Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:764029
MD5:2396925cc38be4f07bd426cf080256ce
SHA1:8884e5383b3601e59089f0d287acad1eff20c676
SHA256:e91bb1f7c2b2ffd094d3915f1fffbfe929efd49e1d732b51d60e8a378a8a066b
Tags:exe
Infos:

Detection

Amadey
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Amadeys stealer DLL
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Yara detected Amadey bot
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Machine Learning detection for sample
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found dropped PE file which has not been started or loaded
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Drops PE files
Contains functionality to read the PEB
Contains functionality to launch a program with higher privileges
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 3520 cmdline: C:\Users\user\Desktop\file.exe MD5: 2396925CC38BE4F07BD426CF080256CE)
    • gntuud.exe (PID: 2016 cmdline: "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" MD5: 2396925CC38BE4F07BD426CF080256CE)
      • schtasks.exe (PID: 5144 cmdline: "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" /F MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • gntuud.exe (PID: 5292 cmdline: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe MD5: 2396925CC38BE4F07BD426CF080256CE)
  • cleanup
{"C2 url": "77.73.133.72/hfk3vK9/index.php", "Version": "3.50"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dllJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dllINDICATOR_TOOL_PWS_AmadyDetects password stealer DLL. Dropped by AmadeyditekSHen
    • 0xd868:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
    • 0x15604:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
    • 0x16074:$s1: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData
    • 0x15158:$s2: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
    • 0x151bc:$s2: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
    • 0xdd0c:$s3: \Mikrotik\Winbox\Addresses.cdb
    • 0x190d8:$s4: \HostName
    • 0x19100:$s5: \Password
    • 0x17c04:$s6: SOFTWARE\RealVNC\
    • 0x17c30:$s6: SOFTWARE\RealVNC\
    • 0x17c5c:$s6: SOFTWARE\RealVNC\
    • 0x17ca4:$s6: SOFTWARE\RealVNC\
    • 0x17cd0:$s6: SOFTWARE\RealVNC\
    • 0x18008:$s7: SOFTWARE\TightVNC\
    • 0x18034:$s7: SOFTWARE\TightVNC\
    • 0x18060:$s7: SOFTWARE\TightVNC\
    • 0x180ac:$s7: SOFTWARE\TightVNC\
    • 0x1c43c:$s8: cred.dll
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.259666135.00000000005D3000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x1640:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000001.00000003.293480849.00000000007CB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
      00000001.00000003.271178795.0000000000680000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
        00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
          00000004.00000003.312159954.0000000000940000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
            Click to see the 10 entries
            SourceRuleDescriptionAuthorStrings
            4.2.gntuud.exe.400000.0.raw.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
              4.2.gntuud.exe.6e0e67.1.raw.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                4.3.gntuud.exe.940000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                  0.2.file.exe.900e67.1.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                    0.2.file.exe.400000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                      Click to see the 9 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: http://77.73.133.72/hfk3vK9/Plugins/cred64.dll_Avira URL Cloud: Label: malware
                      Source: http://77.73.133.72/hfk3vK9/Plugins/cred64.dll=Avira URL Cloud: Label: malware
                      Source: http://77.73.133.72/hfk3vK9/index.phpAvira URL Cloud: Label: malware
                      Source: http://77.73.133.72/hfk3vK9/Plugins/cred64.dllAvira URL Cloud: Label: malware
                      Source: http://77.73.133.72/hfk3vK9/index.php8Avira URL Cloud: Label: malware
                      Source: http://77.73.133.72/hfk3vK9/Plugins/cred64.dll)Avira URL Cloud: Label: malware
                      Source: http://77.73.133.72/hfk3vK9/index.phpplayAvira URL Cloud: Label: malware
                      Source: http://77.73.133.72/hfk3vK9/Plugins/cred64.dllVirustotal: Detection: 18%Perma Link
                      Source: http://77.73.133.72/hfk3vK9/index.phpVirustotal: Detection: 9%Perma Link
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dllAvira: detection malicious, Label: HEUR/AGEN.1233121
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dllReversingLabs: Detection: 88%
                      Source: file.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeJoe Sandbox ML: detected
                      Source: 0.2.file.exe.900e67.1.unpackMalware Configuration Extractor: Amadey {"C2 url": "77.73.133.72/hfk3vK9/index.php", "Version": "3.50"}

                      Compliance

                      barindex
                      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeUnpacked PE file: 4.2.gntuud.exe.400000.0.unpack
                      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: Binary string: D:\Mktmp\Amadey\Release\Amadey.pdb source: file.exe, file.exe, 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, file.exe, 00000000.00000003.256458471.0000000000940000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, gntuud.exe, gntuud.exe, 00000004.00000003.312159954.0000000000940000.00000004.00001000.00020000.00000000.sdmp, gntuud.exe, 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp
                      Source: Binary string: C:\wabuj\8-vuca\fomehibarayar-zejegogotu94\guyo\veceradaro\fev.pdb source: file.exe, gntuud.exe.0.dr
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00420BA6 FindFirstFileExW,0_2_00420BA6
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00920E0D FindFirstFileExW,0_2_00920E0D
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00420BA6 FindFirstFileExW,4_2_00420BA6

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: 77.73.133.72/hfk3vK9/index.php
                      Source: Joe Sandbox ViewASN Name: AS43260TR AS43260TR
                      Source: Joe Sandbox ViewIP Address: 77.73.133.72 77.73.133.72
                      Source: gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmp, gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.73.133.72/hfk3vK9/Plugins/cred64.dll
                      Source: gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.73.133.72/hfk3vK9/Plugins/cred64.dll)
                      Source: gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.73.133.72/hfk3vK9/Plugins/cred64.dll=
                      Source: gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.73.133.72/hfk3vK9/Plugins/cred64.dll_
                      Source: gntuud.exe, 00000001.00000003.293349447.00000000007A7000.00000004.00000020.00020000.00000000.sdmp, gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.73.133.72/hfk3vK9/index.php
                      Source: gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.73.133.72/hfk3vK9/index.php8
                      Source: gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.73.133.72/hfk3vK9/index.phpplay
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404180 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404180
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402C70 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,RegOpenKeyExA,RegSetValueExA,RegCloseKey,GdiplusStartup,GetDC,RegGetValueA,RegGetValueA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,RegGetValueA,GetSystemMetrics,GetSystemMetrics,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GdipCreateBitmapFromHBITMAP,GdipGetImageEncodersSize,GdipGetImageEncoders,GdipSaveImageToFile,SelectObject,DeleteObject,DeleteObject,DeleteObject,ReleaseDC,GdipDisposeImage,GdiplusShutdown,0_2_00402C70

                      System Summary

                      barindex
                      Source: 00000000.00000002.259666135.00000000005D3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                      Source: 00000004.00000002.313317695.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                      Source: 00000004.00000002.313412358.0000000000745000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll, type: DROPPEDMatched rule: Detects password stealer DLL. Dropped by Amadey Author: ditekSHen
                      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 00000000.00000002.259666135.00000000005D3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                      Source: 00000004.00000002.313317695.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                      Source: 00000004.00000002.313412358.0000000000745000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll, type: DROPPEDMatched rule: INDICATOR_TOOL_PWS_Amady author = ditekSHen, description = Detects password stealer DLL. Dropped by Amadey
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CBD00_2_0040CBD0
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004294700_2_00429470
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042848D0_2_0042848D
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004328900_2_00432890
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009296D70_2_009296D7
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009286F40_2_009286F4
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_004294704_2_00429470
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_0042848D4_2_0042848D
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_004328904_2_00432890
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_0040CBD04_2_0040CBD0
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00418C40 appears 40 times
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00416F50 appears 130 times
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00918EA7 appears 33 times
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 009171B7 appears 125 times
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: String function: 00416F50 appears 130 times
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: String function: 00418C40 appears 40 times
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeProcess Stats: CPU usage > 98%
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll 5CD41F164DE6F783B7DA82B5F6DBD49413ECCD87CC7470F2004D58CA081FB0E0
                      Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                      Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe"
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" /F
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" /FJump to behavior
                      Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeFile created: C:\Users\user\AppData\Roaming\f49dfc5e4e2508Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\ecaac49691Jump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/4@0/1
                      Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00746356 CreateToolhelp32Snapshot,Module32First,4_2_00746356
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeMutant created: \Sessions\1\BaseNamedObjects\f49dfc5e4e2508eabedc241a3f1ae459
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5300:120:WilError_01
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: D:\Mktmp\Amadey\Release\Amadey.pdb source: file.exe, file.exe, 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, file.exe, 00000000.00000003.256458471.0000000000940000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, gntuud.exe, gntuud.exe, 00000004.00000003.312159954.0000000000940000.00000004.00001000.00020000.00000000.sdmp, gntuud.exe, 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp
                      Source: Binary string: C:\wabuj\8-vuca\fomehibarayar-zejegogotu94\guyo\veceradaro\fev.pdb source: file.exe, gntuud.exe.0.dr

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeUnpacked PE file: 4.2.gntuud.exe.400000.0.unpack
                      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.wuve:R;.bedicar:R;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeUnpacked PE file: 4.2.gntuud.exe.400000.0.unpack .text:ER;.data:W;.wuve:R;.bedicar:R;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418C86 push ecx; ret 0_2_00418C99
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00418C86 push ecx; ret 4_2_00418C99
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_0074B3E8 push 54850227h; ret 4_2_0074B441
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_0074951B push cs; ret 4_2_00749537
                      Source: file.exeStatic PE information: section name: .wuve
                      Source: file.exeStatic PE information: section name: .bedicar
                      Source: gntuud.exe.0.drStatic PE information: section name: .wuve
                      Source: gntuud.exe.0.drStatic PE information: section name: .bedicar

                      Persistence and Installation Behavior

                      barindex
                      Source: Yara matchFile source: 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: gntuud.exe PID: 2016, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dllJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders StartupJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" /F
                      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe TID: 1948Thread sleep time: -690000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe TID: 5260Thread sleep time: -50000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe TID: 5324Thread sleep time: -1620000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe TID: 5252Thread sleep time: -1080000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe TID: 5324Thread sleep time: -180000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe TID: 1948Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dllJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 180000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 360000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 180000Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.8 %
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeAPI coverage: 4.7 %
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405400 GetVersionExW,GetModuleHandleA,GetProcAddress,GetSystemInfo,0_2_00405400
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00420BA6 FindFirstFileExW,0_2_00420BA6
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00920E0D FindFirstFileExW,0_2_00920E0D
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00420BA6 FindFirstFileExW,4_2_00420BA6
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 30000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 50000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 180000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 360000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 180000Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeThread delayed: delay time: 30000Jump to behavior
                      Source: gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWA
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418A67 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00418A67
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004037D0 DeleteObject,GetUserNameW,GetUserNameW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetUserNameW,LookupAccountNameW,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,LookupAccountNameW,ConvertSidToStringSidW,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,LocalFree,0_2_004037D0
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041B901 mov eax, dword ptr fs:[00000030h]0_2_0041B901
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041DF02 mov eax, dword ptr fs:[00000030h]0_2_0041DF02
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0090092B mov eax, dword ptr fs:[00000030h]0_2_0090092B
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0091E169 mov eax, dword ptr fs:[00000030h]0_2_0091E169
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0091BB68 mov eax, dword ptr fs:[00000030h]0_2_0091BB68
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00900D90 mov eax, dword ptr fs:[00000030h]0_2_00900D90
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_0041B901 mov eax, dword ptr fs:[00000030h]4_2_0041B901
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_0041DF02 mov eax, dword ptr fs:[00000030h]4_2_0041DF02
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00745C33 push dword ptr fs:[00000030h]4_2_00745C33
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418163 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00418163
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418A67 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00418A67
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041CA80 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041CA80
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418BCC SetUnhandledExceptionFilter,0_2_00418BCC
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009183CA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_009183CA
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00918CCE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00918CCE
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0091CCE7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0091CCE7
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00418163 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00418163
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00418A67 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00418A67
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_0041CA80 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0041CA80
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeCode function: 4_2_00418BCC SetUnhandledExceptionFilter,4_2_00418BCC

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403F40 GetModuleFileNameA,CreateProcessA,VirtualAlloc,GetThreadContext,ReadProcessMemory,GetModuleHandleA,GetProcAddress,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,VirtualFree,0_2_00403F40
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404350 ShellExecuteA,0_2_00404350
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" /FJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Roaming\f49dfc5e4e2508\cred64.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exeQueries volume information: C:\Users\user\AppData\Local\Temp\853321935212 VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418887 cpuid 0_2_00418887
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00418CA1 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00418CA1
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00424BC4 _free,_free,_free,GetTimeZoneInformation,_free,0_2_00424BC4
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405400 GetVersionExW,GetModuleHandleA,GetProcAddress,GetSystemInfo,0_2_00405400
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040CBD0 GetUserNameA,SetCurrentDirectoryA,GetFileAttributesA,CreateDirectoryA,GetFileAttributesA,GetModuleFileNameA,SetCurrentDirectoryA,std::_Xinvalid_argument,std::_Xinvalid_argument,std::_Xinvalid_argument,0_2_0040CBD0

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 4.2.gntuud.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.gntuud.exe.6e0e67.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.3.gntuud.exe.940000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.900e67.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.gntuud.exe.6e0e67.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.gntuud.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.file.exe.940000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.gntuud.exe.680000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.gntuud.exe.680000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.3.gntuud.exe.940000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.file.exe.940000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.900e67.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000003.293480849.00000000007CB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.271178795.0000000000680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000003.312159954.0000000000940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.256458471.0000000000940000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.313317695.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: gntuud.exe PID: 2016, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll, type: DROPPED
                      Source: Yara matchFile source: 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: gntuud.exe PID: 2016, type: MEMORYSTR
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      1
                      Exploitation for Privilege Escalation
                      1
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote Services1
                      Screen Capture
                      Exfiltration Over Other Network Medium1
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1
                      Registry Run Keys / Startup Folder
                      111
                      Process Injection
                      21
                      Virtualization/Sandbox Evasion
                      LSASS Memory121
                      Security Software Discovery
                      Remote Desktop Protocol1
                      Archive Collected Data
                      Exfiltration Over Bluetooth1
                      Ingress Tool Transfer
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)1
                      Scheduled Task/Job
                      111
                      Process Injection
                      Security Account Manager21
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)1
                      Registry Run Keys / Startup Folder
                      1
                      Deobfuscate/Decode Files or Information
                      NTDS1
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
                      Obfuscated Files or Information
                      LSA Secrets1
                      Account Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common2
                      Software Packing
                      Cached Domain Credentials1
                      System Owner/User Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync2
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem24
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      file.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll100%AviraHEUR/AGEN.1233121
                      C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll88%ReversingLabsWin32.Infostealer.Decred
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      77.73.133.72/hfk3vK9/index.php0%URL Reputationsafe
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll_100%Avira URL Cloudmalware
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll=100%Avira URL Cloudmalware
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll19%VirustotalBrowse
                      http://77.73.133.72/hfk3vK9/index.php10%VirustotalBrowse
                      http://77.73.133.72/hfk3vK9/index.php100%Avira URL Cloudmalware
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll100%Avira URL Cloudmalware
                      http://77.73.133.72/hfk3vK9/index.php8100%Avira URL Cloudmalware
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll)100%Avira URL Cloudmalware
                      http://77.73.133.72/hfk3vK9/index.phpplay100%Avira URL Cloudmalware
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      77.73.133.72/hfk3vK9/index.phptrue
                      • URL Reputation: safe
                      low
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll_gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dllgntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmp, gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 19%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll=gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.73.133.72/hfk3vK9/index.phpgntuud.exe, 00000001.00000003.293349447.00000000007A7000.00000004.00000020.00020000.00000000.sdmp, gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 10%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.73.133.72/hfk3vK9/index.php8gntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.73.133.72/hfk3vK9/Plugins/cred64.dll)gntuud.exe, 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://77.73.133.72/hfk3vK9/index.phpplaygntuud.exe, 00000001.00000003.293294453.000000000079B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      77.73.133.72
                      unknownKazakhstan
                      43260AS43260TRtrue
                      Joe Sandbox Version:36.0.0 Rainbow Opal
                      Analysis ID:764029
                      Start date and time:2022-12-09 10:31:05 +01:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 11m 8s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:file.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:19
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@7/4@0/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:Failed
                      HCA Information:
                      • Successful, ratio: 94%
                      • Number of executed functions: 22
                      • Number of non-executed functions: 129
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240s for sample files taking high CPU consumption
                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      10:32:10API Interceptor2664x Sleep call for process: gntuud.exe modified
                      10:32:12Task SchedulerRun new task: gntuud.exe path: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      77.73.133.72PFgUxajqwZ.dllGet hashmaliciousBrowse
                      • 77.73.133.72/hfk3vK9/index.php
                      PFgUxajqwZ.dllGet hashmaliciousBrowse
                      • 77.73.133.72/hfk3vK9/index.php
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      AS43260TRfile.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      file.exeGet hashmaliciousBrowse
                      • 77.73.133.72
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dllfile.exeGet hashmaliciousBrowse
                        file.exeGet hashmaliciousBrowse
                          file.exeGet hashmaliciousBrowse
                            file.exeGet hashmaliciousBrowse
                              file.exeGet hashmaliciousBrowse
                                file.exeGet hashmaliciousBrowse
                                  file.exeGet hashmaliciousBrowse
                                    file.exeGet hashmaliciousBrowse
                                      file.exeGet hashmaliciousBrowse
                                        file.exeGet hashmaliciousBrowse
                                          file.exeGet hashmaliciousBrowse
                                            file.exeGet hashmaliciousBrowse
                                              file.exeGet hashmaliciousBrowse
                                                file.exeGet hashmaliciousBrowse
                                                  file.exeGet hashmaliciousBrowse
                                                    file.exeGet hashmaliciousBrowse
                                                      file.exeGet hashmaliciousBrowse
                                                        file.exeGet hashmaliciousBrowse
                                                          file.exeGet hashmaliciousBrowse
                                                            file.exeGet hashmaliciousBrowse
                                                              Process:C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):129024
                                                              Entropy (8bit):6.512109370826634
                                                              Encrypted:false
                                                              SSDEEP:3072:ox7pOYzBekTRmWDWCMq6As523HeS9FAiZ87vO2rlL3RnG9:ox7ZNhTR/dMq6AO0a7vVlT
                                                              MD5:349B2B47FEF50FA6A1FC19D0EE4B2DB8
                                                              SHA1:077F4328B3F060A9F010B1A63D9E127D24DDAFD4
                                                              SHA-256:5CD41F164DE6F783B7DA82B5F6DBD49413ECCD87CC7470F2004D58CA081FB0E0
                                                              SHA-512:83FD58BE4C0051ED05B7A03443D256D52F09206D2F433BD302C9E9E3780B9D472E823AED1DB01B5052DC8FDC63A4352BEAC9E399858A8252C057F11CF2BD1773
                                                              Malicious:true
                                                              Yara Hits:
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll, Author: Joe Security
                                                              • Rule: INDICATOR_TOOL_PWS_Amady, Description: Detects password stealer DLL. Dropped by Amadey, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll, Author: ditekSHen
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 88%
                                                              Joe Sandbox View:
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              Reputation:moderate, very likely benign file
                                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................X......x.............@..........................@..........................................O.......&.... ..............................................................................................................CODE................................ ..`DATA................................@...BSS......................................idata..&...........................@....edata..O...........................@..P.reloc..............................@..P.rsrc........ ......................@..P.............@......................@..P................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                                                              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
                                                              Category:dropped
                                                              Size (bytes):95068
                                                              Entropy (8bit):7.918851174293143
                                                              Encrypted:false
                                                              SSDEEP:1536:CmbM4iTkYMKsGHObkbXmBRn052EGdH/LaAD5Y9xe4dHEdI2uhiVxp669M6bpt:hiI5GubLR+GhWr7bddpKhN
                                                              MD5:6F8C496BA629E10E2BBF21C5BB00EA7B
                                                              SHA1:3C6C25B7C07632F85DF4E651F68FB849852D354A
                                                              SHA-256:00012D0BE6FC61DFF5851A32B162F2FDBBD13E1289213DEF91DCD25AF1C57B4B
                                                              SHA-512:58F718FCB6A4D3B53024B9CC00502641259825705562472FDA199C8856C9EB5C258072AC616C06F5849BDA077B0F5B88F4EBDD2638AF179627D4AC623F7AEE06
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..01KK...lq\....xcS.m..#Hm.....T......<!...wq5...v1.?S.....rHj-.U:...5............|..+.......}...<.>...H.......Wo.CK`/l.1./...C...W.....,1....R.0.W.M.!.l7.~S....."SW.^..c......^s........u,-n....A..?.2.....l.(.?....7..~.q$.f..1\.q[.....oS:.gOY".....f-%.P.b.Z....>.....4+..b.Y&..F...)Pq.L....... .....H.#.|..).?.H.'.|....).?m.....h.t......|4.%...d....
                                                              Process:C:\Users\user\Desktop\file.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):430592
                                                              Entropy (8bit):6.163540154379331
                                                              Encrypted:false
                                                              SSDEEP:6144:YecLXGqxxoij2Fjzp5/bCgXhh6K9W9n6ded89kTt:Y1LGq3NA5/bvIK9W9nbac
                                                              MD5:2396925CC38BE4F07BD426CF080256CE
                                                              SHA1:8884E5383B3601E59089F0D287ACAD1EFF20C676
                                                              SHA-256:E91BB1F7C2B2FFD094D3915F1FFFBFE929EFD49E1D732B51D60E8A378A8A066B
                                                              SHA-512:D0622E928CAD41C185244CED7E0AC587B256B9A773F85D8ADEC807B4CDCBB73E55AB03AF3C8A8EA4A67BA347F9FE21A30515CB9A5AC871189B4AADC9442432A9
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              Reputation:low
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.m....C...C...C...C(..C...C...C...C...C$%xC...C...C}..C...C...C...C...C...C...CRich...C........PE..L.....a.................n...P.......p............@.................................;e.......................................s..<.... ..............................................................0I..@............................................text...Vm.......n.................. ..`.data...${.......L...r..............@....wuve...............................@..@.bedicarp...........................@..@.rsrc........ ......................@..@.reloc..l............t..............@..B................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\Desktop\file.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:modified
                                                              Size (bytes):26
                                                              Entropy (8bit):3.95006375643621
                                                              Encrypted:false
                                                              SSDEEP:3:ggPYV:rPYV
                                                              MD5:187F488E27DB4AF347237FE461A079AD
                                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                              Malicious:true
                                                              Reputation:high, very likely benign file
                                                              Preview:[ZoneTransfer]....ZoneId=0
                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Entropy (8bit):6.163540154379331
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              • DOS Executable Generic (2002/1) 0.02%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:file.exe
                                                              File size:430592
                                                              MD5:2396925cc38be4f07bd426cf080256ce
                                                              SHA1:8884e5383b3601e59089f0d287acad1eff20c676
                                                              SHA256:e91bb1f7c2b2ffd094d3915f1fffbfe929efd49e1d732b51d60e8a378a8a066b
                                                              SHA512:d0622e928cad41c185244ced7e0ac587b256b9a773f85d8adec807b4cdcbb73e55ab03af3c8a8ea4a67ba347f9fe21a30515cb9a5ac871189b4aadc9442432a9
                                                              SSDEEP:6144:YecLXGqxxoij2Fjzp5/bCgXhh6K9W9n6ded89kTt:Y1LGq3NA5/bvIK9W9nbac
                                                              TLSH:F194D0003299C6F1E3A21D375819DBE1E93BB82BF7245537F3582B6F6E3328157A2215
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.m....C...C...C...C(..C...C...C...C...C$%xC...C...C}..C...C...C...C...C...C...CRich...C........PE..L......a.................n.
                                                              Icon Hash:8286dccea68c9ca4
                                                              Entrypoint:0x407096
                                                              Entrypoint Section:.text
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                              DLL Characteristics:TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x6190B3DA [Sun Nov 14 06:59:38 2021 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:5
                                                              OS Version Minor:0
                                                              File Version Major:5
                                                              File Version Minor:0
                                                              Subsystem Version Major:5
                                                              Subsystem Version Minor:0
                                                              Import Hash:eeffe9860bc9c6507e24465b9b5239be
                                                              Instruction
                                                              call 00007FD0B4BE489Ch
                                                              jmp 00007FD0B4BDEBFEh
                                                              mov edi, edi
                                                              push ebp
                                                              mov ebp, esp
                                                              sub esp, 28h
                                                              xor eax, eax
                                                              push ebx
                                                              mov ebx, dword ptr [ebp+0Ch]
                                                              push esi
                                                              mov esi, dword ptr [ebp+10h]
                                                              push edi
                                                              mov edi, dword ptr [ebp+08h]
                                                              mov byte ptr [ebp-08h], al
                                                              mov byte ptr [ebp-07h], al
                                                              mov byte ptr [ebp-06h], al
                                                              mov byte ptr [ebp-05h], al
                                                              mov byte ptr [ebp-04h], al
                                                              mov byte ptr [ebp-03h], al
                                                              mov byte ptr [ebp-02h], al
                                                              mov byte ptr [ebp-01h], al
                                                              cmp dword ptr [0044CB64h], eax
                                                              je 00007FD0B4BDED90h
                                                              push dword ptr [0044FB08h]
                                                              call 00007FD0B4BE37C8h
                                                              pop ecx
                                                              jmp 00007FD0B4BDED87h
                                                              mov eax, 0040CC48h
                                                              mov ecx, dword ptr [ebp+14h]
                                                              mov edx, 000000A6h
                                                              cmp ecx, edx
                                                              jg 00007FD0B4BDEEFAh
                                                              je 00007FD0B4BDEEE1h
                                                              cmp ecx, 19h
                                                              jg 00007FD0B4BDEE7Eh
                                                              je 00007FD0B4BDEE6Fh
                                                              mov edx, ecx
                                                              push 00000002h
                                                              pop ecx
                                                              sub edx, ecx
                                                              je 00007FD0B4BDEE53h
                                                              dec edx
                                                              je 00007FD0B4BDEE43h
                                                              sub edx, 05h
                                                              je 00007FD0B4BDEE2Bh
                                                              dec edx
                                                              je 00007FD0B4BDEE0Ch
                                                              sub edx, 05h
                                                              je 00007FD0B4BDEDF3h
                                                              dec edx
                                                              je 00007FD0B4BDEDC7h
                                                              sub edx, 09h
                                                              jne 00007FD0B4BDEF5Ah
                                                              mov dword ptr [ebp-28h], 00000003h
                                                              mov dword ptr [ebp-24h], 00401348h
                                                              fld qword ptr [edi]
                                                              lea ecx, dword ptr [ebp-28h]
                                                              fstp qword ptr [ebp-20h]
                                                              push ecx
                                                              fld qword ptr [ebx]
                                                              fstp qword ptr [ebp+00h]
                                                              Programming Language:
                                                              • [C++] VS2008 build 21022
                                                              • [ASM] VS2008 build 21022
                                                              • [ C ] VS2008 build 21022
                                                              • [IMP] VS2005 build 50727
                                                              • [RES] VS2008 build 21022
                                                              • [LNK] VS2008 build 21022
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x173c40x3c.text
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x520000x1a510.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x6d0000xda4.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x11f00x1c.text
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x49300x40.text
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x10000x19c.text
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x16d560x16e00False0.5955110143442623data6.70284422084366IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .data0x180000x37b240x34c00False0.5779074718601895data5.56923108020657IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .wuve0x500000xbb80xc00False0.008138020833333334data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .bedicar0x510000x2700x400False0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .rsrc0x520000x1a5100x1a600False0.6376073755924171data6.234348410854522IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0x6d0000x1c6c0x1e00False0.38958333333333334data3.8825877184339204IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountry
                                                              AFX_DIALOG_LAYOUT0x6a4500x2dataSlovakSlovakia
                                                              AFX_DIALOG_LAYOUT0x6a4380x2dataSlovakSlovakia
                                                              AFX_DIALOG_LAYOUT0x6a4400xcdataSlovakSlovakia
                                                              SUXUMOWUDAKOLA0x682d00x2107ASCII text, with very long lines (8455), with no line terminatorsSlovakSlovakia
                                                              RT_CURSOR0x6a4580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                                                              RT_CURSOR0x6b3000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                                                              RT_CURSOR0x6bbd00x130Device independent bitmap graphic, 32 x 64 x 1, image size 0SlovakSlovakia
                                                              RT_CURSOR0x6bd000xb0Device independent bitmap graphic, 16 x 32 x 1, image size 0SlovakSlovakia
                                                              RT_ICON0x529900x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x530580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x556000x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x55a980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x569400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x571e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x577500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x59cf80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x5ada00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x5b7280x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x5bbf80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x5caa00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x5d3480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x5da100x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SlovakSlovakia
                                                              RT_ICON0x5df780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x605200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x615c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SlovakSlovakia
                                                              RT_ICON0x61a980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSlovakSlovakia
                                                              RT_ICON0x629400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSlovakSlovakia
                                                              RT_ICON0x631e80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSlovakSlovakia
                                                              RT_ICON0x638b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSlovakSlovakia
                                                              RT_ICON0x63e180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216SlovakSlovakia
                                                              RT_ICON0x663c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096SlovakSlovakia
                                                              RT_ICON0x674680x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304SlovakSlovakia
                                                              RT_ICON0x67df00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024SlovakSlovakia
                                                              RT_STRING0x6bfc80x546dataSlovakSlovakia
                                                              RT_ACCELERATOR0x6a3d80x40dataSlovakSlovakia
                                                              RT_GROUP_CURSOR0x6bba80x22dataSlovakSlovakia
                                                              RT_GROUP_CURSOR0x6bdb00x22dataSlovakSlovakia
                                                              RT_GROUP_ICON0x61a300x68dataSlovakSlovakia
                                                              RT_GROUP_ICON0x55a680x30dataSlovakSlovakia
                                                              RT_GROUP_ICON0x5bb900x68dataSlovakSlovakia
                                                              RT_GROUP_ICON0x682580x76dataSlovakSlovakia
                                                              RT_VERSION0x6bdd80x1f0MS Windows COFF PowerPC object fileSlovakSlovakia
                                                              None0x6a4180xadataSlovakSlovakia
                                                              None0x6a4280xadataSlovakSlovakia
                                                              DLLImport
                                                              KERNEL32.dllFillConsoleOutputCharacterA, GetCPInfo, GetProfileIntW, GetSystemDefaultLCID, GetModuleHandleW, WaitNamedPipeW, TlsSetValue, GetPriorityClass, GetVolumeInformationA, LoadLibraryW, IsProcessInJob, AssignProcessToJobObject, GetCalendarInfoW, GetFileAttributesA, TransactNamedPipe, WriteConsoleW, GetVolumePathNameA, CreateJobObjectA, GetVolumeNameForVolumeMountPointA, FillConsoleOutputCharacterW, GetLastError, GetProcAddress, VirtualAlloc, EnumSystemCodePagesW, SetFileAttributesA, LoadLibraryA, WriteConsoleA, GetProcessWorkingSetSize, LocalAlloc, OpenJobObjectW, FoldStringW, FoldStringA, FindFirstChangeNotificationA, GetFileInformationByHandle, FindActCtxSectionStringW, LCMapStringW, GetConsoleAliasesW, GetFullPathNameW, HeapFree, HeapAlloc, Sleep, ExitProcess, GetStartupInfoW, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapReAlloc, WriteFile, GetStdHandle, GetModuleFileNameA, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlUnwind, SetHandleCount, GetFileType, GetStartupInfoA, SetFilePointer, TlsGetValue, TlsAlloc, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, InitializeCriticalSectionAndSpinCount, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RaiseException, GetConsoleOutputCP, MultiByteToWideChar, SetStdHandle, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, CreateFileA, GetModuleHandleA, HeapSize, GetLocaleInfoA, LCMapStringA, GetStringTypeA, GetStringTypeW, SetEndOfFile, GetProcessHeap, ReadFile
                                                              ADVAPI32.dllBackupEventLogW
                                                              Language of compilation systemCountry where language is spokenMap
                                                              SlovakSlovakia
                                                              No network behavior found

