Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:754388
MD5:fc0582e1cd55c0fcc0628241f7e8ce54
SHA1:89fc6969c4a12f714ec051f0b69a50385062868d
SHA256:4294a6949aac8f29179fc5cd688c88f52c6b4c5c85fe433ad11fe6e6947737c6
Tags:exe
Infos:

Detection

Amadey
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Amadeys stealer DLL
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
System process connects to network (likely due to code injection or exploit)
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Machine Learning detection for sample
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to steal Instant Messenger accounts or passwords
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found dropped PE file which has not been started or loaded
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Drops PE files
Contains functionality to read the PEB
Contains functionality to launch a program with higher privileges
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 4948 cmdline: C:\Users\user\Desktop\file.exe MD5: FC0582E1CD55C0FCC0628241F7E8CE54)
    • gntuud.exe (PID: 5176 cmdline: "C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe" MD5: FC0582E1CD55C0FCC0628241F7E8CE54)
      • schtasks.exe (PID: 5816 cmdline: "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe" /F MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5932 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • rundll32.exe (PID: 1544 cmdline: "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll, Main MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • gntuud.exe (PID: 5912 cmdline: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe MD5: FC0582E1CD55C0FCC0628241F7E8CE54)
  • gntuud.exe (PID: 1876 cmdline: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe MD5: FC0582E1CD55C0FCC0628241F7E8CE54)
  • gntuud.exe (PID: 1332 cmdline: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe MD5: FC0582E1CD55C0FCC0628241F7E8CE54)
  • gntuud.exe (PID: 996 cmdline: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe MD5: FC0582E1CD55C0FCC0628241F7E8CE54)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dllJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dllINDICATOR_TOOL_PWS_AmadyDetects password stealer DLL. Dropped by AmadeyditekSHen
    • 0xd868:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
    • 0x15604:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
    • 0x16074:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
    • 0x15158:$s2: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
    • 0x151bc:$s2: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
    • 0xdd0c:$s3: \Mikrotik\Winbox\Addresses.cdb
    • 0x190d8:$s4: \HostName
    • 0x19100:$s5: \Password
    • 0x17c04:$s6: SOFTWARE\RealVNC\
    • 0x17c30:$s6: SOFTWARE\RealVNC\
    • 0x17c5c:$s6: SOFTWARE\RealVNC\
    • 0x17ca4:$s6: SOFTWARE\RealVNC\
    • 0x17cd0:$s6: SOFTWARE\RealVNC\
    • 0x18008:$s7: SOFTWARE\TightVNC\
    • 0x18034:$s7: SOFTWARE\TightVNC\
    • 0x18060:$s7: SOFTWARE\TightVNC\
    • 0x180ac:$s7: SOFTWARE\TightVNC\
    • 0x1c43c:$s8: cred.dll
    C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dllJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
      C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dllINDICATOR_TOOL_PWS_AmadyDetects password stealer DLL. Dropped by AmadeyditekSHen
      • 0xd868:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
      • 0x15604:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
      • 0x16074:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
      • 0x15158:$s2: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
      • 0x151bc:$s2: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
      • 0xdd0c:$s3: \Mikrotik\Winbox\Addresses.cdb
      • 0x190d8:$s4: \HostName
      • 0x19100:$s5: \Password
      • 0x17c04:$s6: SOFTWARE\RealVNC\
      • 0x17c30:$s6: SOFTWARE\RealVNC\
      • 0x17c5c:$s6: SOFTWARE\RealVNC\
      • 0x17ca4:$s6: SOFTWARE\RealVNC\
      • 0x17cd0:$s6: SOFTWARE\RealVNC\
      • 0x18008:$s7: SOFTWARE\TightVNC\
      • 0x18034:$s7: SOFTWARE\TightVNC\
      • 0x18060:$s7: SOFTWARE\TightVNC\
      • 0x180ac:$s7: SOFTWARE\TightVNC\
      • 0x1c43c:$s8: cred.dll
      SourceRuleDescriptionAuthorStrings
      0000000B.00000002.323997230.0000000000D80000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      0000000D.00000002.436289008.0000000002720000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      00000011.00000002.568956006.0000000000CC0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      0000000D.00000002.435991850.0000000000C4C000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0xb88:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      Click to see the 5 entries
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: http://31.41.244.17/hfk3vK9/Plugins/cred64.dllVirustotal: Detection: 7%Perma Link
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dllAvira: detection malicious, Label: HEUR/AGEN.1233121
      Source: C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dllAvira: detection malicious, Label: HEUR/AGEN.1233121
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dllReversingLabs: Detection: 88%
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dllVirustotal: Detection: 75%Perma Link
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeVirustotal: Detection: 34%Perma Link
      Source: C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dllReversingLabs: Detection: 88%
      Source: C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dllVirustotal: Detection: 75%Perma Link
      Source: file.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeJoe Sandbox ML: detected

      Compliance

      barindex
      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 1.2.file.exe.400000.0.unpack
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeUnpacked PE file: 11.2.gntuud.exe.400000.0.unpack
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeUnpacked PE file: 13.2.gntuud.exe.400000.0.unpack
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeUnpacked PE file: 17.2.gntuud.exe.400000.0.unpack
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeUnpacked PE file: 18.2.gntuud.exe.400000.0.unpack
      Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: Binary string: D:\Mktmp\Amadey\Release\Amadey.pdb source: gntuud.exe, gntuud.exe, 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, gntuud.exe, 0000000B.00000003.313741322.0000000002760000.00000004.00001000.00020000.00000000.sdmp, gntuud.exe, 0000000D.00000003.434412948.0000000002780000.00000004.00001000.00020000.00000000.sdmp, gntuud.exe, 0000000D.00000002.436289008.0000000002720000.00000040.00001000.00020000.00000000.sdmp, gntuud.exe, 0000000D.00000002.435143049.0000000000400000.00000040.00000001.01000000.00000004.sdmp, gntuud.exe, 00000011.00000003.567938789.00000000027B0000.00000004.00001000.00020000.00000000.sdmp, gntuud.exe, 00000011.00000002.568655643.0000000000400000.00000040.00000001.01000000.00000004.sdmp, gntuud.exe, 00000012.00000003.694215668.0000000002790000.00000004.00001000.00020000.00000000.sdmp, gntuud.exe, 00000012.00000002.695283993.0000000000400000.00000040.00000001.01000000.00000004.sdmp, gntuud.exe, 00000012.00000002.696632130.0000000002750000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: Z^C:\lac89\biwekuyigivoh78 cifixi20 ye.pdb source: file.exe, gntuud.exe.1.dr
      Source: Binary string: C:\lac89\biwekuyigivoh78 cifixi20 ye.pdb source: file.exe, gntuud.exe.1.dr
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00420BA6 FindFirstFileExW,1_2_00420BA6
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_02770E0D FindFirstFileExW,1_2_02770E0D
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: 11_2_00420BA6 FindFirstFileExW,11_2_00420BA6

      Networking

      barindex
      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 31.41.244.17 80Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 192.168.2.5 80Jump to behavior
      Source: Joe Sandbox ViewASN Name: AEROEXPRESS-ASRU AEROEXPRESS-ASRU
      Source: Joe Sandbox ViewIP Address: 31.41.244.17 31.41.244.17
      Source: gntuud.exe, 00000003.00000003.299258643.0000000000E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://31.41.244.17/hfk3vK9/Plugins/cred64.dll
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00404180 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,1_2_00404180
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00402C70 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,RegOpenKeyExA,RegSetValueExA,RegCloseKey,GdiplusStartup,GetDC,RegGetValueA,RegGetValueA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,RegGetValueA,GetSystemMetrics,GetSystemMetrics,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GdipCreateBitmapFromHBITMAP,GdipGetImageEncodersSize,GdipGetImageEncoders,GdipSaveImageToFile,SelectObject,DeleteObject,DeleteObject,DeleteObject,ReleaseDC,GdipDisposeImage,GdiplusShutdown,1_2_00402C70

      System Summary

      barindex
      Source: 0000000B.00000002.323997230.0000000000D80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 0000000D.00000002.436289008.0000000002720000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000011.00000002.568956006.0000000000CC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 0000000D.00000002.435991850.0000000000C4C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000011.00000002.569160304.0000000000D1C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 0000000B.00000002.324503471.0000000000DCC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000001.00000002.294516594.0000000000C86000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000012.00000002.696239731.0000000000DBC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000012.00000002.696632130.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll, type: DROPPEDMatched rule: Detects password stealer DLL. Dropped by Amadey Author: ditekSHen
      Source: C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll, type: DROPPEDMatched rule: Detects password stealer DLL. Dropped by Amadey Author: ditekSHen
      Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 0000000B.00000002.323997230.0000000000D80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 0000000D.00000002.436289008.0000000002720000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000011.00000002.568956006.0000000000CC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 0000000D.00000002.435991850.0000000000C4C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000011.00000002.569160304.0000000000D1C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 0000000B.00000002.324503471.0000000000DCC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000001.00000002.294516594.0000000000C86000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000012.00000002.696239731.0000000000DBC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000012.00000002.696632130.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll, type: DROPPEDMatched rule: INDICATOR_TOOL_PWS_Amady author = ditekSHen, description = Detects password stealer DLL. Dropped by Amadey
      Source: C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll, type: DROPPEDMatched rule: INDICATOR_TOOL_PWS_Amady author = ditekSHen, description = Detects password stealer DLL. Dropped by Amadey
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040CBD01_2_0040CBD0
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004294701_2_00429470
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0042848D1_2_0042848D
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004328901_2_00432890
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_027786F41_2_027786F4
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_027796D71_2_027796D7
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: 11_2_0042947011_2_00429470
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: 11_2_0042848D11_2_0042848D
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: 11_2_0043289011_2_00432890
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: 11_2_0040CBD011_2_0040CBD0
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: String function: 00416F50 appears 130 times
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: String function: 00418C40 appears 40 times
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00418C40 appears 40 times
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 027671B7 appears 130 times
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00416F50 appears 130 times
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 02768EA7 appears 39 times
      Source: file.exeStatic PE information: Resource name: RT_VERSION type: x86 executable not stripped
      Source: gntuud.exe.1.drStatic PE information: Resource name: RT_VERSION type: x86 executable not stripped
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeProcess Stats: CPU usage > 98%
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll D3E9A3365F73A34E2DD9022A318ABCC2C55AF98BAFB2DC302CBB55F5398BB9A0
      Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
      Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe "C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe"
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe" /F
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll, Main
      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe "C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe" Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe" /FJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll, MainJump to behavior
      Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeFile created: C:\Users\user\AppData\Roaming\56a1c3d463f381Jump to behavior
      Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\3f904562a0Jump to behavior
      Source: classification engineClassification label: mal100.phis.spyw.evad.winEXE@12/5@0/2
      Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll, Main
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeMutant created: \Sessions\1\BaseNamedObjects\56a1c3d463f38174c2fd686077b9fd81
      Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\e832cadb1fd2ddc07c2cc5d843c5256a
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5932:120:WilError_01
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: D:\Mktmp\Amadey\Release\Amadey.pdb source: gntuud.exe, gntuud.exe, 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, gntuud.exe, 0000000B.00000003.313741322.0000000002760000.00000004.00001000.00020000.00000000.sdmp, gntuud.exe, 0000000D.00000003.434412948.0000000002780000.00000004.00001000.00020000.00000000.sdmp, gntuud.exe, 0000000D.00000002.436289008.0000000002720000.00000040.00001000.00020000.00000000.sdmp, gntuud.exe, 0000000D.00000002.435143049.0000000000400000.00000040.00000001.01000000.00000004.sdmp, gntuud.exe, 00000011.00000003.567938789.00000000027B0000.00000004.00001000.00020000.00000000.sdmp, gntuud.exe, 00000011.00000002.568655643.0000000000400000.00000040.00000001.01000000.00000004.sdmp, gntuud.exe, 00000012.00000003.694215668.0000000002790000.00000004.00001000.00020000.00000000.sdmp, gntuud.exe, 00000012.00000002.695283993.0000000000400000.00000040.00000001.01000000.00000004.sdmp, gntuud.exe, 00000012.00000002.696632130.0000000002750000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: Z^C:\lac89\biwekuyigivoh78 cifixi20 ye.pdb source: file.exe, gntuud.exe.1.dr
      Source: Binary string: C:\lac89\biwekuyigivoh78 cifixi20 ye.pdb source: file.exe, gntuud.exe.1.dr

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 1.2.file.exe.400000.0.unpack
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeUnpacked PE file: 11.2.gntuud.exe.400000.0.unpack
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeUnpacked PE file: 13.2.gntuud.exe.400000.0.unpack
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeUnpacked PE file: 17.2.gntuud.exe.400000.0.unpack
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeUnpacked PE file: 18.2.gntuud.exe.400000.0.unpack
      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 1.2.file.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeUnpacked PE file: 11.2.gntuud.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeUnpacked PE file: 13.2.gntuud.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeUnpacked PE file: 17.2.gntuud.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeUnpacked PE file: 18.2.gntuud.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00418C86 push ecx; ret 1_2_00418C99
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0275A758 push ebp; retf 0000h1_2_0275A75F
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_02768EED push ecx; ret 1_2_02768F00
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: 11_2_00418C86 push ecx; ret 11_2_00418C99
      Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dllJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeFile created: C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dllJump to dropped file

      Boot Survival

      barindex
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders StartupJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe" /F
      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe TID: 4356Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe TID: 4332Thread sleep time: -50000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe TID: 4360Thread sleep time: -180000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe TID: 4544Thread sleep time: -1440000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe TID: 4356Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dllJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeThread delayed: delay time: 180000Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeThread delayed: delay time: 360000Jump to behavior
      Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.6 %
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeAPI coverage: 3.5 %
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00405400 GetVersionExW,GetModuleHandleA,GetProcAddress,GetSystemInfo,1_2_00405400
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00420BA6 FindFirstFileExW,1_2_00420BA6
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_02770E0D FindFirstFileExW,1_2_02770E0D
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: 11_2_00420BA6 FindFirstFileExW,11_2_00420BA6
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeThread delayed: delay time: 30000Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeThread delayed: delay time: 50000Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeThread delayed: delay time: 180000Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeThread delayed: delay time: 360000Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeThread delayed: delay time: 30000Jump to behavior
      Source: rundll32.exe, 0000000C.00000002.323525192.0000000000AB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllM
      Source: rundll32.exe, 0000000C.00000003.307563567.0000000000AB5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00418A67 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00418A67
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_004037D0 DeleteObject,GetUserNameW,GetUserNameW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetUserNameW,LookupAccountNameW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,LookupAccountNameW,ConvertSidToStringSidW,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,LocalFree,1_2_004037D0
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0041B901 mov eax, dword ptr fs:[00000030h]1_2_0041B901
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0041DF02 mov eax, dword ptr fs:[00000030h]1_2_0041DF02
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0275092B mov eax, dword ptr fs:[00000030h]1_2_0275092B
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0276E169 mov eax, dword ptr fs:[00000030h]1_2_0276E169
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0276BB68 mov eax, dword ptr fs:[00000030h]1_2_0276BB68
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_02750D90 mov eax, dword ptr fs:[00000030h]1_2_02750D90
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: 11_2_0041B901 mov eax, dword ptr fs:[00000030h]11_2_0041B901
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: 11_2_0041DF02 mov eax, dword ptr fs:[00000030h]11_2_0041DF02
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00418163 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00418163
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00418A67 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00418A67
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0041CA80 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0041CA80
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00418BCC SetUnhandledExceptionFilter,1_2_00418BCC
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_027683CA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_027683CA
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_02768E33 SetUnhandledExceptionFilter,1_2_02768E33
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0276CCE7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0276CCE7
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_02768CCE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_02768CCE
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: 11_2_00418163 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00418163
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: 11_2_00418A67 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00418A67
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: 11_2_0041CA80 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_0041CA80
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeCode function: 11_2_00418BCC SetUnhandledExceptionFilter,11_2_00418BCC

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 31.41.244.17 80Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 192.168.2.5 80Jump to behavior
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00403F40 GetModuleFileNameA,CreateProcessA,VirtualAlloc,GetThreadContext,ReadProcessMemory,GetModuleHandleA,GetProcAddress,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,VirtualFree,1_2_00403F40
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00404350 ShellExecuteA,1_2_00404350
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe "C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe" Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe" /FJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll, MainJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00418887 cpuid 1_2_00418887
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00418CA1 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,1_2_00418CA1
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00424BC4 _free,_free,_free,GetTimeZoneInformation,_free,1_2_00424BC4
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00405400 GetVersionExW,GetModuleHandleA,GetProcAddress,GetSystemInfo,1_2_00405400
      Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0040CBD0 GetUserNameA,SetCurrentDirectoryA,GetFileAttributesA,CreateDirectoryA,GetFileAttributesA,GetModuleFileNameA,SetCurrentDirectoryA,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,1_2_0040CBD0

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll, type: DROPPED
      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll, type: DROPPED
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\SessionsJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\sitemanager.xmlJump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\.purple\accounts.xmlJump to behavior
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Scheduled Task/Job
      1
      Scheduled Task/Job
      1
      Exploitation for Privilege Escalation
      1
      Deobfuscate/Decode Files or Information
      1
      OS Credential Dumping
      2
      System Time Discovery
      Remote Services1
      Archive Collected Data
      Exfiltration Over Other Network Medium1
      Ingress Tool Transfer
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/Job1
      Registry Run Keys / Startup Folder
      211
      Process Injection
      2
      Obfuscated Files or Information
      2
      Credentials in Registry
      1
      Account Discovery
      Remote Desktop Protocol1
      Data from Local System
      Exfiltration Over Bluetooth1
      Encrypted Channel
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)1
      Scheduled Task/Job
      2
      Software Packing
      1
      Credentials In Files
      2
      File and Directory Discovery
      SMB/Windows Admin Shares1
      Screen Capture
      Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)1
      Registry Run Keys / Startup Folder
      1
      Masquerading
      NTDS24
      System Information Discovery
      Distributed Component Object Model1
      Email Collection
      Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script21
      Virtualization/Sandbox Evasion
      LSA Secrets121
      Security Software Discovery
      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common211
      Process Injection
      Cached Domain Credentials21
      Virtualization/Sandbox Evasion
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
      Rundll32
      DCSync1
      System Owner/User Discovery
      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 754388 Sample: file.exe Startdate: 26/11/2022 Architecture: WINDOWS Score: 100 43 Multi AV Scanner detection for domain / URL 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Antivirus detection for dropped file 2->47 49 3 other signatures 2->49 8 file.exe 4 2->8         started        12 gntuud.exe 2->12         started        14 gntuud.exe 2->14         started        16 2 other processes 2->16 process3 file4 35 C:\Users\user\AppData\Local\...\gntuud.exe, PE32 8->35 dropped 37 C:\Users\user\...\gntuud.exe:Zone.Identifier, ASCII 8->37 dropped 67 Detected unpacking (changes PE section rights) 8->67 69 Detected unpacking (overwrites its own PE header) 8->69 71 Contains functionality to inject code into remote processes 8->71 18 gntuud.exe 18 8->18         started        signatures5 process6 dnsIp7 39 31.41.244.17 AEROEXPRESS-ASRU Russian Federation 18->39 31 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32 18->31 dropped 33 C:\Users\user\AppData\Local\...\cred64[1].dll, PE32 18->33 dropped 51 Multi AV Scanner detection for dropped file 18->51 53 Detected unpacking (changes PE section rights) 18->53 55 Detected unpacking (overwrites its own PE header) 18->55 57 3 other signatures 18->57 23 rundll32.exe 18->23         started        27 schtasks.exe 1 18->27         started        file8 signatures9 process10 dnsIp11 41 192.168.2.5 unknown unknown 23->41 59 System process connects to network (likely due to code injection or exploit) 23->59 61 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 23->61 63 Tries to steal Instant Messenger accounts or passwords 23->63 65 2 other signatures 23->65 29 conhost.exe 27->29         started        signatures12 process13

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      file.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll100%AviraHEUR/AGEN.1233121
      C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll100%AviraHEUR/AGEN.1233121
      C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll88%ReversingLabsWin32.Infostealer.Decred
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll75%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe35%VirustotalBrowse
      C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll88%ReversingLabsWin32.Infostealer.Decred
      C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll75%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://31.41.244.17/hfk3vK9/Plugins/cred64.dll0%Avira URL Cloudsafe
      http://31.41.244.17/hfk3vK9/Plugins/cred64.dll8%VirustotalBrowse
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://31.41.244.17/hfk3vK9/Plugins/cred64.dllgntuud.exe, 00000003.00000003.299258643.0000000000E24000.00000004.00000020.00020000.00000000.sdmpfalse
      • 8%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      31.41.244.17
      unknownRussian Federation
      61974AEROEXPRESS-ASRUtrue
      IP
      192.168.2.5
      Joe Sandbox Version:36.0.0 Rainbow Opal
      Analysis ID:754388
      Start date and time:2022-11-26 19:17:05 +01:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 10m 51s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:file.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:19
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.phis.spyw.evad.winEXE@12/5@0/2
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 96%
      • Number of executed functions: 22
      • Number of non-executed functions: 133
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for rundll32
      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
      • Not all processes where analyzed, report is missing behavior information
      • Report creation exceeded maximum time and may have missing disassembly code information.
      • Report size exceeded maximum capacity and may have missing behavior information.
      • Report size getting too big, too many NtDeviceIoControlFile calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtReadVirtualMemory calls found.
      TimeTypeDescription
      19:18:00API Interceptor2513x Sleep call for process: gntuud.exe modified
      19:18:02Task SchedulerRun new task: gntuud.exe path: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      31.41.244.17hhrs7h5uZB.dllGet hashmaliciousBrowse
      • 31.41.244.17/hfk3vK9/index.php
      hhrs7h5uZB.dllGet hashmaliciousBrowse
      • 31.41.244.17/hfk3vK9/index.php
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      AEROEXPRESS-ASRUfile.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      hhrs7h5uZB.dllGet hashmaliciousBrowse
      • 31.41.244.17
      hhrs7h5uZB.dllGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      file.exeGet hashmaliciousBrowse
      • 31.41.244.17
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dllfile.exeGet hashmaliciousBrowse
        file.exeGet hashmaliciousBrowse
          file.exeGet hashmaliciousBrowse
            file.exeGet hashmaliciousBrowse
              file.exeGet hashmaliciousBrowse
                file.exeGet hashmaliciousBrowse
                  file.exeGet hashmaliciousBrowse
                    file.exeGet hashmaliciousBrowse
                      file.exeGet hashmaliciousBrowse
                        file.exeGet hashmaliciousBrowse
                          file.exeGet hashmaliciousBrowse
                            file.exeGet hashmaliciousBrowse
                              file.exeGet hashmaliciousBrowse
                                file.exeGet hashmaliciousBrowse
                                  file.exeGet hashmaliciousBrowse
                                    file.exeGet hashmaliciousBrowse
                                      file.exeGet hashmaliciousBrowse
                                        file.exeGet hashmaliciousBrowse
                                          file.exeGet hashmaliciousBrowse
                                            file.exeGet hashmaliciousBrowse
                                              Process:C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):129024
                                              Entropy (8bit):6.511961466655514
                                              Encrypted:false
                                              SSDEEP:3072:ox7pOYzBekBmWDWCMq6As523HeS9FAiZ87vO2rlL3Rnm9:ox7ZNhB/dMq6AO0a7vVlT
                                              MD5:ADBAF286228C46522E50371C4BE31A03
                                              SHA1:A29D644C4663B2E2B2BD92046BA0DF629537C297
                                              SHA-256:D3E9A3365F73A34E2DD9022A318ABCC2C55AF98BAFB2DC302CBB55F5398BB9A0
                                              SHA-512:74A55CC8D8C3AF54E5BA290A34B968918DA994EA2D55B5F0D1F39E83CB9A39D73226227933C760B48F2E0BDB646F8243967517EF8202E02D88411D2D19AE217D
                                              Malicious:true
                                              Yara Hits:
                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll, Author: Joe Security
                                              • Rule: INDICATOR_TOOL_PWS_Amady, Description: Detects password stealer DLL. Dropped by Amadey, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll, Author: ditekSHen
                                              Antivirus:
                                              • Antivirus: Avira, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 88%
                                              • Antivirus: Virustotal, Detection: 75%, Browse
                                              Joe Sandbox View:
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              Reputation:moderate, very likely benign file
                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................X......x.............@..........................@..........................................O.......&.... ..............................................................................................................CODE................................ ..`DATA................................@...BSS......................................idata..&...........................@....edata..O...........................@..P.reloc..............................@..P.rsrc........ ......................@..P.............@......................@..P................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\file.exe
                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):211968
                                              Entropy (8bit):7.389735637483072
                                              Encrypted:false
                                              SSDEEP:6144:9/kH61vyrS1ccAJEsSBrVqbtkdim2qv6Wlz:9/ine9AZSnqbt4imhNlz
                                              MD5:FC0582E1CD55C0FCC0628241F7E8CE54
                                              SHA1:89FC6969C4A12F714EC051F0B69A50385062868D
                                              SHA-256:4294A6949AAC8F29179FC5CD688C88F52C6B4C5C85FE433AD11FE6E6947737C6
                                              SHA-512:369464A7AD92D41BCB5736DEB9A6332533520EBBA19BDAFA0D93A9A026E6A26E0D46EAD8468593564DECE9D6A0F1E4CFBB5A97AC07F7C784D43D037D82CBBAEF
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: Virustotal, Detection: 35%, Browse
                                              Reputation:low
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d.+...x...x...x.J;x...x.W8x...x.W.x...x...x...x...x5..x.W)x...x.W9x...x.W<x...xRich...x................PE..L...z..a......................m.....wC....... ....@..........................`n......?..........................................P.... n..3...........................................................(..@...............<............................text............................... ..`.data.....l.. ......................@....rsrc....3... n..4..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\file.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):26
                                              Entropy (8bit):3.95006375643621
                                              Encrypted:false
                                              SSDEEP:3:ggPYV:rPYV
                                              MD5:187F488E27DB4AF347237FE461A079AD
                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview:[ZoneTransfer]....ZoneId=0
                                              Process:C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
                                              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
                                              Category:dropped
                                              Size (bytes):107080
                                              Entropy (8bit):7.930494196730398
                                              Encrypted:false
                                              SSDEEP:1536:CCADD22DzOc35XWKpM6b9BWSkzkTcfulVdLM5Y1Rc1m90LH2ON68aEjCwu4EgVek:yf3FIK99BE1fko1dHta8CV4EgVcVd8
                                              MD5:2BE638ED54CE1FD7E010B25FFE76F2C8
                                              SHA1:F22F4F7F433E47EB8655736D571C7C7F5D2A804C
                                              SHA-256:E36B1AFD90BB77E353AF9F1FB0B533BE428DE583C617138569E37A2601B32C05
                                              SHA-512:574CB1736CE9CE1AEF4628CA9386493BEF4821FDAC8E47912849B96A90E4290FB1E8A7C6B1020BB467D6E28EB287239C722003CD8316F40E06F481DB0C4323AE
                                              Malicious:false
                                              Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..01KK...lq\....xcS.m..#Hm.....T......<!...wq5...v1.?S.....rHj-.U:...5............|..+.......}...<.>...H.......Wo.CK`/l.1./...C...W.....,1....R.0.W.M.!.l7.~S....."SW.^..c......^s........u,-n....A..?.2.....l.(.?....7..~.q$.f..1\.q[.....oS:.gOY".....f-%.P.b.Z....>.....4+..b.Y&..F...)Pq.L....... .....H.#.|..).?.H.'.|....).?m.....h.t......|4.%...d....
                                              Process:C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):129024
                                              Entropy (8bit):6.511961466655514
                                              Encrypted:false
                                              SSDEEP:3072:ox7pOYzBekBmWDWCMq6As523HeS9FAiZ87vO2rlL3Rnm9:ox7ZNhB/dMq6AO0a7vVlT
                                              MD5:ADBAF286228C46522E50371C4BE31A03
                                              SHA1:A29D644C4663B2E2B2BD92046BA0DF629537C297
                                              SHA-256:D3E9A3365F73A34E2DD9022A318ABCC2C55AF98BAFB2DC302CBB55F5398BB9A0
                                              SHA-512:74A55CC8D8C3AF54E5BA290A34B968918DA994EA2D55B5F0D1F39E83CB9A39D73226227933C760B48F2E0BDB646F8243967517EF8202E02D88411D2D19AE217D
                                              Malicious:true
                                              Yara Hits:
                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll, Author: Joe Security
                                              • Rule: INDICATOR_TOOL_PWS_Amady, Description: Detects password stealer DLL. Dropped by Amadey, Source: C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll, Author: ditekSHen
                                              Antivirus:
                                              • Antivirus: Avira, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 88%
                                              • Antivirus: Virustotal, Detection: 75%, Browse
                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................X......x.............@..........................@..........................................O.......&.... ..............................................................................................................CODE................................ ..`DATA................................@...BSS......................................idata..&...........................@....edata..O...........................@..P.reloc..............................@..P.rsrc........ ......................@..P.............@......................@..P................................................................................................................................................................................
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):7.389735637483072
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:file.exe
                                              File size:211968
                                              MD5:fc0582e1cd55c0fcc0628241f7e8ce54
                                              SHA1:89fc6969c4a12f714ec051f0b69a50385062868d
                                              SHA256:4294a6949aac8f29179fc5cd688c88f52c6b4c5c85fe433ad11fe6e6947737c6
                                              SHA512:369464a7ad92d41bcb5736deb9a6332533520ebba19bdafa0d93a9a026e6a26e0d46ead8468593564dece9d6a0f1e4cfbb5a97ac07f7c784d43d037d82cbbaef
                                              SSDEEP:6144:9/kH61vyrS1ccAJEsSBrVqbtkdim2qv6Wlz:9/ine9AZSnqbt4imhNlz
                                              TLSH:EE24F1223A40E033C40391748538E7B13A7E797759B89843BF551FAD9FB22D2BA27359
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d.+...x...x...x.J;x...x.W8x...x.W.x...x...x...x...x5..x.W)x...x.W9x...x.W<x...xRich...x................PE..L...z..a...........
                                              Icon Hash:c8d0d8e0f8f0f0e0
                                              Entrypoint:0x404377
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:TERMINAL_SERVER_AWARE
                                              Time Stamp:0x61A7897A [Wed Dec 1 14:40:58 2021 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:5
                                              OS Version Minor:0
                                              File Version Major:5
                                              File Version Minor:0
                                              Subsystem Version Major:5
                                              Subsystem Version Minor:0
                                              Import Hash:77b9cbeda5e32323ee560d94649c1c1a
                                              Instruction
                                              call 00007F155CB71D92h
                                              jmp 00007F155CB6C97Dh
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              push ebp
                                              mov ebp, esp
                                              push edi
                                              push esi
                                              mov esi, dword ptr [ebp+0Ch]
                                              mov ecx, dword ptr [ebp+10h]
                                              mov edi, dword ptr [ebp+08h]
                                              mov eax, ecx
                                              mov edx, ecx
                                              add eax, esi
                                              cmp edi, esi
                                              jbe 00007F155CB6CB0Ah
                                              cmp edi, eax
                                              jc 00007F155CB6CCAAh
                                              cmp ecx, 00000100h
                                              jc 00007F155CB6CB21h
                                              cmp dword ptr [00AE17BCh], 00000000h
                                              je 00007F155CB6CB18h
                                              push edi
                                              push esi
                                              and edi, 0Fh
                                              and esi, 0Fh
                                              cmp edi, esi
                                              pop esi
                                              pop edi
                                              jne 00007F155CB6CB0Ah
                                              pop esi
                                              pop edi
                                              pop ebp
                                              jmp 00007F155CB71E54h
                                              test edi, 00000003h
                                              jne 00007F155CB6CB17h
                                              shr ecx, 02h
                                              and edx, 03h
                                              cmp ecx, 08h
                                              jc 00007F155CB6CB2Ch
                                              rep movsd
                                              jmp dword ptr [00404504h+edx*4]
                                              nop
                                              mov eax, edi
                                              mov edx, 00000003h
                                              sub ecx, 04h
                                              jc 00007F155CB6CB0Eh
                                              and eax, 03h
                                              add ecx, eax
                                              jmp dword ptr [00404418h+eax*4]
                                              jmp dword ptr [00404514h+ecx*4]
                                              nop
                                              jmp dword ptr [00404498h+ecx*4]
                                              nop
                                              sub byte ptr [eax+eax*2+00h], al
                                              push esp
                                              inc esp
                                              inc eax
                                              add byte ptr [eax+44h], bh
                                              inc eax
                                              add byte ptr [ebx], ah
                                              ror dword ptr [edx-75F877FAh], 1
                                              inc esi
                                              add dword ptr [eax+468A0147h], ecx
                                              add al, cl
                                              jmp 00007F155EFE5307h
                                              add esi, 00000000h
                                              Programming Language:
                                              • [ASM] VS2008 build 21022
                                              • [ C ] VS2008 build 21022
                                              • [IMP] VS2005 build 50727
                                              • [C++] VS2008 build 21022
                                              • [RES] VS2008 build 21022
                                              • [LNK] VS2008 build 21022
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x107dc0x50.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x6e20000x33f0.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x12800x1c.text
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x28100x40.text
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x10000x23c.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x104f00x10600False0.5108092795801527data6.104729117132287IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .data0x120000x6cf7c40x1fe00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x6e20000x33f00x3400False0.6715745192307693data5.8441873543465155IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountry
                                              KADI0x6e4d680x4a3ASCII text, with very long lines (1187), with no line terminatorsRaeto-RomanceSwitzerland
                                              RT_ICON0x6e22500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0Raeto-RomanceSwitzerland
                                              RT_ICON0x6e29180x568Device independent bitmap graphic, 16 x 32 x 8, image size 0Raeto-RomanceSwitzerland
                                              RT_ICON0x6e2e800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Raeto-RomanceSwitzerland
                                              RT_ICON0x6e3f280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0Raeto-RomanceSwitzerland
                                              RT_ICON0x6e48b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0Raeto-RomanceSwitzerland
                                              RT_ACCELERATOR0x6e52100x98dataRaeto-RomanceSwitzerland
                                              RT_GROUP_ICON0x6e4d180x4cdataRaeto-RomanceSwitzerland
                                              RT_VERSION0x6e52a80x148x86 executable not stripped
                                              DLLImport
                                              KERNEL32.dllEnumSystemCodePagesA, EnumDateFormatsW, OpenMutexA, GetConsoleAliasExesLengthW, CopyFileExW, ReadConsoleOutputCharacterA, GetEnvironmentStrings, GetCommConfig, QueryDosDeviceA, EnumCalendarInfoExA, SetProcessPriorityBoost, CreateJobSet, AddConsoleAliasW, CreateFileA, GetMailslotInfo, GetWindowsDirectoryA, GetModuleHandleA, GlobalHandle, CreateDirectoryExA, GetLogicalDriveStringsA, ReadConsoleInputA, FindNextVolumeMountPointW, OpenWaitableTimerA, GetVersionExW, SearchPathA, RequestWakeupLatency, CallNamedPipeA, GetCurrentDirectoryW, GetDriveTypeW, CreateMailslotW, BuildCommDCBAndTimeoutsW, GetProcAddress, LoadLibraryA, LocalAlloc, MoveFileWithProgressW, GetBinaryTypeA, TerminateThread, WriteConsoleOutputA, GetCommandLineW, GetVolumeInformationA, VerifyVersionInfoA, DeleteTimerQueue, SearchPathW, CopyFileW, GetHandleInformation, FindResourceA, CreateJobObjectW, FindFirstVolumeW, GlobalFlags, CreateNamedPipeW, WritePrivateProfileStringW, InterlockedDecrement, GetModuleHandleW, GetTickCount, VerSetConditionMask, WriteTapemark, GetTapeParameters, HeapLock, GetConsoleTitleW, InterlockedExchangeAdd, EnumCalendarInfoA, InterlockedExchange, GetNamedPipeHandleStateA, TerminateProcess, MoveFileA, AddAtomW, UnregisterWait, FreeEnvironmentStringsW, SetConsoleTitleA, SetVolumeMountPointW, VirtualProtect, _hread, ClearCommBreak, GlobalFindAtomA, CloseHandle, FindFirstChangeNotificationA, LoadLibraryW, GetLastError, HeapFree, HeapAlloc, UnhandledExceptionFilter, SetUnhandledExceptionFilter, DeleteFileA, GetCommandLineA, GetStartupInfoA, GetCurrentProcess, IsDebuggerPresent, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, SetHandleCount, GetFileType, FreeEnvironmentStringsA, WideCharToMultiByte, GetEnvironmentStringsW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, RtlUnwind, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, SetFilePointer, GetConsoleCP, GetConsoleMode, MultiByteToWideChar, HeapSize, GetLocaleInfoA, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, ReadFile
                                              USER32.dllGetComboBoxInfo, CharUpperBuffA, GetMenuInfo
                                              GDI32.dllGetCharABCWidthsA
                                              Language of compilation systemCountry where language is spokenMap
                                              Raeto-RomanceSwitzerland
                                              No network behavior found

