: B361E770600605AFEB34CAA8D881BEEFBE5EF45310F208AACE596E37D0D271E645C751
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5a69bb6c2e2dd0246e9eed7c9937f7434ec19c89c8bc092a0474fc883d991025
                      • Instruction ID: 5fa792c39a148d4cc52003e74d8f9d43a09d9be340e708a5348d11d557e2305f
                      • Opcode Fuzzy Hash: 5a69bb6c2e2dd0246e9eed7c9937f7434ec19c89c8bc092a0474fc883d991025
                      • Instruction Fuzzy Hash: D07161326205644FD70ECF5FECC05273762A78A3417D5872AEA81F7295C539FA2AC7A0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e7c0fe21f4d14e376c2ae9e7ff776500b313db378e1d2a236112620963421295
                      • Instruction ID: c884eb9a0aad50217c9d9faae08d99c0004818117bbaa0e87c04cd25e601335f
                      • Opcode Fuzzy Hash: e7c0fe21f4d14e376c2ae9e7ff776500b313db378e1d2a236112620963421295
                      • Instruction Fuzzy Hash: 79614C716201648FD70DCF5FFCC04273766E78A341786472AEA81EB2D6C535E92AD7A0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 563c096d62770bff53cdbb19f3653670aacb8bd0a76d05738593bad46fe6d402
                      • Instruction ID: 01f72c976f8380824181328275a82eb53f6527fdf3fff3c4eced98fa92df8363
                      • Opcode Fuzzy Hash: 563c096d62770bff53cdbb19f3653670aacb8bd0a76d05738593bad46fe6d402
                      • Instruction Fuzzy Hash: 4B518072D00119AFDF04DF98C941AEEBBB2FF88300F598459E955AB201D7349A40DFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d2690a81f27f6994415059e057746b6e1ce943cdab0d87838aefee2dd9494447
                      • Instruction ID: 6be4315698300786549119a7b2ebdba964b5322d2253cfd6a748d93107914c53
                      • Opcode Fuzzy Hash: d2690a81f27f6994415059e057746b6e1ce943cdab0d87838aefee2dd9494447
                      • Instruction Fuzzy Hash: 3D31487160879A5FC721EE3DD94049A7BE2BBC6310F14D77DE0E4871D6D735840AEA42
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 42c984d3f07eda0a429da2c70b56e3254edc4134771c9ffa6adb7c022f487015
                      • Instruction ID: 5c294d3e95b3dcca07ea89e624d961555982ed9b656f21dccda62c2c83572a0b
                      • Opcode Fuzzy Hash: 42c984d3f07eda0a429da2c70b56e3254edc4134771c9ffa6adb7c022f487015
                      • Instruction Fuzzy Hash: 55312272A0879A6FC731EE39990059B7792BBC6320F14D72DE4E8875D6C735800AEA42
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1584348cf9e3f3be4a9b24cc4e2ffe07feb8b558a8eaef0232f41b95094aa3e0
                      • Instruction ID: 8f961ab890de4720c8fa8dde243d6b889b5c9cd9f0a04b662df788d740b9b3bb
                      • Opcode Fuzzy Hash: 1584348cf9e3f3be4a9b24cc4e2ffe07feb8b558a8eaef0232f41b95094aa3e0
                      • Instruction Fuzzy Hash: 0D312972B80708AEDB209E69DC40BC9BFD6EF45211F08C559FD9C9B750C2B1E249C7A0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 94978ecb10fb46a92cf3899432018b8b37c83ef522de7d078de12bb46ee25086
                      • Instruction ID: 64606c1c3d4d26e97f446000d2beed60cf0f42562ec2e08bb82ffa9f263e0588
                      • Opcode Fuzzy Hash: 94978ecb10fb46a92cf3899432018b8b37c83ef522de7d078de12bb46ee25086
                      • Instruction Fuzzy Hash: FFE0DF356083A58BC750FB60CA0269EBBA9BAE0340F984729B6E2A7409DB346454D787
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00DA8040
                      • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00DA8055
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: AddressProc
                      • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive$``
                      • API String ID: 190572456-3927222770
                      • Opcode ID: 091afc2546241784bb5cb40806e0a3cbb1ba9968617d3b048f874c6682a74318
                      • Instruction ID: 0b60b0d07d7c5d1e1c35ac920ce123b160b016086557c2a180e78e8a0d111464
                      • Opcode Fuzzy Hash: 091afc2546241784bb5cb40806e0a3cbb1ba9968617d3b048f874c6682a74318
