Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
h4QtFUlwIz.exe

Overview

General Information

Sample name:h4QtFUlwIz.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:feef88d2312370e6b654f759d6853247ffc81337dc2e18ffb2f0f8b9335cd079
Analysis ID:1432122
MD5:c1e6995e3a405d018ad7a69d2a0f075b
SHA1:14a2add2815925174eabb86b510f5c2743930ba1
SHA256:feef88d2312370e6b654f759d6853247ffc81337dc2e18ffb2f0f8b9335cd079
Infos:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Detected potential crypto function
PE file contains executable resources (Code or Archives)
Sample file is different than original file name gathered from version info
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Uses 32bit PE files

Classification

  • System is w10x64
  • h4QtFUlwIz.exe (PID: 2672 cmdline: "C:\Users\user\Desktop\h4QtFUlwIz.exe" MD5: C1E6995E3A405D018AD7A69D2A0F075B)
    • msiexec.exe (PID: 3868 cmdline: msiexec /p VC234PATCH01.msp REINSTALL=ALL REINSTALLMODE=amus /qf MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • rundll32.exe (PID: 6536 cmdline: "C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\" MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\h4QtFUlwIz.exe, ProcessId: 2672, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: h4QtFUlwIz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: h4QtFUlwIz.exeStatic PE information: certificate valid
Source: Binary string: wextract.pdb source: h4QtFUlwIz.exe
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\scaexec.pdb source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.dr
Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\SfxCA.pdb source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C51000.00000004.00000020.00020000.00000000.sdmp, h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C15000.00000004.00000020.00020000.00000000.sdmp, h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003D9A000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.dr
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\scasched.pdb source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.dr
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: h4QtFUlwIz.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: h4QtFUlwIz.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: h4QtFUlwIz.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
Source: h4QtFUlwIz.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: h4QtFUlwIz.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
Source: h4QtFUlwIz.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: h4QtFUlwIz.exeString found in binary or memory: http://crl.globalsign.com/root.crl0G
Source: h4QtFUlwIz.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
Source: h4QtFUlwIz.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: h4QtFUlwIz.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0L
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: h4QtFUlwIz.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: h4QtFUlwIz.exe, VC234PATCH01.msp.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: http://ocsp.digicert.com0K
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: http://ocsp.digicert.com0N
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: http://ocsp.digicert.com0O
Source: h4QtFUlwIz.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: h4QtFUlwIz.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: h4QtFUlwIz.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: h4QtFUlwIz.exeString found in binary or memory: http://ocsp.globalsign.com/rootr103
Source: h4QtFUlwIz.exeString found in binary or memory: http://ocsp.globalsign.com/rootr30;
Source: h4QtFUlwIz.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: h4QtFUlwIz.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: h4QtFUlwIz.exeString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: http://wixtoolset.org
Source: VC234PATCH01.msp.0.drString found in binary or memory: http://www.opentext.com/2/global/services-home/services-support-contact.htmMoreInfoURLOptimizedInsta
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: h4QtFUlwIz.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: h4QtFUlwIz.exeString found in binary or memory: https://www.opentext.com0
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeCode function: 0_2_0100871A0_2_0100871A
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeCode function: 0_2_01009A1F0_2_01009A1F
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeCode function: 0_2_01008DBD0_2_01008DBD
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeCode function: 0_2_01008A3E0_2_01008A3E
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeCode function: 0_2_010095E50_2_010095E5
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeCode function: 0_2_010091750_2_01009175
Source: h4QtFUlwIz.exeStatic PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, Windows 2000/XP setup, 16117495 bytes, 1 file, at 0x2c +A "VC234PATCH01.msp", ID 1153, number 1, 533 datablocks, 0x1503 compression
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003BE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCopySAPConnector.dlll% vs h4QtFUlwIz.exe
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003BE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dll\ vs h4QtFUlwIz.exe
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGACnetCheck.dlll% vs h4QtFUlwIz.exe
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dll\ vs h4QtFUlwIz.exe
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamescasched.dll\ vs h4QtFUlwIz.exe
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamescaexec.dll\ vs h4QtFUlwIz.exe
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C1F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCopySAPConnector.dlll% vs h4QtFUlwIz.exe
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C1F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dll\ vs h4QtFUlwIz.exe
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003DA4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSetDefaultDatabaseConnection.dlll% vs h4QtFUlwIz.exe