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:1
                                              Start time:19:17:54
                                              Start date:26/11/2022
                                              Path:C:\Users\user\Desktop\file.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\Desktop\file.exe
                                              Imagebase:0x400000
                                              File size:211968 bytes
                                              MD5 hash:FC0582E1CD55C0FCC0628241F7E8CE54
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000001.00000002.294516594.0000000000C86000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                              Reputation:low

                                              Target ID:3
                                              Start time:19:17:57
                                              Start date:26/11/2022
                                              Path:C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe"
                                              Imagebase:0x400000
                                              File size:211968 bytes
                                              MD5 hash:FC0582E1CD55C0FCC0628241F7E8CE54
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Antivirus matches:
                                              • Detection: 100%, Joe Sandbox ML
                                              • Detection: 35%, Virustotal, Browse
                                              Reputation:low

                                              Target ID:7
                                              Start time:19:18:00
                                              Start date:26/11/2022
                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe" /F
                                              Imagebase:0x1c0000
                                              File size:185856 bytes
                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              Target ID:8
                                              Start time:19:18:00
                                              Start date:26/11/2022
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7fcd70000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              Target ID:11
                                              Start time:19:18:02
                                              Start date:26/11/2022
                                              Path:C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
                                              Imagebase:0x400000
                                              File size:211968 bytes
                                              MD5 hash:FC0582E1CD55C0FCC0628241F7E8CE54
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000000B.00000002.323997230.0000000000D80000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000B.00000002.324503471.0000000000DCC000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                              Reputation:low

                                              Target ID:12
                                              Start time:19:18:02
                                              Start date:26/11/2022
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\56a1c3d463f381\cred64.dll, Main
                                              Imagebase:0xe10000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Reputation:high

                                              Target ID:13
                                              Start time:19:19:01
                                              Start date:26/11/2022
                                              Path:C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
                                              Imagebase:0x400000
                                              File size:211968 bytes
                                              MD5 hash:FC0582E1CD55C0FCC0628241F7E8CE54
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000000D.00000002.436289008.0000000002720000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000D.00000002.435991850.0000000000C4C000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                              Reputation:low

                                              Target ID:17
                                              Start time:19:20:00
                                              Start date:26/11/2022
                                              Path:C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
                                              Imagebase:0x400000
                                              File size:211968 bytes
                                              MD5 hash:FC0582E1CD55C0FCC0628241F7E8CE54
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000011.00000002.568956006.0000000000CC0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000011.00000002.569160304.0000000000D1C000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                              Reputation:low

                                              Target ID:18
                                              Start time:19:21:01
                                              Start date:26/11/2022
                                              Path:C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
                                              Imagebase:0x400000
                                              File size:211968 bytes
                                              MD5 hash:FC0582E1CD55C0FCC0628241F7E8CE54
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000012.00000002.696239731.0000000000DBC000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000012.00000002.696632130.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                              Reputation:low