                      • Instruction Fuzzy Hash: B0F0C2316427225F4B711FA55CC52A73288AA037E431D413EDE42F3140EE14CC8EB2B8
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: String___crt$Type_memset
                      • String ID:
                      • API String ID: 1957702402-3916222277
                      • Opcode ID: 9b361b41e08002eb96135586fdf474ba1a58ac9be43322b8183458d74da400c5
                      • Instruction ID: 9f69b3033867bc3f49497712f89be8c7e3dca519c84a2de168b686a6c6d6af9e
                      • Opcode Fuzzy Hash: 9b361b41e08002eb96135586fdf474ba1a58ac9be43322b8183458d74da400c5
                      • Instruction Fuzzy Hash: C24138B050079C9EDB218B259C85FFB7BF9AF05308F1454E8E696A7283E2719E49CF10
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _ValidateScopeTableHandlers.LIBCMT ref: 00EF82F1
                      • __FindPESection.LIBCMT ref: 00EF830B
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: FindHandlersScopeSectionTableValidate
                      • String ID:
                      • API String ID: 876702719-0
                      • Opcode ID: f47af90b38500edd1440b2c79f5c45b1b8af42c86a5f66920b45704c51c417bf
                      • Instruction ID: fe08e89a2839beb546da789119ad240efd7274ea895e0e8cf26820efbf2022bd
                      • Opcode Fuzzy Hash: f47af90b38500edd1440b2c79f5c45b1b8af42c86a5f66920b45704c51c417bf
                      • Instruction Fuzzy Hash: 7E91B032A0161D8BDB14CF58DA9477EB3B6FB84714F155229EA15B73A0DB31ED02CBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 00D6D28A
                      • std::_Lockit::_Lockit.LIBCPMT ref: 00D6D2AC
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00D6D2D4
                      • __Getcoll.LIBCPMT ref: 00D6D39F
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00D6D40E
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getcoll
                      • String ID:
                      • API String ID: 2318601406-0
                      • Opcode ID: 3783a3a5efc0a8b4395db4ba06cfeaef19402ba5a2653c55c032d239bfaca835
                      • Instruction ID: a274e46bb37922037c3580374acdc3d954722c027afd445ab3db14d502ba44a0
                      • Opcode Fuzzy Hash: 3783a3a5efc0a8b4395db4ba06cfeaef19402ba5a2653c55c032d239bfaca835
                      • Instruction Fuzzy Hash: C251ABB0D01208DFDB01DF99E9447AEBBB4EF40314F248059E8156B381D775AE09CBB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00D56587
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: ___std_exception_destroy
                      • String ID: ", "$: "$string too long
                      • API String ID: 4194217158-1244075009
                      • Opcode ID: 5960045ed0c649374d05ab6e914f4ebb1e895b5a1f223a2eefca1f69521ffb87
                      • Instruction ID: 8ba91d1f885aae9bce22f6bd8a978583ed97cf16342d13d3d02a0227673053cd
                      • Opcode Fuzzy Hash: 5960045ed0c649374d05ab6e914f4ebb1e895b5a1f223a2eefca1f69521ffb87
                      • Instruction Fuzzy Hash: 4FD1C370D002059FCF24DFA8D841AAEBBF5EF44311F14462DE865A7381EB70AA48CBB5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetProcAddress.KERNEL32(?,?), ref: 00D591D3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: AddressProc
                      • String ID: Ws2_32.dll$v<Ea$v<Ea
                      • API String ID: 190572456-996692458
                      • Opcode ID: b66eb4405b3018313e662ef82b6bddba4afdef940880800301fb14aa7595888e
                      • Instruction ID: 955c58b84ec9fe9d0c459bf6422593b4e4e648f0dff7b81bdd068758de273b48
                      • Opcode Fuzzy Hash: b66eb4405b3018313e662ef82b6bddba4afdef940880800301fb14aa7595888e
                      • Instruction Fuzzy Hash: E3410174E04658CBDF24CFA8C8546ADFBB0BF48311F28824DE865AB390DB746946CF94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ___initmbctable.LIBCMT ref: 00EF1B0B
                        • Part of subcall function 00EEEA1D: __setmbcp.LIBCMT ref: 00EEEA28