Source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003DA4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dll\ vs h4QtFUlwIz.exe
Source: h4QtFUlwIz.exeBinary or memory string: OriginalFilenameWEXTRACT.EXE h# vs h4QtFUlwIz.exe
Source: h4QtFUlwIz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: clean2.winEXE@4/1@0/0
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeCode function: 0_2_01005190 GetDlgItem,GetDlgItem,ShowWindow,ShowWindow,GetDlgItem,ShowWindow,FreeResource,SendMessageA,0_2_01005190
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeFile created: C:\Users\user\AppData\Local\Temp\IXP000.TMPJump to behavior
Source: h4QtFUlwIz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
Source: unknownProcess created: C:\Users\user\Desktop\h4QtFUlwIz.exe "C:\Users\user\Desktop\h4QtFUlwIz.exe"
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec /p VC234PATCH01.msp REINSTALL=ALL REINSTALLMODE=amus /qf
Source: unknownProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec /p VC234PATCH01.msp REINSTALL=ALL REINSTALLMODE=amus /qfJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: feclient.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeSection loaded: advpack.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: h4QtFUlwIz.exeStatic PE information: certificate valid
Source: h4QtFUlwIz.exeStatic file information: File size 16199144 > 1048576
Source: h4QtFUlwIz.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0xf65800
Source: h4QtFUlwIz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wextract.pdb source: h4QtFUlwIz.exe
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\scaexec.pdb source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.dr
Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\SfxCA.pdb source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C51000.00000004.00000020.00020000.00000000.sdmp, h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C15000.00000004.00000020.00020000.00000000.sdmp, h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003D9A000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.dr
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\scasched.pdb source: h4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.dr
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\h4QtFUlwIz.exeCode function: 0_2_0100646B GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0100646B
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Rundll32
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Process Injection
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1432122 Sample: h4QtFUlwIz Startdate: 26/04/2024 Architecture: WINDOWS Score: 2 5 h4QtFUlwIz.exe 1 3 2->5         started        7 rundll32.exe 2->7         started        process3 9 msiexec.exe 5->9         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
h4QtFUlwIz.exe0%ReversingLabs
h4QtFUlwIz.exe0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://www.opentext.com00%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.opentext.com/2/global/services-home/services-support-contact.htmMoreInfoURLOptimizedInstaVC234PATCH01.msp.0.drfalse
    high
    http://wixtoolset.orgh4QtFUlwIz.exe, 00000000.00000003.1999194712.0000000003C5B000.00000004.00000020.00020000.00000000.sdmp, VC234PATCH01.msp.0.drfalse
      high
      https://www.opentext.com0h4QtFUlwIz.exefalse
      • Avira URL Cloud: safe
      unknown
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1432122
      Start date and time:2024-04-26 14:27:14 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 36s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:6
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:h4QtFUlwIz.exe
      (renamed file extension from none to exe, renamed because original name is a hash value)
      Original Sample Name:feef88d2312370e6b654f759d6853247ffc81337dc2e18ffb2f0f8b9335cd079
      Detection:CLEAN
      Classification:clean2.winEXE@4/1@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:Failed
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\h4QtFUlwIz.exe
      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Installation Database, Subject: OpenText Validation for SAP Solutions, Author: Open Text Corporation, Keywords: Installer, Comments: OpenText Validation for SAP Solutions., Create Time/Date: Thu Jan 11 08:48:30 2024, Name of Creating Application: Windows Installer XML Toolset (3.10.2.2516), Security: 2, Template: Intel;1033, Last Saved By: Intel;1033, Revision Number: {349BB8AD-FD04-4468-91BD-DD9127ED2725}23.4.3;{349BB8AD-FD04-4468-91BD-DD9127ED2725}23.4.3.1;{3CD97D22-E660-4547-96DF-E91D3EE910AA}, Number of Pages: 301, Number of Characters: 153223191
      Category:dropped
      Size (bytes):17440768
      Entropy (8bit):7.941416811574007
      Encrypted:false
      SSDEEP:393216:cL1dc3aZf1HP+Lkg89+ZyQj6ezYXJeWq4W3OmMV78hRjs:EDGajaY+Zyq6eUwWg3OmMN8hRjs
      MD5:56746DB2FDFD175332A1A0B3DA711540
      SHA1:B55E5A9D6FB5F92EE490C3BBDAEE9639060FFF46
      SHA-256:E0DF18EE403A08ED1CAFED31592110B56C6B6BADF1D06EDB1A848ADE260118AE
      SHA-512:5230EDEA62CD9A72D1F114BE7DB351AC5F881711F79A38EF627649C84881F1A04BC25F39C24647490D2870CAD8E78A6B19343C715FBF6A3F626AD7889ACB0565
      Malicious:false
      Reputation:low
      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):7.9994159862293115
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:h4QtFUlwIz.exe
      File size:16'199'144 bytes
      MD5:c1e6995e3a405d018ad7a69d2a0f075b
      SHA1:14a2add2815925174eabb86b510f5c2743930ba1
      SHA256:feef88d2312370e6b654f759d6853247ffc81337dc2e18ffb2f0f8b9335cd079
      SHA512:f340c958d814a0546598c8f35ba817b4325afab52ecfeb44a3205565cf74deec1e450ddf5c803ccb626ae7af5e3af8b332e6d549c6733474c12a3711b9ebab9d
      SSDEEP:393216:VAjlvgUQ+OiPb3cDJo81WQe5gIy59JAlGkdTZKIp9o:6xvgCSJo81Wp/O96lhdTZzp2
      TLSH:5BF633B25EE44B8EFA471272E42F36B584393D939ACB932E171068C24C226394D7F757
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...Cu..C...C...C0..Cu..C...Cu..C...Cu..C...CRich...C................PE..L....Q.H.....................\......\d.....