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:1.4%
                                                Dynamic/Decrypted Code Coverage:6.2%
                                                Signature Coverage:5.5%
                                                Total number of Nodes:307
                                                Total number of Limit Nodes:7
                                                execution_graph 34393 405860 34394 405866 34393->34394 34400 41bacc 34394->34400 34396 405886 34399 405880 34404 41ba15 34400->34404 34403 41bb5a 67 API calls 4 library calls 34403->34399 34406 41ba21 CallCatchBlock 34404->34406 34405 41ba28 34429 41c750 14 API calls __dosmaperr 34405->34429 34406->34405 34408 41ba48 34406->34408 34410 41ba5a 34408->34410 34411 41ba4d 34408->34411 34409 41ba2d 34430 41cc2c 25 API calls __wsopen_s 34409->34430 34421 41e06f 34410->34421 34431 41c750 14 API calls __dosmaperr 34411->34431 34413 405873 34413->34396 34413->34403 34417 41ba77 34433 41bab5 LeaveCriticalSection ___scrt_uninitialize_crt 34417->34433 34418 41ba6a 34432 41c750 14 API calls __dosmaperr 34418->34432 34422 41e07b CallCatchBlock 34421->34422 34434 41dea3 EnterCriticalSection 34422->34434 34424 41e089 34435 41e113 34424->34435 34429->34409 34430->34413 34431->34413 34432->34413 34433->34413 34434->34424 34436 41e136 34435->34436 34437 41e18e 34436->34437 34444 41e096 34436->34444 34452 41e047 EnterCriticalSection 34436->34452 34453 41e05b LeaveCriticalSection 34436->34453 34454 420873 14 API calls 2 library calls 34437->34454 34439 41e197 34455 41e5a1 14 API calls _free 34439->34455 34442 41e1a0 34442->34444 34456 41f451 6 API calls _unexpected 34442->34456 34449 41e0cf 34444->34449 34445 41e1bf 34457 41e047 EnterCriticalSection 34445->34457 34448 41e1d2 34448->34444 34458 41deeb LeaveCriticalSection 34449->34458 34451 41ba63 34451->34417 34451->34418 34452->34436 34453->34436 34454->34439 34455->34442 34456->34445 34457->34448 34458->34451 34459 2750920 TerminateProcess 34460 275003c 34461 2750049 34460->34461 34475 2750e0f SetErrorMode SetErrorMode 34461->34475 34466 2750265 34467 27502ce VirtualProtect 34466->34467 34469 275030b 34467->34469 34468 2750439 VirtualFree 34470 27504be 34468->34470 34474 27505f4 LoadLibraryA 34468->34474 34469->34468 34471 27504e3 LoadLibraryA 34470->34471 34470->34474 34471->34470 34473 27508c7 34474->34473 34476 2750223 34475->34476 34477 2750d90 34476->34477 34478 2750dad 34477->34478 34479 2750dbb GetPEB 34478->34479 34480 2750238 VirtualAlloc 34478->34480 34479->34480 34480->34466 34481 41e3ff 34486 41e1d5 34481->34486 34484 41e43e 34487 41e1f4 34486->34487 34488 41e207 34487->34488 34496 41e21c 34487->34496 34506 41c750 14 API calls __dosmaperr 34488->34506 34490 41e20c 34507 41cc2c 25 API calls __wsopen_s 34490->34507 34492 41e217 34492->34484 34503 4235dd 34492->34503 34494 41e3ed 34512 41cc2c 25 API calls __wsopen_s 34494->34512 34501 41e33c 34496->34501 34508 422e6c 37 API calls 2 library calls 34496->34508 34498 41e38c 34498->34501 34509 422e6c 37 API calls 2 library calls 34498->34509 34500 41e3aa 34500->34501 34510 422e6c 37 API calls 2 library calls 34500->34510 34501->34492 34511 41c750 14 API calls __dosmaperr 34501->34511 34513 422fa2 34503->34513 34506->34490 34507->34492 34508->34498 34509->34500 34510->34501 34511->34494 34512->34492 34514 422fae CallCatchBlock 34513->34514 34515 422fb5 34514->34515 34518 422fe0 34514->34518 34533 41c750 14 API calls __dosmaperr 34515->34533 34517 422fba 34534 41cc2c 25 API calls __wsopen_s 34517->34534 34524 42356f 34518->34524 34523 422fc4 34523->34484 34536 41bd30 34524->34536 34529 4235a5 34531 423004 34529->34531 34591 41e5a1 14 API calls _free 34529->34591 34535 423037 LeaveCriticalSection __wsopen_s 34531->34535 34533->34517 34534->34523 34535->34523 34592 41bcad 34536->34592 34539 41bd54 34541 41bc90 34539->34541 34604 41bbde 34541->34604 34544 4235fd 34629 42334b 34544->34629 34547 423648 34647 41feca 34547->34647 34548 42362f 34661 41c73d 14 API calls __dosmaperr 34548->34661 34552 423634 34662 41c750 14 API calls __dosmaperr 34552->34662 34553 423656 34663 41c73d 14 API calls __dosmaperr 34553->34663 34554 42366d 34660 4232b6 CreateFileW 34554->34660 34558 42365b 34664 41c750 14 API calls __dosmaperr 34558->34664 34559 423641 34559->34529 34561 423723 GetFileType 34562 423775 34561->34562 34563 42372e GetLastError 34561->34563 34669 41fe15 15 API calls 3 library calls 34562->34669 34667 41c71a 14 API calls 2 library calls 34563->34667 34564 4236f8 GetLastError 34666 41c71a 14 API calls 2 library calls 34564->34666 34567 4236a6 34567->34561 34567->34564 34665 4232b6 CreateFileW 34567->34665 34568 42373c CloseHandle 34568->34552 34570 423765 34568->34570 34668 41c750 14 API calls __dosmaperr 34570->34668 34572 4236eb 34572->34561 34572->34564 34574 423796 34575 4237e2 34574->34575 34670 4234c5 71 API calls 3 library calls 34574->34670 34580 4237e9 34575->34580 34672 423063 71 API calls 2 library calls 34575->34672 34576 42376a 34576->34552 34579 423817 34579->34580 34581 423825 34579->34581 34671 41e6f4 28 API calls 2 library calls 34580->34671 34581->34559 34583 4238a1 CloseHandle 34581->34583 34673 4232b6 CreateFileW 34583->34673 34585 4238cc 34586 4238d6 GetLastError 34585->34586 34590 4237f0 34585->34590 34674 41c71a 14 API calls 2 library calls 34586->34674 34588 4238e2 34675 41ffdd 15 API calls 3 library calls 34588->34675 34590->34559 34591->34531 34593 41bccd 34592->34593 34599 41bcc4 34592->34599 34593->34599 34601 41ee92 37 API calls 3 library calls 34593->34601 34595 41bced 34602 41f58b 37 API calls __fassign 34595->34602 34597 41bd03 34603 41f5b8 37 API calls __fassign 34597->34603 34599->34539 34600 41f2d6 5 API calls __wsopen_s 34599->34600 34600->34539 34601->34595 34602->34597 34603->34599 34605 41bc06 34604->34605 34606 41bbec 34604->34606 34608 41bc0d 34605->34608 34609 41bc2c 34605->34609 34622 41bd6f 14 API calls _free 34606->34622 34614 41bbf6 34608->34614 34623 41bd89 15 API calls __wsopen_s 34608->34623 34624 41ead8 MultiByteToWideChar 34609->34624 34612 41bc42 GetLastError 34625 41c71a 14 API calls 2 library calls 34612->34625 34613 41bc3b 34613->34612 34616 41bc68 34613->34616 34627 41bd89 15 API calls __wsopen_s 34613->34627 34614->34529 34614->34544 34616->34614 34628 41ead8 MultiByteToWideChar 34616->34628 34617 41bc4e 34626 41c750 14 API calls __dosmaperr 34617->34626 34621 41bc7f 34621->34612 34621->34614 34622->34614 34623->34614 34624->34613 34625->34617 34626->34614 34627->34616 34628->34621 34630 423386 34629->34630 34631 42336c 34629->34631 34676 4232db 34630->34676 34631->34630 34683 41c750 14 API calls __dosmaperr 34631->34683 34634 42337b 34684 41cc2c 25 API calls __wsopen_s 34634->34684 34636 4233be 34637 4233ed 34636->34637 34685 41c750 14 API calls __dosmaperr 34636->34685 34645 423440 34637->34645 34687 41d9cf 25 API calls 2 library calls 34637->34687 34640 4233e2 34686 41cc2c 25 API calls __wsopen_s 34640->34686 34641 42343b 34642 4234b8 34641->34642 34641->34645 34688 41cc59 11 API calls CallCatchBlock 34642->34688 34645->34547 34645->34548 34646 4234c4 34648 41fed6 CallCatchBlock 34647->34648 34691 41dea3 EnterCriticalSection 34648->34691 34650 41fedd 34652 41ff02 34650->34652 34656 41ff71 EnterCriticalSection 34650->34656 34657 41ff24 34650->34657 34695 41fca4 15 API calls 3 library calls 34652->34695 34655 41ff07 34655->34657 34696 41fdf2 EnterCriticalSection 34655->34696 34656->34657 34658 41ff7e LeaveCriticalSection 34656->34658 34692 41ffd4 34657->34692 34658->34650 34660->34567 34661->34552 34662->34559 34663->34558 34664->34552 34665->34572 34666->34552 34667->34568 34668->34576 34669->34574 34670->34575 34671->34590 34672->34579 34673->34585 34674->34588 34675->34590 34678 4232f3 34676->34678 34677 42330e 34677->34636 34678->34677 34689 41c750 14 API calls __dosmaperr 34678->34689 34680 423332 34690 41cc2c 25 API calls __wsopen_s 34680->34690 34682 42333d 34682->34636 34683->34634 34684->34630 34685->34640 34686->34637 34687->34641 34688->34646 34689->34680 34690->34682 34691->34650 34697 41deeb LeaveCriticalSection 34692->34697 34694 41ff44 34694->34553 34694->34554 34695->34655 34696->34657 34697->34694 34698 275092b GetPEB 34699 2750972 34698->34699 34700 4186de 34701 4186ea CallCatchBlock 34700->34701 34726 418404 34701->34726 34703 4186f1 34704 41884a 34703->34704 34713 41871b ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallCatchBlock 34703->34713 34756 418a67 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 34704->34756 34706 418851 34749 41b9ff 34706->34749 34710 41885f 34711 41873a 34712 4187bb 34734 41d42b 34712->34734 34713->34711 34713->34712 34752 41b9d9 37 API calls 5 library calls 34713->34752 34716 4187c1 34738 416830 34716->34738 34727 41840d 34726->34727 34758 418887 IsProcessorFeaturePresent 34727->34758 34729 418419 34759 419450 10 API calls 2 library calls 34729->34759 34731 41841e 34732 418422 34731->34732 34760 41946f 7 API calls 2 library calls 34731->34760 34732->34703 34735 41d434 34734->34735 34736 41d439 34734->34736 34761 41d18f 34735->34761 34736->34716 34739 40b2a0 34738->34739 34740 41683e 34739->34740 34810 406510 28 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 34740->34810 34742 416861 34811 4138b0 100 API calls __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 34742->34811 34744 41686e 34812 4167e0 CreateThread CreateThread CreateThread Sleep 34744->34812 34813 41b89d 34749->34813 34752->34712 34756->34706 34757 41b9c3 23 API calls CallCatchBlock 34757->34710 34758->34729 34759->34731 34760->34732 34762 41d198 34761->34762 34766 41d1ae 34761->34766 34762->34766 34767 41d1bb 34762->34767 34764 41d1a5 34764->34766 34780 41d30d 15 API calls 3 library calls 34764->34780 34766->34736 34768 41d1c4 34767->34768 34769 41d1c7 34767->34769 34768->34764 34781 421602 34769->34781 34776 41d1e4 34802 41e5a1 14 API calls _free 34776->34802 34777 41d208 34777->34764 34779 41d1d9 34803 41e5a1 14 API calls _free 34779->34803 34780->34766 34782 41d1ce 34781->34782 34783 42160b 34781->34783 34787 4219a3 GetEnvironmentStringsW 34782->34787 34804 41ef4f 37 API calls 3 library calls 34783->34804 34785 42162e 34805 421449 47 API calls 3 library calls 34785->34805 34788 421a13 34787->34788 34789 4219ba 34787->34789 34790 41d1d3 34788->34790 34791 421a19 FreeEnvironmentStringsW 34788->34791 34806 4218bf WideCharToMultiByte 34789->34806 34790->34779 34801 41d20e 25 API calls 4 library calls 34790->34801 34791->34790 34793 4219d3 34793->34788 34794 4219dd 34793->34794 34807 41ea8a 15 API calls 2 library calls 34794->34807 34796 4219e3 34798 4219fb 34796->34798 34808 4218bf WideCharToMultiByte 34796->34808 34809 41e5a1 14 API calls _free 34798->34809 34800 421a10 34800->34788 34801->34776 34802->34779 34803->34777 34804->34785 34805->34782 34806->34793 34807->34796 34808->34798 34809->34800 34810->34742 34811->34744 34814 41b8ab 34813->34814 34815 41b8bd 34813->34815 34841 418b89 GetModuleHandleW 34814->34841 34825 41b744 34815->34825 34819 418857 34819->34757 34820 41b8b0 34820->34815 34842 41b943 GetModuleHandleExW 34820->34842 34823 41b900 34826 41b750 CallCatchBlock 34825->34826 34848 41dea3 EnterCriticalSection 34826->34848 34828 41b75a 34849 41b7b0 34828->34849 34830 41b767 34853 41b785 34830->34853 34833 41b901 34858 41df02 GetPEB 34833->34858 34836 41b930 34838 41b943 CallCatchBlock 3 API calls 34836->34838 34837 41b910 GetPEB 34837->34836 34839 41b920 GetCurrentProcess TerminateProcess 34837->34839 34840 41b938 ExitProcess 34838->34840 34839->34836 34841->34820 34843 41b962 GetProcAddress 34842->34843 34844 41b985 34842->34844 34847 41b977 34843->34847 34845 41b8bc 34844->34845 34846 41b98b FreeLibrary 34844->34846 34845->34815 34846->34845 34847->34844 34848->34828 34850 41b7bc CallCatchBlock 34849->34850 34852 41b81d CallCatchBlock 34850->34852 34856 41d713 14 API calls CallCatchBlock 34850->34856 34852->34830 34857 41deeb LeaveCriticalSection 34853->34857 34855 41b773 34855->34819 34855->34833 34856->34852 34857->34855 34859 41df1c 34858->34859 34861 41b90b 34858->34861 34862 41f296 5 API calls _unexpected 34859->34862 34861->34836 34861->34837 34862->34861
                                                APIs
                                                • GetUserNameA.ADVAPI32(?,?), ref: 0040CD3E
                                                • SetCurrentDirectoryA.KERNEL32(00000000,?,?), ref: 0040CD9C
                                                  • Part of subcall function 00416A90: Concurrency::cancel_current_task.LIBCPMT ref: 00416B49
                                                  • Part of subcall function 00402C70: RegOpenKeyExA.ADVAPI32(?,?,00000000,00000001,44FDFA8B,44FDFA8B), ref: 00402E1C
                                                  • Part of subcall function 00402C70: RegQueryValueExA.ADVAPI32(44FDFA8B,?,00000000,00000000,?,00000400,?,?,00000000,00000001,44FDFA8B,44FDFA8B), ref: 00402E4A
                                                  • Part of subcall function 00402C70: RegCloseKey.ADVAPI32(44FDFA8B,?,?,00000000,00000001,44FDFA8B,44FDFA8B), ref: 00402E56
                                                  • Part of subcall function 00402C70: RegOpenKeyExA.ADVAPI32(80000001,80000001,00000000,000F003F,00000001), ref: 00402F63
                                                  • Part of subcall function 00402C70: RegSetValueExA.ADVAPI32(80000001,?,00000000,00000002,?,?), ref: 00402F91
                                                  • Part of subcall function 00402C70: RegCloseKey.ADVAPI32(80000001), ref: 00402F9A
                                                  • Part of subcall function 004048C0: Sleep.KERNEL32(000003E8), ref: 004049A9
                                                • GetFileAttributesA.KERNEL32(00000000), ref: 0040E4F1
                                                • CreateDirectoryA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040E623
                                                • GetFileAttributesA.KERNEL32(00000000), ref: 0040E738
                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 0040ED75
                                                • std::_Xinvalid_argument.LIBCPMT ref: 0040F9E5
                                                  • Part of subcall function 00402C70: GdiplusStartup.GDIPLUS(?,?,00000000,44FDFA8B), ref: 004030CA
                                                  • Part of subcall function 0040CBD0: SetCurrentDirectoryA.KERNEL32(00000000), ref: 0040EF9C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: DirectoryFile$AttributesCloseCurrentNameOpenValue$Concurrency::cancel_current_taskCreateGdiplusModuleQuerySleepStartupUserXinvalid_argumentstd::_
                                                • String ID: "$"$%$invalid stoi argument$stoi argument out of range
                                                • API String ID: 1674928435-2043294232
                                                • Opcode ID: bf4418512fe37c34e4452a46c62b86bedc19af7eba5b246c68533f93a84f6707
                                                • Instruction ID: ca7d88425734236cf169f520bb3e28de2df1445630f25be11c52c40f1bbbcbb8
                                                • Opcode Fuzzy Hash: bf4418512fe37c34e4452a46c62b86bedc19af7eba5b246c68533f93a84f6707
                                                • Instruction Fuzzy Hash: 07632A71A001489BEB18DB38CD897DD7B729F86304F5082ADE409A73D6DB3D9EC48B59
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1328 41b901-41b90e call 41df02 1331 41b930-41b93c call 41b943 ExitProcess 1328->1331 1332 41b910-41b91e GetPEB 1328->1332 1332->1331 1334 41b920-41b92a GetCurrentProcess TerminateProcess 1332->1334 1334->1331
                                                APIs
                                                • GetCurrentProcess.KERNEL32(?,?,0041B900,0041BE86,?,NA,0041BE86,0041EF4E), ref: 0041B923
                                                • TerminateProcess.KERNEL32(00000000,?,0041B900,0041BE86,?,NA,0041BE86,0041EF4E), ref: 0041B92A
                                                • ExitProcess.KERNEL32 ref: 0041B93C
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Process$CurrentExitTerminate
                                                • String ID:
                                                • API String ID: 1703294689-0
                                                • Opcode ID: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                • Instruction ID: c3524ad3d233ec0a3a19b1bf7aedcb75de5af13a6c7a41cb1465cf438659ca8f
                                                • Opcode Fuzzy Hash: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                • Instruction Fuzzy Hash: 63E0B671120208EFCB216F65DD49AA97B79FB44751BC44439FA0586231CB39EE93CB98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1336 275092b-2750970 GetPEB 1337 2750972-2750978 1336->1337 1338 275098c-275098e 1337->1338 1339 275097a-275098a call 2750d35 1337->1339 1338->1337 1341 2750990 1338->1341 1339->1338 1344 2750992-2750994 1339->1344 1343 2750996-2750998 1341->1343 1345 2750a3b-2750a3e 1343->1345 1344->1343 1346 275099d-27509d3 1344->1346 1347 27509dc-27509ee call 2750d0c 1346->1347 1350 27509d5-27509d8 1347->1350 1351 27509f0-2750a3a 1347->1351 1350->1347 1351->1345
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: .$GetProcAddress.$l
                                                • API String ID: 0-2784972518
                                                • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                • Instruction ID: ba3f8c4a5a04c936f80f6b85bcc408eceefba1a569e7af12c73bd767da7089d4
                                                • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                • Instruction Fuzzy Hash: B83138B6900619DFEB10CF99C884AAEFBF9FF48324F15404AD841A7214D7B1EA45CBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1353 404350-40448b call 416f50 ShellExecuteA 1359 4044b5-4044c6 1353->1359 1360 40448d-404499 1353->1360 1361 4044ab-4044b2 call 4185df 1360->1361 1362 40449b-4044a9 1360->1362 1361->1359 1362->1361 1363 4044c7-40453a call 41cc3c call 416a90 * 3 call 404350 1362->1363
                                                APIs
                                                • ShellExecuteA.SHELL32(00000000,00429838,?,?,00000000,00000000), ref: 004043F2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: ExecuteShell
                                                • String ID: runas
                                                • API String ID: 587946157-4000483414
                                                • Opcode ID: 82e6eb50347e734f096ebca9fc259a422462d2b896881076858bbb2ef81b7636
                                                • Instruction ID: 0d432a24b2a6eecf06ea0bc45d18f5c5656229febad52b915354dd5f9442050f
                                                • Opcode Fuzzy Hash: 82e6eb50347e734f096ebca9fc259a422462d2b896881076858bbb2ef81b7636
                                                • Instruction Fuzzy Hash: 56411370600208EBDB04DF69C981BDE7BB9EB45344FA0822AFC15972C0C779E984CB85
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1175 4235fd-42362d call 42334b 1178 423648-423654 call 41feca 1175->1178 1179 42362f-42363a call 41c73d 1175->1179 1184 423656-42366b call 41c73d call 41c750 1178->1184 1185 42366d-4236b6 call 4232b6 1178->1185 1186 42363c-423643 call 41c750 1179->1186 1184->1186 1194 423723-42372c GetFileType 1185->1194 1195 4236b8-4236c1 1185->1195 1196 423922-423926 1186->1196 1197 423775-423778 1194->1197 1198 42372e-42375f GetLastError call 41c71a CloseHandle 1194->1198 1200 4236c3-4236c7 1195->1200 1201 4236f8-42371e GetLastError call 41c71a 1195->1201 1204 423781-423787 1197->1204 1205 42377a-42377f 1197->1205 1198->1186 1212 423765-423770 call 41c750 1198->1212 1200->1201 1206 4236c9-4236f6 call 4232b6 1200->1206 1201->1186 1209 42378b-4237d9 call 41fe15 1204->1209 1210 423789 1204->1210 1205->1209 1206->1194 1206->1201 1217 4237db-4237e7 call 4234c5 1209->1217 1218 4237f8-423820 call 423063 1209->1218 1210->1209 1212->1186 1217->1218 1224 4237e9 1217->1224 1225 423822-423823 1218->1225 1226 423825-423866 1218->1226 1227 4237eb-4237f3 call 41e6f4 1224->1227 1225->1227 1228 423887-423895 1226->1228 1229 423868-42386c 1226->1229 1227->1196 1232 423920 1228->1232 1233 42389b-42389f 1228->1233 1229->1228 1231 42386e-423882 1229->1231 1231->1228 1232->1196 1233->1232 1234 4238a1-4238d4 CloseHandle call 4232b6 1233->1234 1238 4238d6-423902 GetLastError call 41c71a call 41ffdd 1234->1238 1239 423908-42391c 1234->1239 1238->1239 1239->1232
                                                APIs
                                                  • Part of subcall function 004232B6: CreateFileW.KERNELBASE(00000000,00000000,?,004236A6,?,?,00000000,?,004236A6,00000000,0000000C), ref: 004232D3
                                                • GetLastError.KERNEL32 ref: 00423711
                                                • __dosmaperr.LIBCMT ref: 00423718
                                                • GetFileType.KERNELBASE(00000000), ref: 00423724
                                                • GetLastError.KERNEL32 ref: 0042372E
                                                • __dosmaperr.LIBCMT ref: 00423737
                                                • CloseHandle.KERNEL32(00000000), ref: 00423757
                                                • CloseHandle.KERNEL32(?), ref: 004238A4
                                                • GetLastError.KERNEL32 ref: 004238D6
                                                • __dosmaperr.LIBCMT ref: 004238DD
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                • String ID:
                                                • API String ID: 4237864984-0
                                                • Opcode ID: 0d649afaf30192c5c19431845a951fd0479d0f23fa76b0b367cd72335b8b290c
                                                • Instruction ID: c7b97c56f1a0d1b911df166da15c54d720095dd6c25035754b532be6d98a6b0c
                                                • Opcode Fuzzy Hash: 0d649afaf30192c5c19431845a951fd0479d0f23fa76b0b367cd72335b8b290c
                                                • Instruction Fuzzy Hash: 7CA15872A041149FCF19DF68EC917AE3BB1AB06325F54016EF811AB391CB7C8952CB5A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1244 275003c-2750047 1245 275004c-2750263 call 2750a3f call 2750e0f call 2750d90 VirtualAlloc 1244->1245 1246 2750049 1244->1246 1261 2750265-2750289 call 2750a69 1245->1261 1262 275028b-2750292 1245->1262 1246->1245 1267 27502ce-27503c2 VirtualProtect call 2750cce call 2750ce7 1261->1267 1264 27502a1-27502b0 1262->1264 1266 27502b2-27502cc 1264->1266 1264->1267 1266->1264 1273 27503d1-27503e0 1267->1273 1274 27503e2-2750437 call 2750ce7 1273->1274 1275 2750439-27504b8 VirtualFree 1273->1275 1274->1273 1277 27505f4-27505fe 1275->1277 1278 27504be-27504cd 1275->1278 1281 2750604-275060d 1277->1281 1282 275077f-2750789 1277->1282 1280 27504d3-27504dd 1278->1280 1280->1277 1286 27504e3-2750505 LoadLibraryA 1280->1286 1281->1282 1287 2750613-2750637 1281->1287 1284 27507a6-27507b0 1282->1284 1285 275078b-27507a3 1282->1285 1288 27507b6-27507cb 1284->1288 1289 275086e-27508be LoadLibraryA 1284->1289 1285->1284 1290 2750517-2750520 1286->1290 1291 2750507-2750515 1286->1291 1292 275063e-2750648 1287->1292 1293 27507d2-27507d5 1288->1293 1296 27508c7-27508f9 1289->1296 1294 2750526-2750547 1290->1294 1291->1294 1292->1282 1295 275064e-275065a 1292->1295 1297 2750824-2750833 1293->1297 1298 27507d7-27507e0 1293->1298 1299 275054d-2750550 1294->1299 1295->1282 1300 2750660-275066a 1295->1300 1303 2750902-275091d 1296->1303 1304 27508fb-2750901 1296->1304 1302 2750839-275083c 1297->1302 1305 27507e4-2750822 1298->1305 1306 27507e2 1298->1306 1307 2750556-275056b 1299->1307 1308 27505e0-27505ef 1299->1308 1301 275067a-2750689 1300->1301 1311 2750750-275077a 1301->1311 1312 275068f-27506b2 1301->1312 1302->1289 1313 275083e-2750847 1302->1313 1304->1303 1305->1293 1306->1297 1309 275056d 1307->1309 1310 275056f-275057a 1307->1310 1308->1280 1309->1308 1314 275057c-2750599 1310->1314 1315 275059b-27505bb 1310->1315 1311->1292 1316 27506b4-27506ed 1312->1316 1317 27506ef-27506fc 1312->1317 1318 2750849 1313->1318 1319 275084b-275086c 1313->1319 1327 27505bd-27505db 1314->1327 1315->1327 1316->1317 1321 27506fe-2750748 1317->1321 1322 275074b 1317->1322 1318->1289 1319->1302 1321->1322 1322->1301 1327->1299
                                                APIs
                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0275024D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID: cess$kernel32.dll
                                                • API String ID: 4275171209-1230238691
                                                • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                • Instruction ID: 6a8be28c26d6e027151cf9905f423a8690d2d638a3724b2d8fb99916f368a809
                                                • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                • Instruction Fuzzy Hash: 71526974A01229DFDB64CF68C985BACBBB1BF09304F1480D9E94DAB351DB70AA85CF14
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1375 42356f-4235a3 call 41bd30 call 41bc90 1380 4235a5-4235a8 1375->1380 1381 4235aa-4235bf call 4235fd 1375->1381 1382 4235c9-4235cd 1380->1382 1384 4235c4-4235c7 1381->1384 1385 4235d8-4235dc 1382->1385 1386 4235cf-4235d7 call 41e5a1 1382->1386 1384->1382 1386->1385
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID: >A
                                                • API String ID: 269201875-3365779530
                                                • Opcode ID: 6d7cabbe3305cb9b6d011bf0e9d56addc9b4860a8407226052aa3c61f76cc774
                                                • Instruction ID: 30ff9b9e87434c0f379a7433cd06ee0227cf71fd1282e2cff9dc0eafdffef8ec
                                                • Opcode Fuzzy Hash: 6d7cabbe3305cb9b6d011bf0e9d56addc9b4860a8407226052aa3c61f76cc774
                                                • Instruction Fuzzy Hash: A8017172D00159BFCF01AFA89C01ADE7FF5AF08304F14016AB918E2151E7398B609BC4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1389 41d1bb-41d1c2 1390 41d1c4-41d1c6 1389->1390 1391 41d1c7-41d1ce call 421602 call 4219a3 1389->1391 1395 41d1d3-41d1d7 1391->1395 1396 41d1d9-41d1dc 1395->1396 1397 41d1de-41d1e7 call 41d20e 1395->1397 1398 41d202-41d20d call 41e5a1 1396->1398 1402 41d1e9-41d1ec 1397->1402 1403 41d1ee-41d1f5 1397->1403 1405 41d1fa-41d201 call 41e5a1 1402->1405 1403->1405 1405->1398
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: 9f5dec638c6018a6b24b976b0791b773a56ee0672529c52ab4d44372aafa3d49
                                                • Instruction ID: f1d333090dd57bfd17dfe39ecb9b07313f9b1ca465b706eabb36e918cd1afe6e
                                                • Opcode Fuzzy Hash: 9f5dec638c6018a6b24b976b0791b773a56ee0672529c52ab4d44372aafa3d49
                                                • Instruction Fuzzy Hash: 4FE0E5B6E0242022E211623F7C46AEB11856BD133AB15022FF860861E0DF7C88C2D19E
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1408 2750e0f-2750e24 SetErrorMode * 2 1409 2750e26 1408->1409 1410 2750e2b-2750e2c 1408->1410 1409->1410
                                                APIs
                                                • SetErrorMode.KERNELBASE(00000400,?,?,02750223,?,?), ref: 02750E19
                                                • SetErrorMode.KERNELBASE(00000000,?,?,02750223,?,?), ref: 02750E1E
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ErrorMode
                                                • String ID:
                                                • API String ID: 2340568224-0
                                                • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                • Instruction ID: 90e7bb8c758be92c28614f2c48844fb0f3aa085600f9d063d5eed204c5228071
                                                • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                • Instruction Fuzzy Hash: D9D0123114512877D7003A94DC09BCDBB1CDF09B66F108011FB0DD9080C7B1954046E5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1411 41e3ff-41e425 call 41e1d5 1414 41e427-41e439 call 4235dd 1411->1414 1415 41e47e-41e481 1411->1415 1417 41e43e-41e443 1414->1417 1417->1415 1418 41e445-41e47d 1417->1418
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: __wsopen_s
                                                • String ID:
                                                • API String ID: 3347428461-0
                                                • Opcode ID: 0d6bf0a7e9f29163ed6caaa22d8f5b82bf3e75d92930a2ecd6c24ab71e07ee1e
                                                • Instruction ID: 322a9cb7d115cba5ea2c99f456cc5fe6d3c651e69e51ada78d95c10651760d14
                                                • Opcode Fuzzy Hash: 0d6bf0a7e9f29163ed6caaa22d8f5b82bf3e75d92930a2ecd6c24ab71e07ee1e
                                                • Instruction Fuzzy Hash: 14115775A0020AAFCF05DF59E9459DB7BF4EF48304F0040AAF808EB311D630EA21CBA8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 0040CBD0: GetTempPathA.KERNEL32(00000104,?), ref: 0040B2FE
                                                  • Part of subcall function 0040CBD0: GetModuleFileNameA.KERNEL32(00000000,?,00000104,44FDFA8B), ref: 0040A7BC
                                                  • Part of subcall function 00406510: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00406540
                                                  • Part of subcall function 0040CBD0: GetUserNameA.ADVAPI32(?,?), ref: 0040B96E
                                                  • Part of subcall function 004138B0: IsUserAnAdmin.SHELL32 ref: 0041390D
                                                  • Part of subcall function 004138B0: GetUserNameA.ADVAPI32(?,?), ref: 004139B7
                                                  • Part of subcall function 004138B0: GetComputerNameExW.KERNEL32(00000002,?,?,?,?), ref: 00413A20
                                                  • Part of subcall function 004167E0: CreateThread.KERNEL32 ref: 004167F6
                                                  • Part of subcall function 004167E0: CreateThread.KERNEL32 ref: 00416807
                                                  • Part of subcall function 004167E0: CreateThread.KERNEL32 ref: 00416818
                                                  • Part of subcall function 004167E0: Sleep.KERNEL32(00007530,?,00416873), ref: 00416825
                                                • InternetCloseHandle.WININET(00000000), ref: 00416887
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Name$CreateThreadUser$FileModule$AdminCloseComputerHandleInternetPathSleepTemp
                                                • String ID:
                                                • API String ID: 1411138196-0
                                                • Opcode ID: 681845bb7bdad3a9b280c05efa4f412a3339f2d7827d3117315032cc1d5ff116
                                                • Instruction ID: fcb51b4180ac2c01cd311fc2696d032aed602c74c46a29392a881be8b31f0bff
                                                • Opcode Fuzzy Hash: 681845bb7bdad3a9b280c05efa4f412a3339f2d7827d3117315032cc1d5ff116
                                                • Instruction Fuzzy Hash: 21E08671A0050407DA043BBA5D0B64E31184F8134CF94027FB815665D7EE6DD56441FF
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1438 4232b6-4232da CreateFileW
                                                APIs
                                                • CreateFileW.KERNELBASE(00000000,00000000,?,004236A6,?,?,00000000,?,004236A6,00000000,0000000C), ref: 004232D3
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: CreateFile
                                                • String ID:
                                                • API String ID: 823142352-0
                                                • Opcode ID: 5f6f20da4e93aca7bdcb0ea2359822fb329caed46e02a9c52ac097750241beb4
                                                • Instruction ID: cd0ee65043cc83d888fb6f456493c6bde9bec702db69a9442c4f6e90f97d0004
                                                • Opcode Fuzzy Hash: 5f6f20da4e93aca7bdcb0ea2359822fb329caed46e02a9c52ac097750241beb4
                                                • Instruction Fuzzy Hash: 77D06C3210010DFFDF128F84DC06EDA3BAAFB48724F414120BA1856020C732E872EB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1439 2750920-2750929 TerminateProcess
                                                APIs
                                                • TerminateProcess.KERNELBASE(000000FF,00000000), ref: 02750929
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ProcessTerminate
                                                • String ID:
                                                • API String ID: 560597551-0
                                                • Opcode ID: cd6e8b06e9fc6daff329b0075f01cd6e00680555ed9156381d0d7b778eb813a9
                                                • Instruction ID: 3e9c807a23c100a99a722049cf7bfbcce58d99a4c5dbb09bf75c012b4819f226
                                                • Opcode Fuzzy Hash: cd6e8b06e9fc6daff329b0075f01cd6e00680555ed9156381d0d7b778eb813a9
                                                • Instruction Fuzzy Hash: D490047034435111DC703DFC0C01F0500013741730F7107107130FD5D5DC4055004157
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000001,44FDFA8B,44FDFA8B), ref: 00402E1C
                                                • RegQueryValueExA.ADVAPI32(44FDFA8B,?,00000000,00000000,?,00000400,?,?,00000000,00000001,44FDFA8B,44FDFA8B), ref: 00402E4A
                                                • RegCloseKey.ADVAPI32(44FDFA8B,?,?,00000000,00000001,44FDFA8B,44FDFA8B), ref: 00402E56
                                                • RegOpenKeyExA.ADVAPI32(80000001,80000001,00000000,000F003F,00000001), ref: 00402F63
                                                • RegSetValueExA.ADVAPI32(80000001,?,00000000,00000002,?,?), ref: 00402F91
                                                • RegCloseKey.ADVAPI32(80000001), ref: 00402F9A
                                                • GdiplusStartup.GDIPLUS(?,?,00000000,44FDFA8B), ref: 004030CA
                                                • GetDC.USER32(00000000), ref: 004031C2
                                                • RegGetValueA.ADVAPI32(80000002,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000004), ref: 00403449
                                                • GetSystemMetrics.USER32 ref: 004034A2
                                                • GetSystemMetrics.USER32 ref: 004034AB
                                                • RegGetValueA.ADVAPI32(80000002,?,00000000), ref: 004034F3
                                                • GetSystemMetrics.USER32 ref: 00403546
                                                • GetSystemMetrics.USER32 ref: 0040354F
                                                • CreateCompatibleDC.GDI32(?), ref: 0040355B
                                                • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00403570
                                                • SelectObject.GDI32(00000000,00000000), ref: 00403580
                                                • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 004035A6
                                                • GdipCreateBitmapFromHBITMAP.GDIPLUS(00000000,00000000,?), ref: 004035BA
                                                • GdipGetImageEncodersSize.GDIPLUS(00000000,?), ref: 004035D6
                                                • GdipGetImageEncoders.GDIPLUS(00000000,00000000,00000000), ref: 00403603
                                                • GdipSaveImageToFile.GDIPLUS(00000000,?,?,00000000), ref: 00403687
                                                • SelectObject.GDI32(00000000,?), ref: 00403694
                                                • DeleteObject.GDI32(00000000), ref: 004036A1
                                                • DeleteObject.GDI32(?), ref: 004036A9
                                                • ReleaseDC.USER32 ref: 004036B3
                                                • GdipDisposeImage.GDIPLUS(00000000), ref: 004036BA
                                                • GdiplusShutdown.GDIPLUS(?), ref: 0040375C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Gdip$ImageMetricsObjectSystemValue$Create$BitmapCloseCompatibleDeleteEncodersGdiplusOpenSelect$DisposeFileFromQueryReleaseSaveShutdownSizeStartup
                                                • String ID: image/jpeg
                                                • API String ID: 406439762-3785015651
                                                • Opcode ID: e8628ae9d8af01cf96e14566c09d0971b984f7e7a06f5e93ac5e6e0091313de2
                                                • Instruction ID: ef3e356fa5e9885fc08513456cc6264c1fb040e0d3da28046e10bcebe11668ea
                                                • Opcode Fuzzy Hash: e8628ae9d8af01cf96e14566c09d0971b984f7e7a06f5e93ac5e6e0091313de2
                                                • Instruction Fuzzy Hash: A362F471A00108ABEB18DF28CD85BDDBB76EF45304F50826EE805B72D1DB799A85CB58
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403F66
                                                • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00403FCB
                                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00403FE4
                                                • GetThreadContext.KERNEL32(?,00000000), ref: 00403FFF
                                                • ReadProcessMemory.KERNEL32(?, ,?,00000004,00000000), ref: 00404023
                                                • GetModuleHandleA.KERNEL32(ntdll.dll,NtUnmapViewOfSection), ref: 0040403E
                                                • GetProcAddress.KERNEL32(00000000), ref: 00404045
                                                • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 0040406D
                                                • WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000), ref: 0040408E
                                                • WriteProcessMemory.KERNEL32(?,?,?,?,00000000,?,?,00000000), ref: 004040D2
                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000,?,?,00000000), ref: 0040410E
                                                • SetThreadContext.KERNEL32(?,00000000,?,?,00000000), ref: 0040412A
                                                • ResumeThread.KERNEL32(?,?,?,00000000), ref: 00404136
                                                • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000), ref: 00404144
                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00404165
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Process$MemoryVirtual$ThreadWrite$AllocContextFreeModule$AddressCreateFileHandleNameProcReadResume
                                                • String ID: $NtUnmapViewOfSection$ntdll.dll
                                                • API String ID: 4033543172-1522589568
                                                • Opcode ID: 2fc5be1b3ec4d92441bc9103c4f92097ff01d4c177745f7de35fcca25cf32f0a
                                                • Instruction ID: 7185e54e9f5f5e6bc342fc5ffd2bfcf32a837d4cfdcfbf42461452ed81247528
                                                • Opcode Fuzzy Hash: 2fc5be1b3ec4d92441bc9103c4f92097ff01d4c177745f7de35fcca25cf32f0a
                                                • Instruction Fuzzy Hash: 66518971600218EBDB209F54DC49FEAB7B8FF48701F9040B6F708AA291D7B1A995CF58
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetUserNameW.ADVAPI32(00000000,?), ref: 00403822
                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403837
                                                • HeapAlloc.KERNEL32(00000000), ref: 0040383A
                                                • GetUserNameW.ADVAPI32(00000000,?), ref: 00403848
                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 0040386B
                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403876
                                                • HeapAlloc.KERNEL32(00000000), ref: 00403879
                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403889
                                                • HeapAlloc.KERNEL32(00000000), ref: 0040388C
                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 004038B6
                                                • ConvertSidToStringSidW.ADVAPI32(00000000,00000000), ref: 004038C9
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 004039C5
                                                • HeapFree.KERNEL32(00000000), ref: 004039CE
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004039D3
                                                • HeapFree.KERNEL32(00000000), ref: 004039D6
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004039DD
                                                • HeapFree.KERNEL32(00000000), ref: 004039E0
                                                • LocalFree.KERNEL32(00000000), ref: 004039E5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Heap$Process$FreeName$Alloc$AccountLookupUser$ConvertLocalString
                                                • String ID:
                                                • API String ID: 3326663573-0
                                                • Opcode ID: 81082af4a1cd3e5adf3d15ae17c1d0ef02a80ef5388b3166f9402cb38f54a02f
                                                • Instruction ID: 167f534f4a5bc3f8c65bdd595c5ec8e1d54d44385eb9c59962b1969d814595bf
                                                • Opcode Fuzzy Hash: 81082af4a1cd3e5adf3d15ae17c1d0ef02a80ef5388b3166f9402cb38f54a02f
                                                • Instruction Fuzzy Hash: EA716DB1E00209ABDB14DFA5DC85BEFBBBCEB48300F40453AE905A7281DB749905CBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 027541CD
                                                • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 02754232
                                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0275424B
                                                • GetThreadContext.KERNEL32(?,00000000), ref: 02754266
                                                • ReadProcessMemory.KERNEL32(?,00434ECC,?,00000004,00000000), ref: 0275428A
                                                • GetModuleHandleA.KERNEL32(00434EE8,00434ED0), ref: 027542A5
                                                • GetProcAddress.KERNEL32(00000000), ref: 027542AC
                                                • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 027542D4
                                                • WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000), ref: 027542F5
                                                • WriteProcessMemory.KERNEL32(?,?,?,?,00000000,?,?,00000000), ref: 02754339
                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000,?,?,00000000), ref: 02754375
                                                • SetThreadContext.KERNEL32(?,00000000,?,?,00000000), ref: 02754391
                                                • ResumeThread.KERNEL32(?,?,?,00000000), ref: 0275439D
                                                • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000), ref: 027543AB
                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 027543CC
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Process$MemoryVirtual$ThreadWrite$AllocContextFreeModule$AddressCreateFileHandleNameProcReadResume
                                                • String ID:
                                                • API String ID: 4033543172-0
                                                • Opcode ID: 2fc5be1b3ec4d92441bc9103c4f92097ff01d4c177745f7de35fcca25cf32f0a
                                                • Instruction ID: 49568d744b763212b2e98cd0c818412f5909d2fa079c6506a8426ca39294f13d
                                                • Opcode Fuzzy Hash: 2fc5be1b3ec4d92441bc9103c4f92097ff01d4c177745f7de35fcca25cf32f0a
                                                • Instruction Fuzzy Hash: 62516C71640218AFDB219F54DC49FEAB7B8FF08705F9000B5FA08EA2A1D7B16994CF58
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InternetOpenW.WININET(00434EF4,00000000,00000000,00000000,00000000), ref: 0040425C
                                                • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 0040426E
                                                • InternetReadFile.WININET(00000000,?,03E80000,03E80000), ref: 00404281