                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:10:31:56
                                                              Start date:09/12/2022
                                                              Path:C:\Users\user\Desktop\file.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Users\user\Desktop\file.exe
                                                              Imagebase:0x400000
                                                              File size:430592 bytes
                                                              MD5 hash:2396925CC38BE4F07BD426CF080256CE
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.259666135.00000000005D3000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000003.256458471.0000000000940000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                              Reputation:low

                                                              Target ID:1
                                                              Start time:10:32:03
                                                              Start date:09/12/2022
                                                              Path:C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe"
                                                              Imagebase:0x400000
                                                              File size:430592 bytes
                                                              MD5 hash:2396925CC38BE4F07BD426CF080256CE
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000001.00000003.293480849.00000000007CB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000001.00000003.271178795.0000000000680000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Amadey, Description: Yara detected Amadey bot, Source: 00000001.00000003.293433328.00000000007AF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              Antivirus matches:
                                                              • Detection: 100%, Joe Sandbox ML
                                                              Reputation:low

                                                              Target ID:2
                                                              Start time:10:32:10
                                                              Start date:09/12/2022
                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" /F
                                                              Imagebase:0x1050000
                                                              File size:185856 bytes
                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:3
                                                              Start time:10:32:10
                                                              Start date:09/12/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff745070000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:4
                                                              Start time:10:32:12
                                                              Start date:09/12/2022
                                                              Path:C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                                                              Imagebase:0x400000
                                                              File size:430592 bytes
                                                              MD5 hash:2396925CC38BE4F07BD426CF080256CE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000004.00000003.312159954.0000000000940000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000004.00000002.313317695.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000004.00000002.313317695.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000004.00000002.313412358.0000000000745000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                              Reputation:low