      Icon Hash:878fd7f3b9353593
      Entrypoint:0x100645c
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x1000000
      Subsystem:windows gui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0x480251CD [Sun Apr 13 18:32:45 2008 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:5
      OS Version Minor:1
      File Version Major:5
      File Version Minor:1
      Subsystem Version Major:5
      Subsystem Version Minor:1
      Import Hash:0ebb3c09b06b1666d307952e824c8697
      Signature Valid:true
      Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
      Signature Validation Error:The operation completed successfully
      Error Number:0
      Not Before, Not After
      • 15/06/2023 18:01:26 15/06/2026 18:01:26
      Subject Chain
      • E=adakhqan@opentext.com, CN=Open Text Corporation, O=Open Text Corporation, STREET=275 Frank Tompa Drive, L=Waterloo, S=Ontario, C=CA, OID.1.3.6.1.4.1.311.60.2.1.2=Ontario, OID.1.3.6.1.4.1.311.60.2.1.3=CA, SERIALNUMBER=1083604-4, OID.2.5.4.15=Private Organization
      Version:3
      Thumbprint MD5:F955674D7B422BAC69C5B420C3B0C5DC
      Thumbprint SHA-1:FD17AEE5AC3FDA7ED84C0FA7ECAC5BFDA17A66A3
      Thumbprint SHA-256:0FEA432F23CB44DA6EDB5004ABF49887ED03C510AFC9D02CC22E62F36090A9AE
      Serial:4AA7DB0E66C0135E684BA4E5
      Instruction
      call 00007F9FE120231Fh
      jmp 00007F9FE120228Fh
      int3
      int3
      int3
      int3
      int3
      mov edi, edi
      push ebp
      mov ebp, esp
      sub esp, 10h
      mov eax, dword ptr [0100B2D0h]
      test eax, eax
      je 00007F9FE1202319h
      cmp eax, 0000BB40h
      jne 00007F9FE120235Fh
      push esi
      lea eax, dword ptr [ebp-08h]
      push eax
      call dword ptr [01001170h]
      mov esi, dword ptr [ebp-04h]
      xor esi, dword ptr [ebp-08h]
      call dword ptr [0100116Ch]
      xor esi, eax
      call dword ptr [01001168h]
      xor esi, eax
      call dword ptr [01001164h]
      xor esi, eax
      lea eax, dword ptr [ebp-10h]
      push eax
      call dword ptr [01001160h]
      mov eax, dword ptr [ebp-0Ch]
      xor eax, dword ptr [ebp-10h]
      xor eax, esi
      and eax, 0000FFFFh
      pop esi
      jne 00007F9FE1202317h
      mov eax, 0000BB40h
      mov dword ptr [0100B2D0h], eax
      not eax
      mov dword ptr [0100B2CCh], eax
      leave
      ret
      int3
      int3
      int3
      int3
      int3
      cmp ecx, dword ptr [0100B2D0h]
      jne 00007F9FE120231Bh
      test ecx, FFFF0000h
      jne 00007F9FE1202313h
      ret
      jmp 00007F9FE120231Ah
      int3
      int3
      int3
      int3
      int3
      mov edi, edi
      push ebp
      mov ebp, esp
      sub esp, 00000330h
      push edi
      mov dword ptr [ebp-00000228h], eax
      mov dword ptr [ebp-0000022Ch], ecx
      mov dword ptr [ebp-00000230h], edx
      mov dword ptr [ebp-00000234h], ebx
      mov dword ptr [ebp-00000238h], esi
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x9d800x8c.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd0000xf65764.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0xf6fa000x33e8.rsrc
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x12300x1c.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x10000x230.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x99c80x9a0087fe10d9dbd6b4e42fc70a9a4ecaa575False0.5805854301948052data6.579209426291961IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .data0xb0000x1be40x40099858e86526942a66950c7139f78a725False0.330078125data4.247999525438142IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0xd0000xf660000xf658002fbc1adeae9069c61439b8ff9233e5f2unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      AVI0xd7a00x2e1aRIFF (little-endian) data, AVI, 272 x 60, 10.00 fps, video: RLE 8bppGermanGermany0.2713099474665311
      RT_ICON0x105bc0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512GermanGermany0.3709677419354839
      RT_ICON0x108a40x128Device independent bitmap graphic, 16 x 32 x 4, image size 128GermanGermany0.6081081081081081
      RT_DIALOG0x109cc0x354dataGermanGermany0.4518779342723005
      RT_DIALOG0x10d200x1f0dataGermanGermany0.5342741935483871
      RT_DIALOG0x10f100x180dataGermanGermany0.53125
      RT_DIALOG0x110900x1e0dataGermanGermany0.5604166666666667
      RT_DIALOG0x112700x150dataGermanGermany0.5833333333333334
      RT_DIALOG0x113c00x138dataGermanGermany0.5961538461538461
      RT_STRING0x114f80xd0Matlab v4 mat-file (little endian) \344, numeric, rows 0, columns 0GermanGermany0.5721153846153846
      RT_STRING0x115c80x6f4dataGermanGermany0.34775280898876404
      RT_STRING0x11cbc0x744dataGermanGermany0.3387096774193548
      RT_STRING0x124000x678dataGermanGermany0.338768115942029
      RT_STRING0x12a780x4b0dataGermanGermany0.4225
      RT_STRING0x12f280x428dataGermanGermany0.35150375939849626
      RT_RCDATA0x133500x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
      RT_RCDATA0x133580xf5eef7Microsoft Cabinet archive data, Windows 2000/XP setup, 16117495 bytes, 1 file, at 0x2c +A "VC234PATCH01.msp", ID 1153, number 1, 533 datablocks, 0x1503 compressionEnglishUnited States0.9980459213256836