                                                • InternetCloseHandle.WININET(00000000), ref: 00404292
                                                • InternetCloseHandle.WININET(00000000), ref: 00404295
                                                • InternetCloseHandle.WININET(00000000), ref: 004042A3
                                                • InternetCloseHandle.WININET(00000000), ref: 004042A6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Internet$CloseHandle$Open$FileRead
                                                • String ID: runas
                                                • API String ID: 4294395943-4000483414
                                                • Opcode ID: fae0703545513bfb253ff8d12ed2bbd6d49dc64722ffe67a819130fce2169ef7
                                                • Instruction ID: ba1dc25ec83469701d4c7edc2e7ba4793e46b241d410edfdecdbeb0a0fce58bd
                                                • Opcode Fuzzy Hash: fae0703545513bfb253ff8d12ed2bbd6d49dc64722ffe67a819130fce2169ef7
                                                • Instruction Fuzzy Hash: 4951D571E00108ABDB14DFA4DC41BEEBB75EF85300F60816EF915B7291D7389945CBA8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: _free$InformationTimeZone
                                                • String ID:
                                                • API String ID: 597776487-0
                                                • Opcode ID: 0fe61e17206dce54771a5055940e70056e7a200eab18ece9396fc025dad7d191
                                                • Instruction ID: 2c4f844ee906d1c5b8a05b7d4d89c1c9074c071bb98950a21f89e01ce9d05ddf
                                                • Opcode Fuzzy Hash: 0fe61e17206dce54771a5055940e70056e7a200eab18ece9396fc025dad7d191
                                                • Instruction Fuzzy Hash: 1FC17835B00128ABDB209F69EC41BAB7BA9EFC5354F94416FE550D7381E7388E01CB88
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetVersionExW.KERNEL32(0000011C,?,44FDFA8B,00000000), ref: 00405479
                                                • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004054E0
                                                • GetProcAddress.KERNEL32(00000000), ref: 004054E7
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: AddressHandleModuleProcVersion
                                                • String ID:
                                                • API String ID: 3310240892-0
                                                • Opcode ID: 41f166c362470559257fb6c6fdba98857b9dfdc03a0680adebd4d4756d13aeff
                                                • Instruction ID: 1307c1e28f23caf99c3cad6e9d6b2b61846357279e254348caa37701d54b456e
                                                • Opcode Fuzzy Hash: 41f166c362470559257fb6c6fdba98857b9dfdc03a0680adebd4d4756d13aeff
                                                • Instruction Fuzzy Hash: B8513971900608ABDB14DB24DD497DE7B76EB46314F5042BAE805B73C1DB389EC48F99
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0041CB78
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0041CB82
                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0041CB8F
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                • String ID:
                                                • API String ID: 3906539128-0
                                                • Opcode ID: d01e7f133785e3bb0beafcf269aef2531f9dd5a62572b740f5956f5575e894ef
                                                • Instruction ID: ff4d1174fdddd5ebc348feb1509e890b27b9c9d6be8b5b558b14357fec343526
                                                • Opcode Fuzzy Hash: d01e7f133785e3bb0beafcf269aef2531f9dd5a62572b740f5956f5575e894ef
                                                • Instruction Fuzzy Hash: 8C31A275901228ABCB21DF65D989BD9BBB8AF08310F5041EAE40CA6251EB749F858F58
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0276CDDF
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0276CDE9
                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0276CDF6
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                • String ID:
                                                • API String ID: 3906539128-0
                                                • Opcode ID: d01e7f133785e3bb0beafcf269aef2531f9dd5a62572b740f5956f5575e894ef
                                                • Instruction ID: 8ca55b2bd817a58af6016c0c371f6b312ef167b68391e11cdb9cb71140cf921c
                                                • Opcode Fuzzy Hash: d01e7f133785e3bb0beafcf269aef2531f9dd5a62572b740f5956f5575e894ef
                                                • Instruction Fuzzy Hash: 5931A5759012289BCB22DF68D98CBDDBBB4BF48310F5041EAE91CA7250E7709F958F45
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCurrentProcess.KERNEL32(0276F1B5,?,0276BB67,0276C0ED,?,0276F1B5,0276C0ED,0276F1B5), ref: 0276BB8A
                                                • TerminateProcess.KERNEL32(00000000,?,0276BB67,0276C0ED,?,0276F1B5,0276C0ED,0276F1B5), ref: 0276BB91
                                                • ExitProcess.KERNEL32 ref: 0276BBA3
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Process$CurrentExitTerminate
                                                • String ID:
                                                • API String ID: 1703294689-0
                                                • Opcode ID: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                • Instruction ID: 19090f5a950a68fb1ae8d05c7f6bc2785dc9dbf6c919a9f0b118a83c103ebaaa
                                                • Opcode Fuzzy Hash: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                • Instruction Fuzzy Hash: 45E09231100248EBCB266B65D81CE693BA9FB46645B805434F809E6524CB75DD92DA54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00428488,?,?,00000008,?,?,00428120,00000000), ref: 004286BA
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: ExceptionRaise
                                                • String ID:
                                                • API String ID: 3997070919-0
                                                • Opcode ID: 5ef4d00b5429483db4ee21fa4326bc925bf0c13a1e125d06c7f23f728c6050ca
                                                • Instruction ID: 4a71125e6f4c823a3763720cf76552cabfd479d0aa9e4c8b08dce5cb0b77843e
                                                • Opcode Fuzzy Hash: 5ef4d00b5429483db4ee21fa4326bc925bf0c13a1e125d06c7f23f728c6050ca
                                                • Instruction Fuzzy Hash: 39B17B31211618DFD714CF28D48AB697BA0FF44364F65865DE89ACF3A1CB39E982CB44
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,027786EF,?,?,00000008,?,?,02778387,00000000), ref: 02778921
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExceptionRaise
                                                • String ID:
                                                • API String ID: 3997070919-0
                                                • Opcode ID: 5ef4d00b5429483db4ee21fa4326bc925bf0c13a1e125d06c7f23f728c6050ca
                                                • Instruction ID: 79b75ed41d7dbbdfc6fb0c4e114ec491460ab3d31ad935078903e7b9429ec63c
                                                • Opcode Fuzzy Hash: 5ef4d00b5429483db4ee21fa4326bc925bf0c13a1e125d06c7f23f728c6050ca
                                                • Instruction Fuzzy Hash: 14B13D31620605DFDB15CF28C48EB657BA0FF45368F298658E89ACF2A1C335E991DF42
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0041889D
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: FeaturePresentProcessor
                                                • String ID:
                                                • API String ID: 2325560087-0
                                                • Opcode ID: d55505ce439c0c625bb69c877a6f4797faed7c5d0db0f84db7aa582d50e4da23
                                                • Instruction ID: 42c5aa6f6f7fc7f776cec8504a7906bb6cf0d019190ab3c9283af4763153d71d
                                                • Opcode Fuzzy Hash: d55505ce439c0c625bb69c877a6f4797faed7c5d0db0f84db7aa582d50e4da23
                                                • Instruction Fuzzy Hash: 92516AB2A10215CBDB18CF65D9817AEBBF4FB48314F24942BD445EB350D7789980CF6A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d97f7f4797c3a364c903861215189f8d8653831c5c514b3b47f127515a30102c
                                                • Instruction ID: 995ca3f643b73f20b77409ea83fcee654ff77a15ad0f1f03090dea471df43cee
                                                • Opcode Fuzzy Hash: d97f7f4797c3a364c903861215189f8d8653831c5c514b3b47f127515a30102c
                                                • Instruction Fuzzy Hash: FE41C4B5904228AEDB24DF69DC89AEABBB8EF45304F5442DEE40DD3211DA349E848F54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d97f7f4797c3a364c903861215189f8d8653831c5c514b3b47f127515a30102c
                                                • Instruction ID: 25f72ceac5d0811b2db7a0dbd5563b7f74c0a99c5242e11352d703dd614aaca4
                                                • Opcode Fuzzy Hash: d97f7f4797c3a364c903861215189f8d8653831c5c514b3b47f127515a30102c
                                                • Instruction Fuzzy Hash: 0C418FB580421CAEDF21DF69CC88AEABBB9EF45304F5442EDE45DE3210DA359E858F50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(Function_00018BD8,004186D1), ref: 00418BD1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: 5b644bd4298714589124608af917b149a8cdb7aa3ad9eb7150b270449828aa51
                                                • Instruction ID: fb13876baf3060654c4d3ec658a032312c050c0c5ceb920d56ad85ce90fc2474
                                                • Opcode Fuzzy Hash: 5b644bd4298714589124608af917b149a8cdb7aa3ad9eb7150b270449828aa51
                                                • Instruction Fuzzy Hash:
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(00418BD8,02768938), ref: 02768E38
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: 5b644bd4298714589124608af917b149a8cdb7aa3ad9eb7150b270449828aa51
                                                • Instruction ID: fb13876baf3060654c4d3ec658a032312c050c0c5ceb920d56ad85ce90fc2474
                                                • Opcode Fuzzy Hash: 5b644bd4298714589124608af917b149a8cdb7aa3ad9eb7150b270449828aa51
                                                • Instruction Fuzzy Hash:
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5a3a9157b277817cb60641082f1e4f8ca4ec7dff310ffa31a6fd9bf35832d5c1
                                                • Instruction ID: 2ed8bcd71233cdd26d40d40588c8b3db03f02c46a7ead0be40a967f157380f8c
                                                • Opcode Fuzzy Hash: 5a3a9157b277817cb60641082f1e4f8ca4ec7dff310ffa31a6fd9bf35832d5c1
                                                • Instruction Fuzzy Hash: F3E1875548E3C15FD7138B3449B5681BF70AE23114B1E96DBCCDA8E4A7D24CAA0EE732
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                • Instruction ID: 836b6cb189818071d5d152d6c3d8cd1a25b1ac1f9bf822a59482dcdb2b2a5351
                                                • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                • Instruction Fuzzy Hash: 3B115B7730407157D605DA3DF8B46BBA395EFC9320FAC437BC0424B748D22A9C839508
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                • Instruction ID: 47a5988ad1152b791bbdb134366d72e9f97da065f643aa92ec92dba43ce64b87
                                                • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                • Instruction Fuzzy Hash: C211C47B243193C39E148E2DD9F42F6A799EAC5128B2D4A6AD3428B658D332E145DA80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                • Instruction ID: 101a31cfbdbd36781ccd57c37aaf3eaf53161d82e8e2d64777ab4f23b8630046
                                                • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                • Instruction Fuzzy Hash: B2012672A106108FDF21DF20C804BAAB3F5FB8A306F1540B4DD0AD7282E3B0A841CF80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e0ad719187851a61f309ddbb2cee80a5110ae42387cecf94a10a94091515ac20
                                                • Instruction ID: 75fb159916dc4249806a39f04cce895c1ac82e6549e7b4276809d1188ffe9861
                                                • Opcode Fuzzy Hash: e0ad719187851a61f309ddbb2cee80a5110ae42387cecf94a10a94091515ac20
                                                • Instruction Fuzzy Hash: 70E046B2921228EBCB24DF8999049CAF3ECEB49B04B2100AAB502D3200C274DF41C7D4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e0ad719187851a61f309ddbb2cee80a5110ae42387cecf94a10a94091515ac20
                                                • Instruction ID: 2d512d3db21468ee4c20aeb3da59541ea0d668c7a38b958442acfd37a75affd8
                                                • Opcode Fuzzy Hash: e0ad719187851a61f309ddbb2cee80a5110ae42387cecf94a10a94091515ac20
                                                • Instruction Fuzzy Hash: 03E08C32912228EBCB19DB98D908D9AF7FEEB44B04B1544A6F902E3500C270DE00DBE0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ___free_lconv_mon.LIBCMT ref: 00422653
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422209
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 0042221B
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 0042222D
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 0042223F
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422251
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422263
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422275
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422287
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422299
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222AB
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222BD
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222CF
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222E1
                                                • _free.LIBCMT ref: 00422648
                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                • _free.LIBCMT ref: 0042266A
                                                • _free.LIBCMT ref: 0042267F
                                                • _free.LIBCMT ref: 0042268A
                                                • _free.LIBCMT ref: 004226AC
                                                • _free.LIBCMT ref: 004226BF
                                                • _free.LIBCMT ref: 004226CD
                                                • _free.LIBCMT ref: 004226D8
                                                • _free.LIBCMT ref: 00422710
                                                • _free.LIBCMT ref: 00422717
                                                • _free.LIBCMT ref: 00422734
                                                • _free.LIBCMT ref: 0042274C
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                • String ID:
                                                • API String ID: 161543041-0
                                                • Opcode ID: 2ebc8ac26202a0620aa625b36a1d2a8fe7bc692bad1c871fd446d657effbc3a9
                                                • Instruction ID: 87a383156b0838ac626f9c2c6038cf6ce1f5ffd7cd3d592d57855f9c4539c293
                                                • Opcode Fuzzy Hash: 2ebc8ac26202a0620aa625b36a1d2a8fe7bc692bad1c871fd446d657effbc3a9
                                                • Instruction Fuzzy Hash: B6319272604211BFEB205A76EA45B9B73E5AF80358F50441FE849D7251DFBCED80DB18
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ___free_lconv_mon.LIBCMT ref: 027728BA
                                                  • Part of subcall function 02772453: _free.LIBCMT ref: 02772470
                                                  • Part of subcall function 02772453: _free.LIBCMT ref: 02772482
                                                  • Part of subcall function 02772453: _free.LIBCMT ref: 02772494
                                                  • Part of subcall function 02772453: _free.LIBCMT ref: 027724A6
                                                  • Part of subcall function 02772453: _free.LIBCMT ref: 027724B8
                                                  • Part of subcall function 02772453: _free.LIBCMT ref: 027724CA
                                                  • Part of subcall function 02772453: _free.LIBCMT ref: 027724DC
                                                  • Part of subcall function 02772453: _free.LIBCMT ref: 027724EE
                                                  • Part of subcall function 02772453: _free.LIBCMT ref: 02772500
                                                  • Part of subcall function 02772453: _free.LIBCMT ref: 02772512
                                                  • Part of subcall function 02772453: _free.LIBCMT ref: 02772524
                                                  • Part of subcall function 02772453: _free.LIBCMT ref: 02772536
                                                  • Part of subcall function 02772453: _free.LIBCMT ref: 02772548
                                                • _free.LIBCMT ref: 027728AF
                                                  • Part of subcall function 0276E808: HeapFree.KERNEL32(00000000,00000000,?,027725E4,?,00000000,?,?,?,0277260B,?,00000007,?,?,02772A0D,?), ref: 0276E81E
                                                  • Part of subcall function 0276E808: GetLastError.KERNEL32(?,?,027725E4,?,00000000,?,?,?,0277260B,?,00000007,?,?,02772A0D,?,?), ref: 0276E830
                                                • _free.LIBCMT ref: 027728D1
                                                • _free.LIBCMT ref: 027728E6
                                                • _free.LIBCMT ref: 027728F1
                                                • _free.LIBCMT ref: 02772913
                                                • _free.LIBCMT ref: 02772926
                                                • _free.LIBCMT ref: 02772934
                                                • _free.LIBCMT ref: 0277293F
                                                • _free.LIBCMT ref: 02772977
                                                • _free.LIBCMT ref: 0277297E
                                                • _free.LIBCMT ref: 0277299B
                                                • _free.LIBCMT ref: 027729B3
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                • String ID:
                                                • API String ID: 161543041-0
                                                • Opcode ID: 2ebc8ac26202a0620aa625b36a1d2a8fe7bc692bad1c871fd446d657effbc3a9
                                                • Instruction ID: 9a60ce04eecac8abc32cd4ae9b6ae397bb149c5fc544f9e40773165f2afdcaf4
                                                • Opcode Fuzzy Hash: 2ebc8ac26202a0620aa625b36a1d2a8fe7bc692bad1c871fd446d657effbc3a9
                                                • Instruction Fuzzy Hash: F3313E716003069FEF22AA79D84DB6A77EAEF00314F245429EC65E7151DF75E980CF20
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 00419C22
                                                • type_info::operator==.LIBVCRUNTIME ref: 00419C49
                                                • ___TypeMatch.LIBVCRUNTIME ref: 00419D55
                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 00419E30
                                                • _UnwindNestedFrames.LIBCMT ref: 00419EB7
                                                • CallUnexpected.LIBVCRUNTIME ref: 00419ED2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                • String ID: csm$csm$csm
                                                • API String ID: 2123188842-393685449
                                                • Opcode ID: 7c1fb931e7428280153d6c09b5a5c630754522480dfed903c9c8a59691bc5c1e
                                                • Instruction ID: d03aefa22aee8cf5aa416bea0a170c685dbf4c7cd79984a2e6415da9b3a38480
                                                • Opcode Fuzzy Hash: 7c1fb931e7428280153d6c09b5a5c630754522480dfed903c9c8a59691bc5c1e
                                                • Instruction Fuzzy Hash: 49C18871900209EFCF29DFA5D8A19EEBBB5BF04314F14405BE8516B242D339DE91CB9A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 02769E89
                                                • type_info::operator==.LIBVCRUNTIME ref: 02769EB0
                                                • ___TypeMatch.LIBVCRUNTIME ref: 02769FBC
                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 0276A097
                                                • _UnwindNestedFrames.LIBCMT ref: 0276A11E
                                                • CallUnexpected.LIBVCRUNTIME ref: 0276A139
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                • String ID: csm$csm$csm
                                                • API String ID: 2123188842-393685449
                                                • Opcode ID: 7c1fb931e7428280153d6c09b5a5c630754522480dfed903c9c8a59691bc5c1e
                                                • Instruction ID: ba7172ad64488b7f179499febd723124d01f242f16dafd78cfdfde122e78fa9b
                                                • Opcode Fuzzy Hash: 7c1fb931e7428280153d6c09b5a5c630754522480dfed903c9c8a59691bc5c1e
                                                • Instruction Fuzzy Hash: D2C15771800209EFCF2ADFA4C988ABEBBB6AF09714F14415AED017B251E731DA55CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00408BAC
                                                • InternetOpenA.WININET(0043432B,00000000,00000000,00000000,00000000), ref: 00408BC2
                                                • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 00408BE2
                                                • InternetReadFile.WININET(00000000,00000000,?,?), ref: 00408BF3
                                                • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00408C15
                                                • InternetReadFile.WININET(00000000,00000000,?,?), ref: 00408C20
                                                • CloseHandle.KERNEL32(?), ref: 00408C32
                                                • InternetCloseHandle.WININET(?), ref: 00408C41
                                                • InternetCloseHandle.WININET(00000000), ref: 00408C44
                                                • RemoveDirectoryA.KERNEL32(00000000,?,?,?), ref: 00408CFD
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Internet$File$CloseHandle$OpenRead$CreateDirectoryRemoveWrite
                                                • String ID:
                                                • API String ID: 1496009958-0
                                                • Opcode ID: 7836158d722f943eb13c0f572eb15de27d04c743bee1a8dc89097e857feb2d98
                                                • Instruction ID: e39da941a42be4000a8416f9d2a6f8c848e32a180712f45a109694aa4e2734ce
                                                • Opcode Fuzzy Hash: 7836158d722f943eb13c0f572eb15de27d04c743bee1a8dc89097e857feb2d98
                                                • Instruction Fuzzy Hash: 6E71EF71600208ABEB14DF64DD85BEE7735EF44304F50423EF945AB2D1DB38A980CB68
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 0041ED90
                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                • _free.LIBCMT ref: 0041ED9C
                                                • _free.LIBCMT ref: 0041EDA7
                                                • _free.LIBCMT ref: 0041EDB2
                                                • _free.LIBCMT ref: 0041EDBD
                                                • _free.LIBCMT ref: 0041EDC8
                                                • _free.LIBCMT ref: 0041EDD3
                                                • _free.LIBCMT ref: 0041EDDE
                                                • _free.LIBCMT ref: 0041EDE9
                                                • _free.LIBCMT ref: 0041EDF7
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: b518f20b764996853f57fbd2a3fdc4e7bf3deb810a08f9cd0b2a52dd965201da
                                                • Instruction ID: e610bd300bd5c2f85586062e27af9f16ff799e012d6f089a2169b26ee7872c24
                                                • Opcode Fuzzy Hash: b518f20b764996853f57fbd2a3fdc4e7bf3deb810a08f9cd0b2a52dd965201da
                                                • Instruction Fuzzy Hash: ED219CBA910108BFCB41EF96C941DDD7BF6BF88344F00416AF9199B121EB35DA84DB84
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 0276EFF7
                                                  • Part of subcall function 0276E808: HeapFree.KERNEL32(00000000,00000000,?,027725E4,?,00000000,?,?,?,0277260B,?,00000007,?,?,02772A0D,?), ref: 0276E81E
                                                  • Part of subcall function 0276E808: GetLastError.KERNEL32(?,?,027725E4,?,00000000,?,?,?,0277260B,?,00000007,?,?,02772A0D,?,?), ref: 0276E830
                                                • _free.LIBCMT ref: 0276F003
                                                • _free.LIBCMT ref: 0276F00E
                                                • _free.LIBCMT ref: 0276F019
                                                • _free.LIBCMT ref: 0276F024
                                                • _free.LIBCMT ref: 0276F02F
                                                • _free.LIBCMT ref: 0276F03A
                                                • _free.LIBCMT ref: 0276F045
                                                • _free.LIBCMT ref: 0276F050
                                                • _free.LIBCMT ref: 0276F05E
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: b518f20b764996853f57fbd2a3fdc4e7bf3deb810a08f9cd0b2a52dd965201da
                                                • Instruction ID: 3ba85a530b3435ceb1eb288e90ee44e27f8abb9ccbf60d24889cb71dce7be236
                                                • Opcode Fuzzy Hash: b518f20b764996853f57fbd2a3fdc4e7bf3deb810a08f9cd0b2a52dd965201da
                                                • Instruction Fuzzy Hash: 3221987A910109AFDB42EF94C889DEE7FB9EF08340F415566E915AB120DB31EA94CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f5ce67aa41b5f7f4889b1a1a20be5028291e55dfd00ef2a2d6d7ad31bcea8bed
                                                • Instruction ID: 5128a0cef717139e7719faf6ed0b9fe75c650819d7ce78bb109199c1610a9dbc
                                                • Opcode Fuzzy Hash: f5ce67aa41b5f7f4889b1a1a20be5028291e55dfd00ef2a2d6d7ad31bcea8bed
                                                • Instruction Fuzzy Hash: D3C114B4B002159FDF11DF99E880BAEBBB0BF49304F51406AE914A7382C7789D81CF69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f5ce67aa41b5f7f4889b1a1a20be5028291e55dfd00ef2a2d6d7ad31bcea8bed
                                                • Instruction ID: 46dfa1866fdf9769d30b82b9e5f9b3ab5a036a43473f158a321cd048c6f5b6d3
                                                • Opcode Fuzzy Hash: f5ce67aa41b5f7f4889b1a1a20be5028291e55dfd00ef2a2d6d7ad31bcea8bed
                                                • Instruction Fuzzy Hash: B3C1F4B0A04745AFDF16CF98C888BBDBBB9BF49304F14816AE944A7399C7309941CF65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: _free$___from_strstr_to_strchr
                                                • String ID:
                                                • API String ID: 3409252457-0
                                                • Opcode ID: 17a2c5d05d88992eb6c4295c13d4ba7d46687f58b453e92c494b9aad345095be
                                                • Instruction ID: f188bb2de727b7b751c2d84351da10a70f250225146cef8743706f99745805fe
                                                • Opcode Fuzzy Hash: 17a2c5d05d88992eb6c4295c13d4ba7d46687f58b453e92c494b9aad345095be
                                                • Instruction Fuzzy Hash: 0E518C74F44324AFDB24AFB7A881A6E7BB4AF11314F54416FE410972A1EA3D8940CB5D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: _free$___from_strstr_to_strchr
                                                • String ID:
                                                • API String ID: 3409252457-0
                                                • Opcode ID: 17a2c5d05d88992eb6c4295c13d4ba7d46687f58b453e92c494b9aad345095be
                                                • Instruction ID: 12afe521a9fcdd2c3e69018d01e128c62f597ce4837920bd9ba39743c19fa815
                                                • Opcode Fuzzy Hash: 17a2c5d05d88992eb6c4295c13d4ba7d46687f58b453e92c494b9aad345095be
                                                • Instruction Fuzzy Hash: CF51D471D04305AFEF21EF698889E6E7BB5EF02314F94426ED958A7280EBB19540CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 02753AA1
                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 02753AD2
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 02753AE0
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 02753AF3
                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 02753B1D
                                                • ConvertSidToStringSidW.ADVAPI32(00000000,00000000), ref: 02753B30
                                                • LocalFree.KERNEL32(00000000), ref: 02753C4C
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocateHeap$AccountLookupName$ConvertFreeLocalString
                                                • String ID:
                                                • API String ID: 856199767-0
                                                • Opcode ID: a21390300934cd29b774af7455bbd4a5da11480314e204e02bb9cb101a81b481
                                                • Instruction ID: 797eff8db7a2c54cd32f25e40976ad5c0635eccd7ab1fb7492cebe1ab7619208
                                                • Opcode Fuzzy Hash: a21390300934cd29b774af7455bbd4a5da11480314e204e02bb9cb101a81b481
                                                • Instruction Fuzzy Hash: 1A71A2B1E00219AFDB14DFA4DC88FBFBBB9EF44344F40416AE905A7291DB759909CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _ValidateLocalCookies.LIBCMT ref: 00419507
                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 0041950F
                                                • _ValidateLocalCookies.LIBCMT ref: 00419598
                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 004195C3
                                                • _ValidateLocalCookies.LIBCMT ref: 00419618
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                • String ID: csm
                                                • API String ID: 1170836740-1018135373
                                                • Opcode ID: 170db4f13a52bbc04fbb15fe7ab42c90d24a7c19ae8ceb0e3c19913b98646896
                                                • Instruction ID: cf6a3be1c1e6f4323defd25786acadca5afaa418f9c93884064ec3a043526e94
                                                • Opcode Fuzzy Hash: 170db4f13a52bbc04fbb15fe7ab42c90d24a7c19ae8ceb0e3c19913b98646896
                                                • Instruction Fuzzy Hash: 09411A31A00214AFCF11DF69C890ADEBBB1BF45318F54806BE8146B352D739DE96CB99
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: api-ms-$ext-ms-
                                                • API String ID: 0-537541572
                                                • Opcode ID: d346eea9aafd959945e16ecfc9ebbe047e966c499b5e8e0d3b3e0bbc48b51e8c
                                                • Instruction ID: 8946f5363388c355846af12649c4142b4e9cf4c5f65ba016e67a922269825e5f
                                                • Opcode Fuzzy Hash: d346eea9aafd959945e16ecfc9ebbe047e966c499b5e8e0d3b3e0bbc48b51e8c
                                                • Instruction Fuzzy Hash: 3521C672A41221FBCB318A24DC45A9B3778AB017A0F650532ED15A7391D638ED4BC5DC
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00422353: _free.LIBCMT ref: 00422378
                                                • _free.LIBCMT ref: 004223D9
                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                • _free.LIBCMT ref: 004223E4
                                                • _free.LIBCMT ref: 004223EF
                                                • _free.LIBCMT ref: 00422443
                                                • _free.LIBCMT ref: 0042244E
                                                • _free.LIBCMT ref: 00422459
                                                • _free.LIBCMT ref: 00422464
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 745ba4c7df38b0c8b3501d58b22aa89868de86b005191e755d783c3d27d16807
                                                • Instruction ID: 3666b1e76cecdb1a9706d82e7bd79ae187b091a1e89744abee2c0a3d449e73e2
                                                • Opcode Fuzzy Hash: 745ba4c7df38b0c8b3501d58b22aa89868de86b005191e755d783c3d27d16807
                                                • Instruction Fuzzy Hash: C611E471601714BAD921F7B2DD47FCB77DD5F0834CF84881EBACD6A052D6ACB6514604
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 027725BA: _free.LIBCMT ref: 027725DF
                                                • _free.LIBCMT ref: 02772640
                                                  • Part of subcall function 0276E808: HeapFree.KERNEL32(00000000,00000000,?,027725E4,?,00000000,?,?,?,0277260B,?,00000007,?,?,02772A0D,?), ref: 0276E81E
                                                  • Part of subcall function 0276E808: GetLastError.KERNEL32(?,?,027725E4,?,00000000,?,?,?,0277260B,?,00000007,?,?,02772A0D,?,?), ref: 0276E830
                                                • _free.LIBCMT ref: 0277264B
                                                • _free.LIBCMT ref: 02772656
                                                • _free.LIBCMT ref: 027726AA
                                                • _free.LIBCMT ref: 027726B5
                                                • _free.LIBCMT ref: 027726C0
                                                • _free.LIBCMT ref: 027726CB
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 745ba4c7df38b0c8b3501d58b22aa89868de86b005191e755d783c3d27d16807
                                                • Instruction ID: 690ef06092df6abb4de141e229026613ed6bdcd8bff58440342f608cb0b01082
                                                • Opcode Fuzzy Hash: 745ba4c7df38b0c8b3501d58b22aa89868de86b005191e755d783c3d27d16807
                                                • Instruction Fuzzy Hash: F9114F72540B14AAEA23F7B0CC1EFDB77DFAF01700F400825BEA9A6051DA65B5548E50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetConsoleCP.KERNEL32(?,00405880,00000000), ref: 00423A8E
                                                • __fassign.LIBCMT ref: 00423C6D
                                                • __fassign.LIBCMT ref: 00423C8A
                                                • WriteFile.KERNEL32(?,00405880,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00423CD2
                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00423D12
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00423DBE
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: FileWrite__fassign$ConsoleErrorLast
                                                • String ID:
                                                • API String ID: 4031098158-0
                                                • Opcode ID: 5a0c35df1f21bdc5310913443ad541efee69954072d07ce9ea6e444a121a2afd
                                                • Instruction ID: 55294dd1ed643e62d688e25fe7fc8b93d32e6dca02253c809cdcf0ede3e7f937
                                                • Opcode Fuzzy Hash: 5a0c35df1f21bdc5310913443ad541efee69954072d07ce9ea6e444a121a2afd
                                                • Instruction Fuzzy Hash: 21D1A075E002689FCF15CFA8D8809EDBBB5BF48314F64016AE455FB342D738AA46CB58
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetConsoleCP.KERNEL32(?,02755AE7,00000000), ref: 02773CF5
                                                • __fassign.LIBCMT ref: 02773ED4
                                                • __fassign.LIBCMT ref: 02773EF1
                                                • WriteFile.KERNEL32(?,02755AE7,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02773F39
                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 02773F79
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 02774025
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: FileWrite__fassign$ConsoleErrorLast
                                                • String ID:
                                                • API String ID: 4031098158-0
                                                • Opcode ID: e542d5d4a89b9a95555eca30389ef7d2b429d4e8e228d9549bf9bdf1a88ffcb9
                                                • Instruction ID: 0d6d3bd5e39ce660a7c22d15134d7d5af99a88c8c978f923b85629f5209df37b
                                                • Opcode Fuzzy Hash: e542d5d4a89b9a95555eca30389ef7d2b429d4e8e228d9549bf9bdf1a88ffcb9
                                                • Instruction Fuzzy Hash: D5D19B75D002589FCF15CFA8C8949EDBBB5BF49314F2801AAE855FB242D731AA46CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(?,?,004197E7,004193D7,00418C1C), ref: 004197FE
                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0041980C
                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00419825
                                                • SetLastError.KERNEL32(00000000,004197E7,004193D7,00418C1C), ref: 00419877
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: ErrorLastValue___vcrt_
                                                • String ID:
                                                • API String ID: 3852720340-0
                                                • Opcode ID: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                • Instruction ID: 71a7697fc03e6214697c45e1a132a8316019e6706060db725442c6d2a3e753c8
                                                • Opcode Fuzzy Hash: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                • Instruction Fuzzy Hash: F101D8326293115EE62C3B76AE959D72774EF067B8720023FF120441F1EF594C95D58D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(?,?,02769A4E,0276963E,02768E83), ref: 02769A65
                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 02769A73
                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 02769A8C
                                                • SetLastError.KERNEL32(00000000,02769A4E,0276963E,02768E83), ref: 02769ADE
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ErrorLastValue___vcrt_
                                                • String ID:
                                                • API String ID: 3852720340-0
                                                • Opcode ID: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                • Instruction ID: 77eefdde2cad2ea3807d51ddf95d696e0c908912cc45292b88bfd5752bde6228
                                                • Opcode Fuzzy Hash: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                • Instruction Fuzzy Hash: 1001D432609712DFE72927B57E8CA363AF6EB45774724023AEE10604F0EF634C05D948
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InternetOpenW.WININET(00434EF4,00000000,00000000,00000000,00000000), ref: 027544C3
                                                • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 027544D5
                                                • InternetReadFile.WININET(00000000,?,03E80000,03E80000), ref: 027544E8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Internet$Open$FileRead
                                                • String ID: +CC$runas
                                                • API String ID: 72386350-2150734417
                                                • Opcode ID: f629ccd115f1b0a5505da88cd8cf5212883000edcb5ff7f417580e889bd18442
                                                • Instruction ID: f235b078d8e5cd8d1ce9ce8e8a15bf9b04223d9607ea949ab54a873c36bfd279
                                                • Opcode Fuzzy Hash: f629ccd115f1b0a5505da88cd8cf5212883000edcb5ff7f417580e889bd18442
                                                • Instruction Fuzzy Hash: F851F572E00128AFDB14DFA4CC95FEEBB76EF48700F608129E811B7280DB759944CBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                • C:\Users\user\Desktop\file.exe, xrefs: 00420F81
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\Users\user\Desktop\file.exe
                                                • API String ID: 0-517116171
                                                • Opcode ID: d9fd3d3f386e086f16d5e96c86dfc6c05a3e177acafcacdda8c025444d2164cb
                                                • Instruction ID: f2c65a4c72dcbe00dc32dc221c8eb50b3435d1ebdf66b1fbb5bbc6e11338d05a
                                                • Opcode Fuzzy Hash: d9fd3d3f386e086f16d5e96c86dfc6c05a3e177acafcacdda8c025444d2164cb
                                                • Instruction Fuzzy Hash: CB210A713001257F97206F71ED81D6BB7ADAF103A8750462BF828D7691D778DC818799
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                • C:\Users\user\Desktop\file.exe, xrefs: 027711E8
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: C:\Users\user\Desktop\file.exe
                                                • API String ID: 0-517116171
                                                • Opcode ID: 58ea943009bd374bebf7ec5987a08b3fa813e305a807f4d2fcbf4f6ae6d6cbf6
                                                • Instruction ID: a1691d8b73b000e1f75bc6cc6df190d83291ed8a3eacfc4bde1cc85a5015f106
                                                • Opcode Fuzzy Hash: 58ea943009bd374bebf7ec5987a08b3fa813e305a807f4d2fcbf4f6ae6d6cbf6
                                                • Instruction Fuzzy Hash: 4C218E72B04205BF9F21AF659C88E7B77AEAB153647404665ED69D7550EB20EC008FA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: _wcsrchr
                                                • String ID: .bat$.cmd$.com$.exe
                                                • API String ID: 1752292252-4019086052
                                                • Opcode ID: 19671788b65354572937ca0f5259cacd468799deb2890a42aa5f1fe1ebfecd1d
                                                • Instruction ID: baa428b651ab7fadd2aefce0a8d8cefe58070258f098f4f191bca89b56dcb2ea
                                                • Opcode Fuzzy Hash: 19671788b65354572937ca0f5259cacd468799deb2890a42aa5f1fe1ebfecd1d
                                                • Instruction Fuzzy Hash: 7E012B3BA8C635212624101AEC62BF717988B96FB8B25412FF854F72C1ED9DEC8205DC
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: api-ms-
                                                • API String ID: 0-2084034818
                                                • Opcode ID: d7b12ed5c3c764c8b82cc7f1cf76b5788b814adb9963f19d14a8505e8bb0b4a8
                                                • Instruction ID: 8addbc20e8b4f1572ca5f78bff053ba989236767de5a1c4d832f47c373f0c560
                                                • Opcode Fuzzy Hash: d7b12ed5c3c764c8b82cc7f1cf76b5788b814adb9963f19d14a8505e8bb0b4a8
                                                • Instruction Fuzzy Hash: 2B112C71A12221EBC7314B249D44AAB37689F017B4B624933ED45AB390D738DDE1C5DE
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,0041B938,?,?,0041B900,0041BE86,?,NA), ref: 0041B958
                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0041B96B
                                                • FreeLibrary.KERNEL32(00000000,?,?,0041B938,?,?,0041B900,0041BE86,?,NA), ref: 0041B98E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: af14fd2dde53d7be7e540de01eeb28501674720f1683c90e0ca13ac16e635f3d
                                                • Instruction ID: 6ab08718997dcf592451d77b1cbf540418157bbc441c253cf8170436862d5d78
                                                • Opcode Fuzzy Hash: af14fd2dde53d7be7e540de01eeb28501674720f1683c90e0ca13ac16e635f3d
                                                • Instruction Fuzzy Hash: 52F08230651218FBDB259B50DD0ABEEBA78DF44759F900175A504A1260CB788E46DA98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: _free$InformationTimeZone
                                                • String ID:
                                                • API String ID: 597776487-0