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:1.6%
                                                                Dynamic/Decrypted Code Coverage:6.2%
                                                                Signature Coverage:5.5%
                                                                Total number of Nodes:307
                                                                Total number of Limit Nodes:7
                                                                execution_graph 30064 405860 30065 405866 30064->30065 30071 41bacc 30065->30071 30068 405886 30070 405880 30075 41ba15 30071->30075 30074 41bb5a 67 API calls 4 library calls 30074->30070 30077 41ba21 CallCatchBlock 30075->30077 30076 41ba28 30100 41c750 14 API calls _free 30076->30100 30077->30076 30079 41ba48 30077->30079 30081 41ba5a 30079->30081 30082 41ba4d 30079->30082 30080 41ba2d 30101 41cc2c 25 API calls ___std_exception_copy 30080->30101 30092 41e06f 30081->30092 30102 41c750 14 API calls _free 30082->30102 30087 405873 30087->30068 30087->30074 30088 41ba77 30104 41bab5 LeaveCriticalSection ___scrt_uninitialize_crt 30088->30104 30089 41ba6a 30103 41c750 14 API calls _free 30089->30103 30093 41e07b CallCatchBlock 30092->30093 30105 41dea3 EnterCriticalSection 30093->30105 30095 41e089 30106 41e113 30095->30106 30100->30080 30101->30087 30102->30087 30103->30087 30104->30087 30105->30095 30113 41e136 30106->30113 30107 41e096 30120 41e0cf 30107->30120 30108 41e18e 30125 420873 14 API calls 2 library calls 30108->30125 30110 41e197 30126 41e5a1 14 API calls _free 30110->30126 30113->30107 30113->30108 30123 41e047 EnterCriticalSection 30113->30123 30124 41e05b LeaveCriticalSection 30113->30124 30114 41e1a0 30114->30107 30127 41f451 6 API calls _unexpected 30114->30127 30116 41e1bf 30128 41e047 EnterCriticalSection 30116->30128 30119 41e1d2 30119->30107 30129 41deeb LeaveCriticalSection 30120->30129 30122 41ba63 30122->30088 30122->30089 30123->30113 30124->30113 30125->30110 30126->30114 30127->30116 30128->30119 30129->30122 30130 900920 TerminateProcess 30131 90092b GetPEB 30132 900972 30131->30132 30133 90003c 30134 900049 30133->30134 30148 900e0f SetErrorMode SetErrorMode 30134->30148 30139 900265 30140 9002ce VirtualProtect 30139->30140 30142 90030b 30140->30142 30141 900439 VirtualFree 30146 9004be 30141->30146 30147 9005f4 LoadLibraryA 30141->30147 30142->30141 30143 9004e3 LoadLibraryA 30143->30146 30145 9008c7 30146->30143 30146->30147 30147->30145 30149 900223 30148->30149 30150 900d90 30149->30150 30151 900dad 30150->30151 30152 900dbb GetPEB 30151->30152 30153 900238 VirtualAlloc 30151->30153 30152->30153 30153->30139 30154 41e3ff 30159 41e1d5 30154->30159 30157 41e43e 30160 41e1f4 30159->30160 30161 41e207 30160->30161 30169 41e21c 30160->30169 30179 41c750 14 API calls _free 30161->30179 30163 41e20c 30180 41cc2c 25 API calls ___std_exception_copy 30163->30180 30165 41e217 30165->30157 30176 4235dd 30165->30176 30167 41e3ed 30185 41cc2c 25 API calls ___std_exception_copy 30167->30185 30174 41e33c 30169->30174 30181 422e6c 37 API calls 2 library calls 30169->30181 30171 41e38c 30171->30174 30182 422e6c 37 API calls 2 library calls 30171->30182 30173 41e3aa 30173->30174 30183 422e6c 37 API calls 2 library calls 30173->30183 30174->30165 30184 41c750 14 API calls _free 30174->30184 30186 422fa2 30176->30186 30179->30163 30180->30165 30181->30171 30182->30173 30183->30174 30184->30167 30185->30165 30187 422fae CallCatchBlock 30186->30187 30188 422fb5 30187->30188 30191 422fe0 30187->30191 30206 41c750 14 API calls _free 30188->30206 30190 422fba 30207 41cc2c 25 API calls ___std_exception_copy 30190->30207 30197 42356f 30191->30197 30196 422fc4 30196->30157 30209 41bd30 30197->30209 30202 4235a5 30204 423004 30202->30204 30264 41e5a1 14 API calls _free 30202->30264 30208 423037 LeaveCriticalSection __wsopen_s 30204->30208 30206->30190 30207->30196 30208->30196 30265 41bcad 30209->30265 30212 41bd54 30214 41bc90 30212->30214 30277 41bbde 30214->30277 30217 4235fd 30302 42334b 30217->30302 30220 423648 30320 41feca 30220->30320 30221 42362f 30334 41c73d 14 API calls _free 30221->30334 30224 423634 30335 41c750 14 API calls _free 30224->30335 30226 423656 30336 41c73d 14 API calls _free 30226->30336 30227 42366d 30333 4232b6 CreateFileW 30227->30333 30231 42365b 30337 41c750 14 API calls _free 30231->30337 30233 423723 GetFileType 30235 423775 30233->30235 30236 42372e GetLastError 30233->30236 30234 4236f8 GetLastError 30339 41c71a 14 API calls 2 library calls 30234->30339 30342 41fe15 15 API calls 3 library calls 30235->30342 30340 41c71a 14 API calls 2 library calls 30236->30340 30237 4236a6 30237->30233 30237->30234 30338 4232b6 CreateFileW 30237->30338 30240 42373c CloseHandle 30240->30224 30242 423765 30240->30242 30341 41c750 14 API calls _free 30242->30341 30244 4236eb 30244->30233 30244->30234 30246 423796 30248 4237e2 30246->30248 30343 4234c5 71 API calls 3 library calls 30246->30343 30247 42376a 30247->30224 30252 4237e9 30248->30252 30345 423063 71 API calls 3 library calls 30248->30345 30251 423817 30251->30252 30253 423825 30251->30253 30344 41e6f4 28 API calls 2 library calls 30252->30344 30255 423641 30253->30255 30256 4238a1 CloseHandle 30253->30256 30255->30202 30346 4232b6 CreateFileW 30256->30346 30258 4238cc 30259 4238d6 GetLastError 30258->30259 30263 4237f0 30258->30263 30347 41c71a 14 API calls 2 library calls 30259->30347 30261 4238e2 30348 41ffdd 15 API calls 3 library calls 30261->30348 30263->30255 30264->30204 30266 41bcc4 30265->30266 30267 41bccd 30265->30267 30266->30212 30273 41f2d6 5 API calls __wsopen_s 30266->30273 30267->30266 30274 41ee92 37 API calls 3 library calls 30267->30274 30269 41bced 30275 41f58b 37 API calls __fassign 30269->30275 30271 41bd03 30276 41f5b8 37 API calls __fassign 30271->30276 30273->30212 30274->30269 30275->30271 30276->30266 30278 41bc06 30277->30278 30279 41bbec 30277->30279 30280 41bc0d 30278->30280 30281 41bc2c 30278->30281 30295 41bd6f 14 API calls _free 30279->30295 30285 41bbf6 30280->30285 30296 41bd89 15 API calls __wsopen_s 30280->30296 30297 41ead8 MultiByteToWideChar 30281->30297 30285->30202 30285->30217 30286 41bc42 GetLastError 30298 41c71a 14 API calls 2 library calls 30286->30298 30287 41bc3b 30287->30286 30288 41bc68 30287->30288 30300 41bd89 15 API calls __wsopen_s 30287->30300 30288->30285 30301 41ead8 MultiByteToWideChar 30288->30301 30292 41bc4e 30299 41c750 14 API calls _free 30292->30299 30293 41bc7f 30293->30285 30293->30286 30295->30285 30296->30285 30297->30287 30298->30292 30299->30285 30300->30288 30301->30293 30303 42336c 30302->30303 30309 423386 30302->30309 30303->30309 30356 41c750 14 API calls _free 30303->30356 30306 42337b 30357 41cc2c 25 API calls ___std_exception_copy 30306->30357 30308 4233be 30310 4233ed 30308->30310 30358 41c750 14 API calls _free 30308->30358 30349 4232db 30309->30349 30317 423440 30310->30317 30360 41d9cf 25 API calls 2 library calls 30310->30360 30313 42343b 30315 4234b8 30313->30315 30313->30317 30314 4233e2 30359 41cc2c 25 API calls ___std_exception_copy 30314->30359 30361 41cc59 11 API calls __CreateFrameInfo 30315->30361 30317->30220 30317->30221 30319 4234c4 30321 41fed6 CallCatchBlock 30320->30321 30364 41dea3 EnterCriticalSection 30321->30364 30324 41ff02 30368 41fca4 15 API calls 3 library calls 30324->30368 30327 41fedd 30327->30324 30329 41ff71 EnterCriticalSection 30327->30329 30330 41ff24 30327->30330 30328 41ff07 30328->30330 30369 41fdf2 EnterCriticalSection 30328->30369 30329->30330 30331 41ff7e LeaveCriticalSection 30329->30331 30365 41ffd4 30330->30365 30331->30327 30333->30237 30334->30224 30335->30255 30336->30231 30337->30224 30338->30244 30339->30224 30340->30240 30341->30247 30342->30246 30343->30248 30344->30263 30345->30251 30346->30258 30347->30261 30348->30263 30351 4232f3 30349->30351 30350 42330e 30350->30308 30351->30350 30362 41c750 14 API calls _free 30351->30362 30353 423332 30363 41cc2c 25 API calls ___std_exception_copy 30353->30363 30355 42333d 30355->30308 30356->30306 30357->30309 30358->30314 30359->30310 30360->30313 30361->30319 30362->30353 30363->30355 30364->30327 30370 41deeb LeaveCriticalSection 30365->30370 30367 41ff44 30367->30226 30367->30227 30368->30328 30369->30330 30370->30367 30371 4186de 30372 4186ea CallCatchBlock 30371->30372 30397 418404 30372->30397 30374 4186f1 30375 41884a 30374->30375 30385 41871b ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 30374->30385 30427 418a67 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 30375->30427 30377 418851 30420 41b9ff 30377->30420 30381 41885f 30382 41873a 30383 4187bb 30405 41d42b 30383->30405 30385->30382 30385->30383 30423 41b9d9 37 API calls 5 library calls 30385->30423 30387 4187c1 30409 416830 30387->30409 30398 41840d 30397->30398 30429 418887 IsProcessorFeaturePresent 30398->30429 30400 418419 30430 419450 10 API calls 2 library calls 30400->30430 30402 41841e 30403 418422 30402->30403 30431 41946f 7 API calls 2 library calls 30402->30431 30403->30374 30406 41d434 30405->30406 30407 41d439 30405->30407 30432 41d18f 30406->30432 30407->30387 30410 40b2a0 30409->30410 30411 41683e 30410->30411 30481 406510 28 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 30411->30481 30413 416861 30482 4138b0 99 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 30413->30482 30415 41686e 30483 4167e0 CreateThread CreateThread CreateThread Sleep 30415->30483 30484 41b89d 30420->30484 30423->30383 30427->30377 30428 41b9c3 23 API calls __CreateFrameInfo 30428->30381 30429->30400 30430->30402 30431->30403 30433 41d198 30432->30433 30436 41d1ae 30432->30436 30433->30436 30438 41d1bb 30433->30438 30435 41d1a5 30435->30436 30451 41d30d 15 API calls 3 library calls 30435->30451 30436->30407 30439 41d1c4 30438->30439 30440 41d1c7 30438->30440 30439->30435 30452 421602 30440->30452 30445 41d1d9 30474 41e5a1 14 API calls _free 30445->30474 30447 41d1e4 30473 41e5a1 14 API calls _free 30447->30473 30449 41d208 30449->30435 30451->30436 30453 41d1ce 30452->30453 30454 42160b 30452->30454 30458 4219a3 GetEnvironmentStringsW 30453->30458 30475 41ef4f 37 API calls 3 library calls 30454->30475 30456 42162e 30476 421449 47 API calls 3 library calls 30456->30476 30459 421a13 30458->30459 30460 4219ba 30458->30460 30461 41d1d3 30459->30461 30462 421a19 FreeEnvironmentStringsW 30459->30462 30477 4218bf WideCharToMultiByte 30460->30477 30461->30445 30472 41d20e 25 API calls 3 library calls 30461->30472 30462->30461 30464 4219d3 30464->30459 30465 4219dd 30464->30465 30478 41ea8a 15 API calls 2 library calls 30465->30478 30467 4219e3 30468 4219fb 30467->30468 30479 4218bf WideCharToMultiByte 30467->30479 30480 41e5a1 14 API calls _free 30468->30480 30471 421a10 30471->30459 30472->30447 30473->30445 30474->30449 30475->30456 30476->30453 30477->30464 30478->30467 30479->30468 30480->30471 30481->30413 30482->30415 30485 41b8ab 30484->30485 30486 41b8bd 30484->30486 30512 418b89 GetModuleHandleW 30485->30512 30496 41b744 30486->30496 30489 41b8b0 30489->30486 30513 41b943 GetModuleHandleExW 30489->30513 30491 418857 30491->30428 30494 41b900 30497 41b750 CallCatchBlock 30496->30497 30519 41dea3 EnterCriticalSection 30497->30519 30499 41b75a 30520 41b7b0 30499->30520 30501 41b767 30524 41b785 30501->30524 30504 41b901 30529 41df02 GetPEB 30504->30529 30507 41b930 30510 41b943 __CreateFrameInfo 3 API calls 30507->30510 30508 41b910 GetPEB 30508->30507 30509 41b920 GetCurrentProcess TerminateProcess 30508->30509 30509->30507 30511 41b938 ExitProcess 30510->30511 30512->30489 30514 41b962 GetProcAddress 30513->30514 30515 41b985 30513->30515 30516 41b977 30514->30516 30517 41b8bc 30515->30517 30518 41b98b FreeLibrary 30515->30518 30516->30515 30517->30486 30518->30517 30519->30499 30521 41b7bc CallCatchBlock 30520->30521 30523 41b81d __CreateFrameInfo 30521->30523 30527 41d713 14 API calls __CreateFrameInfo 30521->30527 30523->30501 30528 41deeb LeaveCriticalSection 30524->30528 30526 41b773 30526->30491 30526->30504 30527->30523 30528->30526 30530 41b90b 30529->30530 30531 41df1c 30529->30531 30530->30507 30530->30508 30533 41f296 5 API calls _unexpected 30531->30533 30533->30530
                                                                APIs
                                                                • GetUserNameA.ADVAPI32(?,?), ref: 0040CD3E
                                                                • SetCurrentDirectoryA.KERNEL32(00000000,?,?), ref: 0040CD9C
                                                                  • Part of subcall function 00416A90: Concurrency::cancel_current_task.LIBCPMT ref: 00416B49
                                                                  • Part of subcall function 00402C70: RegOpenKeyExA.ADVAPI32(?,?,00000000,00000001,FBA00511,FBA00511), ref: 00402E1C
                                                                  • Part of subcall function 00402C70: RegQueryValueExA.ADVAPI32(FBA00511,?,00000000,00000000,?,00000400,?,?,00000000,00000001,FBA00511,FBA00511), ref: 00402E4A
                                                                  • Part of subcall function 00402C70: RegCloseKey.ADVAPI32(FBA00511,?,?,00000000,00000001,FBA00511,FBA00511), ref: 00402E56
                                                                  • Part of subcall function 00402C70: RegOpenKeyExA.ADVAPI32(80000001,80000001,00000000,000F003F,00000001), ref: 00402F63
                                                                  • Part of subcall function 00402C70: RegSetValueExA.ADVAPI32(80000001,?,00000000,00000002,?,?), ref: 00402F91
                                                                  • Part of subcall function 00402C70: RegCloseKey.ADVAPI32(80000001), ref: 00402F9A
                                                                  • Part of subcall function 004048C0: Sleep.KERNEL32(000003E8), ref: 004049A9
                                                                • GetFileAttributesA.KERNEL32(00000000), ref: 0040E4F1
                                                                • CreateDirectoryA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040E623
                                                                • GetFileAttributesA.KERNEL32(00000000), ref: 0040E738
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 0040ED75
                                                                • std::_Xinvalid_argument.LIBCPMT ref: 0040F9E5
                                                                  • Part of subcall function 00402C70: GdiplusStartup.GDIPLUS(?,?,00000000,FBA00511), ref: 004030CA
                                                                  • Part of subcall function 0040CBD0: SetCurrentDirectoryA.KERNEL32(00000000), ref: 0040EF9C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DirectoryFile$AttributesCloseCurrentNameOpenValue$Concurrency::cancel_current_taskCreateGdiplusModuleQuerySleepStartupUserXinvalid_argumentstd::_
                                                                • String ID: "$"$%$invalid stoi argument$stoi argument out of range
                                                                • API String ID: 1674928435-2043294232
                                                                • Opcode ID: d58a70c0b947218ce40ea755a6b85afed98bfd464afc2cec89cffcacd805f77e
                                                                • Instruction ID: ca7d88425734236cf169f520bb3e28de2df1445630f25be11c52c40f1bbbcbb8
                                                                • Opcode Fuzzy Hash: d58a70c0b947218ce40ea755a6b85afed98bfd464afc2cec89cffcacd805f77e
                                                                • Instruction Fuzzy Hash: 07632A71A001489BEB18DB38CD897DD7B729F86304F5082ADE409A73D6DB3D9EC48B59
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1328 41b901-41b90e call 41df02 1331 41b930-41b93c call 41b943 ExitProcess 1328->1331 1332 41b910-41b91e GetPEB 1328->1332 1332->1331 1333 41b920-41b92a GetCurrentProcess TerminateProcess 1332->1333 1333->1331
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(?,?,0041B900,0041BE86,?,NA,0041BE86,0041EF4E), ref: 0041B923
                                                                • TerminateProcess.KERNEL32(00000000,?,0041B900,0041BE86,?,NA,0041BE86,0041EF4E), ref: 0041B92A
                                                                • ExitProcess.KERNEL32 ref: 0041B93C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CurrentExitTerminate
                                                                • String ID:
                                                                • API String ID: 1703294689-0
                                                                • Opcode ID: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                                • Instruction ID: c3524ad3d233ec0a3a19b1bf7aedcb75de5af13a6c7a41cb1465cf438659ca8f
                                                                • Opcode Fuzzy Hash: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                                • Instruction Fuzzy Hash: 63E0B671120208EFCB216F65DD49AA97B79FB44751BC44439FA0586231CB39EE93CB98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1336 90092b-900970 GetPEB 1337 900972-900978 1336->1337 1338 90097a-90098a call 900d35 1337->1338 1339 90098c-90098e 1337->1339 1338->1339 1345 900992-900994 1338->1345 1339->1337 1341 900990 1339->1341 1342 900996-900998 1341->1342 1344 900a3b-900a3e 1342->1344 1345->1342 1346 90099d-9009d3 1345->1346 1347 9009dc-9009ee call 900d0c 1346->1347 1350 9009f0-900a3a 1347->1350 1351 9009d5-9009d8 1347->1351 1350->1344 1351->1347
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: .$GetProcAddress.$l
                                                                • API String ID: 0-2784972518
                                                                • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                • Instruction ID: 520dc34f5cb0e4c7ffaa731f1686fc0a207e8b75648b6858ea7761a596e9eef0
                                                                • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                • Instruction Fuzzy Hash: F7316AB6900609DFDB10CF99C880BAEBBF9FF88324F25404AD841A7351D775EA45CBA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1353 404350-40448b call 416f50 ShellExecuteA 1359 4044b5-4044c6 1353->1359 1360 40448d-404499 1353->1360 1361 4044ab-4044b2 call 4185df 1360->1361 1362 40449b-4044a9 1360->1362 1361->1359 1362->1361 1363 4044c7-40453a call 41cc3c call 416a90 * 3 call 404350 1362->1363
                                                                APIs
                                                                • ShellExecuteA.SHELL32(00000000,00429838,?,?,00000000,00000000), ref: 004043F2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExecuteShell
                                                                • String ID: runas
                                                                • API String ID: 587946157-4000483414
                                                                • Opcode ID: d80de1ca38c1f9366a18ecaf0721887ea901d7ba4e133c8412f7233846fa743a
                                                                • Instruction ID: 0d432a24b2a6eecf06ea0bc45d18f5c5656229febad52b915354dd5f9442050f
                                                                • Opcode Fuzzy Hash: d80de1ca38c1f9366a18ecaf0721887ea901d7ba4e133c8412f7233846fa743a
                                                                • Instruction Fuzzy Hash: 56411370600208EBDB04DF69C981BDE7BB9EB45344FA0822AFC15972C0C779E984CB85
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1175 4235fd-42362d call 42334b 1178 423648-423654 call 41feca 1175->1178 1179 42362f-42363a call 41c73d 1175->1179 1185 423656-42366b call 41c73d call 41c750 1178->1185 1186 42366d-4236b6 call 4232b6 1178->1186 1184 42363c-423643 call 41c750 1179->1184 1196 423922-423926 1184->1196 1185->1184 1194 423723-42372c GetFileType 1186->1194 1195 4236b8-4236c1 1186->1195 1200 423775-423778 1194->1200 1201 42372e-42375f GetLastError call 41c71a CloseHandle 1194->1201 1198 4236c3-4236c7 1195->1198 1199 4236f8-42371e GetLastError call 41c71a 1195->1199 1198->1199 1204 4236c9-4236f6 call 4232b6 1198->1204 1199->1184 1202 423781-423787 1200->1202 1203 42377a-42377f 1200->1203 1201->1184 1212 423765-423770 call 41c750 1201->1212 1208 42378b-4237d9 call 41fe15 1202->1208 1209 423789 1202->1209 1203->1208 1204->1194 1204->1199 1218 4237db-4237e7 call 4234c5 1208->1218 1219 4237f8-423820 call 423063 1208->1219 1209->1208 1212->1184 1218->1219 1226 4237e9 1218->1226 1224 423822-423823 1219->1224 1225 423825-423866 1219->1225 1227 4237eb-4237f3 call 41e6f4 1224->1227 1228 423887-423895 1225->1228 1229 423868-42386c 1225->1229 1226->1227 1227->1196 1232 423920 1228->1232 1233 42389b-42389f 1228->1233 1229->1228 1231 42386e-423882 1229->1231 1231->1228 1232->1196 1233->1232 1235 4238a1-4238d4 CloseHandle call 4232b6 1233->1235 1238 4238d6-423902 GetLastError call 41c71a call 41ffdd 1235->1238 1239 423908-42391c 1235->1239 1238->1239 1239->1232
                                                                APIs
                                                                  • Part of subcall function 004232B6: CreateFileW.KERNELBASE(00000000,00000000,?,004236A6,?,?,00000000,?,004236A6,00000000,0000000C), ref: 004232D3
                                                                • GetLastError.KERNEL32 ref: 00423711
                                                                • __dosmaperr.LIBCMT ref: 00423718
                                                                • GetFileType.KERNELBASE(00000000), ref: 00423724
                                                                • GetLastError.KERNEL32 ref: 0042372E
                                                                • __dosmaperr.LIBCMT ref: 00423737
                                                                • CloseHandle.KERNEL32(00000000), ref: 00423757
                                                                • CloseHandle.KERNEL32(?), ref: 004238A4
                                                                • GetLastError.KERNEL32 ref: 004238D6
                                                                • __dosmaperr.LIBCMT ref: 004238DD
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                • String ID:
                                                                • API String ID: 4237864984-0
                                                                • Opcode ID: 0d649afaf30192c5c19431845a951fd0479d0f23fa76b0b367cd72335b8b290c
                                                                • Instruction ID: c7b97c56f1a0d1b911df166da15c54d720095dd6c25035754b532be6d98a6b0c
                                                                • Opcode Fuzzy Hash: 0d649afaf30192c5c19431845a951fd0479d0f23fa76b0b367cd72335b8b290c
                                                                • Instruction Fuzzy Hash: 7CA15872A041149FCF19DF68EC917AE3BB1AB06325F54016EF811AB391CB7C8952CB5A
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1244 90003c-900047 1245 900049 1244->1245 1246 90004c-900263 call 900a3f call 900e0f call 900d90 VirtualAlloc 1244->1246 1245->1246 1261 900265-900289 call 900a69 1246->1261 1262 90028b-900292 1246->1262 1267 9002ce-9003c2 VirtualProtect call 900cce call 900ce7 1261->1267 1264 9002a1-9002b0 1262->1264 1266 9002b2-9002cc 1264->1266 1264->1267 1266->1264 1273 9003d1-9003e0 1267->1273 1274 9003e2-900437 call 900ce7 1273->1274 1275 900439-9004b8 VirtualFree 1273->1275 1274->1273 1276 9005f4-9005fe 1275->1276 1277 9004be-9004cd 1275->1277 1281 900604-90060d 1276->1281 1282 90077f-900789 1276->1282 1280 9004d3-9004dd 1277->1280 1280->1276 1286 9004e3-900505 LoadLibraryA 1280->1286 1281->1282 1287 900613-900637 1281->1287 1284 9007a6-9007b0 1282->1284 1285 90078b-9007a3 1282->1285 1288 9007b6-9007cb 1284->1288 1289 90086e-9008be LoadLibraryA 1284->1289 1285->1284 1290 900517-900520 1286->1290 1291 900507-900515 1286->1291 1292 90063e-900648 1287->1292 1293 9007d2-9007d5 1288->1293 1296 9008c7-9008f9 1289->1296 1294 900526-900547 1290->1294 1291->1294 1292->1282 1295 90064e-90065a 1292->1295 1297 900824-900833 1293->1297 1298 9007d7-9007e0 1293->1298 1299 90054d-900550 1294->1299 1295->1282 1300 900660-90066a 1295->1300 1301 900902-90091d 1296->1301 1302 9008fb-900901 1296->1302 1308 900839-90083c 1297->1308 1303 9007e2 1298->1303 1304 9007e4-900822 1298->1304 1305 9005e0-9005ef 1299->1305 1306 900556-90056b 1299->1306 1307 90067a-900689 1300->1307 1302->1301 1303->1297 1304->1293 1305->1280 1309 90056d 1306->1309 1310 90056f-90057a 1306->1310 1311 900750-90077a 1307->1311 1312 90068f-9006b2 1307->1312 1308->1289 1313 90083e-900847 1308->1313 1309->1305 1315 90059b-9005bb 1310->1315 1316 90057c-900599 1310->1316 1311->1292 1317 9006b4-9006ed 1312->1317 1318 9006ef-9006fc 1312->1318 1319 900849 1313->1319 1320 90084b-90086c 1313->1320 1327 9005bd-9005db 1315->1327 1316->1327 1317->1318 1321 90074b 1318->1321 1322 9006fe-900748 1318->1322 1319->1289 1320->1308 1321->1307 1322->1321 1327->1299
                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0090024D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID: cess$kernel32.dll
                                                                • API String ID: 4275171209-1230238691
                                                                • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                • Instruction ID: a333e6a411b48fa1e3fcca5256e1b4aee84f3571d1e6abc263e030b453690c43
                                                                • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                • Instruction Fuzzy Hash: 70527974A01229DFDB64CF58C984BACBBB1BF49304F1480D9E94DAB291DB34AE85DF14
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1375 42356f-4235a3 call 41bd30 call 41bc90 1380 4235a5-4235a8 1375->1380 1381 4235aa-4235bf call 4235fd 1375->1381 1382 4235c9-4235cd 1380->1382 1384 4235c4-4235c7 1381->1384 1385 4235d8-4235dc 1382->1385 1386 4235cf-4235d7 call 41e5a1 1382->1386 1384->1382 1386->1385
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: >A
                                                                • API String ID: 269201875-3365779530
                                                                • Opcode ID: 6d7cabbe3305cb9b6d011bf0e9d56addc9b4860a8407226052aa3c61f76cc774
                                                                • Instruction ID: 30ff9b9e87434c0f379a7433cd06ee0227cf71fd1282e2cff9dc0eafdffef8ec
                                                                • Opcode Fuzzy Hash: 6d7cabbe3305cb9b6d011bf0e9d56addc9b4860a8407226052aa3c61f76cc774
                                                                • Instruction Fuzzy Hash: A8017172D00159BFCF01AFA89C01ADE7FF5AF08304F14016AB918E2151E7398B609BC4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1389 41d1bb-41d1c2 1390 41d1c4-41d1c6 1389->1390 1391 41d1c7-41d1ce call 421602 call 4219a3 1389->1391 1395 41d1d3-41d1d7 1391->1395 1396 41d1d9-41d1dc 1395->1396 1397 41d1de-41d1e7 call 41d20e 1395->1397 1398 41d202-41d20d call 41e5a1 1396->1398 1402 41d1e9-41d1ec 1397->1402 1403 41d1ee-41d1f5 1397->1403 1405 41d1fa-41d201 call 41e5a1 1402->1405 1403->1405 1405->1398
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID:
                                                                • API String ID: 269201875-0
                                                                • Opcode ID: 9f5dec638c6018a6b24b976b0791b773a56ee0672529c52ab4d44372aafa3d49
                                                                • Instruction ID: f1d333090dd57bfd17dfe39ecb9b07313f9b1ca465b706eabb36e918cd1afe6e
                                                                • Opcode Fuzzy Hash: 9f5dec638c6018a6b24b976b0791b773a56ee0672529c52ab4d44372aafa3d49
                                                                • Instruction Fuzzy Hash: 4FE0E5B6E0242022E211623F7C46AEB11856BD133AB15022FF860861E0DF7C88C2D19E
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1408 900e0f-900e24 SetErrorMode * 2 1409 900e26 1408->1409 1410 900e2b-900e2c 1408->1410 1409->1410
                                                                APIs
                                                                • SetErrorMode.KERNELBASE(00000400,?,?,00900223,?,?), ref: 00900E19
                                                                • SetErrorMode.KERNELBASE(00000000,?,?,00900223,?,?), ref: 00900E1E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorMode
                                                                • String ID:
                                                                • API String ID: 2340568224-0
                                                                • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                • Instruction ID: a9ae9ecf61987860a9aad7c84a8effda743ffebd388c1edcb4f9afcbabe7c4d7
                                                                • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                • Instruction Fuzzy Hash: 01D0123114512877D7002A94DC09BCD7B1CDF05B62F008411FB0DE9080C770994046E5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1411 41e3ff-41e425 call 41e1d5 1414 41e427-41e439 call 4235dd 1411->1414 1415 41e47e-41e481 1411->1415 1417 41e43e-41e443 1414->1417 1417->1415 1418 41e445-41e47d 1417->1418
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __wsopen_s
                                                                • String ID:
                                                                • API String ID: 3347428461-0
                                                                • Opcode ID: 0d6bf0a7e9f29163ed6caaa22d8f5b82bf3e75d92930a2ecd6c24ab71e07ee1e
                                                                • Instruction ID: 322a9cb7d115cba5ea2c99f456cc5fe6d3c651e69e51ada78d95c10651760d14
                                                                • Opcode Fuzzy Hash: 0d6bf0a7e9f29163ed6caaa22d8f5b82bf3e75d92930a2ecd6c24ab71e07ee1e
                                                                • Instruction Fuzzy Hash: 14115775A0020AAFCF05DF59E9459DB7BF4EF48304F0040AAF808EB311D630EA21CBA8
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 0040CBD0: GetTempPathA.KERNEL32(00000104,?), ref: 0040B2FE
                                                                  • Part of subcall function 0040CBD0: GetModuleFileNameA.KERNEL32(00000000,?,00000104,FBA00511), ref: 0040A7BC
                                                                  • Part of subcall function 00406510: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00406540
                                                                  • Part of subcall function 0040CBD0: GetUserNameA.ADVAPI32(?,?), ref: 0040B96E
                                                                  • Part of subcall function 004138B0: IsUserAnAdmin.SHELL32 ref: 0041390D
                                                                  • Part of subcall function 004138B0: GetUserNameA.ADVAPI32(?,?), ref: 004139B7
                                                                  • Part of subcall function 004138B0: GetComputerNameExW.KERNEL32(00000002,?,?,?,?), ref: 00413A20
                                                                  • Part of subcall function 004167E0: CreateThread.KERNEL32 ref: 004167F6
                                                                  • Part of subcall function 004167E0: CreateThread.KERNEL32 ref: 00416807
                                                                  • Part of subcall function 004167E0: CreateThread.KERNEL32 ref: 00416818
                                                                  • Part of subcall function 004167E0: Sleep.KERNEL32(00007530,?,00416873), ref: 00416825
                                                                • InternetCloseHandle.WININET(00000000), ref: 00416887
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Name$CreateThreadUser$FileModule$AdminCloseComputerHandleInternetPathSleepTemp
                                                                • String ID:
                                                                • API String ID: 1411138196-0
                                                                • Opcode ID: 681845bb7bdad3a9b280c05efa4f412a3339f2d7827d3117315032cc1d5ff116
                                                                • Instruction ID: fcb51b4180ac2c01cd311fc2696d032aed602c74c46a29392a881be8b31f0bff
                                                                • Opcode Fuzzy Hash: 681845bb7bdad3a9b280c05efa4f412a3339f2d7827d3117315032cc1d5ff116
                                                                • Instruction Fuzzy Hash: 21E08671A0050407DA043BBA5D0B64E31184F8134CF94027FB815665D7EE6DD56441FF
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1438 4232b6-4232da CreateFileW
                                                                APIs
                                                                • CreateFileW.KERNELBASE(00000000,00000000,?,004236A6,?,?,00000000,?,004236A6,00000000,0000000C), ref: 004232D3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: 5f6f20da4e93aca7bdcb0ea2359822fb329caed46e02a9c52ac097750241beb4
                                                                • Instruction ID: cd0ee65043cc83d888fb6f456493c6bde9bec702db69a9442c4f6e90f97d0004
                                                                • Opcode Fuzzy Hash: 5f6f20da4e93aca7bdcb0ea2359822fb329caed46e02a9c52ac097750241beb4
                                                                • Instruction Fuzzy Hash: 77D06C3210010DFFDF128F84DC06EDA3BAAFB48724F414120BA1856020C732E872EB94
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1439 900920-900929 TerminateProcess
                                                                APIs
                                                                • TerminateProcess.KERNELBASE(000000FF,00000000), ref: 00900929
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ProcessTerminate
                                                                • String ID:
                                                                • API String ID: 560597551-0
                                                                • Opcode ID: a81f69529bcf2872433a6626b6dddab0307a3207cad9c1e7665d850a07e5ea8b
                                                                • Instruction ID: f1a77b98683cafb1fb7459b4dcf7902f75ab8b99c0f73db378513641b05b932d
                                                                • Opcode Fuzzy Hash: a81f69529bcf2872433a6626b6dddab0307a3207cad9c1e7665d850a07e5ea8b
                                                                • Instruction Fuzzy Hash: 1190026038415011D820259C4C02B0510021751634F3047107170B91D4D84496144126
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000001,FBA00511,FBA00511), ref: 00402E1C
                                                                • RegQueryValueExA.ADVAPI32(FBA00511,?,00000000,00000000,?,00000400,?,?,00000000,00000001,FBA00511,FBA00511), ref: 00402E4A
                                                                • RegCloseKey.ADVAPI32(FBA00511,?,?,00000000,00000001,FBA00511,FBA00511), ref: 00402E56
                                                                • RegOpenKeyExA.ADVAPI32(80000001,80000001,00000000,000F003F,00000001), ref: 00402F63
                                                                • RegSetValueExA.ADVAPI32(80000001,?,00000000,00000002,?,?), ref: 00402F91
                                                                • RegCloseKey.ADVAPI32(80000001), ref: 00402F9A
                                                                • GdiplusStartup.GDIPLUS(?,?,00000000,FBA00511), ref: 004030CA
                                                                • GetDC.USER32(00000000), ref: 004031C2
                                                                • RegGetValueA.ADVAPI32(80000002,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000004), ref: 00403449
                                                                • GetSystemMetrics.USER32 ref: 004034A2
                                                                • GetSystemMetrics.USER32 ref: 004034AB
                                                                • RegGetValueA.ADVAPI32(80000002,?,00000000), ref: 004034F3
                                                                • GetSystemMetrics.USER32 ref: 00403546
                                                                • GetSystemMetrics.USER32 ref: 0040354F
                                                                • CreateCompatibleDC.GDI32(?), ref: 0040355B
                                                                • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00403570
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00403580
                                                                • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 004035A6
                                                                • GdipCreateBitmapFromHBITMAP.GDIPLUS(00000000,00000000,?), ref: 004035BA
                                                                • GdipGetImageEncodersSize.GDIPLUS(00000000,?), ref: 004035D6
                                                                • GdipGetImageEncoders.GDIPLUS(00000000,00000000,00000000), ref: 00403603
                                                                • GdipSaveImageToFile.GDIPLUS(00000000,?,?,00000000), ref: 00403687
                                                                • SelectObject.GDI32(00000000,?), ref: 00403694
                                                                • DeleteObject.GDI32(00000000), ref: 004036A1
                                                                • DeleteObject.GDI32(?), ref: 004036A9
                                                                • ReleaseDC.USER32 ref: 004036B3
                                                                • GdipDisposeImage.GDIPLUS(00000000), ref: 004036BA
                                                                • GdiplusShutdown.GDIPLUS(?), ref: 0040375C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Gdip$ImageMetricsObjectSystemValue$Create$BitmapCloseCompatibleDeleteEncodersGdiplusOpenSelect$DisposeFileFromQueryReleaseSaveShutdownSizeStartup
                                                                • String ID: Pr<p$image/jpeg
                                                                • API String ID: 406439762-3751219293
                                                                • Opcode ID: 625a111996d65bc9ed0ed905ec51ae3e3c4fd81772ab0eac13281042dc8f5b47
                                                                • Instruction ID: ef3e356fa5e9885fc08513456cc6264c1fb040e0d3da28046e10bcebe11668ea
                                                                • Opcode Fuzzy Hash: 625a111996d65bc9ed0ed905ec51ae3e3c4fd81772ab0eac13281042dc8f5b47
                                                                • Instruction Fuzzy Hash: A362F471A00108ABEB18DF28CD85BDDBB76EF45304F50826EE805B72D1DB799A85CB58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403F66
                                                                • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00403FCB
                                                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00403FE4
                                                                • GetThreadContext.KERNEL32(?,00000000), ref: 00403FFF
                                                                • ReadProcessMemory.KERNEL32(?, ,?,00000004,00000000), ref: 00404023
                                                                • GetModuleHandleA.KERNEL32(ntdll.dll,NtUnmapViewOfSection), ref: 0040403E
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00404045
                                                                • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 0040406D
                                                                • WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000), ref: 0040408E
                                                                • WriteProcessMemory.KERNEL32(?,?,?,?,00000000,?,?,00000000), ref: 004040D2
                                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000,?,?,00000000), ref: 0040410E
                                                                • SetThreadContext.KERNEL32(?,00000000,?,?,00000000), ref: 0040412A
                                                                • ResumeThread.KERNEL32(?,?,?,00000000), ref: 00404136
                                                                • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000), ref: 00404144
                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00404165
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$MemoryVirtual$ThreadWrite$AllocContextFreeModule$AddressCreateFileHandleNameProcReadResume
                                                                • String ID: $NtUnmapViewOfSection$ntdll.dll
                                                                • API String ID: 4033543172-1522589568
                                                                • Opcode ID: 2fc5be1b3ec4d92441bc9103c4f92097ff01d4c177745f7de35fcca25cf32f0a
                                                                • Instruction ID: 7185e54e9f5f5e6bc342fc5ffd2bfcf32a837d4cfdcfbf42461452ed81247528
                                                                • Opcode Fuzzy Hash: 2fc5be1b3ec4d92441bc9103c4f92097ff01d4c177745f7de35fcca25cf32f0a
                                                                • Instruction Fuzzy Hash: 66518971600218EBDB209F54DC49FEAB7B8FF48701F9040B6F708AA291D7B1A995CF58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetUserNameW.ADVAPI32(00000000,?), ref: 00403822
                                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403837
                                                                • HeapAlloc.KERNEL32(00000000), ref: 0040383A
                                                                • GetUserNameW.ADVAPI32(00000000,?), ref: 00403848
                                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 0040386B
                                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403876
                                                                • HeapAlloc.KERNEL32(00000000), ref: 00403879
                                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403889
                                                                • HeapAlloc.KERNEL32(00000000), ref: 0040388C
                                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 004038B6
                                                                • ConvertSidToStringSidW.ADVAPI32(00000000,00000000), ref: 004038C9
                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 004039C5
                                                                • HeapFree.KERNEL32(00000000), ref: 004039CE
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004039D3
                                                                • HeapFree.KERNEL32(00000000), ref: 004039D6
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004039DD
                                                                • HeapFree.KERNEL32(00000000), ref: 004039E0
                                                                • LocalFree.KERNEL32(00000000), ref: 004039E5
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Heap$Process$FreeName$Alloc$AccountLookupUser$ConvertLocalString
                                                                • String ID:
                                                                • API String ID: 3326663573-0
                                                                • Opcode ID: 93a4281d13f0704140c6beef434c464d6d8b3a4c89b9e3582a668aa3840330e6
                                                                • Instruction ID: 167f534f4a5bc3f8c65bdd595c5ec8e1d54d44385eb9c59962b1969d814595bf
                                                                • Opcode Fuzzy Hash: 93a4281d13f0704140c6beef434c464d6d8b3a4c89b9e3582a668aa3840330e6
                                                                • Instruction Fuzzy Hash: EA716DB1E00209ABDB14DFA5DC85BEFBBBCEB48300F40453AE905A7281DB749905CBA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 009041CD
                                                                • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00904232
                                                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0090424B
                                                                • GetThreadContext.KERNEL32(?,00000000), ref: 00904266
                                                                • ReadProcessMemory.KERNEL32(?,00434ECC,?,00000004,00000000), ref: 0090428A
                                                                • GetModuleHandleA.KERNEL32(00434EE8,00434ED0), ref: 009042A5
                                                                • GetProcAddress.KERNEL32(00000000), ref: 009042AC
                                                                • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 009042D4
                                                                • WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000), ref: 009042F5
                                                                • WriteProcessMemory.KERNEL32(?,?,?,?,00000000,?,?,00000000), ref: 00904339
                                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000,?,?,00000000), ref: 00904375
                                                                • SetThreadContext.KERNEL32(?,00000000,?,?,00000000), ref: 00904391
                                                                • ResumeThread.KERNEL32(?,?,?,00000000), ref: 0090439D
                                                                • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000), ref: 009043AB
                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 009043CC
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$MemoryVirtual$ThreadWrite$AllocContextFreeModule$AddressCreateFileHandleNameProcReadResume
                                                                • String ID:
                                                                • API String ID: 4033543172-0
                                                                • Opcode ID: 2fc5be1b3ec4d92441bc9103c4f92097ff01d4c177745f7de35fcca25cf32f0a
                                                                • Instruction ID: 47865855c339fcac2aa575af8c197fa55696cef6e415eee374fa9b57d342aedf
                                                                • Opcode Fuzzy Hash: 2fc5be1b3ec4d92441bc9103c4f92097ff01d4c177745f7de35fcca25cf32f0a
                                                                • Instruction Fuzzy Hash: 1B516871A40218AFDB219B54DD45FEAB7B8FF08701F9000B5FA08EA2D1D7B1A995CF58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • InternetOpenW.WININET(00434EF4,00000000,00000000,00000000,00000000), ref: 0040425C
                                                                • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 0040426E
                                                                • InternetReadFile.WININET(00000000,?,03E80000,03E80000), ref: 00404281
                                                                • InternetCloseHandle.WININET(00000000), ref: 00404292
                                                                • InternetCloseHandle.WININET(00000000), ref: 00404295
                                                                • InternetCloseHandle.WININET(00000000), ref: 004042A3
                                                                • InternetCloseHandle.WININET(00000000), ref: 004042A6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Internet$CloseHandle$Open$FileRead
                                                                • String ID: runas
                                                                • API String ID: 4294395943-4000483414
                                                                • Opcode ID: a0e62042591dcd607715080cbff65227e67b358108453fe37a7e00f2974e3f0f
                                                                • Instruction ID: ba1dc25ec83469701d4c7edc2e7ba4793e46b241d410edfdecdbeb0a0fce58bd
                                                                • Opcode Fuzzy Hash: a0e62042591dcd607715080cbff65227e67b358108453fe37a7e00f2974e3f0f
                                                                • Instruction Fuzzy Hash: 4951D571E00108ABDB14DFA4DC41BEEBB75EF85300F60816EF915B7291D7389945CBA8
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$InformationTimeZone
                                                                • String ID:
                                                                • API String ID: 597776487-0
                                                                • Opcode ID: 0fe61e17206dce54771a5055940e70056e7a200eab18ece9396fc025dad7d191
                                                                • Instruction ID: 2c4f844ee906d1c5b8a05b7d4d89c1c9074c071bb98950a21f89e01ce9d05ddf
                                                                • Opcode Fuzzy Hash: 0fe61e17206dce54771a5055940e70056e7a200eab18ece9396fc025dad7d191
                                                                • Instruction Fuzzy Hash: 1FC17835B00128ABDB209F69EC41BAB7BA9EFC5354F94416FE550D7381E7388E01CB88
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetVersionExW.KERNEL32(0000011C,?,FBA00511,00000000), ref: 00405479
                                                                • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004054E0
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004054E7
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressHandleModuleProcVersion
                                                                • String ID:
                                                                • API String ID: 3310240892-0
                                                                • Opcode ID: 025e2cf7a5914327391402419fbf5478b425843cba7f01ef3a6bcbe6256d18f7
                                                                • Instruction ID: 1307c1e28f23caf99c3cad6e9d6b2b61846357279e254348caa37701d54b456e
                                                                • Opcode Fuzzy Hash: 025e2cf7a5914327391402419fbf5478b425843cba7f01ef3a6bcbe6256d18f7
                                                                • Instruction Fuzzy Hash: B8513971900608ABDB14DB24DD497DE7B76EB46314F5042BAE805B73C1DB389EC48F99
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0041CB78
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0041CB82
                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0041CB8F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                • String ID:
                                                                • API String ID: 3906539128-0
                                                                • Opcode ID: d01e7f133785e3bb0beafcf269aef2531f9dd5a62572b740f5956f5575e894ef
                                                                • Instruction ID: ff4d1174fdddd5ebc348feb1509e890b27b9c9d6be8b5b558b14357fec343526
                                                                • Opcode Fuzzy Hash: d01e7f133785e3bb0beafcf269aef2531f9dd5a62572b740f5956f5575e894ef
                                                                • Instruction Fuzzy Hash: 8C31A275901228ABCB21DF65D989BD9BBB8AF08310F5041EAE40CA6251EB749F858F58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0091CDDF
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0091CDE9
                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0091CDF6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                • String ID:
                                                                • API String ID: 3906539128-0
                                                                • Opcode ID: d01e7f133785e3bb0beafcf269aef2531f9dd5a62572b740f5956f5575e894ef
                                                                • Instruction ID: 28e3415dce9daf1f57a745cb9ca0de07979e7e8adc76e651560d475a155874d3
                                                                • Opcode Fuzzy Hash: d01e7f133785e3bb0beafcf269aef2531f9dd5a62572b740f5956f5575e894ef
                                                                • Instruction Fuzzy Hash: E331C674A0121C9BCB21DF68D9897DDBBB8BF48710F5041EAE41CA6251E7709FD58F44
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(0091F1B5,?,0091BB67,0091C0ED,?,0091F1B5,0091C0ED,0091F1B5), ref: 0091BB8A
                                                                • TerminateProcess.KERNEL32(00000000,?,0091BB67,0091C0ED,?,0091F1B5,0091C0ED,0091F1B5), ref: 0091BB91
                                                                • ExitProcess.KERNEL32 ref: 0091BBA3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CurrentExitTerminate
                                                                • String ID:
                                                                • API String ID: 1703294689-0
                                                                • Opcode ID: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                                • Instruction ID: 3eb00b9f77b235fbc77a4c09d7a139db7d8923c227bd3391f1ace5b6a3fdf95a
                                                                • Opcode Fuzzy Hash: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                                • Instruction Fuzzy Hash: F2E09231244248EBCB216B65D809AA93BAAFB84741BC44434F80986525CB35DD92CA54
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00428488,?,?,00000008,?,?,00428120,00000000), ref: 004286BA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionRaise
                                                                • String ID:
                                                                • API String ID: 3997070919-0
                                                                • Opcode ID: 5ef4d00b5429483db4ee21fa4326bc925bf0c13a1e125d06c7f23f728c6050ca
                                                                • Instruction ID: 4a71125e6f4c823a3763720cf76552cabfd479d0aa9e4c8b08dce5cb0b77843e
                                                                • Opcode Fuzzy Hash: 5ef4d00b5429483db4ee21fa4326bc925bf0c13a1e125d06c7f23f728c6050ca
                                                                • Instruction Fuzzy Hash: 39B17B31211618DFD714CF28D48AB697BA0FF44364F65865DE89ACF3A1CB39E982CB44
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,009286EF,?,?,00000008,?,?,00928387,00000000), ref: 00928921
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionRaise
                                                                • String ID:
                                                                • API String ID: 3997070919-0
                                                                • Opcode ID: 5ef4d00b5429483db4ee21fa4326bc925bf0c13a1e125d06c7f23f728c6050ca
                                                                • Instruction ID: 6642dd05f8316dd916a896d817974448012b7bf92e168c18eae29257f1b4440a
                                                                • Opcode Fuzzy Hash: 5ef4d00b5429483db4ee21fa4326bc925bf0c13a1e125d06c7f23f728c6050ca
                                                                • Instruction Fuzzy Hash: 7AB18C35611618CFD718CF28D486B667BE0FF45364F298658E8EACF2A5C735E982CB40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0041889D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FeaturePresentProcessor
                                                                • String ID:
                                                                • API String ID: 2325560087-0
                                                                • Opcode ID: d55505ce439c0c625bb69c877a6f4797faed7c5d0db0f84db7aa582d50e4da23
                                                                • Instruction ID: 42c5aa6f6f7fc7f776cec8504a7906bb6cf0d019190ab3c9283af4763153d71d
                                                                • Opcode Fuzzy Hash: d55505ce439c0c625bb69c877a6f4797faed7c5d0db0f84db7aa582d50e4da23
                                                                • Instruction Fuzzy Hash: 92516AB2A10215CBDB18CF65D9817AEBBF4FB48314F24942BD445EB350D7789980CF6A
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d97f7f4797c3a364c903861215189f8d8653831c5c514b3b47f127515a30102c
                                                                • Instruction ID: 995ca3f643b73f20b77409ea83fcee654ff77a15ad0f1f03090dea471df43cee