      RT_RCDATA0xf722500x4dataEnglishUnited States3.0
      RT_RCDATA0xf722540x24dataEnglishUnited States0.7222222222222222
      RT_RCDATA0xf722780x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
      RT_RCDATA0xf722800x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
      RT_RCDATA0xf722880x4dataEnglishUnited States3.0
      RT_RCDATA0xf7228c0x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
      RT_RCDATA0xf722940x4dataEnglishUnited States3.0
      RT_RCDATA0xf722980x41ASCII text, with no line terminatorsEnglishUnited States0.9692307692307692
      RT_RCDATA0xf722dc0x4dataEnglishUnited States3.0
      RT_RCDATA0xf722e00x1dASCII text, with no line terminatorsEnglishUnited States1.2758620689655173
      RT_RCDATA0xf723000x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
      RT_RCDATA0xf723080x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
      RT_GROUP_ICON0xf723100x22dataGermanGermany1.0
      RT_VERSION0xf723340x430dataGermanGermany0.42350746268656714
      DLLImport
      ADVAPI32.dllFreeSid, AllocateAndInitializeSid, EqualSid, GetTokenInformation, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueA, RegCloseKey, RegDeleteValueA, RegOpenKeyExA, RegSetValueExA, RegQueryValueExA, RegCreateKeyExA, RegQueryInfoKeyA
      KERNEL32.dllLocalFree, LocalAlloc, GetLastError, GetCurrentProcess, lstrlenA, GetModuleFileNameA, GetSystemDirectoryA, _lclose, _llseek, _lopen, WritePrivateProfileStringA, GetWindowsDirectoryA, CreateDirectoryA, GetFileAttributesA, ExpandEnvironmentStringsA, lstrcpyA, GlobalFree, GlobalUnlock, GlobalLock, GlobalAlloc, IsDBCSLeadByte, GetShortPathNameA, GetPrivateProfileStringA, GetPrivateProfileIntA, lstrcmpiA, RemoveDirectoryA, FindClose, FindNextFileA, DeleteFileA, SetFileAttributesA, lstrcmpA, FindFirstFileA, FreeResource, GetProcAddress, LoadResource, SizeofResource, FindResourceA, lstrcatA, CloseHandle, WriteFile, SetFilePointer, SetFileTime, LocalFileTimeToFileTime, DosDateTimeToFileTime, SetCurrentDirectoryA, GetTempFileNameA, ExitProcess, CreateFileA, LoadLibraryExA, lstrcpynA, GetVolumeInformationA, FormatMessageA, GetCurrentDirectoryA, GetVersionExA, GetExitCodeProcess, WaitForSingleObject, CreateProcessA, GetTempPathA, GetSystemInfo, CreateMutexA, SetEvent, CreateEventA, CreateThread, ResetEvent, TerminateThread, GetDriveTypeA, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, QueryPerformanceCounter, GetTickCount, GetCurrentThreadId, GetCurrentProcessId, GetSystemTimeAsFileTime, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, ReadFile, LoadLibraryA, GetDiskFreeSpaceA, MulDiv, EnumResourceLanguagesA, FreeLibrary, LockResource
      GDI32.dllGetDeviceCaps
      USER32.dllExitWindowsEx, wsprintfA, CharNextA, CharUpperA, CharPrevA, SetWindowLongA, GetWindowLongA, CallWindowProcA, DispatchMessageA, MsgWaitForMultipleObjects, PeekMessageA, SendMessageA, SetWindowPos, ReleaseDC, GetDC, GetWindowRect, SendDlgItemMessageA, GetDlgItem, SetForegroundWindow, SetWindowTextA, MessageBoxA, DialogBoxIndirectParamA, ShowWindow, EnableWindow, GetDlgItemTextA, EndDialog, GetDesktopWindow, MessageBeep, SetDlgItemTextA, LoadStringA, GetSystemMetrics
      COMCTL32.dll
      VERSION.dllGetFileVersionInfoA, VerQueryValueA, GetFileVersionInfoSizeA
      Language of compilation systemCountry where language is spokenMap
      GermanGermany
      EnglishUnited States
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:14:27:59
      Start date:26/04/2024
      Path:C:\Users\user\Desktop\h4QtFUlwIz.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\h4QtFUlwIz.exe"
      Imagebase:0x1000000
      File size:16'199'144 bytes
      MD5 hash:C1E6995E3A405D018AD7A69D2A0F075B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:2
      Start time:14:28:00
      Start date:26/04/2024
      Path:C:\Windows\SysWOW64\msiexec.exe
      Wow64 process (32bit):true
      Commandline:msiexec /p VC234PATCH01.msp REINSTALL=ALL REINSTALLMODE=amus /qf
      Imagebase:0xf00000
      File size:59'904 bytes
      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:14:28:12
      Start date:26/04/2024
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
      Imagebase:0x7ff65d040000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:21.8%
        Dynamic/Decrypted Code Coverage:58.3%
        Signature Coverage:29.2%
        Total number of Nodes:48
        Total number of Limit Nodes:1