                      • _parse_cmdline.LIBCMT ref: 00EF1B4D
                      • _parse_cmdline.LIBCMT ref: 00EF1B8E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: _parse_cmdline$___initmbctable__setmbcp
                      • String ID: C:\Users\user\Desktop\file.exe
                      • API String ID: 1290970244-1957095476
                      • Opcode ID: 85a50852ea1b027c7764e48295f657d1038c8ebe74679b9a99119bdee3ed5967
                      • Instruction ID: 6187730327d9ac3a0f1795fc166ef768d558604ad1e7f65d55966b7b98b85ecf
                      • Opcode Fuzzy Hash: 85a50852ea1b027c7764e48295f657d1038c8ebe74679b9a99119bdee3ed5967
                      • Instruction Fuzzy Hash: B621B776D0010DEBCB10DBA5AC948AE7BBCFA8032471056B9E714F7251E2305E45DBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • MultiByteToWideChar.KERNEL32(00ED6328,00000000,?,?,00000000,00000000,00001006,00001004,000030BB,?,?,?,00EF2ED4,00000001,?,00ED6328), ref: 00EF2D90
                      • _memset.LIBCMT ref: 00EF2DE5
                      • MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000,?,?,00ED6328,?,00000001,00ED6328,00ED6328,00000008,?,00ED6328), ref: 00EF2DFA
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$_memset
                      • String ID:
                      • API String ID: 3545102435-0
                      • Opcode ID: 58ab5bad5d5d51aa44cb2173e68ea1ec4dc1ded59f7b3b86fdba6732a6e1f3d4
                      • Instruction ID: cc5b9161569ce4d900c83afddb3e1765fc041522aca0e5686f5053b939cd35a3
                      • Opcode Fuzzy Hash: 58ab5bad5d5d51aa44cb2173e68ea1ec4dc1ded59f7b3b86fdba6732a6e1f3d4
                      • Instruction Fuzzy Hash: 80518C7290010EAFDF129F64DC81DBE7BA9EF18358B245429FB04EB261D731CD619BA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 00D6A09D
                      • std::_Lockit::_Lockit.LIBCPMT ref: 00D6A0BF
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00D6A0E7
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00D6A223
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: Lockitstd::_$Lockit::_Lockit::~_
                      • String ID:
                      • API String ID: 593203224-0
                      • Opcode ID: 8fb13e61af8f76051e3159918883bc17bfa6687d5a65d8b0e5379dcc630ad841
                      • Instruction ID: cba02332432edc65ba9ff93a015da2ef4b12422b7e3fbea87ac73c57c30b95e0
                      • Opcode Fuzzy Hash: 8fb13e61af8f76051e3159918883bc17bfa6687d5a65d8b0e5379dcc630ad841
                      • Instruction Fuzzy Hash: 555187B1901749CFDB11DF58C9417AEBBB0EB15314F18815AD885BB281E774AE48CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __EH_prolog3.LIBCMT ref: 00D82720
                      • std::_Lockit::_Lockit.LIBCPMT ref: 00D8272B
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00D82799
                        • Part of subcall function 00D8287C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00D82894
                      • std::locale::_Setgloballocale.LIBCPMT ref: 00D82746
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                      • String ID:
                      • API String ID: 677527491-0
                      • Opcode ID: 0e67742cec83749362dc6b6917cd223f00a62a2786dd4b825d62340280c59065
                      • Instruction ID: 1bd7eb77179b811e51574867a6c87dd60f156cca321ef3bdb2f94dd0860c71c0
                      • Opcode Fuzzy Hash: 0e67742cec83749362dc6b6917cd223f00a62a2786dd4b825d62340280c59065
                      • Instruction Fuzzy Hash: 8D01B876A006209FCB06FB25DC4197D7BB1FF84B80B08000AE80127386CF74AA4ACBF1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00D75787
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00D7579E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: ___std_exception_destroy
                      • String ID: l
                      • API String ID: 4194217158-2517025534
                      • Opcode ID: a2f997624f2c7475cbdfe518c8b3b17163aa5eb5eba8d0d640458bf4d676be8e