                                                                • Opcode Fuzzy Hash: d97f7f4797c3a364c903861215189f8d8653831c5c514b3b47f127515a30102c
                                                                • Instruction Fuzzy Hash: FE41C4B5904228AEDB24DF69DC89AEABBB8EF45304F5442DEE40DD3211DA349E848F54
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d97f7f4797c3a364c903861215189f8d8653831c5c514b3b47f127515a30102c
                                                                • Instruction ID: f17ed17631185613e0974f3c68eefd0de4fcdf86dcdbe6e40fdb7fcadbc9e040
                                                                • Opcode Fuzzy Hash: d97f7f4797c3a364c903861215189f8d8653831c5c514b3b47f127515a30102c
                                                                • Instruction Fuzzy Hash: 1541A4B180422CAEDF20DF69DC89AEABBBDEF85300F1442D9E41DE3205D6319E858F50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • SetUnhandledExceptionFilter.KERNEL32(Function_00018BD8,004186D1), ref: 00418BD1
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled
                                                                • String ID:
                                                                • API String ID: 3192549508-0
                                                                • Opcode ID: 5b644bd4298714589124608af917b149a8cdb7aa3ad9eb7150b270449828aa51
                                                                • Instruction ID: fb13876baf3060654c4d3ec658a032312c050c0c5ceb920d56ad85ce90fc2474
                                                                • Opcode Fuzzy Hash: 5b644bd4298714589124608af917b149a8cdb7aa3ad9eb7150b270449828aa51
                                                                • Instruction Fuzzy Hash:
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5a3a9157b277817cb60641082f1e4f8ca4ec7dff310ffa31a6fd9bf35832d5c1
                                                                • Instruction ID: 2ed8bcd71233cdd26d40d40588c8b3db03f02c46a7ead0be40a967f157380f8c
                                                                • Opcode Fuzzy Hash: 5a3a9157b277817cb60641082f1e4f8ca4ec7dff310ffa31a6fd9bf35832d5c1
                                                                • Instruction Fuzzy Hash: F3E1875548E3C15FD7138B3449B5681BF70AE23114B1E96DBCCDA8E4A7D24CAA0EE732
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                • Instruction ID: 836b6cb189818071d5d152d6c3d8cd1a25b1ac1f9bf822a59482dcdb2b2a5351
                                                                • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                • Instruction Fuzzy Hash: 3B115B7730407157D605DA3DF8B46BBA395EFC9320FAC437BC0424B748D22A9C839508
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                • Instruction ID: cd2d6def0ea168070ea203d4fa9fa44f0e799964e925fd5460bd45be1438a453
                                                                • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                • Instruction Fuzzy Hash: BC11EB7B2611B143D6148E2DF9F41F7A7DDEBD5320F2D427AD0428F75CD122EA459A04
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                • Instruction ID: 567c10109addfba5efa79a0d59ea0cc09ae68345949f4a779214ad3919a58e14
                                                                • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                • Instruction Fuzzy Hash: 7401A276A006048FDF21CF64C804BAA33E9EBC6316F4544A5D90AAB2C2E774A9818F90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e0ad719187851a61f309ddbb2cee80a5110ae42387cecf94a10a94091515ac20
                                                                • Instruction ID: 75fb159916dc4249806a39f04cce895c1ac82e6549e7b4276809d1188ffe9861
                                                                • Opcode Fuzzy Hash: e0ad719187851a61f309ddbb2cee80a5110ae42387cecf94a10a94091515ac20
                                                                • Instruction Fuzzy Hash: 70E046B2921228EBCB24DF8999049CAF3ECEB49B04B2100AAB502D3200C274DF41C7D4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e0ad719187851a61f309ddbb2cee80a5110ae42387cecf94a10a94091515ac20
                                                                • Instruction ID: fe313f8a4db0f48ac5a15f3858cabba5eaf4b6548c08782c35345d5cf3c5b403
                                                                • Opcode Fuzzy Hash: e0ad719187851a61f309ddbb2cee80a5110ae42387cecf94a10a94091515ac20
                                                                • Instruction Fuzzy Hash: F5E08C32A1522CEBCB14DB8CD904ACAF7FCEB84F00B1144A6B901E3111C270DE40CBE0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ___free_lconv_mon.LIBCMT ref: 00422653
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422209
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 0042221B
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 0042222D
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 0042223F
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422251
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422263
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422275
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422287
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422299
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222AB
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222BD
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222CF
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222E1
                                                                • _free.LIBCMT ref: 00422648
                                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                                • _free.LIBCMT ref: 0042266A
                                                                • _free.LIBCMT ref: 0042267F
                                                                • _free.LIBCMT ref: 0042268A
                                                                • _free.LIBCMT ref: 004226AC
                                                                • _free.LIBCMT ref: 004226BF
                                                                • _free.LIBCMT ref: 004226CD
                                                                • _free.LIBCMT ref: 004226D8
                                                                • _free.LIBCMT ref: 00422710
                                                                • _free.LIBCMT ref: 00422717
                                                                • _free.LIBCMT ref: 00422734
                                                                • _free.LIBCMT ref: 0042274C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                • String ID:
                                                                • API String ID: 161543041-0
                                                                • Opcode ID: 2ebc8ac26202a0620aa625b36a1d2a8fe7bc692bad1c871fd446d657effbc3a9
                                                                • Instruction ID: 87a383156b0838ac626f9c2c6038cf6ce1f5ffd7cd3d592d57855f9c4539c293
                                                                • Opcode Fuzzy Hash: 2ebc8ac26202a0620aa625b36a1d2a8fe7bc692bad1c871fd446d657effbc3a9
                                                                • Instruction Fuzzy Hash: B6319272604211BFEB205A76EA45B9B73E5AF80358F50441FE849D7251DFBCED80DB18
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ___free_lconv_mon.LIBCMT ref: 009228BA
                                                                  • Part of subcall function 00922453: _free.LIBCMT ref: 00922470
                                                                  • Part of subcall function 00922453: _free.LIBCMT ref: 00922482
                                                                  • Part of subcall function 00922453: _free.LIBCMT ref: 00922494
                                                                  • Part of subcall function 00922453: _free.LIBCMT ref: 009224A6
                                                                  • Part of subcall function 00922453: _free.LIBCMT ref: 009224B8
                                                                  • Part of subcall function 00922453: _free.LIBCMT ref: 009224CA
                                                                  • Part of subcall function 00922453: _free.LIBCMT ref: 009224DC
                                                                  • Part of subcall function 00922453: _free.LIBCMT ref: 009224EE
                                                                  • Part of subcall function 00922453: _free.LIBCMT ref: 00922500
                                                                  • Part of subcall function 00922453: _free.LIBCMT ref: 00922512
                                                                  • Part of subcall function 00922453: _free.LIBCMT ref: 00922524
                                                                  • Part of subcall function 00922453: _free.LIBCMT ref: 00922536
                                                                  • Part of subcall function 00922453: _free.LIBCMT ref: 00922548
                                                                • _free.LIBCMT ref: 009228AF
                                                                  • Part of subcall function 0091E808: HeapFree.KERNEL32(00000000,00000000,?,009225E4,?,00000000,?,?,?,0092260B,?,00000007,?,?,00922A0D,?), ref: 0091E81E
                                                                  • Part of subcall function 0091E808: GetLastError.KERNEL32(?,?,009225E4,?,00000000,?,?,?,0092260B,?,00000007,?,?,00922A0D,?,?), ref: 0091E830
                                                                • _free.LIBCMT ref: 009228D1
                                                                • _free.LIBCMT ref: 009228E6
                                                                • _free.LIBCMT ref: 009228F1
                                                                • _free.LIBCMT ref: 00922913
                                                                • _free.LIBCMT ref: 00922926
                                                                • _free.LIBCMT ref: 00922934
                                                                • _free.LIBCMT ref: 0092293F
                                                                • _free.LIBCMT ref: 00922977
                                                                • _free.LIBCMT ref: 0092297E
                                                                • _free.LIBCMT ref: 0092299B
                                                                • _free.LIBCMT ref: 009229B3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                • String ID:
                                                                • API String ID: 161543041-0
                                                                • Opcode ID: 2ebc8ac26202a0620aa625b36a1d2a8fe7bc692bad1c871fd446d657effbc3a9
                                                                • Instruction ID: 73f32a29da1eb0e49a3805a95da45d433cbf92b183cb5faa6d51f008893ba708
                                                                • Opcode Fuzzy Hash: 2ebc8ac26202a0620aa625b36a1d2a8fe7bc692bad1c871fd446d657effbc3a9
                                                                • Instruction Fuzzy Hash: 0D316D31610319AFEB20AB38E949B9AB7EDEF40310F644469F859D71A5DB71ECC0CB20
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 00919E89
                                                                • type_info::operator==.LIBVCRUNTIME ref: 00919EB0
                                                                • ___TypeMatch.LIBVCRUNTIME ref: 00919FBC
                                                                • CatchIt.LIBVCRUNTIME ref: 0091A011
                                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 0091A097
                                                                • _UnwindNestedFrames.LIBCMT ref: 0091A11E
                                                                • CallUnexpected.LIBVCRUNTIME ref: 0091A139
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionSpec$CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                • String ID: csm$csm$csm
                                                                • API String ID: 4234981820-393685449
                                                                • Opcode ID: 7c1fb931e7428280153d6c09b5a5c630754522480dfed903c9c8a59691bc5c1e
                                                                • Instruction ID: b03b8247f1cd3639bc2aa2c2de5c4b6c4fdb27be9687167bc702bb4c8b25e417
                                                                • Opcode Fuzzy Hash: 7c1fb931e7428280153d6c09b5a5c630754522480dfed903c9c8a59691bc5c1e
                                                                • Instruction Fuzzy Hash: 29C19A71A0120DEFCF25DFA4C891AEEBBB9BF59310F04415AE8116B252D335DE91CB92
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 00419C22
                                                                • type_info::operator==.LIBVCRUNTIME ref: 00419C49
                                                                • ___TypeMatch.LIBVCRUNTIME ref: 00419D55
                                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 00419E30
                                                                • _UnwindNestedFrames.LIBCMT ref: 00419EB7
                                                                • CallUnexpected.LIBVCRUNTIME ref: 00419ED2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                • String ID: csm$csm$csm
                                                                • API String ID: 2123188842-393685449
                                                                • Opcode ID: 7c1fb931e7428280153d6c09b5a5c630754522480dfed903c9c8a59691bc5c1e
                                                                • Instruction ID: d03aefa22aee8cf5aa416bea0a170c685dbf4c7cd79984a2e6415da9b3a38480
                                                                • Opcode Fuzzy Hash: 7c1fb931e7428280153d6c09b5a5c630754522480dfed903c9c8a59691bc5c1e
                                                                • Instruction Fuzzy Hash: 49C18871900209EFCF29DFA5D8A19EEBBB5BF04314F14405BE8516B242D339DE91CB9A
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00408BAC
                                                                • InternetOpenA.WININET(0043432B,00000000,00000000,00000000,00000000), ref: 00408BC2
                                                                • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 00408BE2
                                                                • InternetReadFile.WININET(00000000,00000000,?,?), ref: 00408BF3
                                                                • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00408C15
                                                                • InternetReadFile.WININET(00000000,00000000,?,?), ref: 00408C20
                                                                • CloseHandle.KERNEL32(?), ref: 00408C32
                                                                • InternetCloseHandle.WININET(?), ref: 00408C41
                                                                • InternetCloseHandle.WININET(00000000), ref: 00408C44
                                                                • RemoveDirectoryA.KERNEL32(00000000,?,?,?), ref: 00408CFD
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Internet$File$CloseHandle$OpenRead$CreateDirectoryRemoveWrite
                                                                • String ID:
                                                                • API String ID: 1496009958-0
                                                                • Opcode ID: d6c720663f9b5b78fa5f1015a3dfa6bc7eec9ceecaca795ede3bf18aecdef0c6
                                                                • Instruction ID: e39da941a42be4000a8416f9d2a6f8c848e32a180712f45a109694aa4e2734ce
                                                                • Opcode Fuzzy Hash: d6c720663f9b5b78fa5f1015a3dfa6bc7eec9ceecaca795ede3bf18aecdef0c6
                                                                • Instruction Fuzzy Hash: 6E71EF71600208ABEB14DF64DD85BEE7735EF44304F50423EF945AB2D1DB38A980CB68
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 0041ED90
                                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                                • _free.LIBCMT ref: 0041ED9C
                                                                • _free.LIBCMT ref: 0041EDA7
                                                                • _free.LIBCMT ref: 0041EDB2
                                                                • _free.LIBCMT ref: 0041EDBD
                                                                • _free.LIBCMT ref: 0041EDC8
                                                                • _free.LIBCMT ref: 0041EDD3
                                                                • _free.LIBCMT ref: 0041EDDE
                                                                • _free.LIBCMT ref: 0041EDE9
                                                                • _free.LIBCMT ref: 0041EDF7
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: b518f20b764996853f57fbd2a3fdc4e7bf3deb810a08f9cd0b2a52dd965201da
                                                                • Instruction ID: e610bd300bd5c2f85586062e27af9f16ff799e012d6f089a2169b26ee7872c24
                                                                • Opcode Fuzzy Hash: b518f20b764996853f57fbd2a3fdc4e7bf3deb810a08f9cd0b2a52dd965201da
                                                                • Instruction Fuzzy Hash: ED219CBA910108BFCB41EF96C941DDD7BF6BF88344F00416AF9199B121EB35DA84DB84
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f5ce67aa41b5f7f4889b1a1a20be5028291e55dfd00ef2a2d6d7ad31bcea8bed
                                                                • Instruction ID: 5128a0cef717139e7719faf6ed0b9fe75c650819d7ce78bb109199c1610a9dbc
                                                                • Opcode Fuzzy Hash: f5ce67aa41b5f7f4889b1a1a20be5028291e55dfd00ef2a2d6d7ad31bcea8bed
                                                                • Instruction Fuzzy Hash: D3C114B4B002159FDF11DF99E880BAEBBB0BF49304F51406AE914A7382C7789D81CF69
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f5ce67aa41b5f7f4889b1a1a20be5028291e55dfd00ef2a2d6d7ad31bcea8bed
                                                                • Instruction ID: a312a967e7d33081e48440c1b11a92d6a8e24dc1c6a4e4ba106a157e7a3c58f2
                                                                • Opcode Fuzzy Hash: f5ce67aa41b5f7f4889b1a1a20be5028291e55dfd00ef2a2d6d7ad31bcea8bed
                                                                • Instruction Fuzzy Hash: 23C116B1E04259AFDF11DF98EC80BADBBB4BF89300F148069E541A779AC7349D81CB61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$___from_strstr_to_strchr
                                                                • String ID:
                                                                • API String ID: 3409252457-0
                                                                • Opcode ID: 17a2c5d05d88992eb6c4295c13d4ba7d46687f58b453e92c494b9aad345095be
                                                                • Instruction ID: f188bb2de727b7b751c2d84351da10a70f250225146cef8743706f99745805fe
                                                                • Opcode Fuzzy Hash: 17a2c5d05d88992eb6c4295c13d4ba7d46687f58b453e92c494b9aad345095be
                                                                • Instruction Fuzzy Hash: 0E518C74F44324AFDB24AFB7A881A6E7BB4AF11314F54416FE410972A1EA3D8940CB5D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$___from_strstr_to_strchr
                                                                • String ID:
                                                                • API String ID: 3409252457-0
                                                                • Opcode ID: 17a2c5d05d88992eb6c4295c13d4ba7d46687f58b453e92c494b9aad345095be
                                                                • Instruction ID: 79603d8c938d4cb5cc3053aea00248fd5033e236be0824de408aa7eb2306cab8
                                                                • Opcode Fuzzy Hash: 17a2c5d05d88992eb6c4295c13d4ba7d46687f58b453e92c494b9aad345095be
                                                                • Instruction Fuzzy Hash: 18515B70E04325AFEB20AF74BC85BAE7BB8FF61310F154169ED1097289DB3199A0CB51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00903AA1
                                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 00903AD2
                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00903AE0
                                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00903AF3
                                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 00903B1D
                                                                • ConvertSidToStringSidW.ADVAPI32(00000000,00000000), ref: 00903B30
                                                                • LocalFree.KERNEL32(00000000), ref: 00903C4C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateHeap$AccountLookupName$ConvertFreeLocalString
                                                                • String ID:
                                                                • API String ID: 856199767-0
                                                                • Opcode ID: a21390300934cd29b774af7455bbd4a5da11480314e204e02bb9cb101a81b481
                                                                • Instruction ID: 43f14e2c16035f7adb5b0d9711097b4a937949b4b5869a25f3ef3557981b297a
                                                                • Opcode Fuzzy Hash: a21390300934cd29b774af7455bbd4a5da11480314e204e02bb9cb101a81b481
                                                                • Instruction Fuzzy Hash: 0D716DB1E00219AFEB149FA5DC85BFFBBBCEF48300F408529E905A3281DB349945CB60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _ValidateLocalCookies.LIBCMT ref: 00419507
                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 0041950F
                                                                • _ValidateLocalCookies.LIBCMT ref: 00419598
                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 004195C3
                                                                • _ValidateLocalCookies.LIBCMT ref: 00419618
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                • String ID: csm
                                                                • API String ID: 1170836740-1018135373
                                                                • Opcode ID: 170db4f13a52bbc04fbb15fe7ab42c90d24a7c19ae8ceb0e3c19913b98646896
                                                                • Instruction ID: cf6a3be1c1e6f4323defd25786acadca5afaa418f9c93884064ec3a043526e94
                                                                • Opcode Fuzzy Hash: 170db4f13a52bbc04fbb15fe7ab42c90d24a7c19ae8ceb0e3c19913b98646896
                                                                • Instruction Fuzzy Hash: 09411A31A00214AFCF11DF69C890ADEBBB1BF45318F54806BE8146B352D739DE96CB99
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: api-ms-$ext-ms-
                                                                • API String ID: 0-537541572
                                                                • Opcode ID: d346eea9aafd959945e16ecfc9ebbe047e966c499b5e8e0d3b3e0bbc48b51e8c
                                                                • Instruction ID: 8946f5363388c355846af12649c4142b4e9cf4c5f65ba016e67a922269825e5f
                                                                • Opcode Fuzzy Hash: d346eea9aafd959945e16ecfc9ebbe047e966c499b5e8e0d3b3e0bbc48b51e8c
                                                                • Instruction Fuzzy Hash: 3521C672A41221FBCB318A24DC45A9B3778AB017A0F650532ED15A7391D638ED4BC5DC
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 00422353: _free.LIBCMT ref: 00422378
                                                                • _free.LIBCMT ref: 004223D9
                                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                                • _free.LIBCMT ref: 004223E4
                                                                • _free.LIBCMT ref: 004223EF
                                                                • _free.LIBCMT ref: 00422443
                                                                • _free.LIBCMT ref: 0042244E
                                                                • _free.LIBCMT ref: 00422459
                                                                • _free.LIBCMT ref: 00422464
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 745ba4c7df38b0c8b3501d58b22aa89868de86b005191e755d783c3d27d16807
                                                                • Instruction ID: 3666b1e76cecdb1a9706d82e7bd79ae187b091a1e89744abee2c0a3d449e73e2
                                                                • Opcode Fuzzy Hash: 745ba4c7df38b0c8b3501d58b22aa89868de86b005191e755d783c3d27d16807
                                                                • Instruction Fuzzy Hash: C611E471601714BAD921F7B2DD47FCB77DD5F0834CF84881EBACD6A052D6ACB6514604
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 009225BA: _free.LIBCMT ref: 009225DF
                                                                • _free.LIBCMT ref: 00922640
                                                                  • Part of subcall function 0091E808: HeapFree.KERNEL32(00000000,00000000,?,009225E4,?,00000000,?,?,?,0092260B,?,00000007,?,?,00922A0D,?), ref: 0091E81E
                                                                  • Part of subcall function 0091E808: GetLastError.KERNEL32(?,?,009225E4,?,00000000,?,?,?,0092260B,?,00000007,?,?,00922A0D,?,?), ref: 0091E830
                                                                • _free.LIBCMT ref: 0092264B
                                                                • _free.LIBCMT ref: 00922656
                                                                • _free.LIBCMT ref: 009226AA
                                                                • _free.LIBCMT ref: 009226B5
                                                                • _free.LIBCMT ref: 009226C0
                                                                • _free.LIBCMT ref: 009226CB
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 745ba4c7df38b0c8b3501d58b22aa89868de86b005191e755d783c3d27d16807
                                                                • Instruction ID: f0502966c2378b057e8740c9db177374b2e74779ca55fe5d4de3eb5456d6738a
                                                                • Opcode Fuzzy Hash: 745ba4c7df38b0c8b3501d58b22aa89868de86b005191e755d783c3d27d16807
                                                                • Instruction Fuzzy Hash: DD115B72540718B6E730F7B0DC07FCBB79DAF84700F404C25FA9966056D679B9844750
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetConsoleCP.KERNEL32(?,00405880,00000000), ref: 00423A8E
                                                                • __fassign.LIBCMT ref: 00423C6D
                                                                • __fassign.LIBCMT ref: 00423C8A
                                                                • WriteFile.KERNEL32(?,00405880,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00423CD2
                                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00423D12
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00423DBE
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileWrite__fassign$ConsoleErrorLast
                                                                • String ID:
                                                                • API String ID: 4031098158-0
                                                                • Opcode ID: 5a0c35df1f21bdc5310913443ad541efee69954072d07ce9ea6e444a121a2afd
                                                                • Instruction ID: 55294dd1ed643e62d688e25fe7fc8b93d32e6dca02253c809cdcf0ede3e7f937