        execution_graph 1350 1005190 1362 10032ff 1350->1362 1352 1005195 1353 1005199 1352->1353 1354 10051d2 1352->1354 1355 10051a8 GetDlgItem ShowWindow GetDlgItem ShowWindow 1352->1355 1365 10042a4 1354->1365 1355->1354 1357 1005288 1360 10052c9 1357->1360 1361 10052b6 SendMessageA 1357->1361 1358 100527b FreeResource 1358->1357 1359 10051dd 1359->1357 1359->1358 1361->1360 1371 1002e55 FindResourceA SizeofResource 1362->1371 1366 10042e5 1365->1366 1370 100433c 1366->1370 1376 10041d8 1366->1376 1368 1004303 1368->1370 1382 1003108 1368->1382 1370->1359 1372 1002ea0 FindResourceA LoadResource LockResource 1371->1372 1373 1002e7c 1371->1373 1372->1352 1373->1372 1374 1002e85 FindResourceA LoadResource LockResource 1373->1374 1374->1372 1375 1002ea4 FreeResource 1374->1375 1375->1372 1377 10041e8 1376->1377 1378 1004219 lstrcmpA 1377->1378 1381 10041fd 1377->1381 1379 100426d 1378->1379 1378->1381 1385 100412e 1379->1385 1381->1368 1383 1003123 1382->1383 1384 100313f FindCloseChangeNotification 1382->1384 1383->1370 1384->1383 1386 100413b 1385->1386 1387 1004143 CreateFileA 1385->1387 1386->1381 1387->1386 1389 10041af 1387->1389 1389->1386 1390 10041b5 1389->1390 1393 1002f6b 1390->1393 1394 1002fd9 CreateFileA 1393->1394 1396 1002f7d 1393->1396 1394->1386 1395 1002fcc CharNextA 1395->1396 1396->1394 1396->1395 1397 1002fbf CreateDirectoryA 1396->1397 1397->1395 1398 100645c 1405 100646b 1398->1405 1400 10063e0 GetCommandLineA 1401 1006409 1400->1401 1401->1400 1402 1006420 GetStartupInfoA 1401->1402 1403 100643a GetModuleHandleA 1402->1403 1404 100637a 1403->1404 1404->1398 1406 1006483 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 1405->1406 1407 100647c 1405->1407 1408 10064c6 1406->1408 1407->1406 1407->1408 1408->1401

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_01003108 1 Function_01007309 6 Function_01007D16 1->6 61 Function_01006F72 1->61 66 Function_01006EF9 1->66 2 Function_0100160F 3 Function_01005190 13 Function_01006AA4 3->13 14 Function_010042A4 3->14 19 Function_01007B2D 3->19 50 Function_0100735B 3->50 67 Function_010032FF 3->67 4 Function_01009590 27 Function_010081B8 4->27 5 Function_01008295 5->4 9 Function_0100861F 5->9 18 Function_0100952B 5->18 21 Function_010086B0 5->21 40 Function_010084CC 5->40 42 Function_010099CE 5->42 53 Function_01008D62 5->53 62 Function_010085F3 5->62 68 Function_010098FF 5->68 7 Function_01007F18 8 Function_0100871A 10 Function_01009A1F 11 Function_010081A0 12 Function_01007DA4 23 Function_01007FB7 12->23 13->6 14->0 14->13 30 Function_01006B3B 14->30 49 Function_010041D8 14->49 14->50 15 Function_010071A5 15->6 43 Function_01003D51 15->43 56 Function_01007E66 15->56 16 Function_01008527 17 Function_01007F28 17->11 36 Function_010080C1 17->36 44 Function_01008151 17->44 32 Function_01008DBD 18->32 64 Function_01009175 18->64 19->2 19->6 24 Function_010072B7 19->24 35 Function_010073C0 19->35 38 Function_01006E46 19->38 48 Function_010079D7 19->48 20 Function_0100412E 58 Function_01002F6B 20->58 22 Function_01009C30 23->17 33 Function_0100803E 23->33 24->6 26 Function_01006DB8 24->26 25 Function_01008537 26->6 28 Function_01007D39 29 Function_0100713A 29->6 31 Function_01007EBB 29->31 29->43 30->6 31->17 34 Function_01008A3E 35->2 35->6 35->26 41 Function_01006BCE 35->41 55 Function_010021E6 35->55 37 Function_010078C5 37->6 37->15 63 Function_01007774 37->63 65 Function_01006C78 37->65 38->6 39 Function_01003D49 41->6 42->22 42->62 45 Function_01001651 46 Function_01007F54 46->5 46->16 47 Function_01002E55 48->6 48->37 60 Function_0100796D 48->60 49->20 50->1 51 Function_0100645C 59 Function_0100646B 51->59 52 Function_01007EE1 52->7 53->8 53->34 54 Function_010095E5 54->10 54->25 54->62 55->2 55->45 56->46 57 Function_0100766B 57->1 57->6 60->29 60->37 60->57 61->6 61->12 61->39 62->25 63->6 63->24 63->35 63->57 65->6 65->28 66->6 66->43 66->52 67->47 68->10 68->54

        Control-flow Graph

        APIs
          • Part of subcall function 010032FF: FindResourceA.KERNEL32(00000000,CABINET,0000000A), ref: 0100331B
          • Part of subcall function 010032FF: LoadResource.KERNEL32(00000000,00000000,?,01005195), ref: 01003324
          • Part of subcall function 010032FF: LockResource.KERNEL32(00000000,?,01005195), ref: 0100332B
        • GetDlgItem.USER32(00020476,00000842), ref: 010051B5
        • ShowWindow.USER32(00000000), ref: 010051BE
        • GetDlgItem.USER32(00000841,00000005), ref: 010051CD
        • ShowWindow.USER32(00000000), ref: 010051D0
        • FreeResource.KERNEL32(00000000,-00000514,00000000,00000000,00000010,00000000), ref: 0100527C
        • SendMessageA.USER32(00000FA1,00000000,00000000,-00000514), ref: 010052C3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2048262048.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.2048246332.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048277968.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.0000000001A0D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_h4QtFUlwIz.jbxd
        Similarity
        • API ID: Resource$ItemShowWindow$FindFreeLoadLockMessageSend
        • String ID: *MEMCAB
        • API String ID: 3694369891-3211172518
        • Opcode ID: db05329e52dd5ee1d8b23c1b6cf70e12f657115257108f69590474f878c27e53
        • Instruction ID: 2bc75931ab46805ef586b25582dda227c40a14ab93dc7bc1b63351d76fe4d624
        • Opcode Fuzzy Hash: db05329e52dd5ee1d8b23c1b6cf70e12f657115257108f69590474f878c27e53
        • Instruction Fuzzy Hash: B931B9757823157BFA3363669C4AFDB7E9CEF46B61F400054F6C4A90C5D6FA84808BA1