                      • Instruction ID: 4a0fd93551f7850e25c2792b5b90349d03526d36abf489efa6ea8356681a19aa
                      • Opcode Fuzzy Hash: a2f997624f2c7475cbdfe518c8b3b17163aa5eb5eba8d0d640458bf4d676be8e
                      • Instruction Fuzzy Hash: 9BF0A9A0C052C8DEDF01DBA8D9457CDBBB59B16304F144096D4446B246E7B5AB1CE773
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00D75680
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00D75697
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: ___std_exception_destroy
                      • String ID: x
                      • API String ID: 4194217158-2363233923
                      • Opcode ID: 8af529a4ff030e25563164fac151c952243fc81b2342025af1f4d0f414ec4551
                      • Instruction ID: 7194770ee3b84b50e29562f8fbef50c305cb34f7f8fde0aec214ef89a4c0b1b6
                      • Opcode Fuzzy Hash: 8af529a4ff030e25563164fac151c952243fc81b2342025af1f4d0f414ec4551
                      • Instruction Fuzzy Hash: D4F0DAA0C09288D9DF41DBE4D54978DBBB45F15304F1480AAD84867241E7B8A70CD777
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • Sleep.KERNEL32(00000001,?,00000000,40000000,00000000,00000001,00000000), ref: 00E92951
                      • GetLastError.KERNEL32(?,00000000,40000000,00000000,00000001,00000000), ref: 00E92968
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: ErrorLastSleep
                      • String ID:
                      • API String ID: 1458359878-0
                      • Opcode ID: fb9cf50877540dc8e43870076bfb60e4993ea827a07d13f2589d403448626cac
                      • Instruction ID: 2aac9caa29d76a30929ddfd9ba70e9f3f1b65f3768238b9447f0f269070ee7ca
                      • Opcode Fuzzy Hash: fb9cf50877540dc8e43870076bfb60e4993ea827a07d13f2589d403448626cac
                      • Instruction Fuzzy Hash: C841D931B413157BDF319B69DC817AEB795EB89724F24926AEE08BB381C3719D4087D0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetLastError.KERNEL32(?,00000000,?,00000000,?,00000000,?,00000000), ref: 00E920E6
                      • Sleep.KERNEL32(00000064,?,00000000,?,00000000), ref: 00E920FC
                      • GetLastError.KERNEL32(00000000), ref: 00E92119
                      • Sleep.KERNEL32(00000064,00000000), ref: 00E9212F
                      Memory Dump Source
                      • Source File: 00000000.00000002.4096844284.0000000000D51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D50000, based on PE: true
                      • Associated: 00000000.00000002.4096830508.0000000000D50000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096948995.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096978283.0000000000ED2000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4096996467.0000000000ED7000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097024924.0000000000EFF000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097045634.0000000000F05000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097172034.00000000010E4000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097187071.00000000010E5000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4097418935.000000000148D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d50000_file.jbxd
                      Similarity
                      • API ID: ErrorLastSleep
                      • String ID:
                      • API String ID: 1458359878-0
                      • Opcode ID: 90d45aa6a9a12f5079e882f3c1207d089962acae8ad29930a64360b0a7f11c2a
                      • Instruction ID: 5c5349ca79037c844d2b7e519f7bb8cb3b36d28444bb87118c490ee644054801
                      • Opcode Fuzzy Hash: 90d45aa6a9a12f5079e882f3c1207d089962acae8ad29930a64360b0a7f11c2a
                      • Instruction Fuzzy Hash: F9214D75D01304AFCF20AB756CC45BE73B8EB55338F10456EFA1DF2240DA31888A9252
                      Uniqueness

                      Uniqueness Score: -1.00%