                                                                • Opcode Fuzzy Hash: 5a0c35df1f21bdc5310913443ad541efee69954072d07ce9ea6e444a121a2afd
                                                                • Instruction Fuzzy Hash: 21D1A075E002689FCF15CFA8D8809EDBBB5BF48314F64016AE455FB342D738AA46CB58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetConsoleCP.KERNEL32(?,00905AE7,00000000), ref: 00923CF5
                                                                • __fassign.LIBCMT ref: 00923ED4
                                                                • __fassign.LIBCMT ref: 00923EF1
                                                                • WriteFile.KERNEL32(?,00905AE7,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00923F39
                                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00923F79
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00924025
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileWrite__fassign$ConsoleErrorLast
                                                                • String ID:
                                                                • API String ID: 4031098158-0
                                                                • Opcode ID: e542d5d4a89b9a95555eca30389ef7d2b429d4e8e228d9549bf9bdf1a88ffcb9
                                                                • Instruction ID: 04569f86539a572a6ac5cdf8ead83c52c697729a0b311242235c68ee31b3ae89
                                                                • Opcode Fuzzy Hash: e542d5d4a89b9a95555eca30389ef7d2b429d4e8e228d9549bf9bdf1a88ffcb9
                                                                • Instruction Fuzzy Hash: 8CD1CD75D002689FCF15CFA8E8809EDBBB5BF48304F28416AE855FB246D731AE46CB50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,004197E7,004193D7,00418C1C), ref: 004197FE
                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0041980C
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00419825
                                                                • SetLastError.KERNEL32(00000000,004197E7,004193D7,00418C1C), ref: 00419877
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastValue___vcrt_
                                                                • String ID:
                                                                • API String ID: 3852720340-0
                                                                • Opcode ID: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                                • Instruction ID: 71a7697fc03e6214697c45e1a132a8316019e6706060db725442c6d2a3e753c8
                                                                • Opcode Fuzzy Hash: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                                • Instruction Fuzzy Hash: F101D8326293115EE62C3B76AE959D72774EF067B8720023FF120441F1EF594C95D58D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,00919A4E,0091963E,00918E83), ref: 00919A65
                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00919A73
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00919A8C
                                                                • SetLastError.KERNEL32(00000000,00919A4E,0091963E,00918E83), ref: 00919ADE
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastValue___vcrt_
                                                                • String ID:
                                                                • API String ID: 3852720340-0
                                                                • Opcode ID: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                                • Instruction ID: 060a2e9a3b9426c4a15cc78a40e65c73be1c0a35bf15f1ea94e4f3df0660fd6d
                                                                • Opcode Fuzzy Hash: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                                • Instruction Fuzzy Hash: C801F73270971A5FE72C27757E95AE62AB8EF957707240239F550400F1EF524C899184
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • InternetOpenW.WININET(00434EF4,00000000,00000000,00000000,00000000), ref: 009044C3
                                                                • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 009044D5
                                                                • InternetReadFile.WININET(00000000,?,03E80000,03E80000), ref: 009044E8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Internet$Open$FileRead
                                                                • String ID: +CC$runas
                                                                • API String ID: 72386350-2150734417
                                                                • Opcode ID: f629ccd115f1b0a5505da88cd8cf5212883000edcb5ff7f417580e889bd18442
                                                                • Instruction ID: 363ad39e5e83cdf653ccb377388059af00715928be177eaead52f5875a2cc99f
                                                                • Opcode Fuzzy Hash: f629ccd115f1b0a5505da88cd8cf5212883000edcb5ff7f417580e889bd18442
                                                                • Instruction Fuzzy Hash: 0551D5B2E00109AFDB14DFA4CC81FEEBBB5EF88700F608529F511A7291DB359945CBA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                • C:\Users\user\Desktop\file.exe, xrefs: 00420F81
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: C:\Users\user\Desktop\file.exe
                                                                • API String ID: 0-2502435711
                                                                • Opcode ID: d9fd3d3f386e086f16d5e96c86dfc6c05a3e177acafcacdda8c025444d2164cb
                                                                • Instruction ID: f2c65a4c72dcbe00dc32dc221c8eb50b3435d1ebdf66b1fbb5bbc6e11338d05a
                                                                • Opcode Fuzzy Hash: d9fd3d3f386e086f16d5e96c86dfc6c05a3e177acafcacdda8c025444d2164cb
                                                                • Instruction Fuzzy Hash: CB210A713001257F97206F71ED81D6BB7ADAF103A8750462BF828D7691D778DC818799
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                • C:\Users\user\Desktop\file.exe, xrefs: 009211E8
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: C:\Users\user\Desktop\file.exe
                                                                • API String ID: 0-2502435711
                                                                • Opcode ID: 58ea943009bd374bebf7ec5987a08b3fa813e305a807f4d2fcbf4f6ae6d6cbf6
                                                                • Instruction ID: fb3bdd2e992c82ed8c61de5ea0adbb332b60dc9894b1cb72e774db80c0f7ffeb
                                                                • Opcode Fuzzy Hash: 58ea943009bd374bebf7ec5987a08b3fa813e305a807f4d2fcbf4f6ae6d6cbf6
                                                                • Instruction Fuzzy Hash: 9721A4B2B04229BF9B20AF75EC81E6B776DEF603647104624F934D7259E730EC6087A0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _wcsrchr
                                                                • String ID: .bat$.cmd$.com$.exe
                                                                • API String ID: 1752292252-4019086052
                                                                • Opcode ID: 19671788b65354572937ca0f5259cacd468799deb2890a42aa5f1fe1ebfecd1d
                                                                • Instruction ID: baa428b651ab7fadd2aefce0a8d8cefe58070258f098f4f191bca89b56dcb2ea
                                                                • Opcode Fuzzy Hash: 19671788b65354572937ca0f5259cacd468799deb2890a42aa5f1fe1ebfecd1d
                                                                • Instruction Fuzzy Hash: 7E012B3BA8C635212624101AEC62BF717988B96FB8B25412FF854F72C1ED9DEC8205DC
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: api-ms-
                                                                • API String ID: 0-2084034818
                                                                • Opcode ID: d7b12ed5c3c764c8b82cc7f1cf76b5788b814adb9963f19d14a8505e8bb0b4a8
                                                                • Instruction ID: 8addbc20e8b4f1572ca5f78bff053ba989236767de5a1c4d832f47c373f0c560
                                                                • Opcode Fuzzy Hash: d7b12ed5c3c764c8b82cc7f1cf76b5788b814adb9963f19d14a8505e8bb0b4a8
                                                                • Instruction Fuzzy Hash: 2B112C71A12221EBC7314B249D44AAB37689F017B4B624933ED45AB390D738DDE1C5DE
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,0041B938,?,?,0041B900,0041BE86,?,NA), ref: 0041B958
                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0041B96B
                                                                • FreeLibrary.KERNEL32(00000000,?,?,0041B938,?,?,0041B900,0041BE86,?,NA), ref: 0041B98E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                • String ID: CorExitProcess$mscoree.dll
                                                                • API String ID: 4061214504-1276376045
                                                                • Opcode ID: af14fd2dde53d7be7e540de01eeb28501674720f1683c90e0ca13ac16e635f3d
                                                                • Instruction ID: 6ab08718997dcf592451d77b1cbf540418157bbc441c253cf8170436862d5d78
                                                                • Opcode Fuzzy Hash: af14fd2dde53d7be7e540de01eeb28501674720f1683c90e0ca13ac16e635f3d
                                                                • Instruction Fuzzy Hash: 52F08230651218FBDB259B50DD0ABEEBA78DF44759F900175A504A1260CB788E46DA98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$InformationTimeZone
                                                                • String ID:
                                                                • API String ID: 597776487-0
                                                                • Opcode ID: cd66b27a8385d4536588664ec460c84106157103f67aa985b2529d6009eaf611
                                                                • Instruction ID: 7d188cf609a94e6c9df1e9dc4e354c7e6be68a112f5a74adf856f43055e31604
                                                                • Opcode Fuzzy Hash: cd66b27a8385d4536588664ec460c84106157103f67aa985b2529d6009eaf611
                                                                • Instruction Fuzzy Hash: 6FC13971A00269AFDB20DF68EC45BEE7BBDEF85310F15416AE851D728AE7308D41CB94
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetCPInfo.KERNEL32(005F1E48,005F1E48,?,7FFFFFFF,?,?,00427265,005F1E48,005F1E48,?,005F1E48,?,?,?,?,005F1E48), ref: 0042704C
                                                                • __alloca_probe_16.LIBCMT ref: 00427102
                                                                • __alloca_probe_16.LIBCMT ref: 00427198
                                                                • __freea.LIBCMT ref: 00427203
                                                                • __freea.LIBCMT ref: 0042720F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __alloca_probe_16__freea$Info
                                                                • String ID:
                                                                • API String ID: 2330168043-0
                                                                • Opcode ID: c559a93f2d06cee59e46b38ea2fc726286989e451536d90b3fb509578e86aae3
                                                                • Instruction ID: f6d9b8f12c634194a1b411eace1e19527ea88e01b30f60a4b5a6e0b516c13e2d
                                                                • Opcode Fuzzy Hash: c559a93f2d06cee59e46b38ea2fc726286989e451536d90b3fb509578e86aae3
                                                                • Instruction Fuzzy Hash: 4481E472B082259BDF219EA5AC41EEF7BB5EF09354F98005BF804A7341D62DCC458BB9
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • __alloca_probe_16.LIBCMT ref: 00425958
                                                                • __alloca_probe_16.LIBCMT ref: 00425A1E
                                                                • __freea.LIBCMT ref: 00425A8A
                                                                  • Part of subcall function 0041EA8A: HeapAlloc.KERNEL32(00000000,?,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041EABC
                                                                • __freea.LIBCMT ref: 00425A93
                                                                • __freea.LIBCMT ref: 00425AB6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                • String ID:
                                                                • API String ID: 1096550386-0
                                                                • Opcode ID: 801bfc73f5307c034d341afffc150cc0786828de70bde5b9b10ebb0cec96e4eb
                                                                • Instruction ID: 7e0d7c363e2f027523b7077ca53f82abc72318da18e9cc0c3b19bc4bba63112a
                                                                • Opcode Fuzzy Hash: 801bfc73f5307c034d341afffc150cc0786828de70bde5b9b10ebb0cec96e4eb
                                                                • Instruction Fuzzy Hash: 8351E672700626AFDB209F95EC86EBF37A9EF44764F95422AFC04D7240E778DC418698
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFileType.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0041C040), ref: 0041C130
                                                                • GetFileInformationByHandle.KERNEL32(?,?), ref: 0041C18A
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0041C040,?,000000FF,00000000,00000000), ref: 0041C218
                                                                • __dosmaperr.LIBCMT ref: 0041C21F
                                                                • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 0041C25C
                                                                  • Part of subcall function 0041C484: __dosmaperr.LIBCMT ref: 0041C4B9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                                • String ID:
                                                                • API String ID: 1206951868-0
                                                                • Opcode ID: 8e7ecedbbb3726c11739f19b321c018a01a8de47d4bdd8436282d5c79af9c44f
                                                                • Instruction ID: 0071a9752275d4edb8b9c21b1954eb469a97b67ce05b4548820d0adabff3a4d5
                                                                • Opcode Fuzzy Hash: 8e7ecedbbb3726c11739f19b321c018a01a8de47d4bdd8436282d5c79af9c44f
                                                                • Instruction Fuzzy Hash: B7413C75940204AFDB249FA5DC859EFBBF9EF89700B00452EF856D3610E7389885CB24
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFileType.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0091C2A7), ref: 0091C397
                                                                • GetFileInformationByHandle.KERNEL32(?,?), ref: 0091C3F1
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0091C2A7,?,000000FF,00000000,00000000), ref: 0091C47F
                                                                • __dosmaperr.LIBCMT ref: 0091C486
                                                                • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 0091C4C3
                                                                  • Part of subcall function 0091C6EB: __dosmaperr.LIBCMT ref: 0091C720
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                                • String ID:
                                                                • API String ID: 1206951868-0
                                                                • Opcode ID: 8e7ecedbbb3726c11739f19b321c018a01a8de47d4bdd8436282d5c79af9c44f
                                                                • Instruction ID: 6579284268bfa244cde56fe647c1d75bc5d31675bc3e0e1d32d1c4959c82b46c
                                                                • Opcode Fuzzy Hash: 8e7ecedbbb3726c11739f19b321c018a01a8de47d4bdd8436282d5c79af9c44f
                                                                • Instruction Fuzzy Hash: 15416FB5A44208ABCB24DFA5DC559FFBBF9EF887007004529F956D3660E6349885CB20
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 00422302
                                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                                • _free.LIBCMT ref: 00422314
                                                                • _free.LIBCMT ref: 00422326
                                                                • _free.LIBCMT ref: 00422338
                                                                • _free.LIBCMT ref: 0042234A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: a090e3dca2e19da394a01cead958df991e42452585b2f6658ee12e14c4d52992
                                                                • Instruction ID: 8eed935d1f0a41e2b9dbe60b1656bd2ba3e28f3ae1fefd92f9cbf16fd4f54630
                                                                • Opcode Fuzzy Hash: a090e3dca2e19da394a01cead958df991e42452585b2f6658ee12e14c4d52992
                                                                • Instruction Fuzzy Hash: 04F04472501210B78520DBA6F6C2C4B73DAAB94355794180AF809D7641C77CFD81866C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 00922569
                                                                  • Part of subcall function 0091E808: HeapFree.KERNEL32(00000000,00000000,?,009225E4,?,00000000,?,?,?,0092260B,?,00000007,?,?,00922A0D,?), ref: 0091E81E
                                                                  • Part of subcall function 0091E808: GetLastError.KERNEL32(?,?,009225E4,?,00000000,?,?,?,0092260B,?,00000007,?,?,00922A0D,?,?), ref: 0091E830
                                                                • _free.LIBCMT ref: 0092257B
                                                                • _free.LIBCMT ref: 0092258D
                                                                • _free.LIBCMT ref: 0092259F
                                                                • _free.LIBCMT ref: 009225B1
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: a090e3dca2e19da394a01cead958df991e42452585b2f6658ee12e14c4d52992
                                                                • Instruction ID: 69062e6505738a0dce4d37ff36018a6291cdce049293f16c4a9724d559ed95a7
                                                                • Opcode Fuzzy Hash: a090e3dca2e19da394a01cead958df991e42452585b2f6658ee12e14c4d52992
                                                                • Instruction Fuzzy Hash: 9DF09632925218BBD720DF54F4C6C9AB3DDEB403107A45865F404D7544CB70FCC08694
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseOpenQueryValue
                                                                • String ID: #
                                                                • API String ID: 3677997916-1885708031
                                                                • Opcode ID: 4d26a9903dbf7e4ba4290750e16a9ab8299c95c43a50e3bd25ecedede5d2791d
                                                                • Instruction ID: f95b3bddd0445c9e7feb3aa2a76d36977b64df9762eeb795983c213a40bf9cd4
                                                                • Opcode Fuzzy Hash: 4d26a9903dbf7e4ba4290750e16a9ab8299c95c43a50e3bd25ecedede5d2791d
                                                                • Instruction Fuzzy Hash: D712CF70A0428CDFEF14DF68C949BDDBFB5AB45304F508598E844673C2D7B95A88CB92
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: *?
                                                                • API String ID: 269201875-2564092906
                                                                • Opcode ID: 4349432449d004c56f1fbb459abf86acb5202655a551f523de74eb3488688e5f
                                                                • Instruction ID: 7415b14c5d0124b7c9719d17695bca9e12f23279d28e73ebbb8fdbf8e8460f59
                                                                • Opcode Fuzzy Hash: 4349432449d004c56f1fbb459abf86acb5202655a551f523de74eb3488688e5f
                                                                • Instruction Fuzzy Hash: 5661A1B5E002299FCB14CFA9D8815EEFBF5EF48314B54816AE805F7301E735AE418B94
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: *?
                                                                • API String ID: 269201875-2564092906
                                                                • Opcode ID: 4349432449d004c56f1fbb459abf86acb5202655a551f523de74eb3488688e5f
                                                                • Instruction ID: 5e24d6aea41164e299f37363c8c26bebfae06dd71b3b42dc8050ed8619166b58
                                                                • Opcode Fuzzy Hash: 4349432449d004c56f1fbb459abf86acb5202655a551f523de74eb3488688e5f
                                                                • Instruction Fuzzy Hash: 01615CB5E002299FCF14CFA8D8815EDFBF9EF88310B24816AE855F7345D631AE418B90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RtlEncodePointer.NTDLL(00000000), ref: 0091A169
                                                                • CatchIt.LIBVCRUNTIME ref: 0091A24F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CatchEncodePointer
                                                                • String ID: MOC$RCC
                                                                • API String ID: 1435073870-2084237596
                                                                • Opcode ID: 56cf5a80f9e67a63b3ea8228320d3624bd09d448c8f94bbe6aa890cfa768ed17
                                                                • Instruction ID: db8ba5d18e9e06ebe78755ba27463113a3f5c2890177742f2a3466321595d572
                                                                • Opcode Fuzzy Hash: 56cf5a80f9e67a63b3ea8228320d3624bd09d448c8f94bbe6aa890cfa768ed17
                                                                • Instruction Fuzzy Hash: AE415871A0120DAFDF15DF98CD81AEE7BB9BF88300F188159F914A7261D3369D90DB51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetTempPathA.KERNEL32(00000104,?), ref: 0090B565
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0090B784
                                                                • CreateDirectoryA.KERNEL32(?,00000000,?,?,?,?), ref: 0090B8A4
                                                                • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0090B9F0
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CopyCreateDirectoryModuleNamePathTemp
                                                                • String ID:
                                                                • API String ID: 2256340497-0
                                                                • Opcode ID: 69506e0b47fdf4355df82a24afce3d41012599873781e6f53ce1b916386e2bff
                                                                • Instruction ID: 3dc78a10a5c927721ce32143a8bffdf154cbe6c5b39fa9b5bd17e841b8073315
                                                                • Opcode Fuzzy Hash: 69506e0b47fdf4355df82a24afce3d41012599873781e6f53ce1b916386e2bff
                                                                • Instruction Fuzzy Hash: B8D1E2B1A001188FEB24DB28CC85BDDB779AF85304F5041E8E659A32C2DB755FC48F6A
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AdjustPointer
                                                                • String ID:
                                                                • API String ID: 1740715915-0
                                                                • Opcode ID: 7e8d2a906245dc524fe8c50e746b229fe3151c293ccc1eab8f3b2c5d31764d92
                                                                • Instruction ID: a8cd01a110c9a5ba9b93cdf8b6ca506de852c713b8af7688bfec1274bd28d331
                                                                • Opcode Fuzzy Hash: 7e8d2a906245dc524fe8c50e746b229fe3151c293ccc1eab8f3b2c5d31764d92
                                                                • Instruction Fuzzy Hash: 3251D0B2601286AFDB298F15D861BEA77A4EF04314F24012FE84646391E739ECC1C799
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AdjustPointer
                                                                • String ID:
                                                                • API String ID: 1740715915-0
                                                                • Opcode ID: 7e8d2a906245dc524fe8c50e746b229fe3151c293ccc1eab8f3b2c5d31764d92
                                                                • Instruction ID: d5710e9617424eb533ca73fd58ee0188d22a8f6a6e78ee97a7e6c775ad63b798
                                                                • Opcode Fuzzy Hash: 7e8d2a906245dc524fe8c50e746b229fe3151c293ccc1eab8f3b2c5d31764d92
                                                                • Instruction Fuzzy Hash: E751BF72B0560AAFDB298F14D8A1BEA77E9EF50710F144529E88A47290E731EDC0D790
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetVersionExW.KERNEL32(0000011C,?,00439008,00000000), ref: 009056E0
                                                                • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00905747
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0090574E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressHandleModuleProcVersion
                                                                • String ID:
                                                                • API String ID: 3310240892-0
                                                                • Opcode ID: ddc787008df3d19dcf6ff3ff6324906e599249e81a3a5c2a1838fed2653284d0
                                                                • Instruction ID: 2e748ae2982acb9a126e7053dc0f3ded4ad058f2cfb0f0f358c1a8b6a4794faf
                                                                • Opcode Fuzzy Hash: ddc787008df3d19dcf6ff3ff6324906e599249e81a3a5c2a1838fed2653284d0
                                                                • Instruction Fuzzy Hash: A951D571E00608DFDB24DB68DD497DEB779EB45310F9082A8E815A72C1EB359EC48F91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 00425FDE
                                                                • _free.LIBCMT ref: 00426007
                                                                • SetEndOfFile.KERNEL32(00000000,0042354B,00000000,?,?,?,?,?,?,?,?,0042354B,?,00000000), ref: 00426039
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,0042354B,?,00000000,?,?,?,?,?), ref: 00426055
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFileLast
                                                                • String ID:
                                                                • API String ID: 1547350101-0
                                                                • Opcode ID: 005ab2c57f032726cdaaa7f9df82d6b6984aac1401b59b4031c376f8f621a61a
                                                                • Instruction ID: 61c1fed18fa2e053e229d2c366b1320fca6b3d495f3fb51fd3c042a4ee27fee9
                                                                • Opcode Fuzzy Hash: 005ab2c57f032726cdaaa7f9df82d6b6984aac1401b59b4031c376f8f621a61a
                                                                • Instruction Fuzzy Hash: 6C413E72B006115BDB11ABB5ED41B8E37B6AF44364F560017F424E72D2EB7CC840576D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 00926245
                                                                • _free.LIBCMT ref: 0092626E
                                                                • SetEndOfFile.KERNEL32(00000000,009237B2,00000000,0091E6A5,?,?,?,?,?,?,?,009237B2,0091E6A5,00000000), ref: 009262A0
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,009237B2,0091E6A5,00000000,?,?,?,?,00000000), ref: 009262BC
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFileLast
                                                                • String ID:
                                                                • API String ID: 1547350101-0
                                                                • Opcode ID: 005ab2c57f032726cdaaa7f9df82d6b6984aac1401b59b4031c376f8f621a61a
                                                                • Instruction ID: 22ddc026a44be9e00aedc3bb04043ddbed80a9c0ba4a04aa8cdeb63bc3f15244