                                                • Opcode ID: cd66b27a8385d4536588664ec460c84106157103f67aa985b2529d6009eaf611
                                                • Instruction ID: ee50c6848bb474b5af7ccc4471fe8fa1f30a3597846ecea4035693242deb34ac
                                                • Opcode Fuzzy Hash: cd66b27a8385d4536588664ec460c84106157103f67aa985b2529d6009eaf611
                                                • Instruction Fuzzy Hash: 71C13972A002459FDF21DF78CC68BBE7BFAEF46314F58416AD84097290E7708A41CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCPInfo.KERNEL32(00CA43C0,00CA43C0,?,7FFFFFFF,?,?,00427265,00CA43C0,00CA43C0,?,00CA43C0,?,?,?,?,00CA43C0), ref: 0042704C
                                                • __alloca_probe_16.LIBCMT ref: 00427102
                                                • __alloca_probe_16.LIBCMT ref: 00427198
                                                • __freea.LIBCMT ref: 00427203
                                                • __freea.LIBCMT ref: 0042720F
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: __alloca_probe_16__freea$Info
                                                • String ID:
                                                • API String ID: 2330168043-0
                                                • Opcode ID: c559a93f2d06cee59e46b38ea2fc726286989e451536d90b3fb509578e86aae3
                                                • Instruction ID: f6d9b8f12c634194a1b411eace1e19527ea88e01b30f60a4b5a6e0b516c13e2d
                                                • Opcode Fuzzy Hash: c559a93f2d06cee59e46b38ea2fc726286989e451536d90b3fb509578e86aae3
                                                • Instruction Fuzzy Hash: 4481E472B082259BDF219EA5AC41EEF7BB5EF09354F98005BF804A7341D62DCC458BB9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __alloca_probe_16.LIBCMT ref: 00425958
                                                • __alloca_probe_16.LIBCMT ref: 00425A1E
                                                • __freea.LIBCMT ref: 00425A8A
                                                  • Part of subcall function 0041EA8A: HeapAlloc.KERNEL32(00000000,?,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041EABC
                                                • __freea.LIBCMT ref: 00425A93
                                                • __freea.LIBCMT ref: 00425AB6
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: __freea$__alloca_probe_16$AllocHeap
                                                • String ID:
                                                • API String ID: 1096550386-0
                                                • Opcode ID: 801bfc73f5307c034d341afffc150cc0786828de70bde5b9b10ebb0cec96e4eb
                                                • Instruction ID: 7e0d7c363e2f027523b7077ca53f82abc72318da18e9cc0c3b19bc4bba63112a
                                                • Opcode Fuzzy Hash: 801bfc73f5307c034d341afffc150cc0786828de70bde5b9b10ebb0cec96e4eb
                                                • Instruction Fuzzy Hash: 8351E672700626AFDB209F95EC86EBF37A9EF44764F95422AFC04D7240E778DC418698
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetFileType.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0041C040), ref: 0041C130
                                                • GetFileInformationByHandle.KERNEL32(?,?), ref: 0041C18A
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0041C040,?,000000FF,00000000,00000000), ref: 0041C218
                                                • __dosmaperr.LIBCMT ref: 0041C21F
                                                • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 0041C25C
                                                  • Part of subcall function 0041C484: __dosmaperr.LIBCMT ref: 0041C4B9
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                • String ID:
                                                • API String ID: 1206951868-0
                                                • Opcode ID: 8e7ecedbbb3726c11739f19b321c018a01a8de47d4bdd8436282d5c79af9c44f
                                                • Instruction ID: 0071a9752275d4edb8b9c21b1954eb469a97b67ce05b4548820d0adabff3a4d5
                                                • Opcode Fuzzy Hash: 8e7ecedbbb3726c11739f19b321c018a01a8de47d4bdd8436282d5c79af9c44f
                                                • Instruction Fuzzy Hash: B7413C75940204AFDB249FA5DC859EFBBF9EF89700B00452EF856D3610E7389885CB24
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetFileType.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0276C2A7), ref: 0276C397
                                                • GetFileInformationByHandle.KERNEL32(?,?), ref: 0276C3F1
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0276C2A7,?,000000FF,00000000,00000000), ref: 0276C47F
                                                • __dosmaperr.LIBCMT ref: 0276C486
                                                • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 0276C4C3
                                                  • Part of subcall function 0276C6EB: __dosmaperr.LIBCMT ref: 0276C720
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                • String ID:
                                                • API String ID: 1206951868-0
                                                • Opcode ID: 8e7ecedbbb3726c11739f19b321c018a01a8de47d4bdd8436282d5c79af9c44f
                                                • Instruction ID: f2dce3c38de29645b90e79dc8f8b0570afbde7ff417312c7869cdcd7de206402
                                                • Opcode Fuzzy Hash: 8e7ecedbbb3726c11739f19b321c018a01a8de47d4bdd8436282d5c79af9c44f
                                                • Instruction Fuzzy Hash: 2C412EB5900204ABDB26DFA5DC4D9BFBFF9EF49700B04452EE996D3A10E7309845CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 00422302
                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                • _free.LIBCMT ref: 00422314
                                                • _free.LIBCMT ref: 00422326
                                                • _free.LIBCMT ref: 00422338
                                                • _free.LIBCMT ref: 0042234A
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: a090e3dca2e19da394a01cead958df991e42452585b2f6658ee12e14c4d52992
                                                • Instruction ID: 8eed935d1f0a41e2b9dbe60b1656bd2ba3e28f3ae1fefd92f9cbf16fd4f54630
                                                • Opcode Fuzzy Hash: a090e3dca2e19da394a01cead958df991e42452585b2f6658ee12e14c4d52992
                                                • Instruction Fuzzy Hash: 04F04472501210B78520DBA6F6C2C4B73DAAB94355794180AF809D7641C77CFD81866C
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 02772569
                                                  • Part of subcall function 0276E808: HeapFree.KERNEL32(00000000,00000000,?,027725E4,?,00000000,?,?,?,0277260B,?,00000007,?,?,02772A0D,?), ref: 0276E81E
                                                  • Part of subcall function 0276E808: GetLastError.KERNEL32(?,?,027725E4,?,00000000,?,?,?,0277260B,?,00000007,?,?,02772A0D,?,?), ref: 0276E830
                                                • _free.LIBCMT ref: 0277257B
                                                • _free.LIBCMT ref: 0277258D
                                                • _free.LIBCMT ref: 0277259F
                                                • _free.LIBCMT ref: 027725B1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: a090e3dca2e19da394a01cead958df991e42452585b2f6658ee12e14c4d52992
                                                • Instruction ID: 8e5291c93d8933e4aeb2202cc74c5f8312492be2912c7737044130de530b1904
                                                • Opcode Fuzzy Hash: a090e3dca2e19da394a01cead958df991e42452585b2f6658ee12e14c4d52992
                                                • Instruction Fuzzy Hash: 79F06232811215ABDA20DB58E4DEC2A73DEEB00714BA42865F854D7540CB70FCC08A64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseOpenQueryValue
                                                • String ID: #
                                                • API String ID: 3677997916-1885708031
                                                • Opcode ID: 4d26a9903dbf7e4ba4290750e16a9ab8299c95c43a50e3bd25ecedede5d2791d
                                                • Instruction ID: 7807f8706a2a98856709ee0ef03dc5717255c5c9c56eebd0d3a4cea47453a7ff
                                                • Opcode Fuzzy Hash: 4d26a9903dbf7e4ba4290750e16a9ab8299c95c43a50e3bd25ecedede5d2791d
                                                • Instruction Fuzzy Hash: C112AF70900298DBEB15DF68C94CBDDBFB6AF06308F548199D844673C2D7B95A88CF92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • std::_Xinvalid_argument.LIBCPMT ref: 02760580
                                                • std::_Xinvalid_argument.LIBCPMT ref: 0276058F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Xinvalid_argumentstd::_
                                                • String ID: "$%
                                                • API String ID: 909987262-2120515197
                                                • Opcode ID: c099b85426fcf12805a5928d4c4bd781302b2ff8f44ebcaca473b76456323364
                                                • Instruction ID: 1acf68138820871216cdf77e87ffbcbca9dd7e9aaf99845560ca50bddfc0ac9f
                                                • Opcode Fuzzy Hash: c099b85426fcf12805a5928d4c4bd781302b2ff8f44ebcaca473b76456323364
                                                • Instruction Fuzzy Hash: 9002F7B1A002589BDF15EF38CD4D7AC7B66AF86304F54419CEC4457282DB759B888F93
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID: *?
                                                • API String ID: 269201875-2564092906
                                                • Opcode ID: 4349432449d004c56f1fbb459abf86acb5202655a551f523de74eb3488688e5f
                                                • Instruction ID: 7415b14c5d0124b7c9719d17695bca9e12f23279d28e73ebbb8fdbf8e8460f59
                                                • Opcode Fuzzy Hash: 4349432449d004c56f1fbb459abf86acb5202655a551f523de74eb3488688e5f
                                                • Instruction Fuzzy Hash: 5661A1B5E002299FCB14CFA9D8815EEFBF5EF48314B54816AE805F7301E735AE418B94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: _free
                                                • String ID: *?
                                                • API String ID: 269201875-2564092906
                                                • Opcode ID: 4349432449d004c56f1fbb459abf86acb5202655a551f523de74eb3488688e5f
                                                • Instruction ID: 9132b5f6416f2435e7835eceeb710ff179bfd16cfaee2d3502c3c8f98f1f05f9
                                                • Opcode Fuzzy Hash: 4349432449d004c56f1fbb459abf86acb5202655a551f523de74eb3488688e5f
                                                • Instruction Fuzzy Hash: 5A6138B6E00219AFDF15CFA9C8849EDFBF5EF48314B24816AD855E7300E771AE418B90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetTempPathA.KERNEL32(00000104,?), ref: 0275B565
                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0275B784
                                                • CreateDirectoryA.KERNEL32(?,00000000,?,?,?,?), ref: 0275B8A4
                                                • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0275B9F0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: File$CopyCreateDirectoryModuleNamePathTemp
                                                • String ID:
                                                • API String ID: 2256340497-0
                                                • Opcode ID: 69506e0b47fdf4355df82a24afce3d41012599873781e6f53ce1b916386e2bff
                                                • Instruction ID: edf038f38d3fa5cdae65f0c9cae46b82194b5a1588214de4abedea2996d9f813
                                                • Opcode Fuzzy Hash: 69506e0b47fdf4355df82a24afce3d41012599873781e6f53ce1b916386e2bff
                                                • Instruction Fuzzy Hash: 23D128B1A001288BDB25DB24CC897EDB776AF45308F5441DCDA08A72C6DB755FC88F56
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: AdjustPointer
                                                • String ID:
                                                • API String ID: 1740715915-0
                                                • Opcode ID: 7e8d2a906245dc524fe8c50e746b229fe3151c293ccc1eab8f3b2c5d31764d92
                                                • Instruction ID: a8cd01a110c9a5ba9b93cdf8b6ca506de852c713b8af7688bfec1274bd28d331
                                                • Opcode Fuzzy Hash: 7e8d2a906245dc524fe8c50e746b229fe3151c293ccc1eab8f3b2c5d31764d92
                                                • Instruction Fuzzy Hash: 3251D0B2601286AFDB298F15D861BEA77A4EF04314F24012FE84646391E739ECC1C799
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AdjustPointer
                                                • String ID:
                                                • API String ID: 1740715915-0
                                                • Opcode ID: 7e8d2a906245dc524fe8c50e746b229fe3151c293ccc1eab8f3b2c5d31764d92
                                                • Instruction ID: 477d1afd4253ec0c377ddbdf0ce16c0b5deaa6466c754a0171e00830ca6f593b
                                                • Opcode Fuzzy Hash: 7e8d2a906245dc524fe8c50e746b229fe3151c293ccc1eab8f3b2c5d31764d92
                                                • Instruction Fuzzy Hash: 9D51F372A06606EFDB2A8F24C98CBBA77E6FF40714F14452DDE0567690E732E844DB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetVersionExW.KERNEL32(0000011C,?,00439008,00000000), ref: 027556E0
                                                • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02755747
                                                • GetProcAddress.KERNEL32(00000000), ref: 0275574E
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AddressHandleModuleProcVersion
                                                • String ID:
                                                • API String ID: 3310240892-0
                                                • Opcode ID: ddc787008df3d19dcf6ff3ff6324906e599249e81a3a5c2a1838fed2653284d0
                                                • Instruction ID: 422f76f37cf0a7a2f335cd6b4343aa178ccd891b1801b325ad7f070e851068fe
                                                • Opcode Fuzzy Hash: ddc787008df3d19dcf6ff3ff6324906e599249e81a3a5c2a1838fed2653284d0
                                                • Instruction Fuzzy Hash: 01511571D00218DBDB24DB68DD497EDBB75EF45310F9042A8EC05A7281EBB9AA848F91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 00425FDE
                                                • _free.LIBCMT ref: 00426007
                                                • SetEndOfFile.KERNEL32(00000000,0042354B,00000000,?,?,?,?,?,?,?,?,0042354B,?,00000000), ref: 00426039
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,0042354B,?,00000000,?,?,?,?,?), ref: 00426055
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFileLast
                                                • String ID:
                                                • API String ID: 1547350101-0
                                                • Opcode ID: 005ab2c57f032726cdaaa7f9df82d6b6984aac1401b59b4031c376f8f621a61a
                                                • Instruction ID: 61c1fed18fa2e053e229d2c366b1320fca6b3d495f3fb51fd3c042a4ee27fee9
                                                • Opcode Fuzzy Hash: 005ab2c57f032726cdaaa7f9df82d6b6984aac1401b59b4031c376f8f621a61a
                                                • Instruction Fuzzy Hash: 6C413E72B006115BDB11ABB5ED41B8E37B6AF44364F560017F424E72D2EB7CC840576D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 02776245
                                                • _free.LIBCMT ref: 0277626E
                                                • SetEndOfFile.KERNEL32(00000000,027737B2,00000000,0276E6A5,?,?,?,?,?,?,?,027737B2,0276E6A5,00000000), ref: 027762A0
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,027737B2,0276E6A5,00000000,?,?,?,?,00000000), ref: 027762BC
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: _free$ErrorFileLast
                                                • String ID:
                                                • API String ID: 1547350101-0
                                                • Opcode ID: 005ab2c57f032726cdaaa7f9df82d6b6984aac1401b59b4031c376f8f621a61a
                                                • Instruction ID: 51d9ecf4754b3ef366f129c0f5ecec562ed086aa9c2cdcd16d4392c96bc1b6df
                                                • Opcode Fuzzy Hash: 005ab2c57f032726cdaaa7f9df82d6b6984aac1401b59b4031c376f8f621a61a
                                                • Instruction Fuzzy Hash: 0C41C472900A45ABDF53ABB88C0CBAF37BEEF54364F150515E814E7298EB30D8448B61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 0041BD6F: _free.LIBCMT ref: 0041BD7D
                                                  • Part of subcall function 004218BF: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000000,?,00425A80,?,00000000,00000000), ref: 00421961
                                                • GetLastError.KERNEL32 ref: 00420950
                                                • __dosmaperr.LIBCMT ref: 00420957
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 00420996
                                                • __dosmaperr.LIBCMT ref: 0042099D
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                • String ID:
                                                • API String ID: 167067550-0
                                                • Opcode ID: 2cc476a48764411ac7d7f7841f806bb526956e32d48153aac2d156f6a7af72d6
                                                • Instruction ID: 91911ec1de34df9e01eb008ea9a24e12f878ac442d2ad626700c96a69c790fc9
                                                • Opcode Fuzzy Hash: 2cc476a48764411ac7d7f7841f806bb526956e32d48153aac2d156f6a7af72d6
                                                • Instruction Fuzzy Hash: 2721F0B1700225AFA710AF62ACC196B77EDEF00374790851AF86697253D738DCC08B94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 0276BFD6: _free.LIBCMT ref: 0276BFE4
                                                  • Part of subcall function 02771B26: WideCharToMultiByte.KERNEL32(02755AE7,00000000,00437A28,00000000,02755AE7,02755AE7,0277463D,?,00437A28,?,00000000,?,027743AC,0000FDE9,00000000,?), ref: 02771BC8
                                                • GetLastError.KERNEL32 ref: 02770BB7
                                                • __dosmaperr.LIBCMT ref: 02770BBE
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 02770BFD
                                                • __dosmaperr.LIBCMT ref: 02770C04
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                • String ID:
                                                • API String ID: 167067550-0
                                                • Opcode ID: bcfca7c6e04eeb74265432f959e909c47042bfb9664e3c7dfc54a64be2794b21
                                                • Instruction ID: ad0b2a015595efe9aeaff77aba6a71f5da29d676db88452cd7dd9b6bb879f2c1
                                                • Opcode Fuzzy Hash: bcfca7c6e04eeb74265432f959e909c47042bfb9664e3c7dfc54a64be2794b21
                                                • Instruction Fuzzy Hash: 9521AAB1604209BF9F216F758C88E7BB7AEEF053687404929F959D7150E731ED418BA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d346eea9aafd959945e16ecfc9ebbe047e966c499b5e8e0d3b3e0bbc48b51e8c
                                                • Instruction ID: 47c1dbec5c29ac22d3d6e8f02f62ae44f7ffa1f86b0745a0441bdf80d46764d7
                                                • Opcode Fuzzy Hash: d346eea9aafd959945e16ecfc9ebbe047e966c499b5e8e0d3b3e0bbc48b51e8c
                                                • Instruction Fuzzy Hash: 8721C032A01225EBCB219B25FC89B3A3B69BB017A4F650131ED07B7E91D730ED01C5E6
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(?,00000000,?,0041BCED,00000000,?,?,?,0041BE86,?), ref: 0041EE97
                                                • _free.LIBCMT ref: 0041EEF4
                                                • _free.LIBCMT ref: 0041EF2A
                                                • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,?,0041BE86,?), ref: 0041EF35
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: ErrorLast_free
                                                • String ID:
                                                • API String ID: 2283115069-0
                                                • Opcode ID: 120db594496689011f9c139fa4ddd92dcfd12b70a1cc6502b103967e01bc71cb
                                                • Instruction ID: 26790fddcd24ef136aadc0cc0bf27d5f777129a8301660e6568487d79e7ca8b5
                                                • Opcode Fuzzy Hash: 120db594496689011f9c139fa4ddd92dcfd12b70a1cc6502b103967e01bc71cb
                                                • Instruction Fuzzy Hash: 2411CA3A6002017AD61427B79CC59EB256997C1779B25013BFD39832D2FE6D8CDB811D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(?,00000000,?,0276BF54,00000000,?,?,?,0276C0ED,?), ref: 0276F0FE
                                                • _free.LIBCMT ref: 0276F15B
                                                • _free.LIBCMT ref: 0276F191
                                                • SetLastError.KERNEL32(00000000,004390F8,000000FF,?,?,?,0276C0ED,?), ref: 0276F19C
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ErrorLast_free
                                                • String ID:
                                                • API String ID: 2283115069-0
                                                • Opcode ID: 120db594496689011f9c139fa4ddd92dcfd12b70a1cc6502b103967e01bc71cb
                                                • Instruction ID: 32f7d114ce13f3f533e77e39c2a5bb95f1621cfae7ae68dcf6f153879bdaa4c3
                                                • Opcode Fuzzy Hash: 120db594496689011f9c139fa4ddd92dcfd12b70a1cc6502b103967e01bc71cb
                                                • Instruction Fuzzy Hash: F911E932200502AFD61A2BB4FCCCDBB266BDBC57F4B254134FD27929E0EF618C564566
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(?,?,?,0041C755,0041EACD,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041EFEE
                                                • _free.LIBCMT ref: 0041F04B
                                                • _free.LIBCMT ref: 0041F081
                                                • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041F08C
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: ErrorLast_free
                                                • String ID:
                                                • API String ID: 2283115069-0
                                                • Opcode ID: 048b735e334959feaa5e4ce77df0ba5808e7239d9d4b1868442944ab324b2044
                                                • Instruction ID: d1a755533480a66cbcbdd6da6f61a8fcfdc6096e1f08231a3cc2ec091d2cf52b
                                                • Opcode Fuzzy Hash: 048b735e334959feaa5e4ce77df0ba5808e7239d9d4b1868442944ab324b2044
                                                • Instruction Fuzzy Hash: FB114C322045016AC7102B76ACC1DEB2969DBC8778765023BF92A822E3EF6CCCDF511C
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(?,?,?,0276C9BC,0276ED34,?,?,0276943A,?,?,?,?,?,0275235A,?,?), ref: 0276F255
                                                • _free.LIBCMT ref: 0276F2B2
                                                • _free.LIBCMT ref: 0276F2E8
                                                • SetLastError.KERNEL32(00000000,004390F8,000000FF,?,?,0276943A,?,?,?,?,?,0275235A,?,?), ref: 0276F2F3
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ErrorLast_free
                                                • String ID:
                                                • API String ID: 2283115069-0
                                                • Opcode ID: 048b735e334959feaa5e4ce77df0ba5808e7239d9d4b1868442944ab324b2044
                                                • Instruction ID: f231de62ed30e8760229f284575d5d390448aa15c6d8def6301a6f0999586517
                                                • Opcode Fuzzy Hash: 048b735e334959feaa5e4ce77df0ba5808e7239d9d4b1868442944ab324b2044
                                                • Instruction Fuzzy Hash: 1411C6362441016EDB122674BCCCDBF216AD7C5375B254234ED27929E0DB618C564D66
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d7b12ed5c3c764c8b82cc7f1cf76b5788b814adb9963f19d14a8505e8bb0b4a8
                                                • Instruction ID: 72d13345fd4238e51520c3ca92222d09e424e1d8450a49a8f618cec963c58424
                                                • Opcode Fuzzy Hash: d7b12ed5c3c764c8b82cc7f1cf76b5788b814adb9963f19d14a8505e8bb0b4a8
                                                • Instruction Fuzzy Hash: F4118631A01627EBCB324B289C48E7A77AA9F017B4B550535ED5EB7290E730ED01C6E4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0041F930,00000000,?,00424658,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 0041F7E1
                                                • GetLastError.KERNEL32(?,00424658,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,0041F930,00000000,00000104,?), ref: 0041F7EB
                                                • __dosmaperr.LIBCMT ref: 0041F7F2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                • String ID:
                                                • API String ID: 2398240785-0
                                                • Opcode ID: 05d28394caa5e79c84551c055246600de674f2baba94b68408dd47ae0dfcca9d
                                                • Instruction ID: 3e1febbc0a8defaca1089d50814ae8bcfad4f789bcb8220d5dd2739c2ed7ebaf
                                                • Opcode Fuzzy Hash: 05d28394caa5e79c84551c055246600de674f2baba94b68408dd47ae0dfcca9d
                                                • Instruction Fuzzy Hash: 1DF06D36600115BB8B202FA2DD08C9BBFA9FF443A03444136F52DC7561DB35E8A6CBE8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0041F930,00000000,?,004245E3,00000000,00000000,0041F930,?,?,00000000,00000000,00000001), ref: 0041F84A
                                                • GetLastError.KERNEL32(?,004245E3,00000000,00000000,0041F930,?,?,00000000,00000000,00000001,00000000,00000000,?,0041F930,00000000,00000104), ref: 0041F854
                                                • __dosmaperr.LIBCMT ref: 0041F85B
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                • String ID:
                                                • API String ID: 2398240785-0
                                                • Opcode ID: e95b58acd20ff03b7de0604d3f95648f78153c488b68a8cfe7999cd59df17e1a
                                                • Instruction ID: 5356ccb821a571137923583999cca56af5607f561d8780d9d137012589ba4a16
                                                • Opcode Fuzzy Hash: e95b58acd20ff03b7de0604d3f95648f78153c488b68a8cfe7999cd59df17e1a
                                                • Instruction Fuzzy Hash: FBF01231600115BB8B207BA6DC0499BBFA9FF443A03404536F52DC6521C735E8A6DBD4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0276FB97,00000000,?,027748BF,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 0276FA48
                                                • GetLastError.KERNEL32(?,027748BF,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,0276FB97,00000000,00000104,?), ref: 0276FA52
                                                • __dosmaperr.LIBCMT ref: 0276FA59
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                • String ID:
                                                • API String ID: 2398240785-0
                                                • Opcode ID: 05d28394caa5e79c84551c055246600de674f2baba94b68408dd47ae0dfcca9d
                                                • Instruction ID: 25d75ebcc30eead9758543a2608bad7a22cd0f944c721acbb498cb0f02eeb366
                                                • Opcode Fuzzy Hash: 05d28394caa5e79c84551c055246600de674f2baba94b68408dd47ae0dfcca9d
                                                • Instruction Fuzzy Hash: 4FF06232600116BB8B215FA6EC0CD6ABFAAFF462A13404531E95ED6820DB32D821CBD5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0276FB97,00000000,?,0277484A,00000000,00000000,0276FB97,?,?,00000000,00000000,00000001), ref: 0276FAB1
                                                • GetLastError.KERNEL32(?,0277484A,00000000,00000000,0276FB97,?,?,00000000,00000000,00000001,00000000,00000000,?,0276FB97,00000000,00000104), ref: 0276FABB
                                                • __dosmaperr.LIBCMT ref: 0276FAC2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                • String ID:
                                                • API String ID: 2398240785-0
                                                • Opcode ID: e95b58acd20ff03b7de0604d3f95648f78153c488b68a8cfe7999cd59df17e1a
                                                • Instruction ID: 33e46cd55be3a2a04ffb3ec8078725a0221e4fa38668b4ea89e9c62f70843b07
                                                • Opcode Fuzzy Hash: e95b58acd20ff03b7de0604d3f95648f78153c488b68a8cfe7999cd59df17e1a
                                                • Instruction Fuzzy Hash: 7BF08632200115BB8B215BA2ED0CD6AFF6AFF452A03444522FD5ED7930CB32D821CBD5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • WriteConsoleW.KERNEL32(00405880,00000000,00437A28,00000000,00405880,?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880), ref: 004272E6
                                                • GetLastError.KERNEL32(?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880,00000000,00405880,?,0042436F,00405880), ref: 004272F2
                                                  • Part of subcall function 004272B8: CloseHandle.KERNEL32(FFFFFFFE,00427302,?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880,00000000,00405880), ref: 004272C8
                                                • ___initconout.LIBCMT ref: 00427302
                                                  • Part of subcall function 0042727A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004272A9,004269D4,00405880,?,00423E1B,00000000,?,00405880,00000000), ref: 0042728D
                                                • WriteConsoleW.KERNEL32(00405880,00000000,00437A28,00000000,?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880,00000000), ref: 00427317
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                • String ID:
                                                • API String ID: 2744216297-0
                                                • Opcode ID: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                • Instruction ID: 5b8baa1da4bb66d128bbbdf819d740daca6d0282673a7c9b135cb97f91750bdc
                                                • Opcode Fuzzy Hash: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                • Instruction Fuzzy Hash: 46F01C36201129FBCF221F95EC04A8A3F66FF093A1B814075FE1C86231D6328820EB98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • WriteConsoleW.KERNEL32(02755AE7,00000000,00437A28,00000000,02755AE7,?,02776C4E,02755AE7,00000001,02755AE7,02755AE7,?,02774082,00000000,?,02755AE7), ref: 0277754D
                                                • GetLastError.KERNEL32(?,02776C4E,02755AE7,00000001,02755AE7,02755AE7,?,02774082,00000000,?,02755AE7,00000000,02755AE7,?,027745D6,02755AE7), ref: 02777559
                                                  • Part of subcall function 0277751F: CloseHandle.KERNEL32(00439900,02777569,?,02776C4E,02755AE7,00000001,02755AE7,02755AE7,?,02774082,00000000,?,02755AE7,00000000,02755AE7), ref: 0277752F
                                                • ___initconout.LIBCMT ref: 02777569
                                                  • Part of subcall function 027774E1: CreateFileW.KERNEL32(004336B8,40000000,00000003,00000000,00000003,00000000,00000000,02777510,02776C3B,02755AE7,?,02774082,00000000,?,02755AE7,00000000), ref: 027774F4
                                                • WriteConsoleW.KERNEL32(02755AE7,00000000,00437A28,00000000,?,02776C4E,02755AE7,00000001,02755AE7,02755AE7,?,02774082,00000000,?,02755AE7,00000000), ref: 0277757E
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                • String ID:
                                                • API String ID: 2744216297-0
                                                • Opcode ID: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                • Instruction ID: 3c21345bd29c11fae10a7276c8166fee0963c6bb79cc2ad2dc99626ad9fc3724
                                                • Opcode Fuzzy Hash: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                • Instruction Fuzzy Hash: BBF01536501128BBCF222FD1DC08E8A7F66EF083B1F814430FA1885231D7328820DB98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: CreateThread$Sleep
                                                • String ID:
                                                • API String ID: 422425972-0
                                                • Opcode ID: c7ec29c90368d79a70c95a5ee9845132da8938ab2cedaa7c12f416f09ab0d9a8
                                                • Instruction ID: 3e58bb4c01d1f945cb402fb00719d76fe511b7683de936d62f19d1048555ce50
                                                • Opcode Fuzzy Hash: c7ec29c90368d79a70c95a5ee9845132da8938ab2cedaa7c12f416f09ab0d9a8
                                                • Instruction Fuzzy Hash: 69E09231BE8334B6F47126A45C03F891E545B08F95FB20023B70CBE4D084C87485CAEE
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 0041D822
                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                • _free.LIBCMT ref: 0041D835
                                                • _free.LIBCMT ref: 0041D846
                                                • _free.LIBCMT ref: 0041D857
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 5b4b832eec97106c71e74c3abf3533cea5e390173416251ec6b9798646083543
                                                • Instruction ID: 2f128d3171f244c94fc48b8332bc88089a284fec835ab8af747093701a289460
                                                • Opcode Fuzzy Hash: 5b4b832eec97106c71e74c3abf3533cea5e390173416251ec6b9798646083543
                                                • Instruction Fuzzy Hash: C3E04FB4801520AFCE012F53FE055953BA2FB947EC340302AF81406232DB390261EFCE
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 0276DA89
                                                  • Part of subcall function 0276E808: HeapFree.KERNEL32(00000000,00000000,?,027725E4,?,00000000,?,?,?,0277260B,?,00000007,?,?,02772A0D,?), ref: 0276E81E
                                                  • Part of subcall function 0276E808: GetLastError.KERNEL32(?,?,027725E4,?,00000000,?,?,?,0277260B,?,00000007,?,?,02772A0D,?,?), ref: 0276E830
                                                • _free.LIBCMT ref: 0276DA9C
                                                • _free.LIBCMT ref: 0276DAAD
                                                • _free.LIBCMT ref: 0276DABE
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 5b4b832eec97106c71e74c3abf3533cea5e390173416251ec6b9798646083543
                                                • Instruction ID: 49ad5cfea78a1c5b26876bc67c413274f1d2f24641eb5ba4395d2916a94ae46f
                                                • Opcode Fuzzy Hash: 5b4b832eec97106c71e74c3abf3533cea5e390173416251ec6b9798646083543
                                                • Instruction Fuzzy Hash: 2EE08CB88805209FDB032F21BC0E96A3FA2FB247A03113036E82006230CB350162DFDE
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • std::_Xinvalid_argument.LIBCPMT ref: 00412FEF
                                                  • Part of subcall function 00416F50: Concurrency::cancel_current_task.LIBCPMT ref: 00417083
                                                Strings
                                                • invalid stoi argument, xrefs: 00412FEA
                                                • stoi argument out of range, xrefs: 00412FF9
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Concurrency::cancel_current_taskXinvalid_argumentstd::_
                                                • String ID: invalid stoi argument$stoi argument out of range
                                                • API String ID: 3646673767-1606216832
                                                • Opcode ID: d3d9237d7b9dd4d64f5b1881bc64ddae9b507e0a978812b243918a6d9f26b778
                                                • Instruction ID: 6d18bec53ddcbea06decae191a6eae5fb5e1180c669e5708db714ed38e612d95
                                                • Opcode Fuzzy Hash: d3d9237d7b9dd4d64f5b1881bc64ddae9b507e0a978812b243918a6d9f26b778
                                                • Instruction Fuzzy Hash: 60E1D171A001189BEF28DF28CE857DDBB72EB46304F50819EE419972C1DB799AD1CF98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\Users\user\Desktop\file.exe
                                                • API String ID: 0-517116171
                                                • Opcode ID: 31fa4e4f4f0bc981144b5b3ffc5fea1ddf45f4662b4ea0433f5b95f05539bbed
                                                • Instruction ID: 3e019bb9f1f37e8f56b3af26f626c64f14fa1fa210d5d8f79d997b38734a4c96
                                                • Opcode Fuzzy Hash: 31fa4e4f4f0bc981144b5b3ffc5fea1ddf45f4662b4ea0433f5b95f05539bbed
                                                • Instruction Fuzzy Hash: 9A41A271A80214AFDB11DF9A9CC19EFBBB9EB85710F10006BF40497251D7788E82CB5D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: C:\Users\user\Desktop\file.exe
                                                • API String ID: 0-517116171
                                                • Opcode ID: 31fa4e4f4f0bc981144b5b3ffc5fea1ddf45f4662b4ea0433f5b95f05539bbed
                                                • Instruction ID: 04379a2e3fc591e02a4bd202a747a8a133cb7e6b0714164b3e41183513cdce4e
                                                • Opcode Fuzzy Hash: 31fa4e4f4f0bc981144b5b3ffc5fea1ddf45f4662b4ea0433f5b95f05539bbed
                                                • Instruction Fuzzy Hash: 3D419571F50214AFDB26DB99DC8CABFBBF9EF89310F15406AE804A7250D7B09A40CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 02769776
                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 0276982A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CurrentImageNonwritable___except_validate_context_record
                                                • String ID: csm
                                                • API String ID: 3480331319-1018135373
                                                • Opcode ID: 170db4f13a52bbc04fbb15fe7ab42c90d24a7c19ae8ceb0e3c19913b98646896
                                                • Instruction ID: f14e25b65724a60554b4f1d1149c475650202b7d791fa19baf9d0dd962919b70
                                                • Opcode Fuzzy Hash: 170db4f13a52bbc04fbb15fe7ab42c90d24a7c19ae8ceb0e3c19913b98646896
                                                • Instruction Fuzzy Hash: F4418234A0021AEBCF11DF68C888AAEBBB5BF44318F148565ED15AB351D732A915CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ShellExecuteA.SHELL32(00000000,00429838,?,?,00000000,00000000), ref: 02754659
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ExecuteShell
                                                • String ID: +CC$runas
                                                • API String ID: 587946157-2150734417
                                                • Opcode ID: 275e86e7e836fdb05351418f23eea9cc16955723fba3a8d83db6570cd9dbdf7c
                                                • Instruction ID: 15be516937d4775f8a2a6a82734e1dbc4e2e379e0030a5b2712e872f9b92591d
                                                • Opcode Fuzzy Hash: 275e86e7e836fdb05351418f23eea9cc16955723fba3a8d83db6570cd9dbdf7c
                                                • Instruction Fuzzy Hash: C141E471600208EFDB04DF68C899BDE7BB6EB45744F908629FC15876C0D7B9E9848F91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00419F02
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: EncodePointer
                                                • String ID: MOC$RCC
                                                • API String ID: 2118026453-2084237596
                                                • Opcode ID: 9ba41499cbdf9a4a038d6cc8401d48825653b63da1d3c73c684997a9dc15089d
                                                • Instruction ID: ef4240616421f5d170a5d1c4fd7b0d446090a164c11462a96303fe54a6744129
                                                • Opcode Fuzzy Hash: 9ba41499cbdf9a4a038d6cc8401d48825653b63da1d3c73c684997a9dc15089d
                                                • Instruction Fuzzy Hash: 5C414872900209EFCF16DF98C981AEEBBB5FF48304F18819AF904A7251D3399DA1DB55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RtlEncodePointer.NTDLL(00000000), ref: 0276A169
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294752359.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_2750000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: EncodePointer
                                                • String ID: MOC$RCC
                                                • API String ID: 2118026453-2084237596
                                                • Opcode ID: 56cf5a80f9e67a63b3ea8228320d3624bd09d448c8f94bbe6aa890cfa768ed17
                                                • Instruction ID: ab015dd983a39f54bfc8a12bb31122c68db2a3495161ba5d1a3ba8e6d954cd20
                                                • Opcode Fuzzy Hash: 56cf5a80f9e67a63b3ea8228320d3624bd09d448c8f94bbe6aa890cfa768ed17
                                                • Instruction Fuzzy Hash: CD412871900209EFDF16DF94CD89AAE7BB6BF88304F258159EE04B6261D3369A50DF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00412D18
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: FileModuleName
                                                • String ID: .$5120
                                                • API String ID: 514040917-2446372808
                                                • Opcode ID: d5977a1847af3593c6d2360099aed04a1f4c529663bf82042b77ea6028604958
                                                • Instruction ID: 9696d8c15566c1d42fadb68592e21f39738dfdc301de5d2260ec8dd83da14f2d
                                                • Opcode Fuzzy Hash: d5977a1847af3593c6d2360099aed04a1f4c529663bf82042b77ea6028604958
                                                • Instruction Fuzzy Hash: D421E2B09002489BDB14EF69C90A7DD7FB49F06348F5001CEE44567282D7B99A498BE7
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 0041FDF2: EnterCriticalSection.KERNEL32(00405880,?,00424223,00405880,00437D48,00000010,0041EA11,00000000,C032C301,00000000,00000000,00405880,?,0041BB1A,00405880,00000000), ref: 0041FE0D
                                                • FlushFileBuffers.KERNEL32(00000000,00437D28,0000000C,00423A2E,nA,?,00000001,?,0041E96E,?), ref: 00423970
                                                • GetLastError.KERNEL32 ref: 00423981
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.294096543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000001.00000002.294245823.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                Similarity
                                                • API ID: BuffersCriticalEnterErrorFileFlushLastSection
                                                • String ID: nA
                                                • API String ID: 4109680722-4035868545
                                                • Opcode ID: f003fc8eaf19488ae7f9339aa40c70496bc05c9f4a2d22a8ae3e610d030b7c35
                                                • Instruction ID: 0418fce989e2f534913a4f38d2ce8aa3e5464a19317c2ea272403c313fbf0c0e
                                                • Opcode Fuzzy Hash: f003fc8eaf19488ae7f9339aa40c70496bc05c9f4a2d22a8ae3e610d030b7c35
                                                • Instruction Fuzzy Hash: 45018076B002108FC714AF69E90569D7BB5AF49724F50412FF4219B3D2DBBC9982CB98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Execution Graph