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 33 100645c 34 100645c call 100646b 33->34 35 1006461 GetCommandLineA 34->35 38 1006415-1006417 35->38 39 100641a-100641e 35->39 38->39 40 1006420-1006432 GetStartupInfoA 38->40 39->38 39->40 41 100643a-100644a GetModuleHandleA call 100637a 40->41 41->33
        APIs
          • Part of subcall function 0100646B: GetSystemTimeAsFileTime.KERNEL32(?), ref: 01006488
          • Part of subcall function 0100646B: GetCurrentProcessId.KERNEL32 ref: 01006494
          • Part of subcall function 0100646B: GetCurrentThreadId.KERNEL32 ref: 0100649C
          • Part of subcall function 0100646B: GetTickCount.KERNEL32 ref: 010064A4
          • Part of subcall function 0100646B: QueryPerformanceCounter.KERNEL32(?), ref: 010064B0
        • GetCommandLineA.KERNEL32 ref: 010063E9
        Memory Dump Source
        • Source File: 00000000.00000002.2048262048.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.2048246332.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048277968.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.0000000001A0D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_h4QtFUlwIz.jbxd
        Similarity
        • API ID: CurrentTime$CommandCountCounterFileLinePerformanceProcessQuerySystemThreadTick
        • String ID:
        • API String ID: 4193432215-0
        • Opcode ID: 3ee3686978cb94449a485867cdbe4ff339c0d595a3f89fb2b492943d71a9f968
        • Instruction ID: c5a1862b985673df9dcaa7a20706b7fcb4bdebc4bc52080bc5b72109ef5ee6e2
        • Opcode Fuzzy Hash: 3ee3686978cb94449a485867cdbe4ff339c0d595a3f89fb2b492943d71a9f968
        • Instruction Fuzzy Hash: 5FF0E2714403889AFB736FA8884DBFE3FAB9B12304F550044E9C0D22C5CA7684E287E2
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 43 100412e-1004139 44 1004143-100414c 43->44 45 100413b-100413e 43->45 47 1004155-1004158 44->47 48 100414e 44->48 46 10041cf-10041d0 45->46 49 1004179-1004185 47->49 50 100415a-100415d 47->50 48->47 53 1004188 49->53 51 1004168-1004177 50->51 52 100415f-1004166 50->52 51->53 54 100418b-10041ad CreateFileA 52->54 53->54 55 10041cc-10041ce 54->55 56 10041af-10041b3 54->56 55->46 56->55 57 10041b5-10041ca call 1002f6b CreateFileA 56->57 57->55
        APIs
        • CreateFileA.KERNELBASE(00000180,80000000,00000000,00000000,00008000,00000080,00000000,00000000,00000000,00000000,?,?,0100427B,00000180,00008000,?), ref: 010041A8
        • CreateFileA.KERNEL32(00000180,80000000,00000000,00000000,00000003,00000080,00000000,00000180,?,?,0100427B,00000180,00008000,?), ref: 010041CA
        Memory Dump Source
        • Source File: 00000000.00000002.2048262048.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.2048246332.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048277968.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.0000000001A0D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_h4QtFUlwIz.jbxd
        Similarity
        • API ID: CreateFile
        • String ID:
        • API String ID: 823142352-0
        • Opcode ID: b69cf7712ea0dd325566fc773e9ea564160eeb22ca95d34820805d5e9552cd5a
        • Instruction ID: ad9754ded69d89190427acfe716f1ac8fe926d72f3e8cb2752d49aa3ea161600
        • Opcode Fuzzy Hash: b69cf7712ea0dd325566fc773e9ea564160eeb22ca95d34820805d5e9552cd5a
        • Instruction Fuzzy Hash: 661173B265410CBAFB124E69CC44FEA7BA8EB613A8F148225FB64D61D0C379CD41DB54
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 60 10041d8-10041e3 61 10041e8-10041eb 60->61 62 10041f8-10041fb 61->62 63 10041ed-10041f6 61->63 64 1004219-1004229 lstrcmpA 62->64 65 10041fd-100420d call 1003ebe 62->65 63->61 63->62 67 100422b-100422f 64->67 68 100426d-1004276 call 100412e 64->68 69 1004212 65->69 67->69 70 1004231-1004235 67->70 74 100427b-100428a 68->74 72 1004215-1004218 69->72 70->69 73 1004237-100426b 70->73 75 1004298-100429a 73->75 74->69 76 100428c-1004292 74->76 75->72 76->75
        APIs
        • lstrcmpA.KERNEL32(00000180,*MEMCAB,00000000,?,?,01004303,*MEMCAB,00008000,00000180,00000000), ref: 01004221
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2048262048.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.2048246332.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048277968.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.0000000001A0D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_h4QtFUlwIz.jbxd
        Similarity
        • API ID: lstrcmp
        • String ID: *MEMCAB
        • API String ID: 1534048567-3211172518
        • Opcode ID: 8d1886825cf7cf1b7fca3806ded3f6736f8ae30cbe39c047e8d4af6a682cd926
        • Instruction ID: 92061fbbc721102d292826fa71bb98d8294175fcbeac33c2f5b1cd223c837d31
        • Opcode Fuzzy Hash: 8d1886825cf7cf1b7fca3806ded3f6736f8ae30cbe39c047e8d4af6a682cd926
        • Instruction Fuzzy Hash: C11175716412049FF7639F18C984AB57B94FB00358F4643E9F6D9CA1E6CBB1C8458B54
        Uniqueness

        Uniqueness Score: -1.00%

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 77 1003108-1003121 78 1003123-100313d 77->78 79 100313f-100314d FindCloseChangeNotification 77->79 80 100315c-100315f 78->80 81 1003159 79->81 82 100314f-1003157 79->82 81->80 82->80
        APIs