                                                                • Opcode Fuzzy Hash: 005ab2c57f032726cdaaa7f9df82d6b6984aac1401b59b4031c376f8f621a61a
                                                                • Instruction Fuzzy Hash: 13410772A00265EBDF11ABB8EC06B9E7779EFC4360F250510F424E769AEA34D8848761
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 0041BD6F: _free.LIBCMT ref: 0041BD7D
                                                                  • Part of subcall function 004218BF: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000000,?,00425A80,?,00000000,00000000), ref: 00421961
                                                                • GetLastError.KERNEL32 ref: 00420950
                                                                • __dosmaperr.LIBCMT ref: 00420957
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 00420996
                                                                • __dosmaperr.LIBCMT ref: 0042099D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                • String ID:
                                                                • API String ID: 167067550-0
                                                                • Opcode ID: 2cc476a48764411ac7d7f7841f806bb526956e32d48153aac2d156f6a7af72d6
                                                                • Instruction ID: 91911ec1de34df9e01eb008ea9a24e12f878ac442d2ad626700c96a69c790fc9
                                                                • Opcode Fuzzy Hash: 2cc476a48764411ac7d7f7841f806bb526956e32d48153aac2d156f6a7af72d6
                                                                • Instruction Fuzzy Hash: 2721F0B1700225AFA710AF62ACC196B77EDEF00374790851AF86697253D738DCC08B94
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 0091BFD6: _free.LIBCMT ref: 0091BFE4
                                                                  • Part of subcall function 00921B26: WideCharToMultiByte.KERNEL32(00905AE7,00000000,00437A28,00000000,00905AE7,00905AE7,0092463D,?,00437A28,?,00000000,?,009243AC,0000FDE9,00000000,?), ref: 00921BC8
                                                                • GetLastError.KERNEL32 ref: 00920BB7
                                                                • __dosmaperr.LIBCMT ref: 00920BBE
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 00920BFD
                                                                • __dosmaperr.LIBCMT ref: 00920C04
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                • String ID:
                                                                • API String ID: 167067550-0
                                                                • Opcode ID: bcfca7c6e04eeb74265432f959e909c47042bfb9664e3c7dfc54a64be2794b21
                                                                • Instruction ID: ea27ebbcb6d346a4543f4fbf81d5043c582e5534b15a31edde0ca2ebcbec2497
                                                                • Opcode Fuzzy Hash: bcfca7c6e04eeb74265432f959e909c47042bfb9664e3c7dfc54a64be2794b21
                                                                • Instruction Fuzzy Hash: 7C2137B160422DBFDF20AF75AC80E6BF7ACEF943687108624F85493246D730EC9187A0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d346eea9aafd959945e16ecfc9ebbe047e966c499b5e8e0d3b3e0bbc48b51e8c
                                                                • Instruction ID: a07e7d37ff819b2103b44b399196b800014933503ad63946d036be058c4dabbc
                                                                • Opcode Fuzzy Hash: d346eea9aafd959945e16ecfc9ebbe047e966c499b5e8e0d3b3e0bbc48b51e8c
                                                                • Instruction Fuzzy Hash: 3D210231B0122CEBCB219B24DCA8BAB376C9F41774FA40531EE55A72E1D630EC8585E4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,00000000,?,0041BCED,00000000,?,?,?,0041BE86,?), ref: 0041EE97
                                                                • _free.LIBCMT ref: 0041EEF4
                                                                • _free.LIBCMT ref: 0041EF2A
                                                                • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,?,0041BE86,?), ref: 0041EF35
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast_free
                                                                • String ID:
                                                                • API String ID: 2283115069-0
                                                                • Opcode ID: 120db594496689011f9c139fa4ddd92dcfd12b70a1cc6502b103967e01bc71cb
                                                                • Instruction ID: 26790fddcd24ef136aadc0cc0bf27d5f777129a8301660e6568487d79e7ca8b5
                                                                • Opcode Fuzzy Hash: 120db594496689011f9c139fa4ddd92dcfd12b70a1cc6502b103967e01bc71cb
                                                                • Instruction Fuzzy Hash: 2411CA3A6002017AD61427B79CC59EB256997C1779B25013BFD39832D2FE6D8CDB811D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,00000000,?,0091BF54,00000000,?,?,?,0091C0ED,?), ref: 0091F0FE
                                                                • _free.LIBCMT ref: 0091F15B
                                                                • _free.LIBCMT ref: 0091F191
                                                                • SetLastError.KERNEL32(00000000,004390F8,000000FF,?,?,?,0091C0ED,?), ref: 0091F19C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast_free
                                                                • String ID:
                                                                • API String ID: 2283115069-0
                                                                • Opcode ID: 120db594496689011f9c139fa4ddd92dcfd12b70a1cc6502b103967e01bc71cb
                                                                • Instruction ID: 25ee56c6cb9ed96c3e2a58b0c60ae59391cea25ad2bfb276dea95c0bf0169093
                                                                • Opcode Fuzzy Hash: 120db594496689011f9c139fa4ddd92dcfd12b70a1cc6502b103967e01bc71cb
                                                                • Instruction Fuzzy Hash: D4114C7230850EFADB142BB4DCE5EEB226DDBC03B4B750234F926821E1EF658CD64150
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,?,0041C755,0041EACD,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041EFEE
                                                                • _free.LIBCMT ref: 0041F04B
                                                                • _free.LIBCMT ref: 0041F081
                                                                • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041F08C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast_free
                                                                • String ID:
                                                                • API String ID: 2283115069-0
                                                                • Opcode ID: 048b735e334959feaa5e4ce77df0ba5808e7239d9d4b1868442944ab324b2044
                                                                • Instruction ID: d1a755533480a66cbcbdd6da6f61a8fcfdc6096e1f08231a3cc2ec091d2cf52b
                                                                • Opcode Fuzzy Hash: 048b735e334959feaa5e4ce77df0ba5808e7239d9d4b1868442944ab324b2044
                                                                • Instruction Fuzzy Hash: FB114C322045016AC7102B76ACC1DEB2969DBC8778765023BF92A822E3EF6CCCDF511C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,?,0091C9BC,0091ED34,?,?,0091943A,?,?,?,?,?,0090235A,?,?), ref: 0091F255
                                                                • _free.LIBCMT ref: 0091F2B2
                                                                • _free.LIBCMT ref: 0091F2E8
                                                                • SetLastError.KERNEL32(00000000,004390F8,000000FF,?,?,0091943A,?,?,?,?,?,0090235A,?,?), ref: 0091F2F3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast_free
                                                                • String ID:
                                                                • API String ID: 2283115069-0
                                                                • Opcode ID: 048b735e334959feaa5e4ce77df0ba5808e7239d9d4b1868442944ab324b2044
                                                                • Instruction ID: 76efa30bc93519a542e5802fac46b6e6c786442a3fe726d0d99e8862e98481dc
                                                                • Opcode Fuzzy Hash: 048b735e334959feaa5e4ce77df0ba5808e7239d9d4b1868442944ab324b2044
                                                                • Instruction Fuzzy Hash: 1F11257630020D6ADA112B789CE5EEA216DDBC13B1B610734F93A821E1EE718CD64114
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d7b12ed5c3c764c8b82cc7f1cf76b5788b814adb9963f19d14a8505e8bb0b4a8
                                                                • Instruction ID: ffd1c387d67692d3660134526af65b859cb0b1eb60e18652d775ba60ed75ccfe
                                                                • Opcode Fuzzy Hash: d7b12ed5c3c764c8b82cc7f1cf76b5788b814adb9963f19d14a8505e8bb0b4a8
                                                                • Instruction Fuzzy Hash: 4111E931B8B26DEBC7324B249C40EAA776E9B017B0B910531ED46A7290D630EC84C5D6
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0041F930,00000000,?,00424658,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 0041F7E1
                                                                • GetLastError.KERNEL32(?,00424658,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,0041F930,00000000,00000104,?), ref: 0041F7EB
                                                                • __dosmaperr.LIBCMT ref: 0041F7F2
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                                • String ID:
                                                                • API String ID: 2398240785-0
                                                                • Opcode ID: 05d28394caa5e79c84551c055246600de674f2baba94b68408dd47ae0dfcca9d
                                                                • Instruction ID: 3e1febbc0a8defaca1089d50814ae8bcfad4f789bcb8220d5dd2739c2ed7ebaf
                                                                • Opcode Fuzzy Hash: 05d28394caa5e79c84551c055246600de674f2baba94b68408dd47ae0dfcca9d
                                                                • Instruction Fuzzy Hash: 1DF06D36600115BB8B202FA2DD08C9BBFA9FF443A03444136F52DC7561DB35E8A6CBE8
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0041F930,00000000,?,004245E3,00000000,00000000,0041F930,?,?,00000000,00000000,00000001), ref: 0041F84A
                                                                • GetLastError.KERNEL32(?,004245E3,00000000,00000000,0041F930,?,?,00000000,00000000,00000001,00000000,00000000,?,0041F930,00000000,00000104), ref: 0041F854
                                                                • __dosmaperr.LIBCMT ref: 0041F85B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                                • String ID:
                                                                • API String ID: 2398240785-0
                                                                • Opcode ID: e95b58acd20ff03b7de0604d3f95648f78153c488b68a8cfe7999cd59df17e1a
                                                                • Instruction ID: 5356ccb821a571137923583999cca56af5607f561d8780d9d137012589ba4a16
                                                                • Opcode Fuzzy Hash: e95b58acd20ff03b7de0604d3f95648f78153c488b68a8cfe7999cd59df17e1a
                                                                • Instruction Fuzzy Hash: FBF01231600115BB8B207BA6DC0499BBFA9FF443A03404536F52DC6521C735E8A6DBD4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0091FB97,00000000,?,0092484A,00000000,00000000,0091FB97,?,?,00000000,00000000,00000001), ref: 0091FAB1
                                                                • GetLastError.KERNEL32(?,0092484A,00000000,00000000,0091FB97,?,?,00000000,00000000,00000001,00000000,00000000,?,0091FB97,00000000,00000104), ref: 0091FABB
                                                                • __dosmaperr.LIBCMT ref: 0091FAC2
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                                • String ID:
                                                                • API String ID: 2398240785-0
                                                                • Opcode ID: e95b58acd20ff03b7de0604d3f95648f78153c488b68a8cfe7999cd59df17e1a
                                                                • Instruction ID: 7969d3eebbfd896d8338124d590afec1e60a00553728a14d819b4b661b4e4f75
                                                                • Opcode Fuzzy Hash: e95b58acd20ff03b7de0604d3f95648f78153c488b68a8cfe7999cd59df17e1a
                                                                • Instruction Fuzzy Hash: F4F06D3230011DBB9B205BA2DD18D9ABFADEF443A03548531F51DC6921DB35E8A1C7D0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0091FB97,00000000,?,009248BF,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 0091FA48
                                                                • GetLastError.KERNEL32(?,009248BF,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,0091FB97,00000000,00000104,?), ref: 0091FA52
                                                                • __dosmaperr.LIBCMT ref: 0091FA59
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                                • String ID:
                                                                • API String ID: 2398240785-0
                                                                • Opcode ID: 05d28394caa5e79c84551c055246600de674f2baba94b68408dd47ae0dfcca9d
                                                                • Instruction ID: 12d4c64dc32f944dadaa7044007fa08e64e008abddfa5dbbb9e0127a3bf72869
                                                                • Opcode Fuzzy Hash: 05d28394caa5e79c84551c055246600de674f2baba94b68408dd47ae0dfcca9d
                                                                • Instruction Fuzzy Hash: 47F01D7270011EBB8F205BA6DC19D9ABFADFF843A03444531B55DC6521EB35E8A1D7D0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • WriteConsoleW.KERNEL32(00405880,00000000,00437A28,00000000,00405880,?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880), ref: 004272E6
                                                                • GetLastError.KERNEL32(?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880,00000000,00405880,?,0042436F,00405880), ref: 004272F2
                                                                  • Part of subcall function 004272B8: CloseHandle.KERNEL32(FFFFFFFE,00427302,?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880,00000000,00405880), ref: 004272C8
                                                                • ___initconout.LIBCMT ref: 00427302
                                                                  • Part of subcall function 0042727A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004272A9,004269D4,00405880,?,00423E1B,00000000,?,00405880,00000000), ref: 0042728D
                                                                • WriteConsoleW.KERNEL32(00405880,00000000,00437A28,00000000,?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880,00000000), ref: 00427317
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                • String ID:
                                                                • API String ID: 2744216297-0
                                                                • Opcode ID: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                                • Instruction ID: 5b8baa1da4bb66d128bbbdf819d740daca6d0282673a7c9b135cb97f91750bdc
                                                                • Opcode Fuzzy Hash: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                                • Instruction Fuzzy Hash: 46F01C36201129FBCF221F95EC04A8A3F66FF093A1B814075FE1C86231D6328820EB98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • WriteConsoleW.KERNEL32(00905AE7,00000000,00437A28,00000000,00905AE7,?,00926C4E,00905AE7,00000001,00905AE7,00905AE7,?,00924082,00000000,?,00905AE7), ref: 0092754D
                                                                • GetLastError.KERNEL32(?,00926C4E,00905AE7,00000001,00905AE7,00905AE7,?,00924082,00000000,?,00905AE7,00000000,00905AE7,?,009245D6,00905AE7), ref: 00927559
                                                                  • Part of subcall function 0092751F: CloseHandle.KERNEL32(00439900,00927569,?,00926C4E,00905AE7,00000001,00905AE7,00905AE7,?,00924082,00000000,?,00905AE7,00000000,00905AE7), ref: 0092752F
                                                                • ___initconout.LIBCMT ref: 00927569
                                                                  • Part of subcall function 009274E1: CreateFileW.KERNEL32(004336B8,40000000,00000003,00000000,00000003,00000000,00000000,00927510,00926C3B,00905AE7,?,00924082,00000000,?,00905AE7,00000000), ref: 009274F4
                                                                • WriteConsoleW.KERNEL32(00905AE7,00000000,00437A28,00000000,?,00926C4E,00905AE7,00000001,00905AE7,00905AE7,?,00924082,00000000,?,00905AE7,00000000), ref: 0092757E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                • String ID:
                                                                • API String ID: 2744216297-0
                                                                • Opcode ID: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                                • Instruction ID: 06ed2e5b98884c0e1488f0a028fbccff0d9f1da680ea2d4d915a5dee27478679
                                                                • Opcode Fuzzy Hash: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                                • Instruction Fuzzy Hash: C0F01C36101128BBCF222FD1EC08E89BF66EF483B1B814030FA1895231D6328860DB94
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateThread$Sleep
                                                                • String ID:
                                                                • API String ID: 422425972-0
                                                                • Opcode ID: c7ec29c90368d79a70c95a5ee9845132da8938ab2cedaa7c12f416f09ab0d9a8
                                                                • Instruction ID: 3e58bb4c01d1f945cb402fb00719d76fe511b7683de936d62f19d1048555ce50
                                                                • Opcode Fuzzy Hash: c7ec29c90368d79a70c95a5ee9845132da8938ab2cedaa7c12f416f09ab0d9a8
                                                                • Instruction Fuzzy Hash: 69E09231BE8334B6F47126A45C03F891E545B08F95FB20023B70CBE4D084C87485CAEE
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 0041D822
                                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                                • _free.LIBCMT ref: 0041D835
                                                                • _free.LIBCMT ref: 0041D846
                                                                • _free.LIBCMT ref: 0041D857
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 5b4b832eec97106c71e74c3abf3533cea5e390173416251ec6b9798646083543
                                                                • Instruction ID: 2f128d3171f244c94fc48b8332bc88089a284fec835ab8af747093701a289460
                                                                • Opcode Fuzzy Hash: 5b4b832eec97106c71e74c3abf3533cea5e390173416251ec6b9798646083543
                                                                • Instruction Fuzzy Hash: C3E04FB4801520AFCE012F53FE055953BA2FB947EC340302AF81406232DB390261EFCE
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • std::_Xinvalid_argument.LIBCPMT ref: 00412FEF
                                                                  • Part of subcall function 00416F50: Concurrency::cancel_current_task.LIBCPMT ref: 00417083
                                                                Strings
                                                                • invalid stoi argument, xrefs: 00412FEA
                                                                • stoi argument out of range, xrefs: 00412FF9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Concurrency::cancel_current_taskXinvalid_argumentstd::_
                                                                • String ID: invalid stoi argument$stoi argument out of range
                                                                • API String ID: 3646673767-1606216832
                                                                • Opcode ID: b85171a2f2d5f1a5290fdfb8afa1959db864ff036c3f01053f7b11ad4a7871fd
                                                                • Instruction ID: 6d18bec53ddcbea06decae191a6eae5fb5e1180c669e5708db714ed38e612d95
                                                                • Opcode Fuzzy Hash: b85171a2f2d5f1a5290fdfb8afa1959db864ff036c3f01053f7b11ad4a7871fd
                                                                • Instruction Fuzzy Hash: 60E1D171A001189BEF28DF28CE857DDBB72EB46304F50819EE419972C1DB799AD1CF98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: C:\Users\user\Desktop\file.exe
                                                                • API String ID: 0-2502435711
                                                                • Opcode ID: 31fa4e4f4f0bc981144b5b3ffc5fea1ddf45f4662b4ea0433f5b95f05539bbed
                                                                • Instruction ID: 3e019bb9f1f37e8f56b3af26f626c64f14fa1fa210d5d8f79d997b38734a4c96
                                                                • Opcode Fuzzy Hash: 31fa4e4f4f0bc981144b5b3ffc5fea1ddf45f4662b4ea0433f5b95f05539bbed
                                                                • Instruction Fuzzy Hash: 9A41A271A80214AFDB11DF9A9CC19EFBBB9EB85710F10006BF40497251D7788E82CB5D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: C:\Users\user\Desktop\file.exe
                                                                • API String ID: 0-2502435711
                                                                • Opcode ID: 31fa4e4f4f0bc981144b5b3ffc5fea1ddf45f4662b4ea0433f5b95f05539bbed
                                                                • Instruction ID: 4f231fffb86a680d51bedf5e790736b47d0ea77421014d5cf4a2b5b39103e85e
                                                                • Opcode Fuzzy Hash: 31fa4e4f4f0bc981144b5b3ffc5fea1ddf45f4662b4ea0433f5b95f05539bbed
                                                                • Instruction Fuzzy Hash: EB41AD71F4521CBFDB26DB999C81AEEBBBCEB85310B10046AF41597211D7709E80CB50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 00919776
                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 0091982A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                • String ID: csm
                                                                • API String ID: 3480331319-1018135373
                                                                • Opcode ID: 170db4f13a52bbc04fbb15fe7ab42c90d24a7c19ae8ceb0e3c19913b98646896
                                                                • Instruction ID: a45f4f602d3739a49e4f864c1b903fefe76c19f3ba4ac43411a0f6e220169fb4
                                                                • Opcode Fuzzy Hash: 170db4f13a52bbc04fbb15fe7ab42c90d24a7c19ae8ceb0e3c19913b98646896
                                                                • Instruction Fuzzy Hash: 5641A134B0021DABCF10DF68C894AEEBBB5BF45314F1480A5E8199B392D735EE85CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ShellExecuteA.SHELL32(00000000,00429838,?,?,00000000,00000000), ref: 00904659
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259872011.0000000000900000.00000040.00001000.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_900000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExecuteShell
                                                                • String ID: +CC$runas
                                                                • API String ID: 587946157-2150734417
                                                                • Opcode ID: 275e86e7e836fdb05351418f23eea9cc16955723fba3a8d83db6570cd9dbdf7c
                                                                • Instruction ID: e86c604c89b455090ba24c0eb587b12a05faec799004e6b367dd6e925a625a22
                                                                • Opcode Fuzzy Hash: 275e86e7e836fdb05351418f23eea9cc16955723fba3a8d83db6570cd9dbdf7c
                                                                • Instruction Fuzzy Hash: B141D371600209EFEB04DF68C985BDE7BB9EB46700F908229FD15876C1D779D9848B91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00419F02
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EncodePointer
                                                                • String ID: MOC$RCC
                                                                • API String ID: 2118026453-2084237596
                                                                • Opcode ID: 56cf5a80f9e67a63b3ea8228320d3624bd09d448c8f94bbe6aa890cfa768ed17
                                                                • Instruction ID: ef4240616421f5d170a5d1c4fd7b0d446090a164c11462a96303fe54a6744129
                                                                • Opcode Fuzzy Hash: 56cf5a80f9e67a63b3ea8228320d3624bd09d448c8f94bbe6aa890cfa768ed17
                                                                • Instruction Fuzzy Hash: 5C414872900209EFCF16DF98C981AEEBBB5FF48304F18819AF904A7251D3399DA1DB55
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00412D18
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileModuleName
                                                                • String ID: .$5120
                                                                • API String ID: 514040917-2446372808
                                                                • Opcode ID: d5977a1847af3593c6d2360099aed04a1f4c529663bf82042b77ea6028604958
                                                                • Instruction ID: 9696d8c15566c1d42fadb68592e21f39738dfdc301de5d2260ec8dd83da14f2d
                                                                • Opcode Fuzzy Hash: d5977a1847af3593c6d2360099aed04a1f4c529663bf82042b77ea6028604958
                                                                • Instruction Fuzzy Hash: D421E2B09002489BDB14EF69C90A7DD7FB49F06348F5001CEE44567282D7B99A498BE7
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 0041FDF2: EnterCriticalSection.KERNEL32(00405880,?,00424223,00405880,00437D48,00000010,0041EA11,00000000,C032C301,00000000,00000000,00405880,?,0041BB1A,00405880,00000000), ref: 0041FE0D
                                                                • FlushFileBuffers.KERNEL32(00000000,00437D28,0000000C,00423A2E,nA,?,00000001,?,0041E96E,?), ref: 00423970
                                                                • GetLastError.KERNEL32 ref: 00423981
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.259530025.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.259563361.000000000043E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: BuffersCriticalEnterErrorFileFlushLastSection
                                                                • String ID: nA
                                                                • API String ID: 4109680722-4035868545
                                                                • Opcode ID: f003fc8eaf19488ae7f9339aa40c70496bc05c9f4a2d22a8ae3e610d030b7c35
                                                                • Instruction ID: 0418fce989e2f534913a4f38d2ce8aa3e5464a19317c2ea272403c313fbf0c0e
                                                                • Opcode Fuzzy Hash: f003fc8eaf19488ae7f9339aa40c70496bc05c9f4a2d22a8ae3e610d030b7c35
                                                                • Instruction Fuzzy Hash: 45018076B002108FC714AF69E90569D7BB5AF49724F50412FF4219B3D2DBBC9982CB98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Execution Graph