                                                Execution Coverage:1%
                                                Dynamic/Decrypted Code Coverage:16.2%
                                                Signature Coverage:0%
                                                Total number of Nodes:1396
                                                Total number of Limit Nodes:8
                                                execution_graph 17298 401940 17303 416f50 17298->17303 17300 401951 17316 4185ca 17300->17316 17305 416f6e __InternalCxxFrameHandler 17303->17305 17306 416f94 17303->17306 17304 41707e 17338 402180 17304->17338 17305->17300 17306->17304 17309 416fe8 17306->17309 17310 41700d 17306->17310 17309->17304 17311 41835e 27 API calls 17309->17311 17313 416ff9 __wsopen_s 17310->17313 17319 41835e 17310->17319 17311->17313 17314 417060 17313->17314 17333 41cc3c 17313->17333 17314->17300 17586 41859d 17316->17586 17321 418363 17319->17321 17322 41837d 17321->17322 17324 41837f 17321->17324 17344 41cc8d 17321->17344 17362 41cca7 17321->17362 17322->17313 17325 402180 Concurrency::cancel_current_task 17324->17325 17326 418389 17324->17326 17351 4193e4 17325->17351 17328 4193e4 Concurrency::cancel_current_task RaiseException 17326->17328 17330 418886 17328->17330 17329 40219c 17354 4191a9 17329->17354 17334 41cbc8 __wsopen_s 25 API calls 17333->17334 17335 41cc4b 17334->17335 17336 41cc59 __wsopen_s 11 API calls 17335->17336 17337 41cc58 17336->17337 17339 40218e Concurrency::cancel_current_task 17338->17339 17340 4193e4 Concurrency::cancel_current_task RaiseException 17339->17340 17341 40219c 17340->17341 17342 4191a9 ___std_exception_copy 26 API calls 17341->17342 17343 4021c3 17342->17343 17346 41ea8a _free 17344->17346 17345 41eac8 17365 41c750 17345->17365 17346->17345 17348 41eab3 RtlAllocateHeap 17346->17348 17350 41cca7 _free 2 API calls 17346->17350 17348->17346 17349 41eac6 17348->17349 17349->17321 17350->17346 17352 41942e RaiseException 17351->17352 17353 4193fe 17351->17353 17352->17329 17353->17352 17355 4191b6 17354->17355 17361 4021c3 17354->17361 17356 41cc8d ___std_exception_copy 15 API calls 17355->17356 17355->17361 17357 4191d3 17356->17357 17358 4191e3 17357->17358 17534 41dd4a 17357->17534 17543 41ca42 17358->17543 17361->17313 17575 41ccd4 17362->17575 17368 41efe9 GetLastError 17365->17368 17367 41c755 17367->17349 17369 41f000 17368->17369 17373 41f006 17368->17373 17391 41f3d0 17369->17391 17389 41f00c SetLastError 17373->17389 17396 41f40f 17373->17396 17376 41f034 17377 41f053 17376->17377 17378 41f03c 17376->17378 17380 41f40f _free 6 API calls 17377->17380 17379 41f40f _free 6 API calls 17378->17379 17382 41f04a 17379->17382 17381 41f05f 17380->17381 17383 41f063 17381->17383 17384 41f074 17381->17384 17408 41e5a1 17382->17408 17385 41f40f _free 6 API calls 17383->17385 17414 41ecc0 17384->17414 17385->17382 17389->17367 17390 41e5a1 _free 12 API calls 17390->17389 17419 41f213 17391->17419 17393 41f3ec 17394 41f3f5 17393->17394 17395 41f407 TlsGetValue 17393->17395 17394->17373 17397 41f213 _free 5 API calls 17396->17397 17398 41f42b 17397->17398 17399 41f449 TlsSetValue 17398->17399 17400 41f024 17398->17400 17400->17389 17401 420873 17400->17401 17406 420880 _free 17401->17406 17402 4208c0 17405 41c750 _free 13 API calls 17402->17405 17403 4208ab HeapAlloc 17404 4208be 17403->17404 17403->17406 17404->17376 17405->17404 17406->17402 17406->17403 17407 41cca7 _free 2 API calls 17406->17407 17407->17406 17409 41e5d5 _free 17408->17409 17410 41e5ac HeapFree 17408->17410 17409->17389 17410->17409 17411 41e5c1 17410->17411 17412 41c750 _free 12 API calls 17411->17412 17413 41e5c7 GetLastError 17412->17413 17413->17409 17432 41eb54 17414->17432 17420 41f241 17419->17420 17424 41f23d _free 17419->17424 17420->17424 17425 41f14c 17420->17425 17423 41f25b GetProcAddress 17423->17424 17424->17393 17430 41f15d ___vcrt_FlsFree 17425->17430 17426 41f208 17426->17423 17426->17424 17427 41f17b LoadLibraryExW 17428 41f196 GetLastError 17427->17428 17427->17430 17428->17430 17429 41f1f1 FreeLibrary 17429->17430 17430->17426 17430->17427 17430->17429 17431 41f1c9 LoadLibraryExW 17430->17431 17431->17430 17433 41eb60 CallCatchBlock 17432->17433 17446 41dea3 EnterCriticalSection 17433->17446 17435 41eb6a 17447 41eb9a 17435->17447 17438 41ec66 17439 41ec72 CallCatchBlock 17438->17439 17451 41dea3 EnterCriticalSection 17439->17451 17441 41ec7c 17452 41ee47 17441->17452 17443 41ec94 17456 41ecb4 17443->17456 17446->17435 17450 41deeb LeaveCriticalSection 17447->17450 17449 41eb88 17449->17438 17450->17449 17451->17441 17453 41ee7d __fassign 17452->17453 17454 41ee56 __fassign 17452->17454 17453->17443 17454->17453 17459 42260f 17454->17459 17533 41deeb LeaveCriticalSection 17456->17533 17458 41eca2 17458->17390 17460 42268f 17459->17460 17463 422625 17459->17463 17461 4226dd 17460->17461 17464 41e5a1 _free 14 API calls 17460->17464 17527 422780 17461->17527 17463->17460 17465 422658 17463->17465 17470 41e5a1 _free 14 API calls 17463->17470 17466 4226b1 17464->17466 17467 42267a 17465->17467 17476 41e5a1 _free 14 API calls 17465->17476 17468 41e5a1 _free 14 API calls 17466->17468 17469 41e5a1 _free 14 API calls 17467->17469 17471 4226c4 17468->17471 17473 422684 17469->17473 17475 42264d 17470->17475 17477 41e5a1 _free 14 API calls 17471->17477 17472 4226eb 17474 42274b 17472->17474 17486 41e5a1 14 API calls _free 17472->17486 17478 41e5a1 _free 14 API calls 17473->17478 17479 41e5a1 _free 14 API calls 17474->17479 17487 4221ec 17475->17487 17481 42266f 17476->17481 17482 4226d2 17477->17482 17478->17460 17485 422751 17479->17485 17515 4222ea 17481->17515 17484 41e5a1 _free 14 API calls 17482->17484 17484->17461 17485->17453 17486->17472 17488 4221fd 17487->17488 17514 4222e6 17487->17514 17489 42220e 17488->17489 17490 41e5a1 _free 14 API calls 17488->17490 17491 422220 17489->17491 17492 41e5a1 _free 14 API calls 17489->17492 17490->17489 17493 422232 17491->17493 17494 41e5a1 _free 14 API calls 17491->17494 17492->17491 17495 422244 17493->17495 17496 41e5a1 _free 14 API calls 17493->17496 17494->17493 17497 422256 17495->17497 17498 41e5a1 _free 14 API calls 17495->17498 17496->17495 17499 422268 17497->17499 17500 41e5a1 _free 14 API calls 17497->17500 17498->17497 17501 42227a 17499->17501 17502 41e5a1 _free 14 API calls 17499->17502 17500->17499 17503 42228c 17501->17503 17504 41e5a1 _free 14 API calls 17501->17504 17502->17501 17505 42229e 17503->17505 17506 41e5a1 _free 14 API calls 17503->17506 17504->17503 17507 4222b0 17505->17507 17508 41e5a1 _free 14 API calls 17505->17508 17506->17505 17509 4222c2 17507->17509 17510 41e5a1 _free 14 API calls 17507->17510 17508->17507 17511 41e5a1 _free 14 API calls 17509->17511 17512 4222d4 17509->17512 17510->17509 17511->17512 17513 41e5a1 _free 14 API calls 17512->17513 17512->17514 17513->17514 17514->17465 17516 42234f 17515->17516 17517 4222f7 17515->17517 17516->17467 17518 422307 17517->17518 17519 41e5a1 _free 14 API calls 17517->17519 17520 422319 17518->17520 17522 41e5a1 _free 14 API calls 17518->17522 17519->17518 17521 42232b 17520->17521 17523 41e5a1 _free 14 API calls 17520->17523 17524 42233d 17521->17524 17525 41e5a1 _free 14 API calls 17521->17525 17522->17520 17523->17521 17524->17516 17526 41e5a1 _free 14 API calls 17524->17526 17525->17524 17526->17516 17528 4227ac 17527->17528 17529 42278d 17527->17529 17528->17472 17529->17528 17530 42238b __fassign 14 API calls 17529->17530 17531 4227a6 17530->17531 17532 41e5a1 _free 14 API calls 17531->17532 17532->17528 17533->17458 17536 41dd57 17534->17536 17537 41dd65 17534->17537 17535 41c750 _free 14 API calls 17538 41dd6d 17535->17538 17536->17537 17541 41dd7c 17536->17541 17537->17535 17546 41cc2c 17538->17546 17540 41dd77 17540->17358 17541->17540 17542 41c750 _free 14 API calls 17541->17542 17542->17538 17544 41e5a1 _free 14 API calls 17543->17544 17545 41ca5a 17544->17545 17545->17361 17549 41cbc8 17546->17549 17548 41cc38 17548->17540 17550 41efe9 _free 14 API calls 17549->17550 17551 41cbd3 17550->17551 17555 41cbe1 17551->17555 17557 41cc59 IsProcessorFeaturePresent 17551->17557 17553 41cc2b 17554 41cbc8 __wsopen_s 25 API calls 17553->17554 17556 41cc38 17554->17556 17555->17548 17556->17548 17558 41cc65 17557->17558 17561 41ca80 17558->17561 17562 41ca9c ___scrt_fastfail 17561->17562 17563 41cac8 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17562->17563 17566 41cb99 ___scrt_fastfail 17563->17566 17565 41cbb7 GetCurrentProcess TerminateProcess 17565->17553 17567 418152 17566->17567 17568 41815b 17567->17568 17569 41815d IsProcessorFeaturePresent 17567->17569 17568->17565 17571 41819f 17569->17571 17574 418163 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17571->17574 17573 418282 17573->17565 17574->17573 17576 41cce0 CallCatchBlock 17575->17576 17581 41dea3 EnterCriticalSection 17576->17581 17578 41cceb 17582 41cd27 17578->17582 17581->17578 17585 41deeb LeaveCriticalSection 17582->17585 17584 41ccb2 17584->17321 17585->17584 17587 4185b3 17586->17587 17588 4185ac 17586->17588 17595 41d769 17587->17595 17592 41d6fd 17588->17592 17591 40195b 17593 41d769 28 API calls 17592->17593 17594 41d70f 17593->17594 17594->17591 17598 41d49f 17595->17598 17599 41d4ab CallCatchBlock 17598->17599 17606 41dea3 EnterCriticalSection 17599->17606 17601 41d4b9 17607 41d4fa 17601->17607 17603 41d4c6 17617 41d4ee 17603->17617 17606->17601 17608 41d516 17607->17608 17610 41d58d _free 17607->17610 17609 41d56d 17608->17609 17608->17610 17620 421d8f 17608->17620 17609->17610 17612 421d8f 28 API calls 17609->17612 17610->17603 17614 41d583 17612->17614 17613 41d563 17615 41e5a1 _free 14 API calls 17613->17615 17616 41e5a1 _free 14 API calls 17614->17616 17615->17609 17616->17610 17655 41deeb LeaveCriticalSection 17617->17655 17619 41d4d7 17619->17591 17621 421db7 17620->17621 17622 421d9c 17620->17622 17625 421dc6 17621->17625 17629 425c9c 17621->17629 17622->17621 17623 421da8 17622->17623 17626 41c750 _free 14 API calls 17623->17626 17636 425ccf 17625->17636 17628 421dad ___scrt_fastfail 17626->17628 17628->17613 17630 425ca7 17629->17630 17631 425cbc HeapSize 17629->17631 17632 41c750 _free 14 API calls 17630->17632 17631->17625 17633 425cac 17632->17633 17634 41cc2c __wsopen_s 25 API calls 17633->17634 17635 425cb7 17634->17635 17635->17625 17637 425ce7 17636->17637 17638 425cdc 17636->17638 17640 425cef 17637->17640 17646 425cf8 _free 17637->17646 17648 41ea8a 17638->17648 17641 41e5a1 _free 14 API calls 17640->17641 17644 425ce4 17641->17644 17642 425d22 HeapReAlloc 17642->17644 17642->17646 17643 425cfd 17645 41c750 _free 14 API calls 17643->17645 17644->17628 17645->17644 17646->17642 17646->17643 17647 41cca7 _free 2 API calls 17646->17647 17647->17646 17649 41eac8 17648->17649 17654 41ea98 _free 17648->17654 17650 41c750 _free 14 API calls 17649->17650 17652 41eac6 17650->17652 17651 41eab3 RtlAllocateHeap 17651->17652 17651->17654 17652->17644 17653 41cca7 _free 2 API calls 17653->17654 17654->17649 17654->17651 17654->17653 17655->17619 17656 408650 17657 408666 17656->17657 17657->17656 17659 4086a2 CreateMutexW GetLastError 17657->17659 17707 417a50 17657->17707 17662 4086c8 17659->17662 17660 408764 17665 41cc3c 25 API calls 17660->17665 17661 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 17664 408759 17661->17664 17662->17660 17663 408737 17662->17663 17663->17661 17666 408769 17665->17666 17720 406590 GetModuleFileNameA 17666->17720 17668 4087b3 SetCurrentDirectoryA 17670 4087ca 17668->17670 17671 4087ec 17668->17671 17670->17671 17673 408b10 17670->17673 17740 416a90 17671->17740 17675 41cc3c 25 API calls 17673->17675 17674 40880a 17754 402c70 17674->17754 17678 408b15 17675->17678 17677 408815 17679 416a90 27 API calls 17677->17679 17680 41cc3c 25 API calls 17678->17680 17681 408835 17679->17681 17682 408b1a 17680->17682 17683 402c70 70 API calls 17681->17683 17684 41cc3c 25 API calls 17682->17684 17685 40883d 17683->17685 17686 408b1f 17684->17686 17687 416a90 27 API calls 17685->17687 17688 408858 17687->17688 17689 402c70 70 API calls 17688->17689 17690 408863 17689->17690 17850 4171a0 17690->17850 17692 408877 17854 4170a0 17692->17854 17694 40888b 17695 4171a0 27 API calls 17694->17695 17696 40889c 17695->17696 17862 417380 17696->17862 17698 4088ad 17699 4170a0 27 API calls 17698->17699 17700 4088bd 17699->17700 17866 4048c0 17700->17866 17702 408abc 17702->17682 17704 408aec 17702->17704 17703 4088c5 17703->17678 17703->17702 17705 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 17704->17705 17706 408b0c 17705->17706 17708 417ac7 __wsopen_s 17707->17708 17710 417a73 17707->17710 17709 41cc3c 25 API calls 17708->17709 17719 417b4f __wsopen_s 17708->17719 17713 417b9e 17709->17713 17711 417b8f 17710->17711 17714 417ae0 17710->17714 17715 417ab6 17710->17715 17712 402180 Concurrency::cancel_current_task 27 API calls 17711->17712 17712->17708 17714->17708 17717 41835e 27 API calls 17714->17717 17715->17711 17716 417ac1 17715->17716 17718 41835e 27 API calls 17716->17718 17717->17708 17718->17708 17719->17657 17721 406620 17720->17721 17721->17721 17722 416f50 27 API calls 17721->17722 17723 40663c 17722->17723 17724 416a90 27 API calls 17723->17724 17728 406655 17724->17728 17725 4067bf 17727 416f50 27 API calls 17725->17727 17726 416a90 27 API calls 17726->17728 17730 406836 17727->17730 17728->17725 17728->17726 17729 402c70 70 API calls 17728->17729 17732 4068e1 17728->17732 17736 4068e6 17728->17736 17737 416f50 27 API calls 17728->17737 17729->17728 17730->17732 17735 4068b3 17730->17735 17731 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 17733 4068da 17731->17733 17734 41cc3c 25 API calls 17732->17734 17733->17668 17734->17736 17735->17731 17892 417090 17736->17892 17737->17728 17741 416ab6 17740->17741 17742 416abd 17741->17742 17743 416b11 17741->17743 17744 416af2 17741->17744 17742->17674 17748 41835e 27 API calls 17743->17748 17752 416b06 __wsopen_s 17743->17752 17745 416b49 17744->17745 17746 416af9 17744->17746 17749 402180 Concurrency::cancel_current_task 27 API calls 17745->17749 17747 41835e 27 API calls 17746->17747 17750 416aff 17747->17750 17748->17752 17749->17750 17751 41cc3c 25 API calls 17750->17751 17750->17752 17753 416b53 17751->17753 17752->17674 17906 402a40 17754->17906 17760 402d65 17763 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 17760->17763 17761 402d8b 17764 41cc3c 25 API calls 17761->17764 17762 402cdb 17762->17760 17762->17761 17765 402d87 17763->17765 17766 402d90 ___scrt_fastfail 17764->17766 17765->17677 17767 402df7 RegOpenKeyExA 17766->17767 17768 402e50 RegCloseKey 17767->17768 17769 402e26 RegQueryValueExA 17767->17769 17770 402e76 17768->17770 17769->17768 17770->17770 17771 416f50 27 API calls 17770->17771 17775 402e8e 17771->17775 17772 402ef6 17773 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 17772->17773 17776 402f19 17773->17776 17774 402f1d 17777 41cc3c 25 API calls 17774->17777 17775->17772 17775->17774 17776->17677 17778 402f22 RegOpenKeyExA 17777->17778 17780 402f97 RegCloseKey 17778->17780 17781 402f6d RegSetValueExA 17778->17781 17782 402fa8 17780->17782 17781->17780 17783 40304e 17782->17783 17784 403066 17782->17784 17786 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 17783->17786 17785 41cc3c 25 API calls 17784->17785 17787 40306b GdiplusStartup 17785->17787 17788 403062 17786->17788 17925 416b60 17787->17925 17788->17677 17792 4030f0 GetDC 17793 416a90 27 API calls 17792->17793 17794 4031eb 17793->17794 17795 402c70 42 API calls 17794->17795 17796 4031f6 17795->17796 17797 416a90 27 API calls 17796->17797 17798 403218 17797->17798 17799 402c70 42 API calls 17798->17799 17800 40321f 17799->17800 17801 416a90 27 API calls 17800->17801 17802 403234 17801->17802 17803 402c70 42 API calls 17802->17803 17804 40323b 17803->17804 17805 416a90 27 API calls 17804->17805 17806 403269 17805->17806 17807 402c70 42 API calls 17806->17807 17808 403274 17807->17808 17809 4170a0 27 API calls 17808->17809 17810 403288 17809->17810 17811 4170a0 27 API calls 17810->17811 17813 403299 17811->17813 17812 4037ad 17815 41cc3c 25 API calls 17812->17815 17813->17812 17814 4033db 17813->17814 17817 416a90 27 API calls 17814->17817 17816 4037c6 17815->17816 17818 40341b 17817->17818 17819 402c70 42 API calls 17818->17819 17820 403426 RegGetValueA 17819->17820 17826 403461 17820->17826 17822 4034a2 GetSystemMetrics 17824 4034b0 17822->17824 17825 4034a9 17822->17825 17823 4034ab GetSystemMetrics 17823->17824 17827 416a90 27 API calls 17824->17827 17825->17823 17826->17822 17826->17823 17828 4034cb 17827->17828 17829 402c70 42 API calls 17828->17829 17830 4034d6 RegGetValueA 17829->17830 17832 40350b 17830->17832 17833 403546 GetSystemMetrics 17832->17833 17834 40354f GetSystemMetrics 17832->17834 17835 403554 6 API calls 17833->17835 17836 40354d 17833->17836 17834->17835 17837 403671 6 API calls 17835->17837 17838 4035e7 17835->17838 17836->17834 17840 4036c8 17837->17840 17839 41cc8d ___std_exception_copy 15 API calls 17838->17839 17842 4035ed 17839->17842 17841 403759 GdiplusShutdown 17840->17841 17844 40376a 17841->17844 17842->17837 17843 4035fc GdipGetImageEncoders 17842->17843 17849 403610 17843->17849 17845 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 17844->17845 17846 4037a9 17845->17846 17846->17677 17847 41ca42 ___std_exception_destroy 14 API calls 17848 403668 17847->17848 17848->17837 17849->17847 17851 4171b9 17850->17851 17852 4171cd __InternalCxxFrameHandler 17851->17852 18201 4178f0 17851->18201 17852->17692 17855 4170c8 17854->17855 17857 417112 17854->17857 17856 4170d1 17855->17856 17855->17857 18214 417d50 17856->18214 17859 417121 __InternalCxxFrameHandler 17857->17859 17860 4178f0 27 API calls 17857->17860 17859->17694 17860->17859 17861 4170da 17861->17694 17863 417396 17862->17863 17863->17863 17864 4173ab __InternalCxxFrameHandler 17863->17864 17865 4178f0 27 API calls 17863->17865 17864->17698 17865->17864 17867 416a90 27 API calls 17866->17867 17868 40490b 17867->17868 17869 402c70 70 API calls 17868->17869 17870 404913 17869->17870 17871 4171a0 27 API calls 17870->17871 17872 404923 17871->17872 17873 416a90 27 API calls 17872->17873 17874 40493e 17873->17874 17875 402c70 70 API calls 17874->17875 17876 404945 17875->17876 17877 416f50 27 API calls 17876->17877 17878 404968 17877->17878 18235 404350 17878->18235 17880 404971 17881 4049a4 Sleep 17880->17881 17882 40499a 17880->17882 17886 4049f9 17880->17886 17883 4049b7 17881->17883 17884 4049d5 17881->17884 17882->17881 17883->17884 17887 4049fe 17883->17887 17885 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 17884->17885 17888 4049f5 17885->17888 17889 41cc3c 25 API calls 17886->17889 17890 41cc3c 25 API calls 17887->17890 17888->17703 17889->17887 17891 404a03 17890->17891 17895 418132 17892->17895 17900 4180a6 17895->17900 17898 4193e4 Concurrency::cancel_current_task RaiseException 17899 418151 17898->17899 17903 417fc7 17900->17903 17904 4191a9 ___std_exception_copy 26 API calls 17903->17904 17905 417ff3 17904->17905 17905->17898 17939 416e10 17906->17939 17908 402a6a 17909 402ae0 17908->17909 17910 416e10 27 API calls 17909->17910 17913 402b14 17910->17913 17911 402c46 17914 402890 17911->17914 17913->17911 17952 41bf00 17913->17952 17915 41835e 27 API calls 17914->17915 17920 40291a 17915->17920 17916 4029e8 17917 402a0e 17916->17917 17919 402a36 17916->17919 17918 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 17917->17918 17921 402a32 17918->17921 17922 41cc3c 25 API calls 17919->17922 17920->17916 18188 4177b0 17920->18188 17921->17762 17923 402a3b 17922->17923 17926 416b78 17925->17926 17928 416bab 17925->17928 17926->17792 17927 416c11 17930 41cc3c 25 API calls 17927->17930 17938 416c88 17927->17938 17928->17927 17929 416ca4 17928->17929 17931 416c00 17928->17931 17932 416c27 17928->17932 17933 402180 Concurrency::cancel_current_task 27 API calls 17929->17933 17934 416cb3 17930->17934 17931->17929 17935 416c0b 17931->17935 17932->17927 17937 41835e 27 API calls 17932->17937 17933->17927 17936 41835e 27 API calls 17935->17936 17936->17927 17937->17927 17938->17792 17941 416e4f 17939->17941 17942 416e28 ___scrt_fastfail 17939->17942 17940 416f38 17945 402180 Concurrency::cancel_current_task 27 API calls 17940->17945 17941->17940 17943 416ea3 17941->17943 17944 416ec8 17941->17944 17942->17908 17943->17940 17947 41835e 27 API calls 17943->17947 17948 41835e 27 API calls 17944->17948 17949 416eb4 ___scrt_fastfail 17944->17949 17946 416f42 17945->17946 17947->17949 17948->17949 17950 41cc3c 25 API calls 17949->17950 17951 416f1a 17949->17951 17950->17940 17951->17908 17953 41bf1c __fassign 17952->17953 17954 41bf0e 17952->17954 17953->17913 17957 41be73 17954->17957 17962 41bcad 17957->17962 17961 41be97 17961->17913 17963 41bcc4 17962->17963 17964 41bccd 17962->17964 17970 41beac 17963->17970 17964->17963 17976 41ee92 GetLastError 17964->17976 17971 41bee9 17970->17971 17973 41beb9 17970->17973 18161 41f60d 17971->18161 17975 41bec8 __fassign 17973->17975 18154 41f631 17973->18154 17975->17961 17977 41eea9 17976->17977 17981 41eeaf 17976->17981 17978 41f3d0 _free 6 API calls 17977->17978 17978->17981 17979 41f40f _free 6 API calls 17980 41eecd 17979->17980 17982 420873 _free 14 API calls 17980->17982 18000 41eeb5 SetLastError 17980->18000 17981->17979 17981->18000 17984 41eedd 17982->17984 17987 41eee5 17984->17987 17988 41eefc 17984->17988 17985 41bced 18003 41f58b 17985->18003 17986 41ef49 18011 41dd06 17986->18011 17989 41f40f _free 6 API calls 17987->17989 17991 41f40f _free 6 API calls 17988->17991 17992 41eef3 17989->17992 17994 41ef08 17991->17994 17997 41e5a1 _free 14 API calls 17992->17997 17995 41ef1d 17994->17995 17996 41ef0c 17994->17996 17999 41ecc0 _free 14 API calls 17995->17999 17998 41f40f _free 6 API calls 17996->17998 17997->18000 17998->17992 18001 41ef28 17999->18001 18000->17985 18000->17986 18002 41e5a1 _free 14 API calls 18001->18002 18002->18000 18004 41bd03 18003->18004 18005 41f59e 18003->18005 18007 41f5b8 18004->18007 18005->18004 18111 42285b 18005->18111 18008 41f5e0 18007->18008 18009 41f5cb 18007->18009 18008->17963 18009->18008 18133 42164a 18009->18133 18022 421f7e 18011->18022 18014 41dd16 18016 41dd20 IsProcessorFeaturePresent 18014->18016 18017 41dd3f 18014->18017 18018 41dd2c 18016->18018 18052 41b9c3 18017->18052 18020 41ca80 IsInExceptionSpec 8 API calls 18018->18020 18020->18017 18055 421eb0 18022->18055 18025 421fcc 18026 421fd8 CallCatchBlock 18025->18026 18027 41efe9 _free 14 API calls 18026->18027 18031 422005 IsInExceptionSpec 18026->18031 18033 421fff IsInExceptionSpec 18026->18033 18027->18033 18028 42204a 18029 41c750 _free 14 API calls 18028->18029 18030 42204f 18029->18030 18032 41cc2c __wsopen_s 25 API calls 18030->18032 18035 422076 18031->18035 18065 41dea3 EnterCriticalSection 18031->18065 18051 422034 18032->18051 18033->18028 18033->18031 18033->18051 18037 4221b3 18035->18037 18038 4220be 18035->18038 18048 4220e9 18035->18048 18039 4221be 18037->18039 18073 41deeb LeaveCriticalSection 18037->18073 18038->18048 18066 421fc3 18038->18066 18042 41b9c3 IsInExceptionSpec 23 API calls 18039->18042 18044 4221c6 18042->18044 18045 41ee92 _unexpected 37 API calls 18049 42213d 18045->18049 18047 421fc3 IsInExceptionSpec 37 API calls 18047->18048 18069 42215f 18048->18069 18050 41ee92 _unexpected 37 API calls 18049->18050 18049->18051 18050->18051 18051->18014 18075 41b89d 18052->18075 18056 421ebc CallCatchBlock 18055->18056 18061 41dea3 EnterCriticalSection 18056->18061 18058 421eca 18062 421f08 18058->18062 18061->18058 18063 41deeb IsInExceptionSpec LeaveCriticalSection 18062->18063 18064 41dd0b 18063->18064 18064->18014 18064->18025 18065->18035 18067 41ee92 _unexpected 37 API calls 18066->18067 18068 421fc8 18067->18068 18068->18047 18070 42212e 18069->18070 18071 422165 18069->18071 18070->18045 18070->18049 18070->18051 18074 41deeb LeaveCriticalSection 18071->18074 18073->18039 18074->18070 18076 41b8ab 18075->18076 18077 41b8bd 18075->18077 18087 418b89 GetModuleHandleW 18076->18087 18095 41b744 18077->18095 18082 41b8f6 18088 418b95 18087->18088 18088->18077 18089 41b943 GetModuleHandleExW 18088->18089 18090 41b962 GetProcAddress 18089->18090 18091 41b985 18089->18091 18092 41b977 18090->18092 18093 41b8bc 18091->18093 18094 41b98b FreeLibrary 18091->18094 18092->18091 18093->18077 18094->18093 18096 41b750 CallCatchBlock 18095->18096 18097 41dea3 IsInExceptionSpec EnterCriticalSection 18096->18097 18098 41b75a 18097->18098 18099 41b7b0 IsInExceptionSpec 14 API calls 18098->18099 18100 41b767 18099->18100 18101 41b785 IsInExceptionSpec LeaveCriticalSection 18100->18101 18102 41b773 18101->18102 18102->18082 18103 41b901 18102->18103 18104 41df02 IsInExceptionSpec 6 API calls 18103->18104 18105 41b90b 18104->18105 18106 41b930 18105->18106 18107 41b910 GetPEB 18105->18107 18109 41b943 IsInExceptionSpec GetModuleHandleExW GetProcAddress FreeLibrary 18106->18109 18107->18106 18108 41b920 GetCurrentProcess TerminateProcess 18107->18108 18108->18106 18110 41b938 ExitProcess 18109->18110 18112 422867 CallCatchBlock 18111->18112 18113 41ee92 _unexpected 37 API calls 18112->18113 18114 422870 18113->18114 18115 4228b6 18114->18115 18124 41dea3 EnterCriticalSection 18114->18124 18115->18004 18117 42288e 18125 4228dc 18117->18125 18122 41dd06 IsInExceptionSpec 37 API calls 18123 4228db 18122->18123 18124->18117 18126 4228ea __fassign 18125->18126 18128 42289f 18125->18128 18127 42260f __fassign 14 API calls 18126->18127 18126->18128 18127->18128 18129 4228bb 18128->18129 18132 41deeb LeaveCriticalSection 18129->18132 18131 4228b2 18131->18115 18131->18122 18132->18131 18134 41ee92 _unexpected 37 API calls 18133->18134 18135 421654 18134->18135 18138 421562 18135->18138 18139 42156e CallCatchBlock 18138->18139 18141 421588 18139->18141 18149 41dea3 EnterCriticalSection 18139->18149 18143 42158f 18141->18143 18145 41dd06 IsInExceptionSpec 37 API calls 18141->18145 18142 4215c4 18150 4215e1 18142->18150 18143->18008 18147 421601 18145->18147 