        • FindCloseChangeNotification.KERNELBASE(?,00000000,00000000,?,0100433C,00000000,?,?,?,?,?,00000000), ref: 01003145
        Memory Dump Source
        • Source File: 00000000.00000002.2048262048.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.2048246332.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048277968.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.0000000001A0D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_h4QtFUlwIz.jbxd
        Similarity
        • API ID: ChangeCloseFindNotification
        • String ID:
        • API String ID: 2591292051-0
        • Opcode ID: ddf299c9d854a60029591bd0d9130fc256d7a927763a6f5153bdca3c177d8727
        • Instruction ID: ddcf91d87cb97e1f61d19a99827c2554d1a57a890e9a07dc5fc143585956e2ac
        • Opcode Fuzzy Hash: ddf299c9d854a60029591bd0d9130fc256d7a927763a6f5153bdca3c177d8727
        • Instruction Fuzzy Hash: 78F03632501B11EEA3A38F1995405EA7BE5FA84350B110669D5EEC6250DB30E4018B50
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • GetSystemTimeAsFileTime.KERNEL32(?), ref: 01006488
        • GetCurrentProcessId.KERNEL32 ref: 01006494
        • GetCurrentThreadId.KERNEL32 ref: 0100649C
        • GetTickCount.KERNEL32 ref: 010064A4
        • QueryPerformanceCounter.KERNEL32(?), ref: 010064B0
        Memory Dump Source
        • Source File: 00000000.00000002.2048262048.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.2048246332.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048277968.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.0000000001A0D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_h4QtFUlwIz.jbxd
        Similarity
        • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
        • String ID:
        • API String ID: 1445889803-0
        • Opcode ID: 1c9a6aecb8a7c21b59f0650fcfd769be0ce501fac9dd4907ed4c08a4f18fdedf
        • Instruction ID: 54730ea4cddf6389e8530bc477ef8a499c223e9ef8984b798b14dd8bf7ea62bb
        • Opcode Fuzzy Hash: 1c9a6aecb8a7c21b59f0650fcfd769be0ce501fac9dd4907ed4c08a4f18fdedf
        • Instruction Fuzzy Hash: 76F0EC76D002189BDB22ABB4D44859FBBF5FF08350F420561E481E7145DB3AE9008B80
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.2048262048.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.2048246332.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048277968.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.0000000001A0D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_h4QtFUlwIz.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7ab33120750a6cf8d1db9ab5d913f5b74d9f381fdd4bd0252d22a429b75f835f
        • Instruction ID: 2a4e20d8dd08869bc59d0f7a9c7b9ccb62a101cbb563704953a2602d9f9330db
        • Opcode Fuzzy Hash: 7ab33120750a6cf8d1db9ab5d913f5b74d9f381fdd4bd0252d22a429b75f835f
        • Instruction Fuzzy Hash: 10C16431A09695DFDB17CF68C4942EDBBB0BF05314F1981AED9CA5B683C7709A85C780
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.2048262048.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.2048246332.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048277968.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.0000000001A0D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_h4QtFUlwIz.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 951f3fe9c36bf399cea3b5daee7726a970067545f8f814873e799029eb7aa681
        • Instruction ID: a7c859f818a1c5d7f83a952ccff987e1bf8c78757954649e346333d07fc465ac
        • Opcode Fuzzy Hash: 951f3fe9c36bf399cea3b5daee7726a970067545f8f814873e799029eb7aa681
        • Instruction Fuzzy Hash: 98C179319082959FDB1BCF68C4946EDBBF0BF05318F1985E9D8D96B283C7749A85CB80
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.2048262048.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.2048246332.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048277968.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.0000000001A0D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_h4QtFUlwIz.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 44e1ba9ebfd45170cdbc9c9433d3231e241977a48afbef868eb8f0aea8853ba0
        • Instruction ID: 5fc93633ee571ff39a8677e382d59af8c1c0cea3ee91adbd583a6aeae41621e5
        • Opcode Fuzzy Hash: 44e1ba9ebfd45170cdbc9c9433d3231e241977a48afbef868eb8f0aea8853ba0
        • Instruction Fuzzy Hash: 3BB18031D082959FEB1ACF58C0942EDFBB1BF45314F19C2EED5966B282C7749A85CB80
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.2048262048.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.2048246332.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048277968.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.0000000001A0D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_h4QtFUlwIz.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1c71b5dec91b09520fdc65a5692a70fade92800ff2ceada316785ebfa9eb4593
        • Instruction ID: f8ae5dd48e3debf24b6725d3ddbfc9255f3a3dfa18b0ea0a8bf8b6824d7edd24
        • Opcode Fuzzy Hash: 1c71b5dec91b09520fdc65a5692a70fade92800ff2ceada316785ebfa9eb4593
        • Instruction Fuzzy Hash: BEB188759086999FDB07CF18C4906EEBBB1FF45310F18C6AFD8965B282C7709685CB90