18146 421598 18146->18142 18148 41e5a1 _free 14 API calls 18146->18148 18148->18142 18149->18146 18153 41deeb LeaveCriticalSection 18150->18153 18152 4215e8 18152->18141 18153->18152 18155 41bcad __fassign 37 API calls 18154->18155 18156 41f64e 18155->18156 18159 41f65e 18156->18159 18166 42246f 18156->18166 18158 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 18160 41f6fa 18158->18160 18159->18158 18160->17975 18162 41ee92 _unexpected 37 API calls 18161->18162 18163 41f618 18162->18163 18164 41f58b __fassign 37 API calls 18163->18164 18165 41f628 18164->18165 18165->17975 18167 41bcad __fassign 37 API calls 18166->18167 18168 42248f 18167->18168 18181 41ead8 18168->18181 18170 42254d 18172 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 18170->18172 18171 4224bc 18171->18170 18173 41ea8a __wsopen_s 15 API calls 18171->18173 18177 4224e2 __alloca_probe_16 ___scrt_fastfail 18171->18177 18174 422570 18172->18174 18173->18177 18174->18159 18175 422547 18184 422572 18175->18184 18177->18175 18178 41ead8 __fassign MultiByteToWideChar 18177->18178 18179 422530 18178->18179 18179->18175 18180 422537 GetStringTypeW 18179->18180 18180->18175 18183 41eae9 MultiByteToWideChar 18181->18183 18183->18171 18185 42258f 18184->18185 18186 42257e 18184->18186 18185->18170 18186->18185 18187 41e5a1 _free 14 API calls 18186->18187 18187->18185 18189 4177d3 18188->18189 18190 4178d9 18188->18190 18192 417815 18189->18192 18193 41783f 18189->18193 18191 402180 Concurrency::cancel_current_task 27 API calls 18190->18191 18199 417826 __wsopen_s 18191->18199 18192->18190 18194 417820 18192->18194 18196 41835e 27 API calls 18193->18196 18193->18199 18195 41835e 27 API calls 18194->18195 18195->18199 18196->18199 18197 41cc3c 25 API calls 18198 4178e8 18197->18198 18199->18197 18200 41789b __wsopen_s 18199->18200 18200->17920 18202 41791b 18201->18202 18203 417a3e 18201->18203 18204 417962 18202->18204 18205 41798c 18202->18205 18206 402180 Concurrency::cancel_current_task 27 API calls 18203->18206 18204->18203 18207 41796d 18204->18207 18209 41835e 27 API calls 18205->18209 18212 417973 __wsopen_s 18205->18212 18206->18212 18208 41835e 27 API calls 18207->18208 18208->18212 18209->18212 18210 41cc3c 25 API calls 18211 417a4d 18210->18211 18212->18210 18213 4179fc __wsopen_s 18212->18213 18213->17852 18215 417d64 18214->18215 18218 417d75 __InternalCxxFrameHandler __wsopen_s 18215->18218 18219 417e10 18215->18219 18217 417dfb 18217->17861 18218->17861 18220 417f49 18219->18220 18221 417e3b 18219->18221 18222 402180 Concurrency::cancel_current_task 27 API calls 18220->18222 18223 417e82 18221->18223 18225 417ea9 18221->18225 18232 417e93 __wsopen_s 18222->18232 18223->18220 18224 417e8d 18223->18224 18227 41835e 27 API calls 18224->18227 18228 41835e 27 API calls 18225->18228 18225->18232 18226 41cc3c 25 API calls 18229 417f58 18226->18229 18227->18232 18228->18232 18230 417f8a 18229->18230 18231 41cc3c 25 API calls 18229->18231 18230->18217 18234 417fae 18231->18234 18232->18226 18233 417f11 __wsopen_s 18232->18233 18233->18217 18236 4043a3 18235->18236 18237 416f50 27 API calls 18236->18237 18238 4043c8 ShellExecuteA 18237->18238 18239 404431 18238->18239 18240 4044ab 18239->18240 18241 41cc3c 25 API calls 18239->18241 18240->17880 18242 4044cc 18241->18242 18243 416a90 27 API calls 18242->18243 18244 404507 18243->18244 18245 416a90 27 API calls 18244->18245 18246 404520 18245->18246 18247 416a90 27 API calls 18246->18247 18248 404533 18247->18248 18249 404350 27 API calls 18248->18249 18250 4186de 18251 4186ea CallCatchBlock 18250->18251 18276 418404 18251->18276 18253 4186f1 18254 41884a 18253->18254 18263 41871b ___scrt_is_nonwritable_in_current_image IsInExceptionSpec ___scrt_release_startup_lock 18253->18263 18322 418a67 IsProcessorFeaturePresent 18254->18322 18256 418851 18299 41b9ff 18256->18299 18259 41b9c3 IsInExceptionSpec 23 API calls 18260 41885f 18259->18260 18261 41873a 18262 4187bb 18284 41d42b 18262->18284 18263->18261 18263->18262 18302 41b9d9 18263->18302 18266 4187c1 18288 416830 18266->18288 18277 41840d 18276->18277 18326 418887 IsProcessorFeaturePresent 18277->18326 18281 41841e 18282 418422 18281->18282 18336 41946f 18281->18336 18282->18253 18285 41d434 18284->18285 18286 41d439 18284->18286 18397 41d18f 18285->18397 18286->18266 18289 41683e 18288->18289 18290 416843 18289->18290 18614 406510 GetModuleFileNameA 18290->18614 18292 416861 18620 4138b0 18292->18620 18300 41b89d IsInExceptionSpec 23 API calls 18299->18300 18301 418857 18300->18301 18301->18259 18303 41dc6b CallCatchBlock 18302->18303 18304 41b9ef _free 18302->18304 18305 41ee92 _unexpected 37 API calls 18303->18305 18304->18262 18308 41dc7c 18305->18308 18306 41dd06 IsInExceptionSpec 37 API calls 18307 41dca6 18306->18307 18309 41c750 _free 14 API calls 18307->18309 18312 41dce5 18307->18312 18308->18306 18310 41dcdb 18309->18310 18311 41cc2c __wsopen_s 25 API calls 18310->18311 18311->18312 18312->18262 18323 418a7c ___scrt_fastfail 18322->18323 18324 418b27 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18323->18324 18325 418b72 ___scrt_fastfail 18324->18325 18325->18256 18327 418419 18326->18327 18328 419450 18327->18328 18342 41a6b9 18328->18342 18330 419459 18330->18281 18333 419461 18334 41946c 18333->18334 18356 41a6f5 18333->18356 18334->18281 18337 419482 18336->18337 18338 419478 18336->18338 18337->18282 18339 4198b5 ___vcrt_uninitialize_ptd 6 API calls 18338->18339 18340 41947d 18339->18340 18341 41a6f5 ___vcrt_uninitialize_locks DeleteCriticalSection 18340->18341 18341->18337 18343 41a6c2 18342->18343 18345 41a6eb 18343->18345 18347 419455 18343->18347 18360 41aa7b 18343->18360 18346 41a6f5 ___vcrt_uninitialize_locks DeleteCriticalSection 18345->18346 18346->18347 18347->18330 18348 419882 18347->18348 18378 41a98c 18348->18378 18353 4198b2 18353->18333 18355 419897 18355->18333 18357 41a71f 18356->18357 18358 41a700 18356->18358 18357->18330 18359 41a70a DeleteCriticalSection 18358->18359 18359->18357 18359->18359 18365 41a943 18360->18365 18363 41aab3 InitializeCriticalSectionAndSpinCount 18364 41aa9e 18363->18364 18364->18343 18366 41a95b 18365->18366 18370 41a97e 18365->18370 18366->18370 18371 41a897 18366->18371 18369 41a970 GetProcAddress 18369->18370 18370->18363 18370->18364 18372 41a8a6 ___vcrt_FlsFree 18371->18372 18373 41a938 18372->18373 18374 41a8bf LoadLibraryExW 18372->18374 18376 41a921 FreeLibrary 18372->18376 18377 41a8f9 LoadLibraryExW 18372->18377 18373->18369 18373->18370 18374->18372 18375 41a8da GetLastError 18374->18375 18375->18372 18376->18372 18377->18372 18379 41a943 ___vcrt_FlsFree 5 API calls 18378->18379 18380 41a9a6 18379->18380 18381 41a9bf TlsAlloc 18380->18381 18382 41988c 18380->18382 18382->18355 18383 41aa3d 18382->18383 18384 41a943 ___vcrt_FlsFree 5 API calls 18383->18384 18385 41aa57 18384->18385 18386 41aa72 TlsSetValue 18385->18386 18387 4198a5 18385->18387 18386->18387 18387->18353 18388 4198b5 18387->18388 18389 4198bf 18388->18389 18391 4198c5 18388->18391 18392 41a9c7 18389->18392 18391->18355 18393 41a943 ___vcrt_FlsFree 5 API calls 18392->18393 18394 41a9e1 18393->18394 18395 41a9f9 TlsFree 18394->18395 18396 41a9ed 18394->18396 18395->18396 18396->18391 18398 41d198 18397->18398 18401 41d1ae 18397->18401 18398->18401 18403 41d1bb 18398->18403 18400 41d1a5 18400->18401 18416 41d30d 18400->18416 18401->18286 18404 41d1c4 18403->18404 18405 41d1c7 18403->18405 18404->18400 18424 421602 18405->18424 18410 41d1d9 18412 41e5a1 _free 14 API calls 18410->18412 18414 41d208 18412->18414 18414->18400 18415 41e5a1 _free 14 API calls 18415->18410 18417 41d31c 18416->18417 18418 41d37e 18416->18418 18417->18418 18419 420873 _free 14 API calls 18417->18419 18420 41d382 18417->18420 18421 4218bf WideCharToMultiByte __wsopen_s 18417->18421 18423 41e5a1 _free 14 API calls 18417->18423 18418->18401 18419->18417 18422 41e5a1 _free 14 API calls 18420->18422 18421->18417 18422->18418 18423->18417 18425 41d1ce 18424->18425 18426 42160b 18424->18426 18430 4219a3 GetEnvironmentStringsW 18425->18430 18459 41ef4f 18426->18459 18431 4219ba 18430->18431 18441 421a10 18430->18441 18434 4218bf __wsopen_s WideCharToMultiByte 18431->18434 18432 41d1d3 18432->18410 18442 41d20e 18432->18442 18433 421a19 FreeEnvironmentStringsW 18433->18432 18435 4219d3 18434->18435 18436 41ea8a __wsopen_s 15 API calls 18435->18436 18435->18441 18437 4219e3 18436->18437 18438 4218bf __wsopen_s WideCharToMultiByte 18437->18438 18439 4219fb 18437->18439 18438->18439 18440 41e5a1 _free 14 API calls 18439->18440 18440->18441 18441->18432 18441->18433 18443 41d223 18442->18443 18444 420873 _free 14 API calls 18443->18444 18454 41d24a 18444->18454 18445 41d2af 18446 41e5a1 _free 14 API calls 18445->18446 18447 41d1e4 18446->18447 18447->18415 18448 420873 _free 14 API calls 18448->18454 18449 41d2b1 18608 41d2de 18449->18608 18450 41dd4a ___std_exception_copy 25 API calls 18450->18454 18453 41d2d1 18456 41cc59 __wsopen_s 11 API calls 18453->18456 18454->18445 18454->18448 18454->18449 18454->18450 18454->18453 18457 41e5a1 _free 14 API calls 18454->18457 18455 41e5a1 _free 14 API calls 18455->18445 18458 41d2dd 18456->18458 18457->18454 18460 41ef60 18459->18460 18461 41ef5a 18459->18461 18462 41f40f _free 6 API calls 18460->18462 18483 41ef66 18460->18483 18463 41f3d0 _free 6 API calls 18461->18463 18464 41ef7a 18462->18464 18463->18460 18465 420873 _free 14 API calls 18464->18465 18464->18483 18467 41ef8a 18465->18467 18466 41dd06 IsInExceptionSpec 37 API calls 18468 41efe8 18466->18468 18469 41ef92 18467->18469 18470 41efa7 18467->18470 18472 41f40f _free 6 API calls 18469->18472 18473 41f40f _free 6 API calls 18470->18473 18471 41efdf 18484 421449 18471->18484 18474 41ef9e 18472->18474 18475 41efb3 18473->18475 18479 41e5a1 _free 14 API calls 18474->18479 18476 41efb7 18475->18476 18477 41efc6 18475->18477 18480 41f40f _free 6 API calls 18476->18480 18478 41ecc0 _free 14 API calls 18477->18478 18481 41efd1 18478->18481 18479->18483 18480->18474 18482 41e5a1 _free 14 API calls 18481->18482 18482->18483 18483->18466 18483->18471 18485 421562 __fassign 37 API calls 18484->18485 18486 42145c 18485->18486 18503 4211f2 18486->18503 18489 421475 18489->18425 18490 41ea8a __wsopen_s 15 API calls 18491 421486 18490->18491 18498 4214b8 18491->18498 18510 42165d 18491->18510 18494 41e5a1 _free 14 API calls 18496 4214c6 18494->18496 18495 4214b3 18497 41c750 _free 14 API calls 18495->18497 18496->18425 18497->18498 18498->18494 18499 4214ce 18500 41e5a1 _free 14 API calls 18499->18500 18501 4214fa 18499->18501 18500->18501 18501->18498 18521 4210e4 18501->18521 18504 41bcad __fassign 37 API calls 18503->18504 18505 421204 18504->18505 18506 421213 GetOEMCP 18505->18506 18507 421225 18505->18507 18508 42123c 18506->18508 18507->18508 18509 42122a GetACP 18507->18509 18508->18489 18508->18490 18509->18508 18511 4211f2 39 API calls 18510->18511 18512 42167d 18511->18512 18514 4216b7 IsValidCodePage 18512->18514 18519 4216f3 ___scrt_fastfail 18512->18519 18513 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 18515 4214ab 18513->18515 18516 4216c9 18514->18516 18514->18519 18515->18495 18515->18499 18517 4216f8 GetCPInfo 18516->18517 18520 4216d2 ___scrt_fastfail 18516->18520 18517->18519 18517->18520 18519->18513 18529 4212c8 18520->18529 18522 4210f0 CallCatchBlock 18521->18522 18582 41dea3 EnterCriticalSection 18522->18582 18524 4210fa 18583 421131 18524->18583 18530 4212f0 GetCPInfo 18529->18530 18531 4213b9 18529->18531 18530->18531 18536 421308 18530->18536 18532 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 18531->18532 18533 421447 18532->18533 18533->18519 18534 42246f 40 API calls 18535 421370 18534->18535 18540 425abe 18535->18540 18536->18534 18539 425abe 41 API calls 18539->18531 18541 41bcad __fassign 37 API calls 18540->18541 18542 425ad1 18541->18542 18545 4258d4 18542->18545 18546 4258ef 18545->18546 18547 41ead8 __fassign MultiByteToWideChar 18546->18547 18551 425933 18547->18551 18548 425a98 18549 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 18548->18549 18550 421391 18549->18550 18550->18539 18551->18548 18552 41ea8a __wsopen_s 15 API calls 18551->18552 18555 425958 __alloca_probe_16 18551->18555 18552->18555 18553 4259fd 18557 422572 __freea 14 API calls 18553->18557 18554 41ead8 __fassign MultiByteToWideChar 18556 42599e 18554->18556 18555->18553 18555->18554 18556->18553 18573 41f49c 18556->18573 18557->18548 18560 4259d4 18560->18553 18563 41f49c 6 API calls 18560->18563 18561 425a0c 18564 41ea8a __wsopen_s 15 API calls 18561->18564 18567 425a1e __alloca_probe_16 18561->18567 18562 425a89 18566 422572 __freea 14 API calls 18562->18566 18563->18553 18564->18567 18565 41f49c 6 API calls 18568 425a66 18565->18568 18566->18553 18567->18562 18567->18565 18568->18562 18579 4218bf 18568->18579 18570 425a80 18570->18562 18571 425ab5 18570->18571 18572 422572 __freea 14 API calls 18571->18572 18572->18553 18574 41f118 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 18573->18574 18575 41f4a7 18574->18575 18576 41f4f9 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 18575->18576 18578 41f4ad 18575->18578 18577 41f4ed LCMapStringW 18576->18577 18577->18578 18578->18553 18578->18560 18578->18561 18581 4218d8 WideCharToMultiByte 18579->18581 18581->18570 18582->18524 18593 41fa58 18583->18593 18585 421153 18586 41fa58 25 API calls 18585->18586 18587 421172 18586->18587 18588 421107 18587->18588 18589 41e5a1 _free 14 API calls 18587->18589 18590 421125 18588->18590 18589->18588 18607 41deeb LeaveCriticalSection 18590->18607 18592 421113 18592->18498 18594 41fa69 18593->18594 18602 41fa65 __wsopen_s 18593->18602 18595 41fa70 18594->18595 18598 41fa83 ___scrt_fastfail 18594->18598 18596 41c750 _free 14 API calls 18595->18596 18597 41fa75 18596->18597 18599 41cc2c __wsopen_s 25 API calls 18597->18599 18600 41fab1 18598->18600 18601 41faba 18598->18601 18598->18602 18599->18602 18603 41c750 _free 14 API calls 18600->18603 18601->18602 18605 41c750 _free 14 API calls 18601->18605 18602->18585 18604 41fab6 18603->18604 18606 41cc2c __wsopen_s 25 API calls 18604->18606 18605->18604 18606->18602 18607->18592 18609 41d2eb 18608->18609 18610 41d2b7 18608->18610 18611 41d302 18609->18611 18612 41e5a1 _free 14 API calls 18609->18612 18610->18455 18613 41e5a1 _free 14 API calls 18611->18613 18612->18609 18613->18610 18615 406560 18614->18615 18615->18615 18616 416f50 27 API calls 18615->18616 18617 406578 18616->18617 18618 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 18617->18618 18619 406585 18618->18619 18619->18292 18771 404c60 18620->18771 18627 402220 27 API calls 18628 413909 IsUserAnAdmin 18627->18628 18629 402220 27 API calls 18628->18629 18630 413926 18629->18630 18631 416a90 27 API calls 18630->18631 18632 41394f 18631->18632 18633 402c70 70 API calls 18632->18633 18634 413956 18633->18634 18635 416a90 27 API calls 18634->18635 18636 41396b 18635->18636 18637 402c70 70 API calls 18636->18637 18638 413972 18637->18638 18639 413993 GetUserNameA 18638->18639 18640 4139d7 18639->18640 18640->18640 18641 416f50 27 API calls 18640->18641 18642 4139ef 18641->18642 18643 4139fa GetComputerNameExW 18642->18643 18644 413a50 18643->18644 18644->18644 18868 416cc0 18644->18868 18646 413a72 18882 417bb0 18646->18882 18648 413abf 18649 413b84 GetModuleFileNameA 18648->18649 18650 413bc0 18649->18650 18650->18650 18651 416f50 27 API calls 18650->18651 18652 413bdc 18651->18652 18653 402220 27 API calls 18652->18653 18654 413c7c 18653->18654 18894 4037d0 GetUserNameW GetProcessHeap HeapAlloc GetUserNameW 18654->18894 18660 413ca8 18661 416a90 27 API calls 18660->18661 18662 413cf8 18661->18662 18663 402c70 70 API calls 18662->18663 18664 413d03 18663->18664 18665 402220 27 API calls 18664->18665 18666 413d18 18665->18666 18667 416a90 27 API calls 18666->18667 18668 413d2c 18667->18668 18669 402c70 70 API calls 18668->18669 18670 413d37 18669->18670 18671 416a90 27 API calls 18670->18671 18672 413d55 18671->18672 18673 402c70 70 API calls 18672->18673 18674 413d60 18673->18674 18675 416a90 27 API calls 18674->18675 18676 413d7e 18675->18676 18677 402c70 70 API calls 18676->18677 18678 413d89 18677->18678 18679 416a90 27 API calls 18678->18679 18680 413da7 18679->18680 18681 402c70 70 API calls 18680->18681 18682 413db2 18681->18682 18683 416a90 27 API calls 18682->18683 18684 413dd0 18683->18684 18685 402c70 70 API calls 18684->18685 18686 413ddb 18685->18686 18687 416a90 27 API calls 18686->18687 18688 413df9 18687->18688 18689 402c70 70 API calls 18688->18689 18690 413e04 18689->18690 18691 416a90 27 API calls 18690->18691 18692 413e22 18691->18692 18693 402c70 70 API calls 18692->18693 18694 413e2d 18693->18694 18695 416a90 27 API calls 18694->18695 18696 413e4b 18695->18696 18697 402c70 70 API calls 18696->18697 18698 413e56 18697->18698 18699 416a90 27 API calls 18698->18699 18700 413e72 18699->18700 18701 402c70 70 API calls 18700->18701 18702 413e7d 18701->18702 18703 416a90 27 API calls 18702->18703 18704 413e94 18703->18704 18705 402c70 70 API calls 18704->18705 18706 413e9f 18705->18706 18707 416a90 27 API calls 18706->18707 18708 413eb6 18707->18708 18709 402c70 70 API calls 18708->18709 18710 413ec1 18709->18710 18711 416a90 27 API calls 18710->18711 18712 413edd 18711->18712 18713 402c70 70 API calls 18712->18713 18714 413ee8 18713->18714 18715 4171a0 27 API calls 18714->18715 18716 413efc 18715->18716 18717 4170a0 27 API calls 18716->18717 18718 413f10 18717->18718 18719 4170a0 27 API calls 18718->18719 18720 413f24 18719->18720 18721 4170a0 27 API calls 18720->18721 18722 413f38 18721->18722 18723 4171a0 27 API calls 18722->18723 18724 413f4c 18723->18724 18725 4170a0 27 API calls 18724->18725 18726 413f60 18725->18726 18727 4171a0 27 API calls 18726->18727 18728 413f74 18727->18728 18729 4170a0 27 API calls 18728->18729 18730 413f88 18729->18730 18731 4171a0 27 API calls 18730->18731 18732 413f9c 18731->18732 18733 4170a0 27 API calls 18732->18733 18734 413fb0 18733->18734 18735 4171a0 27 API calls 18734->18735 18736 413fc4 18735->18736 18737 4170a0 27 API calls 18736->18737 18738 413fd8 18737->18738 18739 4171a0 27 API calls 18738->18739 18740 413fec 18739->18740 18741 4170a0 27 API calls 18740->18741 18742 414000 18741->18742 18743 4171a0 27 API calls 18742->18743 18744 414014 18743->18744 18745 4170a0 27 API calls 18744->18745 18746 414028 18745->18746 18747 4171a0 27 API calls 18746->18747 18748 41403c 18747->18748 18749 4170a0 27 API calls 18748->18749 18750 414050 18749->18750 18751 4171a0 27 API calls 18750->18751 18752 414064 18751->18752 18753 4170a0 27 API calls 18752->18753 18754 414078 18753->18754 18755 4170a0 27 API calls 18754->18755 18756 41408c 18755->18756 18757 4170a0 27 API calls 18756->18757 18758 4140a0 18757->18758 18759 4171a0 27 API calls 18758->18759 18760 4140b4 18759->18760 18761 4169d0 25 API calls 18760->18761 18762 4140c2 18761->18762 18764 414eff 18762->18764 18766 414f39 18762->18766 18763 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 18765 414f21 18763->18765 18764->18763 18769 4167e0 CreateThread CreateThread CreateThread 18765->18769 18767 41cc3c 25 API calls 18766->18767 18768 414f3e 18767->18768 18770 416820 Sleep 18769->18770 18770->18770 18932 419630 18771->18932 18774 404ce8 18775 416a90 27 API calls 18774->18775 18778 404cf7 18775->18778 18776 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 18777 4053d7 18776->18777 18840 402220 18777->18840 18779 402c70 70 API calls 18778->18779 18780 404d02 18779->18780 18781 416a90 27 API calls 18780->18781 18782 404d24 18781->18782 18783 402c70 70 API calls 18782->18783 18784 404d2f GetModuleHandleA GetProcAddress 18783->18784 18786 404d55 18784->18786 18787 4053de 18786->18787 18790 404dd6 18786->18790 18789 41cc3c 25 API calls 18787->18789 18788 404e07 GetSystemInfo 18792 404e03 18788->18792 18791 4053f7 18789->18791 18790->18788 18790->18792 18793 404f49 18792->18793 18794 404e6f 18792->18794 18839 404e18 18792->18839 18796 416a90 27 API calls 18793->18796 18795 416a90 27 API calls 18794->18795 18797 404e90 18795->18797 18798 404f5f 18796->18798 18799 402c70 70 API calls 18797->18799 18800 402c70 70 API calls 18798->18800 18802 404e97 18799->18802 18801 404f6a 18800->18801 18803 416a90 27 API calls 18801->18803 18804 416a90 27 API calls 18802->18804 18805 404f8a 18803->18805 18806 404eaf 18804->18806 18807 402c70 70 API calls 18805->18807 18808 402c70 70 API calls 18806->18808 18809 404f91 18807->18809 18812 404eb6 18808->18812 18810 416a90 27 API calls 18809->18810 18811 404fa6 18810->18811 18813 402c70 70 API calls 18811->18813 18934 41ca5d 18812->18934 18816 404fad 18813->18816 18815 416a90 27 API calls 18817 4050ab 18815->18817 18816->18815 18818 402c70 70 API calls 18817->18818 18819 4050b6 18818->18819 18820 416a90 27 API calls 18819->18820 18821 4050d6 18820->18821 18822 402c70 70 API calls 18821->18822 18823 4050dd 18822->18823 18824 416a90 27 API calls 18823->18824 18825 4050f2 18824->18825 18826 402c70 70 API calls 18825->18826 18827 4050f9 18826->18827 18828 416a90 27 API calls 18827->18828 18829 4051f7 18828->18829 18830 402c70 70 API calls 18829->18830 18831 405202 18830->18831 18832 416a90 27 API calls 18831->18832 18833 405222 18832->18833 18834 402c70 70 API calls 18833->18834 18835 405229 18834->18835 18836 416a90 27 API calls 18835->18836 18837 40523e 18836->18837 18838 402c70 70 API calls 18837->18838 18838->18839 18839->18776 18841 402244 18840->18841 18842 4022b7 18841->18842 18844 416f50 27 API calls 18841->18844 18843 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 18842->18843 18845 4022c6 18843->18845 18844->18842 18846 405400 18845->18846 18847 419630 ___scrt_fastfail 18846->18847 18848 405465 GetVersionExW 18847->18848 18849 40548d 18848->18849 18866 405483 18848->18866 18850 416a90 27 API calls 18849->18850 18851 40549c 18850->18851 18853 402c70 70 API calls 18851->18853 18852 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 18854 4055e5 18852->18854 18855 4054a7 18853->18855 18854->18627 18856 416a90 27 API calls 18855->18856 18857 4054c9 18856->18857 18858 402c70 70 API calls 18857->18858 18859 4054d4 GetModuleHandleA GetProcAddress 18858->18859 18861 4054fa 18859->18861 18862 405577 18861->18862 18864 4055ec 18861->18864 18863 4055a8 GetSystemInfo 18862->18863 18862->18866 18863->18866 18865 41cc3c 25 API calls 18864->18865 18867 4055f1 18865->18867 18866->18852 18869 416d0c 18868->18869 18870 416ce1 __InternalCxxFrameHandler 18868->18870 18872 416dfb 18869->18872 18874 416d60 18869->18874 18875 416d87 18869->18875 18880 416d71 __wsopen_s 18869->18880 18870->18646 18871 41cc3c 25 API calls 18873 416e0a 18871->18873 18876 402180 Concurrency::cancel_current_task 27 API calls 18872->18876 18874->18872 18877 416d6b 18874->18877 18879 41835e 27 API calls 18875->18879 18875->18880 18876->18880 18878 41835e 27 API calls 18877->18878 18878->18880 18879->18880 18880->18871 18881 416de2 18880->18881 18881->18646 18884 417bcb 18882->18884 18893 417cb4 __wsopen_s 18882->18893 18883 417d41 18886 402180 Concurrency::cancel_current_task 27 API calls 18883->18886 18884->18883 18885 417c4b __wsopen_s 18884->18885 18887 417c61 18884->18887 18888 417c3a 18884->18888 18884->18893 18892 41cc3c 25 API calls 18885->18892 18885->18893 18889 417d4b 18886->18889 18887->18885 18891 41835e 27 API calls 18887->18891 18888->18883 18890 41835e 27 API calls 18888->18890 18890->18885 18891->18885 18892->18883 18893->18648 18895 4039c2 7 API calls 18894->18895 18896 403855 LookupAccountNameW GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 18894->18896 18907 4039b4 18895->18907 18896->18895 18897 40389d 18896->18897 18897->18895 18898 4038a5 LookupAccountNameW 18897->18898 18898->18895 18900 4038c4 ConvertSidToStringSidW 18898->18900 18899 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 18901 403a03 18899->18901 18900->18895 18902 4038d7 18900->18902 18911 403a10 18901->18911 18903 416f50 27 API calls 18902->18903 18904 403953 18903->18904 18905 416f50 27 API calls 18904->18905 18906 40398e 18905->18906 18906->18907 18908 403a07 18906->18908 18907->18899 18909 41cc3c 25 API calls 18908->18909 18910 403a0c 18909->18910 18912 403ce4 18911->18912 18926 403a88 18911->18926 18913 403da6 18912->18913 18914 403d07 18912->18914 18916 417090 27 API calls 18913->18916 18915 416f50 27 API calls 18914->18915 18921 403d26 18915->18921 18917 403dab 18916->18917 18918 41cc3c 25 API calls 18917->18918 18919 403db0 18918->18919 18920 403d7c 18922 418152 __ehhandler$?_Init@?$_Mpunct@_W@std@@IAEXABV_Locinfo@2@@Z 5 API calls 18920->18922 18921->18917 18921->18920 18923 403d9f 18922->18923 18927 4169d0 18923->18927 18924 416f50 27 API calls 18924->18926 18925 417d50 27 API calls 18925->18926 18926->18912 18926->18913 18926->18917 18926->18924 18926->18925 18928 416a01 18927->18928 18929 4169de 18927->18929 18928->18660 18929->18928 18930 41cc3c 25 API calls 18929->18930 18931 416a4c 18930->18931 18933 404cc6 GetVersionExW 18932->18933 18933->18774 18933->18839 18937 41c7af 18934->18937 18955 41c9fd 18937->18955 18939 41c7fa 18940 41bcad __fassign 37 API calls 18939->18940 18943 41c806 18940->18943 18941 41c7c1 18941->18939 18942 41c7d6 18941->18942 18954 41c7e6 18941->18954 18944 41c750 _free 14 API calls 18942->18944 18946 41beac 40 API calls 18943->18946 18948 41c835 18943->18948 18945 41c7db 18944->18945 18947 41cc2c __wsopen_s 25 API calls 18945->18947 18946->18943 18947->18954 18950 41c89f 18948->18950 18962 41c9d4 18948->18962 18949 41c9d4 25 API calls 18952 41c967 18949->18952 18950->18949 18953 41c750 _free 14 API calls 18952->18953 18952->18954 18953->18954 18954->18839 18956 41ca02 18955->18956 18957 41ca15 18955->18957 18958 41c750 _free 14 API calls 18956->18958 18957->18941 18959 41ca07 18958->18959 18960 41cc2c __wsopen_s 25 API calls 18959->18960 18961 41ca12 18960->18961 18961->18941 18963 41c9e5 18962->18963 18964 41c9f9 18962->18964 18963->18964 18965 41c750 _free 14 API calls 18963->18965 18964->18950 18966 41c9ee 18965->18966 18967 41cc2c __wsopen_s 25 API calls 18966->18967 18967->18964

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 119 41b901-41b90e call 41df02 122 41b930-41b93c call 41b943 ExitProcess 119->122 123 41b910-41b91e GetPEB 119->123 123->122 124 41b920-41b92a GetCurrentProcess TerminateProcess 123->124 124->122
                                                APIs
                                                • GetCurrentProcess.KERNEL32(?,?,0041B900,0041BE86,?,NA,0041BE86,0041EF4E), ref: 0041B923
                                                • TerminateProcess.KERNEL32(00000000,?,0041B900,0041BE86,?,NA,0041BE86,0041EF4E), ref: 0041B92A
                                                • ExitProcess.KERNEL32 ref: 0041B93C
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: Process$CurrentExitTerminate
                                                • String ID:
                                                • API String ID: 1703294689-0
                                                • Opcode ID: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                • Instruction ID: c3524ad3d233ec0a3a19b1bf7aedcb75de5af13a6c7a41cb1465cf438659ca8f
                                                • Opcode Fuzzy Hash: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                • Instruction Fuzzy Hash: 63E0B671120208EFCB216F65DD49AA97B79FB44751BC44439FA0586231CB39EE93CB98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 408650-408664 1 408683-40868f call 417a50 0->1 2 408666-408681 0->2 3 408694-40869b 1->3 2->3 5 4086a2-4086c2 CreateMutexW GetLastError 3->5 6 40869d-4086a0 3->6 7 4086c8-4086ce 5->7 6->0 8 4086d0-4086e2 7->8 9 4086fe-408718 7->9 10 4086f4-4086fb call 4185df 8->10 11 4086e4-4086f2 8->11 12 408741-408754 call 418152 9->12 13 40871a-408725 9->13 10->9 11->10 14 408764-4087ae call 41cc3c call 406bb0 call 406590 11->14 21 408759-40875c 12->21 16 408737-40873e call 4185df 13->16 17 408727-408735 13->17 29 4087b3-4087b7 14->29 16->12 17->14 17->16 30 4087b9 29->30 31 4087bb-4087c8 SetCurrentDirectoryA 29->31 30->31 32 4087f6-4088c0 call 416a90 call 402c70 call 416a90 call 402c70 call 416a90 call 402c70 call 4171a0 call 4170a0 call 4171a0 call 417380 call 4170a0 call 4048c0 31->32 33 4087ca-4087d6 31->33 68 4088c5-4088ce 32->68 34 4087d8-4087e6 33->34 35 4087ec-4087f3 call 4185df 33->35 34->35 37 408b10 call 41cc3c 34->37 35->32 44 408b15 call 41cc3c 37->44 48 408b1a-408b1f call 41cc3c 44->48 69 4088d0-4088dc 68->69 70 4088fc-408914 68->70 71 4088f2-4088f9 call 4185df 69->71 72 4088de-4088ec 69->72 73 408942-40895a 70->73 74 408916-408922 70->74 71->70 72->44 72->71 75 40898b-4089a9 73->75 76 40895c-40896b 73->76 78 408924-408932 74->78 79 408938-40893f call 4185df 74->79 82 4089da-4089fe 75->82 83 4089ab-4089ba 75->83 80 408981-408988 call 4185df 76->80 81 40896d-40897b 76->81 78->44 78->79 79->73 80->75 81->44 81->80 89 408a00-408a0f 82->89 90 408a2f-408a50 82->90 87 4089d0-4089d7 call 4185df 83->87 88 4089bc-4089ca 83->88 87->82 88->44 88->87 96 408a11-408a1f 89->96 97 408a25-408a2c call 4185df 89->97 92 408a52-408a5e 90->92 93 408a7e-408a99 90->93 99 408a60-408a6e 92->99 100 408a74-408a7b call 4185df 92->100 101 408ac6-408acc 93->101 102 408a9b-408aaa 93->102 96->44 96->97 97->90 99->44 99->100 100->93 108 408af6-408b0f call 418152 101->108 109 408ace-408ada 101->109 106 408abc-408ac3 call 4185df 102->106 107 408aac-408aba 102->107 106->101 107->44 107->106 110 408aec-408af3 call 4185df 109->110 111 408adc-408aea 109->111 110->108 111->48 111->110
                                                APIs
                                                • CreateMutexW.KERNELBASE(00000000,00000000,?,0043A194,418014E8,?,00000000,00000000), ref: 004086B1
                                                • GetLastError.KERNEL32(?,00000000,00000000), ref: 004086B7
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: CreateErrorLastMutex
                                                • String ID:
                                                • API String ID: 1925916568-0
                                                • Opcode ID: 963d7460e6cdeb5c2414da801d1c48bd329e912f359a02807103749b9dce1abb
                                                • Instruction ID: d5025c2257f1853fae8f1be1934c88d0cd5ba35f682ee7a5a0e711edb3be859e
                                                • Opcode Fuzzy Hash: 963d7460e6cdeb5c2414da801d1c48bd329e912f359a02807103749b9dce1abb
                                                • Instruction Fuzzy Hash: 57D15C71A001089BEB18DB28CE85BDDB772EF85314F60817EE445B73D6DF395A808B59
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 127 41d1bb-41d1c2 128 41d1c4-41d1c6 127->128 129 41d1c7-41d1ce call 421602 call 4219a3 127->129 133 41d1d3-41d1d7 129->133 134 41d1d9-41d1dc 133->134 135 41d1de-41d1e7 call 41d20e 133->135 136 41d202-41d20d call 41e5a1 134->136 141 41d1e9-41d1ec 135->141 142 41d1ee-41d1f5 135->142 143 41d1fa-41d201 call 41e5a1 141->143 142->143 143->136
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: 9f5dec638c6018a6b24b976b0791b773a56ee0672529c52ab4d44372aafa3d49
                                                • Instruction ID: f1d333090dd57bfd17dfe39ecb9b07313f9b1ca465b706eabb36e918cd1afe6e
                                                • Opcode Fuzzy Hash: 9f5dec638c6018a6b24b976b0791b773a56ee0672529c52ab4d44372aafa3d49
                                                • Instruction Fuzzy Hash: 4FE0E5B6E0242022E211623F7C46AEB11856BD133AB15022FF860861E0DF7C88C2D19E
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 146 408770-4087a7 call 406bb0 149 4087ae call 406590 146->149 150 4087b3-4087b7 149->150 151 4087b9 150->151 152 4087bb-4087c8 SetCurrentDirectoryA 150->152 151->152 153 4087f6-40880a call 416a90 152->153 154 4087ca-4087d6 152->154 163 408810 call 402c70 153->163 155 4087d8-4087e6 154->155 156 4087ec-4087f3 call 4185df 154->156 155->156 158 408b10 call 41cc3c 155->158 156->153 165 408b15 call 41cc3c 158->165 164 408815-408835 call 416a90 163->164 170 408838 call 402c70 164->170 169 408b1a-408b1f call 41cc3c 165->169 172 40883d-408858 call 416a90 170->172 176 40885e call 402c70 172->176 177 408863-4088bd call 4171a0 call 4170a0 call 4171a0 call 417380 call 4170a0 176->177 188 4088c0 call 4048c0 177->188 189 4088c5-4088ce 188->189 190 4088d0-4088dc 189->190 191 4088fc-408914 189->191 192 4088f2-4088f9 call 4185df 190->192 193 4088de-4088ec 190->193 194 408942-40895a 191->194 195 408916-408922 191->195 192->191 193->165 193->192 196 40898b-4089a9 194->196 197 40895c-40896b 194->197 199 408924-408932 195->199 200 408938-40893f call 4185df 195->200 203 4089da-4089fe 196->203 204 4089ab-4089ba 196->204 201 408981-408988 call 4185df 197->201 202 40896d-40897b 197->202 199->165 199->200 200->194 201->196 202->165 202->201 210 408a00-408a0f 203->210 211 408a2f-408a50 203->211 208 4089d0-4089d7 call 4185df 204->208 209 4089bc-4089ca 204->209 208->203 209->165 209->208 217 408a11-408a1f 210->217 218 408a25-408a2c call 4185df 210->218 213 408a52-408a5e 211->213 214 408a7e-408a99 211->214 220 408a60-408a6e 213->220 221 408a74-408a7b call 4185df 213->221 222 408ac6-408acc 214->222 223 408a9b-408aaa 214->223 217->165 217->218 218->211 220->165 220->221 221->214 229 408af6-408b0f call 418152 222->229 230 408ace-408ada 222->230 227 408abc-408ac3 call 4185df 223->227 228 408aac-408aba 223->228 227->222 228->165 228->227 231 408aec-408af3 call 4185df 230->231 232 408adc-408aea 230->232 231->229 232->169 232->231
                                                APIs
                                                  • Part of subcall function 00408770: GetModuleFileNameA.KERNEL32(00000000,?,00000104,418014E8), ref: 00406BFF
                                                  • Part of subcall function 00406590: GetModuleFileNameA.KERNEL32(00000000,?,00000104,418014E8,?,00000000), ref: 004065F3
                                                • SetCurrentDirectoryA.KERNEL32(00000000,418014E8,00000000), ref: 004087BC
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: FileModuleName$CurrentDirectory
                                                • String ID:
                                                • API String ID: 1135421992-0
                                                • Opcode ID: 8bf1f08f99a344696cbf6c5750fc4a98637de2d6f1fa2b96419d82953a99ffaa
                                                • Instruction ID: d0dae173410c9e4e1febe3177f2c9113cc4b317fee0fa56548834116e9d8ebca
                                                • Opcode Fuzzy Hash: 8bf1f08f99a344696cbf6c5750fc4a98637de2d6f1fa2b96419d82953a99ffaa
                                                • Instruction Fuzzy Hash: 4B51FA70E002489BEF14EB64CA45BDDBB72AF42308F6041AED445773C7DB781A84CB5A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 240 416f50-416f6c 241 416f94-416f9a 240->241 242 416f6e-416f73 240->242 243 416fa0-416fab 241->243 244 41707e call 417ba0 241->244 245 416f75 242->245 246 416f77-416f91 call 41ab10 242->246 247 416fb4-416fc1 243->247 248 416fad-416fb2 243->248 251 417083-417088 call 402180 244->251 245->246 254 416fc3-416fc8 247->254 255 416fca-416fcf 247->255 253 416fd2-416fe6 248->253 257 416fe8-416fed 253->257 258 41700d-41700f 253->258 254->253 255->253 257->251 260 416ff3-417000 call 41835e 257->260 261 417011-417012 call 41835e 258->261 262 41701c 258->262 270 417002-41700b 260->270 271 417079 call 41cc3c 260->271 266 417017-41701a 261->266 263 41701e-417041 call 41b1d0 262->263 272 417043-41704e 263->272 273 41706c-417076 263->273 266->263 270->263 271->244 275 417050-41705e 272->275 276 417062-417069 call 4185df 272->276 275->271 277 417060 275->277 276->273 277->276
                                                APIs
                                                • Concurrency::cancel_current_task.LIBCPMT ref: 00417083
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: Concurrency::cancel_current_task
                                                • String ID:
                                                • API String ID: 118556049-0
                                                • Opcode ID: c85319de66d303704c5b32efceed12899cb95431b14fbd0adeec5c40d65b88a5
                                                • Instruction ID: fd946b0658ffb94c1012bd53882065ed5fda9b86f930e014646194fe2c62c28b
                                                • Opcode Fuzzy Hash: c85319de66d303704c5b32efceed12899cb95431b14fbd0adeec5c40d65b88a5
                                                • Instruction Fuzzy Hash: FE316A317042049BC7289F7898805AEB7E8EB49320B24473FF865C7381DB79DDC18399
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 280 417a50-417a6d 281 417a73-417a81 280->281 282 417b94 call 417ba0 280->282 284 417a83-417a85 281->284 285 417a87-417a8f 281->285 286 417b99-417b9f call 41cc3c 282->286 287 417a9f-417aa7 284->287 288 417a91-417a96 285->288 289 417a98-417a9c 285->289 291 417aad-417ab4 287->291 292 417b8f call 402180 287->292 288->287 289->287 295 417ae0-417ae2 291->295 296 417ab6-417abb 291->296 292->282 297 417af4 295->297 298 417ae4-417ae5 call 41835e 295->298 296->292 299 417ac1-417acc call 41835e 296->299 301 417af6-417b06 297->301 304 417aea-417af2 298->304 299->286 307 417ad2-417ade 299->307 305 417b68-417b8c call 41b1d0 301->305 306 417b08-417b3d call 41b1d0 301->306 304->301 312 417b51-417b65 call 4185df 306->312 313 417b3f-417b4d 306->313 307->301 313->286 314 417b4f 313->314 314->312
                                                APIs
                                                • Concurrency::cancel_current_task.LIBCPMT ref: 00417B8F
                                                  • Part of subcall function 00402180: ___std_exception_copy.LIBVCRUNTIME ref: 004021BE
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: Concurrency::cancel_current_task___std_exception_copy
                                                • String ID:
                                                • API String ID: 1979911387-0
                                                • Opcode ID: b3e929870bcd979361fd632a4e356694b34bdea9201ccb953d59f5018555cbdd
                                                • Instruction ID: 17865e07c0a9020476bb62f3ecb7ae26e4e2800d30adc2ccf051e38fdb3837cc
                                                • Opcode Fuzzy Hash: b3e929870bcd979361fd632a4e356694b34bdea9201ccb953d59f5018555cbdd
                                                • Instruction Fuzzy Hash: CD414772A0810A9BCB14DF288C819EFB3B5FF84358714067AD819DB341E734EE9583D9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 317 41835e-418361 318 418370-418373 call 41cc8d 317->318 320 418378-41837b 318->320 321 418363-41836e call 41cca7 320->321 322 41837d-41837e 320->322 321->318 325 41837f-418383 321->325 326 402180-4021d0 call 402160 call 4193e4 call 4191a9 325->326 327 418389-418886 call 417faf call 4193e4 325->327
                                                APIs
                                                • ___std_exception_copy.LIBVCRUNTIME ref: 004021BE
                                                  • Part of subcall function 004193E4: RaiseException.KERNEL32(E06D7363,00000001,00000003,0040219C,?,?,?,0040219C,?,00437E4C), ref: 00419444
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: ExceptionRaise___std_exception_copy
                                                • String ID:
                                                • API String ID: 3109751735-0
                                                • Opcode ID: 79f28c06042652cc4a4b4e37ebf95145dffe76a591269d0a023a1b3527f7ecb0
                                                • Instruction ID: 0754849f2873f9ee99eecf20cf2606fb6430f2f66f9579a4d74c0798b0fd6e96
                                                • Opcode Fuzzy Hash: 79f28c06042652cc4a4b4e37ebf95145dffe76a591269d0a023a1b3527f7ecb0
                                                • Instruction Fuzzy Hash: 09012B3590020D77C714BAA5EC469CA73AC9E04714B60453BF928A7191FB78E9C587DD
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 0040CBD0: GetTempPathA.KERNEL32(00000104,?), ref: 0040B2FE
                                                  • Part of subcall function 0040CBD0: GetModuleFileNameA.KERNEL32(00000000,?,00000104,418014E8), ref: 0040A7BC
                                                  • Part of subcall function 00406510: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00406540
                                                  • Part of subcall function 0040CBD0: GetUserNameA.ADVAPI32(?,?), ref: 0040B96E
                                                  • Part of subcall function 004138B0: IsUserAnAdmin.SHELL32 ref: 0041390D
                                                  • Part of subcall function 004138B0: GetUserNameA.ADVAPI32(?,?), ref: 004139B7
                                                  • Part of subcall function 004138B0: GetComputerNameExW.KERNEL32(00000002,?,?,?,?), ref: 00413A20
                                                  • Part of subcall function 004167E0: CreateThread.KERNEL32 ref: 004167F6
                                                  • Part of subcall function 004167E0: CreateThread.KERNEL32 ref: 00416807
                                                  • Part of subcall function 004167E0: CreateThread.KERNEL32 ref: 00416818
                                                  • Part of subcall function 004167E0: Sleep.KERNEL32(00007530,?,00416873), ref: 00416825
                                                • InternetCloseHandle.WININET(00000000), ref: 00416887
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: Name$CreateThreadUser$FileModule$AdminCloseComputerHandleInternetPathSleepTemp
                                                • String ID:
                                                • API String ID: 1411138196-0
                                                • Opcode ID: 681845bb7bdad3a9b280c05efa4f412a3339f2d7827d3117315032cc1d5ff116
                                                • Instruction ID: fcb51b4180ac2c01cd311fc2696d032aed602c74c46a29392a881be8b31f0bff
                                                • Opcode Fuzzy Hash: 681845bb7bdad3a9b280c05efa4f412a3339f2d7827d3117315032cc1d5ff116
                                                • Instruction Fuzzy Hash: 21E08671A0050407DA043BBA5D0B64E31184F8134CF94027FB815665D7EE6DD56441FF
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 358 41ea8a-41ea96 359 41eac8-41ead3 call 41c750 358->359 360 41ea98-41ea9a 358->360 368 41ead5-41ead7 359->368 362 41eab3-41eac4 RtlAllocateHeap 360->362 363 41ea9c-41ea9d 360->363 364 41eac6 362->364 365 41ea9f-41eaa6 call 41dc2f 362->365 363->362 364->368 365->359 370 41eaa8-41eab1 call 41cca7 365->370 370->359 370->362
                                                APIs
                                                • RtlAllocateHeap.NTDLL(00000000,?,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041EABC
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: AllocateHeap
                                                • String ID:
                                                • API String ID: 1279760036-0
                                                • Opcode ID: dfa22ebf96d117e5e2d1e15a0c463ff833afb46ba7fb8ad48bf3f6a11dcdaed7
                                                • Instruction ID: 5e5b785a8da04b63c94067ca99906f02eb36a9a31bcd46b4234264a7978573d4
                                                • Opcode Fuzzy Hash: dfa22ebf96d117e5e2d1e15a0c463ff833afb46ba7fb8ad48bf3f6a11dcdaed7
                                                • Instruction Fuzzy Hash: A5E0E53954012266E62126634C007DB7A48BF813F0F050037EC18962C0DB98DCC182ED
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403F66
                                                • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00403FCB
                                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00403FE4
                                                • GetThreadContext.KERNEL32(?,00000000), ref: 00403FFF
                                                • ReadProcessMemory.KERNEL32(?, ,?,00000004,00000000), ref: 00404023
                                                • GetModuleHandleA.KERNEL32(ntdll.dll,NtUnmapViewOfSection), ref: 0040403E
                                                • GetProcAddress.KERNEL32(00000000), ref: 00404045
                                                • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 0040406D
                                                • WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000), ref: 0040408E
                                                • WriteProcessMemory.KERNEL32(?,?,?,?,00000000,?,?,00000000), ref: 004040D2
                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000,?,?,00000000), ref: 0040410E
                                                • SetThreadContext.KERNEL32(?,00000000,?,?,00000000), ref: 0040412A
                                                • ResumeThread.KERNEL32(?,?,?,00000000), ref: 00404136
                                                • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000), ref: 00404144
                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00404165
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: Process$MemoryVirtual$ThreadWrite$AllocContextFreeModule$AddressCreateFileHandleNameProcReadResume
                                                • String ID: $NtUnmapViewOfSection$ntdll.dll
                                                • API String ID: 4033543172-1522589568
                                                • Opcode ID: 2fc5be1b3ec4d92441bc9103c4f92097ff01d4c177745f7de35fcca25cf32f0a
                                                • Instruction ID: 7185e54e9f5f5e6bc342fc5ffd2bfcf32a837d4cfdcfbf42461452ed81247528
                                                • Opcode Fuzzy Hash: 2fc5be1b3ec4d92441bc9103c4f92097ff01d4c177745f7de35fcca25cf32f0a
                                                • Instruction Fuzzy Hash: 66518971600218EBDB209F54DC49FEAB7B8FF48701F9040B6F708AA291D7B1A995CF58
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetUserNameW.ADVAPI32(00000000,?), ref: 00403822
                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403837
                                                • HeapAlloc.KERNEL32(00000000), ref: 0040383A
                                                • GetUserNameW.ADVAPI32(00000000,?), ref: 00403848
                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 0040386B
                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403876
                                                • HeapAlloc.KERNEL32(00000000), ref: 00403879
                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403889
                                                • HeapAlloc.KERNEL32(00000000), ref: 0040388C
                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 004038B6
                                                • ConvertSidToStringSidW.ADVAPI32(00000000,00000000), ref: 004038C9
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 004039C5
                                                • HeapFree.KERNEL32(00000000), ref: 004039CE
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004039D3
                                                • HeapFree.KERNEL32(00000000), ref: 004039D6
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004039DD
                                                • HeapFree.KERNEL32(00000000), ref: 004039E0
                                                • LocalFree.KERNEL32(00000000), ref: 004039E5
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: Heap$Process$FreeName$Alloc$AccountLookupUser$ConvertLocalString
                                                • String ID:
                                                • API String ID: 3326663573-0
                                                • Opcode ID: 063badce4704df2348e03859ddb56def879fca3a8a55ff5aa2bc949915fba159
                                                • Instruction ID: 167f534f4a5bc3f8c65bdd595c5ec8e1d54d44385eb9c59962b1969d814595bf
                                                • Opcode Fuzzy Hash: 063badce4704df2348e03859ddb56def879fca3a8a55ff5aa2bc949915fba159
                                                • Instruction Fuzzy Hash: EA716DB1E00209ABDB14DFA5DC85BEFBBBCEB48300F40453AE905A7281DB749905CBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ___free_lconv_mon.LIBCMT ref: 00422653
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422209
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 0042221B
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 0042222D
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 0042223F
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422251
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422263
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422275
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422287
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422299
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222AB
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222BD
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222CF
                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222E1
                                                • _free.LIBCMT ref: 00422648
                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                • _free.LIBCMT ref: 0042266A
                                                • _free.LIBCMT ref: 0042267F
                                                • _free.LIBCMT ref: 0042268A
                                                • _free.LIBCMT ref: 004226AC
                                                • _free.LIBCMT ref: 004226BF
                                                • _free.LIBCMT ref: 004226CD
                                                • _free.LIBCMT ref: 004226D8
                                                • _free.LIBCMT ref: 00422710
                                                • _free.LIBCMT ref: 00422717
                                                • _free.LIBCMT ref: 00422734
                                                • _free.LIBCMT ref: 0042274C
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                • String ID:
                                                • API String ID: 161543041-0
                                                • Opcode ID: 2ebc8ac26202a0620aa625b36a1d2a8fe7bc692bad1c871fd446d657effbc3a9
                                                • Instruction ID: 87a383156b0838ac626f9c2c6038cf6ce1f5ffd7cd3d592d57855f9c4539c293
                                                • Opcode Fuzzy Hash: 2ebc8ac26202a0620aa625b36a1d2a8fe7bc692bad1c871fd446d657effbc3a9
                                                • Instruction Fuzzy Hash: B6319272604211BFEB205A76EA45B9B73E5AF80358F50441FE849D7251DFBCED80DB18
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 00419C22
                                                • type_info::operator==.LIBVCRUNTIME ref: 00419C49
                                                • ___TypeMatch.LIBVCRUNTIME ref: 00419D55
                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 00419E30
                                                • _UnwindNestedFrames.LIBCMT ref: 00419EB7
                                                • CallUnexpected.LIBVCRUNTIME ref: 00419ED2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                • String ID: csm$csm$csm
                                                • API String ID: 2123188842-393685449
                                                • Opcode ID: 7c1fb931e7428280153d6c09b5a5c630754522480dfed903c9c8a59691bc5c1e
                                                • Instruction ID: d03aefa22aee8cf5aa416bea0a170c685dbf4c7cd79984a2e6415da9b3a38480
                                                • Opcode Fuzzy Hash: 7c1fb931e7428280153d6c09b5a5c630754522480dfed903c9c8a59691bc5c1e
                                                • Instruction Fuzzy Hash: 49C18871900209EFCF29DFA5D8A19EEBBB5BF04314F14405BE8516B242D339DE91CB9A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00408BAC
                                                • InternetOpenA.WININET(0043432B,00000000,00000000,00000000,00000000), ref: 00408BC2
                                                • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 00408BE2
                                                • InternetReadFile.WININET(00000000,00000000,?,?), ref: 00408BF3
                                                • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00408C15
                                                • InternetReadFile.WININET(00000000,00000000,?,?), ref: 00408C20
                                                • CloseHandle.KERNEL32(?), ref: 00408C32
                                                • InternetCloseHandle.WININET(?), ref: 00408C41
                                                • InternetCloseHandle.WININET(00000000), ref: 00408C44
                                                • RemoveDirectoryA.KERNEL32(00000000,?,?,?), ref: 00408CFD
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: Internet$File$CloseHandle$OpenRead$CreateDirectoryRemoveWrite
                                                • String ID:
                                                • API String ID: 1496009958-0
                                                • Opcode ID: e4593b5a40381b42fd0a3fcc928968875e60be204a817a7aa3ecd11dd024d64c
                                                • Instruction ID: e39da941a42be4000a8416f9d2a6f8c848e32a180712f45a109694aa4e2734ce
                                                • Opcode Fuzzy Hash: e4593b5a40381b42fd0a3fcc928968875e60be204a817a7aa3ecd11dd024d64c
                                                • Instruction Fuzzy Hash: 6E71EF71600208ABEB14DF64DD85BEE7735EF44304F50423EF945AB2D1DB38A980CB68
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 0041ED90
                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                • _free.LIBCMT ref: 0041ED9C
                                                • _free.LIBCMT ref: 0041EDA7
                                                • _free.LIBCMT ref: 0041EDB2
                                                • _free.LIBCMT ref: 0041EDBD
                                                • _free.LIBCMT ref: 0041EDC8
                                                • _free.LIBCMT ref: 0041EDD3
                                                • _free.LIBCMT ref: 0041EDDE
                                                • _free.LIBCMT ref: 0041EDE9
                                                • _free.LIBCMT ref: 0041EDF7
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: b518f20b764996853f57fbd2a3fdc4e7bf3deb810a08f9cd0b2a52dd965201da
                                                • Instruction ID: e610bd300bd5c2f85586062e27af9f16ff799e012d6f089a2169b26ee7872c24
                                                • Opcode Fuzzy Hash: b518f20b764996853f57fbd2a3fdc4e7bf3deb810a08f9cd0b2a52dd965201da
                                                • Instruction Fuzzy Hash: ED219CBA910108BFCB41EF96C941DDD7BF6BF88344F00416AF9199B121EB35DA84DB84
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InternetOpenW.WININET(00434EF4,00000000,00000000,00000000,00000000), ref: 0040425C
                                                • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 0040426E
                                                • InternetReadFile.WININET(00000000,?,03E80000,03E80000), ref: 00404281
                                                • InternetCloseHandle.WININET(00000000), ref: 00404292
                                                • InternetCloseHandle.WININET(00000000), ref: 00404295
                                                • InternetCloseHandle.WININET(00000000), ref: 004042A3
                                                • InternetCloseHandle.WININET(00000000), ref: 004042A6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: Internet$CloseHandle$Open$FileRead
                                                • String ID: runas
                                                • API String ID: 4294395943-4000483414
                                                • Opcode ID: 803e3b06f4ecfe67b7134cfd9f16a7ce5dde67ef08abd650df4eb275a5d8527c
                                                • Instruction ID: ba1dc25ec83469701d4c7edc2e7ba4793e46b241d410edfdecdbeb0a0fce58bd
                                                • Opcode Fuzzy Hash: 803e3b06f4ecfe67b7134cfd9f16a7ce5dde67ef08abd650df4eb275a5d8527c
                                                • Instruction Fuzzy Hash: 4951D571E00108ABDB14DFA4DC41BEEBB75EF85300F60816EF915B7291D7389945CBA8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f5ce67aa41b5f7f4889b1a1a20be5028291e55dfd00ef2a2d6d7ad31bcea8bed
                                                • Instruction ID: 5128a0cef717139e7719faf6ed0b9fe75c650819d7ce78bb109199c1610a9dbc
                                                • Opcode Fuzzy Hash: f5ce67aa41b5f7f4889b1a1a20be5028291e55dfd00ef2a2d6d7ad31bcea8bed
                                                • Instruction Fuzzy Hash: D3C114B4B002159FDF11DF99E880BAEBBB0BF49304F51406AE914A7382C7789D81CF69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004232B6: CreateFileW.KERNEL32(00000000,00000000,?,004236A6,?,?,00000000,?,004236A6,00000000,0000000C), ref: 004232D3
                                                • GetLastError.KERNEL32 ref: 00423711
                                                • __dosmaperr.LIBCMT ref: 00423718
                                                • GetFileType.KERNEL32(00000000), ref: 00423724
                                                • GetLastError.KERNEL32 ref: 0042372E
                                                • __dosmaperr.LIBCMT ref: 00423737
                                                • CloseHandle.KERNEL32(00000000), ref: 00423757
                                                • CloseHandle.KERNEL32(?), ref: 004238A4
                                                • GetLastError.KERNEL32 ref: 004238D6
                                                • __dosmaperr.LIBCMT ref: 004238DD
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                • String ID:
                                                • API String ID: 4237864984-0
                                                • Opcode ID: 0d649afaf30192c5c19431845a951fd0479d0f23fa76b0b367cd72335b8b290c
                                                • Instruction ID: c7b97c56f1a0d1b911df166da15c54d720095dd6c25035754b532be6d98a6b0c
                                                • Opcode Fuzzy Hash: 0d649afaf30192c5c19431845a951fd0479d0f23fa76b0b367cd72335b8b290c
                                                • Instruction Fuzzy Hash: 7CA15872A041149FCF19DF68EC917AE3BB1AB06325F54016EF811AB391CB7C8952CB5A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: _free$___from_strstr_to_strchr
                                                • String ID:
                                                • API String ID: 3409252457-0
                                                • Opcode ID: 17a2c5d05d88992eb6c4295c13d4ba7d46687f58b453e92c494b9aad345095be
                                                • Instruction ID: f188bb2de727b7b751c2d84351da10a70f250225146cef8743706f99745805fe
                                                • Opcode Fuzzy Hash: 17a2c5d05d88992eb6c4295c13d4ba7d46687f58b453e92c494b9aad345095be
                                                • Instruction Fuzzy Hash: 0E518C74F44324AFDB24AFB7A881A6E7BB4AF11314F54416FE410972A1EA3D8940CB5D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _ValidateLocalCookies.LIBCMT ref: 00419507
                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 0041950F
                                                • _ValidateLocalCookies.LIBCMT ref: 00419598
                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 004195C3
                                                • _ValidateLocalCookies.LIBCMT ref: 00419618
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                • String ID: csm
                                                • API String ID: 1170836740-1018135373
                                                • Opcode ID: 170db4f13a52bbc04fbb15fe7ab42c90d24a7c19ae8ceb0e3c19913b98646896
                                                • Instruction ID: cf6a3be1c1e6f4323defd25786acadca5afaa418f9c93884064ec3a043526e94
                                                • Opcode Fuzzy Hash: 170db4f13a52bbc04fbb15fe7ab42c90d24a7c19ae8ceb0e3c19913b98646896
                                                • Instruction Fuzzy Hash: 09411A31A00214AFCF11DF69C890ADEBBB1BF45318F54806BE8146B352D739DE96CB99
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: api-ms-$ext-ms-
                                                • API String ID: 0-537541572
                                                • Opcode ID: d346eea9aafd959945e16ecfc9ebbe047e966c499b5e8e0d3b3e0bbc48b51e8c
                                                • Instruction ID: 8946f5363388c355846af12649c4142b4e9cf4c5f65ba016e67a922269825e5f
                                                • Opcode Fuzzy Hash: d346eea9aafd959945e16ecfc9ebbe047e966c499b5e8e0d3b3e0bbc48b51e8c
                                                • Instruction Fuzzy Hash: 3521C672A41221FBCB318A24DC45A9B3778AB017A0F650532ED15A7391D638ED4BC5DC
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00422353: _free.LIBCMT ref: 00422378
                                                • _free.LIBCMT ref: 004223D9
                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                • _free.LIBCMT ref: 004223E4
                                                • _free.LIBCMT ref: 004223EF
                                                • _free.LIBCMT ref: 00422443
                                                • _free.LIBCMT ref: 0042244E
                                                • _free.LIBCMT ref: 00422459
                                                • _free.LIBCMT ref: 00422464
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 745ba4c7df38b0c8b3501d58b22aa89868de86b005191e755d783c3d27d16807
                                                • Instruction ID: 3666b1e76cecdb1a9706d82e7bd79ae187b091a1e89744abee2c0a3d449e73e2
                                                • Opcode Fuzzy Hash: 745ba4c7df38b0c8b3501d58b22aa89868de86b005191e755d783c3d27d16807
                                                • Instruction Fuzzy Hash: C611E471601714BAD921F7B2DD47FCB77DD5F0834CF84881EBACD6A052D6ACB6514604
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetConsoleCP.KERNEL32(?,00405880,00000000), ref: 00423A8E
                                                • __fassign.LIBCMT ref: 00423C6D
                                                • __fassign.LIBCMT ref: 00423C8A
                                                • WriteFile.KERNEL32(?,00405880,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00423CD2
                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00423D12
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00423DBE
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: FileWrite__fassign$ConsoleErrorLast
                                                • String ID:
                                                • API String ID: 4031098158-0
                                                • Opcode ID: 5a0c35df1f21bdc5310913443ad541efee69954072d07ce9ea6e444a121a2afd
                                                • Instruction ID: 55294dd1ed643e62d688e25fe7fc8b93d32e6dca02253c809cdcf0ede3e7f937
                                                • Opcode Fuzzy Hash: 5a0c35df1f21bdc5310913443ad541efee69954072d07ce9ea6e444a121a2afd
                                                • Instruction Fuzzy Hash: 21D1A075E002689FCF15CFA8D8809EDBBB5BF48314F64016AE455FB342D738AA46CB58
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(?,?,004197E7,004193D7,00418C1C), ref: 004197FE
                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0041980C
                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00419825
                                                • SetLastError.KERNEL32(00000000,004197E7,004193D7,00418C1C), ref: 00419877
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: ErrorLastValue___vcrt_
                                                • String ID:
                                                • API String ID: 3852720340-0
                                                • Opcode ID: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                • Instruction ID: 71a7697fc03e6214697c45e1a132a8316019e6706060db725442c6d2a3e753c8
                                                • Opcode Fuzzy Hash: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                • Instruction Fuzzy Hash: F101D8326293115EE62C3B76AE959D72774EF067B8720023FF120441F1EF594C95D58D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                • C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe, xrefs: 00420F81
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
                                                • API String ID: 0-3669967572
                                                • Opcode ID: d9fd3d3f386e086f16d5e96c86dfc6c05a3e177acafcacdda8c025444d2164cb
                                                • Instruction ID: f2c65a4c72dcbe00dc32dc221c8eb50b3435d1ebdf66b1fbb5bbc6e11338d05a
                                                • Opcode Fuzzy Hash: d9fd3d3f386e086f16d5e96c86dfc6c05a3e177acafcacdda8c025444d2164cb
                                                • Instruction Fuzzy Hash: CB210A713001257F97206F71ED81D6BB7ADAF103A8750462BF828D7691D778DC818799
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: _wcsrchr
                                                • String ID: .bat$.cmd$.com$.exe
                                                • API String ID: 1752292252-4019086052
                                                • Opcode ID: 19671788b65354572937ca0f5259cacd468799deb2890a42aa5f1fe1ebfecd1d
                                                • Instruction ID: baa428b651ab7fadd2aefce0a8d8cefe58070258f098f4f191bca89b56dcb2ea
                                                • Opcode Fuzzy Hash: 19671788b65354572937ca0f5259cacd468799deb2890a42aa5f1fe1ebfecd1d
                                                • Instruction Fuzzy Hash: 7E012B3BA8C635212624101AEC62BF717988B96FB8B25412FF854F72C1ED9DEC8205DC
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: api-ms-
                                                • API String ID: 0-2084034818
                                                • Opcode ID: d7b12ed5c3c764c8b82cc7f1cf76b5788b814adb9963f19d14a8505e8bb0b4a8
                                                • Instruction ID: 8addbc20e8b4f1572ca5f78bff053ba989236767de5a1c4d832f47c373f0c560
                                                • Opcode Fuzzy Hash: d7b12ed5c3c764c8b82cc7f1cf76b5788b814adb9963f19d14a8505e8bb0b4a8
                                                • Instruction Fuzzy Hash: 2B112C71A12221EBC7314B249D44AAB37689F017B4B624933ED45AB390D738DDE1C5DE
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,0041B938,?,?,0041B900,0041BE86,?,NA), ref: 0041B958
                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0041B96B
                                                • FreeLibrary.KERNEL32(00000000,?,?,0041B938,?,?,0041B900,0041BE86,?,NA), ref: 0041B98E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: af14fd2dde53d7be7e540de01eeb28501674720f1683c90e0ca13ac16e635f3d
                                                • Instruction ID: 6ab08718997dcf592451d77b1cbf540418157bbc441c253cf8170436862d5d78
                                                • Opcode Fuzzy Hash: af14fd2dde53d7be7e540de01eeb28501674720f1683c90e0ca13ac16e635f3d
                                                • Instruction Fuzzy Hash: 52F08230651218FBDB259B50DD0ABEEBA78DF44759F900175A504A1260CB788E46DA98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: _free$InformationTimeZone
                                                • String ID:
                                                • API String ID: 597776487-0
                                                • Opcode ID: 0fe61e17206dce54771a5055940e70056e7a200eab18ece9396fc025dad7d191
                                                • Instruction ID: 2c4f844ee906d1c5b8a05b7d4d89c1c9074c071bb98950a21f89e01ce9d05ddf
                                                • Opcode Fuzzy Hash: 0fe61e17206dce54771a5055940e70056e7a200eab18ece9396fc025dad7d191
                                                • Instruction Fuzzy Hash: 1FC17835B00128ABDB209F69EC41BAB7BA9EFC5354F94416FE550D7381E7388E01CB88
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCPInfo.KERNEL32(00DEDB60,00DEDB60,?,7FFFFFFF,?,?,00427265,00DEDB60,00DEDB60,?,00DEDB60,?,?,?,?,00DEDB60), ref: 0042704C
                                                • __alloca_probe_16.LIBCMT ref: 00427102
                                                • __alloca_probe_16.LIBCMT ref: 00427198
                                                • __freea.LIBCMT ref: 00427203
                                                • __freea.LIBCMT ref: 0042720F
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: __alloca_probe_16__freea$Info
                                                • String ID:
                                                • API String ID: 2330168043-0
                                                • Opcode ID: c559a93f2d06cee59e46b38ea2fc726286989e451536d90b3fb509578e86aae3
                                                • Instruction ID: f6d9b8f12c634194a1b411eace1e19527ea88e01b30f60a4b5a6e0b516c13e2d
                                                • Opcode Fuzzy Hash: c559a93f2d06cee59e46b38ea2fc726286989e451536d90b3fb509578e86aae3
                                                • Instruction Fuzzy Hash: 4481E472B082259BDF219EA5AC41EEF7BB5EF09354F98005BF804A7341D62DCC458BB9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __alloca_probe_16.LIBCMT ref: 00425958
                                                • __alloca_probe_16.LIBCMT ref: 00425A1E
                                                • __freea.LIBCMT ref: 00425A8A
                                                  • Part of subcall function 0041EA8A: RtlAllocateHeap.NTDLL(00000000,?,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041EABC
                                                • __freea.LIBCMT ref: 00425A93
                                                • __freea.LIBCMT ref: 00425AB6
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                • String ID:
                                                • API String ID: 1423051803-0
                                                • Opcode ID: 801bfc73f5307c034d341afffc150cc0786828de70bde5b9b10ebb0cec96e4eb
                                                • Instruction ID: 7e0d7c363e2f027523b7077ca53f82abc72318da18e9cc0c3b19bc4bba63112a
                                                • Opcode Fuzzy Hash: 801bfc73f5307c034d341afffc150cc0786828de70bde5b9b10ebb0cec96e4eb
                                                • Instruction Fuzzy Hash: 8351E672700626AFDB209F95EC86EBF37A9EF44764F95422AFC04D7240E778DC418698
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetFileType.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0041C040), ref: 0041C130
                                                • GetFileInformationByHandle.KERNEL32(?,?), ref: 0041C18A
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0041C040,?,000000FF,00000000,00000000), ref: 0041C218
                                                • __dosmaperr.LIBCMT ref: 0041C21F
                                                • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 0041C25C
                                                  • Part of subcall function 0041C484: __dosmaperr.LIBCMT ref: 0041C4B9
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                • String ID:
                                                • API String ID: 1206951868-0
                                                • Opcode ID: 8e7ecedbbb3726c11739f19b321c018a01a8de47d4bdd8436282d5c79af9c44f
                                                • Instruction ID: 0071a9752275d4edb8b9c21b1954eb469a97b67ce05b4548820d0adabff3a4d5
                                                • Opcode Fuzzy Hash: 8e7ecedbbb3726c11739f19b321c018a01a8de47d4bdd8436282d5c79af9c44f
                                                • Instruction Fuzzy Hash: B7413C75940204AFDB249FA5DC859EFBBF9EF89700B00452EF856D3610E7389885CB24
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 00422302
                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                • _free.LIBCMT ref: 00422314
                                                • _free.LIBCMT ref: 00422326
                                                • _free.LIBCMT ref: 00422338
                                                • _free.LIBCMT ref: 0042234A
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: a090e3dca2e19da394a01cead958df991e42452585b2f6658ee12e14c4d52992
                                                • Instruction ID: 8eed935d1f0a41e2b9dbe60b1656bd2ba3e28f3ae1fefd92f9cbf16fd4f54630
                                                • Opcode Fuzzy Hash: a090e3dca2e19da394a01cead958df991e42452585b2f6658ee12e14c4d52992
                                                • Instruction Fuzzy Hash: 04F04472501210B78520DBA6F6C2C4B73DAAB94355794180AF809D7641C77CFD81866C
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID: *?
                                                • API String ID: 269201875-2564092906
                                                • Opcode ID: 4349432449d004c56f1fbb459abf86acb5202655a551f523de74eb3488688e5f
                                                • Instruction ID: 7415b14c5d0124b7c9719d17695bca9e12f23279d28e73ebbb8fdbf8e8460f59
                                                • Opcode Fuzzy Hash: 4349432449d004c56f1fbb459abf86acb5202655a551f523de74eb3488688e5f
                                                • Instruction Fuzzy Hash: 5661A1B5E002299FCB14CFA9D8815EEFBF5EF48314B54816AE805F7301E735AE418B94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: AdjustPointer
                                                • String ID:
                                                • API String ID: 1740715915-0
                                                • Opcode ID: 7e8d2a906245dc524fe8c50e746b229fe3151c293ccc1eab8f3b2c5d31764d92
                                                • Instruction ID: a8cd01a110c9a5ba9b93cdf8b6ca506de852c713b8af7688bfec1274bd28d331
                                                • Opcode Fuzzy Hash: 7e8d2a906245dc524fe8c50e746b229fe3151c293ccc1eab8f3b2c5d31764d92
                                                • Instruction Fuzzy Hash: 3251D0B2601286AFDB298F15D861BEA77A4EF04314F24012FE84646391E739ECC1C799
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetVersionExW.KERNEL32(0000011C,?,418014E8,00000000), ref: 00405479
                                                • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004054E0
                                                • GetProcAddress.KERNEL32(00000000), ref: 004054E7
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: AddressHandleModuleProcVersion
                                                • String ID:
                                                • API String ID: 3310240892-0
                                                • Opcode ID: 392948f06ea052b49649e5df3ed82fd719d3dc17998501f89306a50c3bb47a8a
                                                • Instruction ID: 1307c1e28f23caf99c3cad6e9d6b2b61846357279e254348caa37701d54b456e
                                                • Opcode Fuzzy Hash: 392948f06ea052b49649e5df3ed82fd719d3dc17998501f89306a50c3bb47a8a
                                                • Instruction Fuzzy Hash: B8513971900608ABDB14DB24DD497DE7B76EB46314F5042BAE805B73C1DB389EC48F99
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 00425FDE
                                                • _free.LIBCMT ref: 00426007
                                                • SetEndOfFile.KERNEL32(00000000,0042354B,00000000,?,?,?,?,?,?,?,?,0042354B,?,00000000), ref: 00426039
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,0042354B,?,00000000,?,?,?,?,?), ref: 00426055
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFileLast
                                                • String ID:
                                                • API String ID: 1547350101-0
                                                • Opcode ID: 005ab2c57f032726cdaaa7f9df82d6b6984aac1401b59b4031c376f8f621a61a
                                                • Instruction ID: 61c1fed18fa2e053e229d2c366b1320fca6b3d495f3fb51fd3c042a4ee27fee9
                                                • Opcode Fuzzy Hash: 005ab2c57f032726cdaaa7f9df82d6b6984aac1401b59b4031c376f8f621a61a
                                                • Instruction Fuzzy Hash: 6C413E72B006115BDB11ABB5ED41B8E37B6AF44364F560017F424E72D2EB7CC840576D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 0041BD6F: _free.LIBCMT ref: 0041BD7D
                                                  • Part of subcall function 004218BF: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000000,?,00425A80,?,00000000,00000000), ref: 00421961
                                                • GetLastError.KERNEL32 ref: 00420950
                                                • __dosmaperr.LIBCMT ref: 00420957
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 00420996
                                                • __dosmaperr.LIBCMT ref: 0042099D
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                • String ID:
                                                • API String ID: 167067550-0
                                                • Opcode ID: 2cc476a48764411ac7d7f7841f806bb526956e32d48153aac2d156f6a7af72d6
                                                • Instruction ID: 91911ec1de34df9e01eb008ea9a24e12f878ac442d2ad626700c96a69c790fc9
                                                • Opcode Fuzzy Hash: 2cc476a48764411ac7d7f7841f806bb526956e32d48153aac2d156f6a7af72d6
                                                • Instruction Fuzzy Hash: 2721F0B1700225AFA710AF62ACC196B77EDEF00374790851AF86697253D738DCC08B94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(?,00000000,?,0041BCED,00000000,?,?,?,0041BE86,?), ref: 0041EE97
                                                • _free.LIBCMT ref: 0041EEF4
                                                • _free.LIBCMT ref: 0041EF2A
                                                • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,?,0041BE86,?), ref: 0041EF35
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: ErrorLast_free
                                                • String ID:
                                                • API String ID: 2283115069-0
                                                • Opcode ID: 120db594496689011f9c139fa4ddd92dcfd12b70a1cc6502b103967e01bc71cb
                                                • Instruction ID: 26790fddcd24ef136aadc0cc0bf27d5f777129a8301660e6568487d79e7ca8b5
                                                • Opcode Fuzzy Hash: 120db594496689011f9c139fa4ddd92dcfd12b70a1cc6502b103967e01bc71cb
                                                • Instruction Fuzzy Hash: 2411CA3A6002017AD61427B79CC59EB256997C1779B25013BFD39832D2FE6D8CDB811D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(?,?,?,0041C755,0041EACD,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041EFEE
                                                • _free.LIBCMT ref: 0041F04B
                                                • _free.LIBCMT ref: 0041F081
                                                • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041F08C
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: ErrorLast_free
                                                • String ID:
                                                • API String ID: 2283115069-0
                                                • Opcode ID: 048b735e334959feaa5e4ce77df0ba5808e7239d9d4b1868442944ab324b2044
                                                • Instruction ID: d1a755533480a66cbcbdd6da6f61a8fcfdc6096e1f08231a3cc2ec091d2cf52b
                                                • Opcode Fuzzy Hash: 048b735e334959feaa5e4ce77df0ba5808e7239d9d4b1868442944ab324b2044
                                                • Instruction Fuzzy Hash: FB114C322045016AC7102B76ACC1DEB2969DBC8778765023BF92A822E3EF6CCCDF511C
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0041F930,00000000,?,00424658,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 0041F7E1
                                                • GetLastError.KERNEL32(?,00424658,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,0041F930,00000000,00000104,?), ref: 0041F7EB
                                                • __dosmaperr.LIBCMT ref: 0041F7F2
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                • String ID:
                                                • API String ID: 2398240785-0
                                                • Opcode ID: 05d28394caa5e79c84551c055246600de674f2baba94b68408dd47ae0dfcca9d
                                                • Instruction ID: 3e1febbc0a8defaca1089d50814ae8bcfad4f789bcb8220d5dd2739c2ed7ebaf
                                                • Opcode Fuzzy Hash: 05d28394caa5e79c84551c055246600de674f2baba94b68408dd47ae0dfcca9d
                                                • Instruction Fuzzy Hash: 1DF06D36600115BB8B202FA2DD08C9BBFA9FF443A03444136F52DC7561DB35E8A6CBE8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0041F930,00000000,?,004245E3,00000000,00000000,0041F930,?,?,00000000,00000000,00000001), ref: 0041F84A
                                                • GetLastError.KERNEL32(?,004245E3,00000000,00000000,0041F930,?,?,00000000,00000000,00000001,00000000,00000000,?,0041F930,00000000,00000104), ref: 0041F854
                                                • __dosmaperr.LIBCMT ref: 0041F85B
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                • String ID:
                                                • API String ID: 2398240785-0
                                                • Opcode ID: e95b58acd20ff03b7de0604d3f95648f78153c488b68a8cfe7999cd59df17e1a
                                                • Instruction ID: 5356ccb821a571137923583999cca56af5607f561d8780d9d137012589ba4a16
                                                • Opcode Fuzzy Hash: e95b58acd20ff03b7de0604d3f95648f78153c488b68a8cfe7999cd59df17e1a
                                                • Instruction Fuzzy Hash: FBF01231600115BB8B207BA6DC0499BBFA9FF443A03404536F52DC6521C735E8A6DBD4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • WriteConsoleW.KERNEL32(00405880,00000000,00437A28,00000000,00405880,?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880), ref: 004272E6
                                                • GetLastError.KERNEL32(?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880,00000000,00405880,?,0042436F,00405880), ref: 004272F2
                                                  • Part of subcall function 004272B8: CloseHandle.KERNEL32(FFFFFFFE,00427302,?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880,00000000,00405880), ref: 004272C8
                                                • ___initconout.LIBCMT ref: 00427302
                                                  • Part of subcall function 0042727A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004272A9,004269D4,00405880,?,00423E1B,00000000,?,00405880,00000000), ref: 0042728D
                                                • WriteConsoleW.KERNEL32(00405880,00000000,00437A28,00000000,?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880,00000000), ref: 00427317
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                • String ID:
                                                • API String ID: 2744216297-0
                                                • Opcode ID: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                • Instruction ID: 5b8baa1da4bb66d128bbbdf819d740daca6d0282673a7c9b135cb97f91750bdc
                                                • Opcode Fuzzy Hash: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                • Instruction Fuzzy Hash: 46F01C36201129FBCF221F95EC04A8A3F66FF093A1B814075FE1C86231D6328820EB98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: CreateThread$Sleep
                                                • String ID:
                                                • API String ID: 422425972-0
                                                • Opcode ID: c7ec29c90368d79a70c95a5ee9845132da8938ab2cedaa7c12f416f09ab0d9a8
                                                • Instruction ID: 3e58bb4c01d1f945cb402fb00719d76fe511b7683de936d62f19d1048555ce50
                                                • Opcode Fuzzy Hash: c7ec29c90368d79a70c95a5ee9845132da8938ab2cedaa7c12f416f09ab0d9a8
                                                • Instruction Fuzzy Hash: 69E09231BE8334B6F47126A45C03F891E545B08F95FB20023B70CBE4D084C87485CAEE
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 0041D822
                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                • _free.LIBCMT ref: 0041D835
                                                • _free.LIBCMT ref: 0041D846
                                                • _free.LIBCMT ref: 0041D857
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 5b4b832eec97106c71e74c3abf3533cea5e390173416251ec6b9798646083543
                                                • Instruction ID: 2f128d3171f244c94fc48b8332bc88089a284fec835ab8af747093701a289460
                                                • Opcode Fuzzy Hash: 5b4b832eec97106c71e74c3abf3533cea5e390173416251ec6b9798646083543
                                                • Instruction Fuzzy Hash: C3E04FB4801520AFCE012F53FE055953BA2FB947EC340302AF81406232DB390261EFCE
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • std::_Xinvalid_argument.LIBCPMT ref: 00412FEF
                                                  • Part of subcall function 00416F50: Concurrency::cancel_current_task.LIBCPMT ref: 00417083
                                                Strings
                                                • stoi argument out of range, xrefs: 00412FF9
                                                • invalid stoi argument, xrefs: 00412FEA
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: Concurrency::cancel_current_taskXinvalid_argumentstd::_
                                                • String ID: invalid stoi argument$stoi argument out of range
                                                • API String ID: 3646673767-1606216832
                                                • Opcode ID: efdd6db421bad83b1e12b61f9b9769eb067da44a7a1b71930ad22f2661138b05
                                                • Instruction ID: 6d18bec53ddcbea06decae191a6eae5fb5e1180c669e5708db714ed38e612d95
                                                • Opcode Fuzzy Hash: efdd6db421bad83b1e12b61f9b9769eb067da44a7a1b71930ad22f2661138b05
                                                • Instruction Fuzzy Hash: 60E1D171A001189BEF28DF28CE857DDBB72EB46304F50819EE419972C1DB799AD1CF98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\Users\user\AppData\Local\Temp\3f904562a0\gntuud.exe
                                                • API String ID: 0-3669967572
                                                • Opcode ID: 31fa4e4f4f0bc981144b5b3ffc5fea1ddf45f4662b4ea0433f5b95f05539bbed
                                                • Instruction ID: 3e019bb9f1f37e8f56b3af26f626c64f14fa1fa210d5d8f79d997b38734a4c96
                                                • Opcode Fuzzy Hash: 31fa4e4f4f0bc981144b5b3ffc5fea1ddf45f4662b4ea0433f5b95f05539bbed
                                                • Instruction Fuzzy Hash: 9A41A271A80214AFDB11DF9A9CC19EFBBB9EB85710F10006BF40497251D7788E82CB5D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00419F02
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: EncodePointer
                                                • String ID: MOC$RCC
                                                • API String ID: 2118026453-2084237596
                                                • Opcode ID: 9ba41499cbdf9a4a038d6cc8401d48825653b63da1d3c73c684997a9dc15089d
                                                • Instruction ID: ef4240616421f5d170a5d1c4fd7b0d446090a164c11462a96303fe54a6744129
                                                • Opcode Fuzzy Hash: 9ba41499cbdf9a4a038d6cc8401d48825653b63da1d3c73c684997a9dc15089d
                                                • Instruction Fuzzy Hash: 5C414872900209EFCF16DF98C981AEEBBB5FF48304F18819AF904A7251D3399DA1DB55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00412D18
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: FileModuleName
                                                • String ID: .$5120
                                                • API String ID: 514040917-2446372808
                                                • Opcode ID: f0f7fa9079d412dfae67557f0ce5a92bcf03b2979e1f9ae925df876b28d94858
                                                • Instruction ID: 9696d8c15566c1d42fadb68592e21f39738dfdc301de5d2260ec8dd83da14f2d
                                                • Opcode Fuzzy Hash: f0f7fa9079d412dfae67557f0ce5a92bcf03b2979e1f9ae925df876b28d94858
                                                • Instruction Fuzzy Hash: D421E2B09002489BDB14EF69C90A7DD7FB49F06348F5001CEE44567282D7B99A498BE7
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 0041FDF2: EnterCriticalSection.KERNEL32(00405880,?,00424223,00405880,00437D48,00000010,0041EA11,00000000,C032C301,00000000,00000000,00405880,?,0041BB1A,00405880,00000000), ref: 0041FE0D
                                                • FlushFileBuffers.KERNEL32(00000000,00437D28,0000000C,00423A2E,nA,?,00000001,?,0041E96E,?), ref: 00423970
                                                • GetLastError.KERNEL32 ref: 00423981
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000000B.00000002.314003713.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 0000000B.00000002.314071069.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_11_2_400000_gntuud.jbxd
                                                Similarity
                                                • API ID: BuffersCriticalEnterErrorFileFlushLastSection
                                                • String ID: nA
                                                • API String ID: 4109680722-4035868545
                                                • Opcode ID: f003fc8eaf19488ae7f9339aa40c70496bc05c9f4a2d22a8ae3e610d030b7c35
                                                • Instruction ID: 0418fce989e2f534913a4f38d2ce8aa3e5464a19317c2ea272403c313fbf0c0e
                                                • Opcode Fuzzy Hash: f003fc8eaf19488ae7f9339aa40c70496bc05c9f4a2d22a8ae3e610d030b7c35
                                                • Instruction Fuzzy Hash: 45018076B002108FC714AF69E90569D7BB5AF49724F50412FF4219B3D2DBBC9982CB98
                                                Uniqueness

                                                Uniqueness Score: -1.00%