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.2048262048.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.2048246332.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048277968.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.0000000001A0D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_h4QtFUlwIz.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: cc9e27de92532d430281cbbbf616aa24eb1d9968cc58c166f414955b503d17a5
        • Instruction ID: d6403490cd5a063b4169a535978f95eea43d4b920502812e922906ff9b75bb89
        • Opcode Fuzzy Hash: cc9e27de92532d430281cbbbf616aa24eb1d9968cc58c166f414955b503d17a5
        • Instruction Fuzzy Hash: AC91F631A04696DEEB179F59C8887FDB7B0FB04708F5081AAD58DA62C2D7749A81CF90
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.2048262048.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.2048246332.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048277968.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.0000000001A0D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_h4QtFUlwIz.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: adc727b130d8a70c901193652c7c29f7f7098ede988ec518b009589487b1a216
        • Instruction ID: 70227f3721590e3e4a8072faacb14836a54763ddc1fb9a3c1eeaf4a681808555
        • Opcode Fuzzy Hash: adc727b130d8a70c901193652c7c29f7f7098ede988ec518b009589487b1a216
        • Instruction Fuzzy Hash: 7061F431A0055E8BEF1ACF6CC4905BE77E2EBC9354F548469D9E6D7382DA309992CB80
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        • FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E6B
        • SizeofResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,Business Center Capture 23.4,0000007F,?,00000000), ref: 01002E6F
        • FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E8B
        • LoadResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,Business Center Capture 23.4,0000007F,?,00000000), ref: 01002E8F
        • LockResource.KERNEL32(00000000,?,0100546E,TITLE,Business Center Capture 23.4,0000007F,?,00000000), ref: 01002E96
        • FreeResource.KERNEL32(00000000,?,0100546E,TITLE,Business Center Capture 23.4,0000007F,?,00000000), ref: 01002EBA
        Strings
        • Business Center Capture 23.4, xrefs: 01002E5B
        Memory Dump Source
        • Source File: 00000000.00000002.2048262048.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.2048246332.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048277968.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.0000000001A0D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_h4QtFUlwIz.jbxd
        Similarity
        • API ID: Resource$Find$FreeLoadLockSizeof
        • String ID: Business Center Capture 23.4
        • API String ID: 468261009-1304987528
        • Opcode ID: 7090d6fbcbd5b277e53ff8aa31aa3d5f4a0baf2b3be01dcc482b1e99473e37a0
        • Instruction ID: c58e523c2e5cc4a020a6dc9083853665ab900ca59998c1429a4b95f367ba78fb
        • Opcode Fuzzy Hash: 7090d6fbcbd5b277e53ff8aa31aa3d5f4a0baf2b3be01dcc482b1e99473e37a0
        • Instruction Fuzzy Hash: 8F01F231300188BBEB239BA5EC88C7F7BAAEBC5761F144019FA85C3280C6768C01DB61
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
          • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E6B
          • Part of subcall function 01002E55: SizeofResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,Business Center Capture 23.4,0000007F,?,00000000), ref: 01002E6F
          • Part of subcall function 01002E55: FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 01002E8B
          • Part of subcall function 01002E55: LoadResource.KERNEL32(00000000,00000000,?,0100546E,TITLE,Business Center Capture 23.4,0000007F,?,00000000), ref: 01002E8F
          • Part of subcall function 01002E55: LockResource.KERNEL32(00000000,?,0100546E,TITLE,Business Center Capture 23.4,0000007F,?,00000000), ref: 01002E96
        • FindResourceA.KERNEL32(00000000,CABINET,0000000A), ref: 0100331B
        • LoadResource.KERNEL32(00000000,00000000,?,01005195), ref: 01003324
        • LockResource.KERNEL32(00000000,?,01005195), ref: 0100332B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2048262048.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
        • Associated: 00000000.00000002.2048246332.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048277968.000000000100B000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.000000000100D000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2048295877.0000000001A0D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_1000000_h4QtFUlwIz.jbxd
        Similarity
        • API ID: Resource$Find$LoadLock$Sizeof
        • String ID: CABINET
        • API String ID: 1933721802-1940454314
        • Opcode ID: 1692d02a55cbc160416827321246fe4b7eec14d249b88bc8613a2a7260353126
        • Instruction ID: cc1630d2f2e1415729ed085009dd32ef9f31af51343d2801e4429469f1343b9d
        • Opcode Fuzzy Hash: 1692d02a55cbc160416827321246fe4b7eec14d249b88bc8613a2a7260353126
        • Instruction Fuzzy Hash: 89E08675B417506BF33267B16C1DF873E5C9B05711F040015F386DA1C4C6F98400C751
        Uniqueness

        Uniqueness Score: -1.00%