                                                                Execution Coverage:1.1%
                                                                Dynamic/Decrypted Code Coverage:15.8%
                                                                Signature Coverage:0.5%
                                                                Total number of Nodes:1230
                                                                Total number of Limit Nodes:13
                                                                execution_graph 17717 408650 17718 408666 17717->17718 17718->17717 17720 4086a2 CreateMutexW GetLastError 17718->17720 17768 417a50 17718->17768 17723 4086c8 17720->17723 17721 408737 17781 418152 17721->17781 17722 408764 17788 41cc3c 17722->17788 17723->17721 17723->17722 17725 408759 17769 417ac7 __wsopen_s 17768->17769 17770 417a73 17768->17770 17772 41cc3c 25 API calls 17769->17772 17780 417b4f __wsopen_s 17769->17780 17771 417b8f 17770->17771 17773 417ae0 17770->17773 17774 417ab6 17770->17774 17807 402180 17771->17807 17776 417b9e 17772->17776 17773->17769 17779 41835e 27 API calls 17773->17779 17774->17771 17777 417ac1 17774->17777 17793 41835e 17777->17793 17779->17769 17780->17718 17782 41815b 17781->17782 17783 41815d IsProcessorFeaturePresent 17781->17783 17782->17725 17785 41819f 17783->17785 18001 418163 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17785->18001 17787 418282 17787->17725 17789 41cbc8 ___std_exception_copy 25 API calls 17788->17789 17790 41cc4b 17789->17790 17791 41cc59 ___std_exception_copy 11 API calls 17790->17791 17792 41cc58 17791->17792 17795 418363 17793->17795 17796 41837d 17795->17796 17798 41837f 17795->17798 17824 41cca7 17795->17824 17827 41cc8d 17795->17827 17796->17769 17799 402180 Concurrency::cancel_current_task 17798->17799 17801 418389 17798->17801 17813 4193e4 17799->17813 17803 4193e4 Concurrency::cancel_current_task RaiseException 17801->17803 17802 40219c 17816 4191a9 17802->17816 17805 418886 17803->17805 17808 40218e Concurrency::cancel_current_task 17807->17808 17809 4193e4 Concurrency::cancel_current_task RaiseException 17808->17809 17810 40219c 17809->17810 17811 4191a9 ___std_exception_copy 26 API calls 17810->17811 17812 4021c3 17811->17812 17812->17769 17814 41942e RaiseException 17813->17814 17815 4193fe 17813->17815 17814->17802 17815->17814 17817 4191b6 17816->17817 17823 4021c3 17816->17823 17818 41cc8d ___std_exception_copy 15 API calls 17817->17818 17817->17823 17819 4191d3 17818->17819 17822 4191e3 17819->17822 17834 41dd4a 17819->17834 17843 41ca42 17822->17843 17823->17769 17990 41ccd4 17824->17990 17832 41ea8a _unexpected 17827->17832 17828 41eac8 17830 41c750 _free 14 API calls 17828->17830 17829 41eab3 RtlAllocateHeap 17831 41eac6 17829->17831 17829->17832 17830->17831 17831->17795 17832->17828 17832->17829 17833 41cca7 _unexpected 2 API calls 17832->17833 17833->17832 17835 41dd57 17834->17835 17836 41dd65 17834->17836 17835->17836 17841 41dd7c 17835->17841 17846 41c750 17836->17846 17838 41dd6d 17849 41cc2c 17838->17849 17840 41dd77 17840->17822 17841->17840 17842 41c750 _free 14 API calls 17841->17842 17842->17838 17844 41e5a1 _free 14 API calls 17843->17844 17845 41ca5a 17844->17845 17845->17823 17852 41efe9 GetLastError 17846->17852 17848 41c755 17848->17838 17972 41cbc8 17849->17972 17851 41cc38 17851->17840 17853 41f000 17852->17853 17856 41f006 17852->17856 17875 41f3d0 17853->17875 17872 41f00c SetLastError 17856->17872 17880 41f40f 17856->17880 17860 41f034 17861 41f053 17860->17861 17862 41f03c 17860->17862 17864 41f40f _unexpected 6 API calls 17861->17864 17863 41f40f _unexpected 6 API calls 17862->17863 17865 41f04a 17863->17865 17866 41f05f 17864->17866 17892 41e5a1 17865->17892 17867 41f063 17866->17867 17868 41f074 17866->17868 17870 41f40f _unexpected 6 API calls 17867->17870 17898 41ecc0 17868->17898 17870->17865 17872->17848 17874 41e5a1 _free 12 API calls 17874->17872 17903 41f213 17875->17903 17877 41f3ec 17878 41f3f5 17877->17878 17879 41f407 TlsGetValue 17877->17879 17878->17856 17881 41f213 _unexpected 5 API calls 17880->17881 17882 41f42b 17881->17882 17883 41f024 17882->17883 17884 41f449 TlsSetValue 17882->17884 17883->17872 17885 420873 17883->17885 17891 420880 _unexpected 17885->17891 17886 4208c0 17889 41c750 _free 13 API calls 17886->17889 17887 4208ab HeapAlloc 17888 4208be 17887->17888 17887->17891 17888->17860 17889->17888 17890 41cca7 _unexpected 2 API calls 17890->17891 17891->17886 17891->17887 17891->17890 17893 41e5ac HeapFree 17892->17893 17897 41e5d5 _free 17892->17897 17894 41e5c1 17893->17894 17893->17897 17895 41c750 _free 12 API calls 17894->17895 17896 41e5c7 GetLastError 17895->17896 17896->17897 17897->17872 17916 41eb54 17898->17916 17904 41f241 17903->17904 17908 41f23d _unexpected 17903->17908 17904->17908 17909 41f14c 17904->17909 17907 41f25b GetProcAddress 17907->17908 17908->17877 17914 41f15d ___vcrt_InitializeCriticalSectionEx 17909->17914 17910 41f208 17910->17907 17910->17908 17911 41f17b LoadLibraryExW 17912 41f196 GetLastError 17911->17912 17911->17914 17912->17914 17913 41f1f1 FreeLibrary 17913->17914 17914->17910 17914->17911 17914->17913 17915 41f1c9 LoadLibraryExW 17914->17915 17915->17914 17917 41eb60 CallCatchBlock 17916->17917 17930 41dea3 EnterCriticalSection 17917->17930 17919 41eb6a 17931 41eb9a 17919->17931 17922 41ec66 17923 41ec72 CallCatchBlock 17922->17923 17935 41dea3 EnterCriticalSection 17923->17935 17925 41ec7c 17936 41ee47 17925->17936 17927 41ec94 17940 41ecb4 17927->17940 17930->17919 17934 41deeb LeaveCriticalSection 17931->17934 17933 41eb88 17933->17922 17934->17933 17935->17925 17937 41ee7d __fassign 17936->17937 17938 41ee56 __fassign 17936->17938 17937->17927 17938->17937 17943 42260f 17938->17943 17971 41deeb LeaveCriticalSection 17940->17971 17942 41eca2 17942->17874 17945 42268f 17943->17945 17948 422625 17943->17948 17944 422780 __fassign 14 API calls 17969 4226eb 17944->17969 17946 41e5a1 _free 14 API calls 17945->17946 17970 4226dd 17945->17970 17947 4226b1 17946->17947 17951 41e5a1 _free 14 API calls 17947->17951 17948->17945 17949 422658 17948->17949 17953 41e5a1 _free 14 API calls 17948->17953 17950 42267a 17949->17950 17958 41e5a1 _free 14 API calls 17949->17958 17952 41e5a1 _free 14 API calls 17950->17952 17954 4226c4 17951->17954 17955 422684 17952->17955 17957 42264d 17953->17957 17959 41e5a1 _free 14 API calls 17954->17959 17962 41e5a1 _free 14 API calls 17955->17962 17956 42274b 17963 41e5a1 _free 14 API calls 17956->17963 17964 4221ec ___free_lconv_mon 14 API calls 17957->17964 17960 42266f 17958->17960 17961 4226d2 17959->17961 17965 4222ea __fassign 14 API calls 17960->17965 17966 41e5a1 _free 14 API calls 17961->17966 17962->17945 17968 422751 17963->17968 17964->17949 17965->17950 17966->17970 17967 41e5a1 14 API calls _free 17967->17969 17968->17937 17969->17956 17969->17967 17970->17944 17971->17942 17973 41efe9 __dosmaperr 14 API calls 17972->17973 17974 41cbd3 17973->17974 17977 41cbe1 17974->17977 17980 41cc59 IsProcessorFeaturePresent 17974->17980 17976 41cc2b 17978 41cbc8 ___std_exception_copy 25 API calls 17976->17978 17977->17851 17979 41cc38 17978->17979 17979->17851 17981 41cc65 17980->17981 17984 41ca80 17981->17984 17985 41ca9c ___scrt_fastfail 17984->17985 17986 41cac8 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17985->17986 17989 41cb99 ___scrt_fastfail 17986->17989 17987 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 17988 41cbb7 GetCurrentProcess TerminateProcess 17987->17988 17988->17976 17989->17987 17991 41cce0 CallCatchBlock 17990->17991 17996 41dea3 EnterCriticalSection 17991->17996 17993 41cceb 17997 41cd27 17993->17997 17996->17993 18000 41deeb LeaveCriticalSection 17997->18000 17999 41ccb2 17999->17795 18000->17999 18001->17787 18002 745bb6 18003 745bc5 18002->18003 18006 746356 18003->18006 18007 746371 18006->18007 18008 74637a CreateToolhelp32Snapshot 18007->18008 18009 746396 Module32First 18007->18009 18008->18007 18008->18009 18010 7463a5 18009->18010 18011 745bce 18009->18011 18013 746015 18010->18013 18014 746040 18013->18014 18015 746051 VirtualAlloc 18014->18015 18016 746089 18014->18016 18015->18016 18016->18016 18017 4186de 18018 4186ea CallCatchBlock 18017->18018 18043 418404 18018->18043 18020 4186f1 18021 41884a 18020->18021 18030 41871b ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 18020->18030 18091 418a67 IsProcessorFeaturePresent 18021->18091 18023 418851 18066 41b9ff 18023->18066 18028 41873a 18029 4187bb 18051 41d42b 18029->18051 18030->18028 18030->18029 18069 41b9d9 18030->18069 18033 4187c1 18055 416830 18033->18055 18044 41840d 18043->18044 18098 418887 IsProcessorFeaturePresent 18044->18098 18048 41841e 18049 418422 18048->18049 18108 41946f 18048->18108 18049->18020 18052 41d434 18051->18052 18053 41d439 18051->18053 18169 41d18f 18052->18169 18053->18033 18056 41683e 18055->18056 18057 416843 18056->18057 18562 406510 GetModuleFileNameA 18057->18562 18059 416861 18568 4138b0 18059->18568 19186 41b89d 18066->19186 18070 41dc6b CallCatchBlock 18069->18070 18071 41b9ef _unexpected 18069->18071 18072 41ee92 _unexpected 37 API calls 18070->18072 18071->18029 18075 41dc7c 18072->18075 18073 41dd06 CallUnexpected 37 API calls 18074 41dca6 18073->18074 18076 41c750 _free 14 API calls 18074->18076 18079 41dce5 18074->18079 18075->18073 18077 41dcdb 18076->18077 18078 41cc2c ___std_exception_copy 25 API calls 18077->18078 18078->18079 18079->18029 18092 418a7c ___scrt_fastfail 18091->18092 18093 418b27 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18092->18093 18094 418b72 ___scrt_fastfail 18093->18094 18094->18023 18095 41b9c3 18096 41b89d _unexpected 23 API calls 18095->18096 18097 41885f 18096->18097 18099 418419 18098->18099 18100 419450 18099->18100 18114 41a6b9 18100->18114 18103 419459 18103->18048 18105 419461 18106 41946c 18105->18106 18128 41a6f5 18105->18128 18106->18048 18109 419482 18108->18109 18110 419478 18108->18110 18109->18049 18111 4198b5 ___vcrt_uninitialize_ptd 6 API calls 18110->18111 18112 41947d 18111->18112 18113 41a6f5 ___vcrt_uninitialize_locks DeleteCriticalSection 18112->18113 18113->18109 18115 41a6c2 18114->18115 18117 41a6eb 18115->18117 18119 419455 18115->18119 18132 41aa7b 18115->18132 18118 41a6f5 ___vcrt_uninitialize_locks DeleteCriticalSection 18117->18118 18118->18119 18119->18103 18120 419882 18119->18120 18150 41a98c 18120->18150 18125 4198b2 18125->18105 18127 419897 18127->18105 18129 41a700 18128->18129 18131 41a71f 18128->18131 18130 41a70a DeleteCriticalSection 18129->18130 18130->18130 18130->18131 18131->18103 18137 41a943 18132->18137 18135 41aab3 InitializeCriticalSectionAndSpinCount 18136 41aa9e 18135->18136 18136->18115 18138 41a97e 18137->18138 18139 41a95b 18137->18139 18138->18135 18138->18136 18139->18138 18143 41a897 18139->18143 18142 41a970 GetProcAddress 18142->18138 18146 41a8a6 ___vcrt_InitializeCriticalSectionEx 18143->18146 18144 41a938 18144->18138 18144->18142 18145 41a8bf LoadLibraryExW 18145->18146 18147 41a8da GetLastError 18145->18147 18146->18144 18146->18145 18148 41a921 FreeLibrary 18146->18148 18149 41a8f9 LoadLibraryExW 18146->18149 18147->18146 18148->18146 18149->18146 18151 41a943 ___vcrt_InitializeCriticalSectionEx 5 API calls 18150->18151 18152 41a9a6 18151->18152 18153 41a9bf TlsAlloc 18152->18153 18154 41988c 18152->18154 18154->18127 18155 41aa3d 18154->18155 18156 41a943 ___vcrt_InitializeCriticalSectionEx 5 API calls 18155->18156 18157 41aa57 18156->18157 18158 41aa72 TlsSetValue 18157->18158 18159 4198a5 18157->18159 18158->18159 18159->18125 18160 4198b5 18159->18160 18161 4198c5 18160->18161 18162 4198bf 18160->18162 18161->18127 18164 41a9c7 18162->18164 18165 41a943 ___vcrt_InitializeCriticalSectionEx 5 API calls 18164->18165 18166 41a9e1 18165->18166 18167 41a9f9 TlsFree 18166->18167 18168 41a9ed 18166->18168 18167->18168 18168->18161 18170 41d198 18169->18170 18171 41d1ae 18169->18171 18170->18171 18175 41d1bb 18170->18175 18171->18053 18173 41d1a5 18173->18171 18188 41d30d 18173->18188 18176 41d1c4 18175->18176 18177 41d1c7 18175->18177 18176->18173 18196 421602 18177->18196 18182 41d1d9 18184 41e5a1 _free 14 API calls 18182->18184 18186 41d208 18184->18186 18186->18173 18187 41e5a1 _free 14 API calls 18187->18182 18189 41d37e 18188->18189 18195 41d31c 18188->18195 18189->18171 18190 420873 _unexpected 14 API calls 18190->18195 18191 41d382 18193 41e5a1 _free 14 API calls 18191->18193 18192 4218bf WideCharToMultiByte __wsopen_s 18192->18195 18193->18189 18194 41e5a1 _free 14 API calls 18194->18195 18195->18189 18195->18190 18195->18191 18195->18192 18195->18194 18197 41d1ce 18196->18197 18198 42160b 18196->18198 18202 4219a3 GetEnvironmentStringsW 18197->18202 18231 41ef4f 18198->18231 18203 4219ba 18202->18203 18213 421a10 18202->18213 18206 4218bf __wsopen_s WideCharToMultiByte 18203->18206 18204 41d1d3 18204->18182 18214 41d20e 18204->18214 18205 421a19 FreeEnvironmentStringsW 18205->18204 18207 4219d3 18206->18207 18208 41ea8a __wsopen_s 15 API calls 18207->18208 18207->18213 18209 4219e3 18208->18209 18210 4218bf __wsopen_s WideCharToMultiByte 18209->18210 18212 4219fb 18209->18212 18210->18212 18211 41e5a1 _free 14 API calls 18211->18213 18212->18211 18213->18204 18213->18205 18215 41d223 18214->18215 18216 420873 _unexpected 14 API calls 18215->18216 18227 41d24a 18216->18227 18217 41d2af 18218 41e5a1 _free 14 API calls 18217->18218 18219 41d1e4 18218->18219 18219->18187 18220 420873 _unexpected 14 API calls 18220->18227 18221 41d2b1 18556 41d2de 18221->18556 18223 41dd4a ___std_exception_copy 25 API calls 18223->18227 18225 41e5a1 _free 14 API calls 18225->18217 18226 41d2d1 18228 41cc59 ___std_exception_copy 11 API calls 18226->18228 18227->18217 18227->18220 18227->18221 18227->18223 18227->18226 18229 41e5a1 _free 14 API calls 18227->18229 18230 41d2dd 18228->18230 18229->18227 18232 41ef60 18231->18232 18233 41ef5a 18231->18233 18234 41f40f _unexpected 6 API calls 18232->18234 18255 41ef66 18232->18255 18235 41f3d0 _unexpected 6 API calls 18233->18235 18236 41ef7a 18234->18236 18235->18232 18237 420873 _unexpected 14 API calls 18236->18237 18236->18255 18239 41ef8a 18237->18239 18241 41ef92 18239->18241 18242 41efa7 18239->18242 18244 41f40f _unexpected 6 API calls 18241->18244 18245 41f40f _unexpected 6 API calls 18242->18245 18243 41efdf 18256 421449 18243->18256 18247 41ef9e 18244->18247 18246 41efb3 18245->18246 18248 41efb7 18246->18248 18249 41efc6 18246->18249 18252 41e5a1 _free 14 API calls 18247->18252 18250 41f40f _unexpected 6 API calls 18248->18250 18251 41ecc0 _unexpected 14 API calls 18249->18251 18250->18247 18253 41efd1 18251->18253 18252->18255 18254 41e5a1 _free 14 API calls 18253->18254 18254->18255 18255->18243 18275 41dd06 18255->18275 18364 421562 18256->18364 18261 421475 18261->18197 18266 41e5a1 _free 14 API calls 18268 4214c6 18266->18268 18267 4214b3 18269 41c750 _free 14 API calls 18267->18269 18268->18197 18271 4214b8 18269->18271 18270 4214ce 18272 4214fa 18270->18272 18273 41e5a1 _free 14 API calls 18270->18273 18271->18266 18272->18271 18400 4210e4 18272->18400 18273->18272 18286 421f7e 18275->18286 18279 41dd20 IsProcessorFeaturePresent 18281 41dd2c 18279->18281 18280 41dd3f 18282 41b9c3 _unexpected 23 API calls 18280->18282 18284 41ca80 _unexpected 8 API calls 18281->18284 18285 41dd49 18282->18285 18283 41dd16 18283->18279 18283->18280 18284->18280 18316 421eb0 18286->18316 18289 421fcc 18290 421fd8 CallCatchBlock 18289->18290 18291 41efe9 __dosmaperr 14 API calls 18290->18291 18295 422005 _unexpected 18290->18295 18296 421fff _unexpected 18290->18296 18291->18296 18292 42204a 18293 41c750 _free 14 API calls 18292->18293 18294 42204f 18293->18294 18297 41cc2c ___std_exception_copy 25 API calls 18294->18297 18300 422076 18295->18300 18327 41dea3 EnterCriticalSection 18295->18327 18296->18292 18296->18295 18298 422034 18296->18298 18297->18298 18298->18283 18302 4221b3 18300->18302 18304 4220be 18300->18304 18313 4220e9 18300->18313 18309 4221be 18302->18309 18362 41deeb LeaveCriticalSection 18302->18362 18304->18313 18328 421fc3 18304->18328 18306 41b9c3 _unexpected 23 API calls 18307 4221c6 18306->18307 18309->18306 18312 421fc3 _unexpected 37 API calls 18312->18313 18331 42215f 18313->18331 18314 42213d 18314->18298 18315 41ee92 _unexpected 37 API calls 18314->18315 18315->18298 18317 421ebc CallCatchBlock 18316->18317 18322 41dea3 EnterCriticalSection 18317->18322 18319 421eca 18323 421f08 18319->18323 18322->18319 18326 41deeb LeaveCriticalSection 18323->18326 18325 41dd0b 18325->18283 18325->18289 18326->18325 18327->18300 18329 41ee92 _unexpected 37 API calls 18328->18329 18330 421fc8 18329->18330 18330->18312 18332 42212e 18331->18332 18333 422165 18331->18333 18332->18298 18332->18314 18335 41ee92 GetLastError 18332->18335 18363 41deeb LeaveCriticalSection 18333->18363 18336 41eeaf 18335->18336 18337 41eea9 18335->18337 18339 41f40f _unexpected 6 API calls 18336->18339 18359 41eeb5 SetLastError 18336->18359 18338 41f3d0 _unexpected 6 API calls 18337->18338 18338->18336 18340 41eecd 18339->18340 18341 420873 _unexpected 14 API calls 18340->18341 18340->18359 18343 41eedd 18341->18343 18344 41eee5 18343->18344 18345 41eefc 18343->18345 18350 41f40f _unexpected 6 API calls 18344->18350 18349 41f40f _unexpected 6 API calls 18345->18349 18346 41ef43 18346->18314 18347 41ef49 18348 41dd06 CallUnexpected 35 API calls 18347->18348 18351 41ef4e 18348->18351 18352 41ef08 18349->18352 18353 41eef3 18350->18353 18354 41ef1d 18352->18354 18355 41ef0c 18352->18355 18356 41e5a1 _free 14 API calls 18353->18356 18358 41ecc0 _unexpected 14 API calls 18354->18358 18357 41f40f _unexpected 6 API calls 18355->18357 18356->18359 18357->18353 18360 41ef28 18358->18360 18359->18346 18359->18347 18361 41e5a1 _free 14 API calls 18360->18361 18361->18359 18362->18309 18363->18332 18365 42156e CallCatchBlock 18364->18365 18366 421588 18365->18366 18408 41dea3 EnterCriticalSection 18365->18408 18368 42145c 18366->18368 18371 41dd06 CallUnexpected 37 API calls 18366->18371 18375 4211f2 18368->18375 18369 4215c4 18409 4215e1 18369->18409 18372 421601 18371->18372 18373 421598 18373->18369 18374 41e5a1 _free 14 API calls 18373->18374 18374->18369 18413 41bcad 18375->18413 18378 421213 GetOEMCP 18381 42123c 18378->18381 18379 421225 18380 42122a GetACP 18379->18380 18379->18381 18380->18381 18381->18261 18382 41ea8a 18381->18382 18383 41eac8 18382->18383 18387 41ea98 _unexpected 18382->18387 18385 41c750 _free 14 API calls 18383->18385 18384 41eab3 RtlAllocateHeap 18386 41eac6 18384->18386 18384->18387 18385->18386 18386->18271 18389 42165d 18386->18389 18387->18383 18387->18384 18388 41cca7 _unexpected 2 API calls 18387->18388 18388->18387 18390 4211f2 39 API calls 18389->18390 18391 42167d 18390->18391 18393 4216b7 IsValidCodePage 18391->18393 18394 4216f3 ___scrt_fastfail 18391->18394 18392 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18395 4214ab 18392->18395 18393->18394 18396 4216c9 18393->18396 18394->18392 18395->18267 18395->18270 18397 4216f8 GetCPInfo 18396->18397 18399 4216d2 ___scrt_fastfail 18396->18399 18397->18394 18397->18399 18455 4212c8 18399->18455 18401 4210f0 CallCatchBlock 18400->18401 18530 41dea3 EnterCriticalSection 18401->18530 18403 4210fa 18531 421131 18403->18531 18408->18373 18412 41deeb LeaveCriticalSection 18409->18412 18411 4215e8 18411->18366 18412->18411 18414 41bccd 18413->18414 18415 41bcc4 18413->18415 18414->18415 18416 41ee92 _unexpected 37 API calls 18414->18416 18415->18378 18415->18379 18417 41bced 18416->18417 18421 41f58b 18417->18421 18422 41bd03 18421->18422 18423 41f59e 18421->18423 18425 41f5b8 18422->18425 18423->18422 18429 42285b 18423->18429 18426 41f5e0 18425->18426 18427 41f5cb 18425->18427 18426->18415 18427->18426 18450 42164a 18427->18450 18430 422867 CallCatchBlock 18429->18430 18431 41ee92 _unexpected 37 API calls 18430->18431 18432 422870 18431->18432 18439 4228b6 18432->18439 18442 41dea3 EnterCriticalSection 18432->18442 18434 42288e 18443 4228dc 18434->18443 18439->18422 18440 41dd06 CallUnexpected 37 API calls 18441 4228db 18440->18441 18442->18434 18444 42289f 18443->18444 18445 4228ea __fassign 18443->18445 18447 4228bb 18444->18447 18445->18444 18446 42260f __fassign 14 API calls 18445->18446 18446->18444 18448 41deeb _unexpected LeaveCriticalSection 18447->18448 18449 4228b2 18448->18449 18449->18439 18449->18440 18451 41ee92 _unexpected 37 API calls 18450->18451 18452 421654 18451->18452 18453 421562 __fassign 37 API calls 18452->18453 18454 42165a 18453->18454 18454->18426 18456 4212f0 GetCPInfo 18455->18456 18465 4213b9 18455->18465 18462 421308 18456->18462 18456->18465 18457 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18459 421447 18457->18459 18459->18394 18466 42246f 18462->18466 18464 425abe 41 API calls 18464->18465 18465->18457 18467 41bcad __fassign 37 API calls 18466->18467 18468 42248f 18467->18468 18486 41ead8 18468->18486 18470 42254d 18472 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18470->18472 18471 4224bc 18471->18470 18473 41ea8a __wsopen_s 15 API calls 18471->18473 18477 4224e2 __alloca_probe_16 ___scrt_fastfail 18471->18477 18474 421370 18472->18474 18473->18477 18481 425abe 18474->18481 18475 422547 18489 422572 18475->18489 18477->18475 18478 41ead8 __fassign MultiByteToWideChar 18477->18478 18479 422530 18478->18479 18479->18475 18480 422537 GetStringTypeW 18479->18480 18480->18475 18482 41bcad __fassign 37 API calls 18481->18482 18483 425ad1 18482->18483 18493 4258d4 18483->18493 18488 41eae9 MultiByteToWideChar 18486->18488 18488->18471 18490 42258f 18489->18490 18491 42257e 18489->18491 18490->18470 18491->18490 18492 41e5a1 _free 14 API calls 18491->18492 18492->18490 18494 4258ef 18493->18494 18495 41ead8 __fassign MultiByteToWideChar 18494->18495 18498 425933 18495->18498 18496 425a98 18497 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18496->18497 18499 421391 18497->18499 18498->18496 18500 41ea8a __wsopen_s 15 API calls 18498->18500 18504 425958 __alloca_probe_16 18498->18504 18499->18464 18500->18504 18501 41ead8 __fassign MultiByteToWideChar 18502 42599e 18501->18502 18515 4259fd 18502->18515 18521 41f49c 18502->18521 18503 422572 __freea 14 API calls 18503->18496 18504->18501 18504->18515 18507 4259d4 18510 41f49c 6 API calls 18507->18510 18507->18515 18508 425a0c 18509 41ea8a __wsopen_s 15 API calls 18508->18509 18514 425a1e __alloca_probe_16 18508->18514 18509->18514 18510->18515 18511 425a89 18512 422572 __freea 14 API calls 18511->18512 18512->18515 18513 41f49c 6 API calls 18516 425a66 18513->18516 18514->18511 18514->18513 18515->18503 18516->18511 18527 4218bf 18516->18527 18518 425a80 18518->18511 18519 425ab5 18518->18519 18520 422572 __freea 14 API calls 18519->18520 18520->18515 18522 41f118 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 18521->18522 18523 41f4a7 18522->18523 18524 41f4f9 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 18523->18524 18525 41f4ad 18523->18525 18526 41f4ed LCMapStringW 18524->18526 18525->18507 18525->18508 18525->18515 18526->18525 18528 4218d8 WideCharToMultiByte 18527->18528 18528->18518 18530->18403 18541 41fa58 18531->18541 18533 421153 18534 41fa58 25 API calls 18533->18534 18535 421172 18534->18535 18536 421107 18535->18536 18537 41e5a1 _free 14 API calls 18535->18537 18538 421125 18536->18538 18537->18536 18555 41deeb LeaveCriticalSection 18538->18555 18540 421113 18540->18271 18542 41fa69 18541->18542 18551 41fa65 __wsopen_s 18541->18551 18543 41fa70 18542->18543 18546 41fa83 ___scrt_fastfail 18542->18546 18544 41c750 _free 14 API calls 18543->18544 18545 41fa75 18544->18545 18547 41cc2c ___std_exception_copy 25 API calls 18545->18547 18548 41fab1 18546->18548 18549 41faba 18546->18549 18546->18551 18547->18551 18550 41c750 _free 14 API calls 18548->18550 18549->18551 18553 41c750 _free 14 API calls 18549->18553 18552 41fab6 18550->18552 18551->18533 18554 41cc2c ___std_exception_copy 25 API calls 18552->18554 18553->18552 18554->18551 18555->18540 18557 41d2eb 18556->18557 18558 41d2b7 18556->18558 18559 41d302 18557->18559 18561 41e5a1 _free 14 API calls 18557->18561 18558->18225 18560 41e5a1 _free 14 API calls 18559->18560 18560->18558 18561->18557 18563 406560 18562->18563 18563->18563 18719 416f50 18563->18719 18565 406578 18566 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18565->18566 18567 406585 18566->18567 18567->18059 18732 404c60 18568->18732 18575 402220 27 API calls 18576 413909 IsUserAnAdmin 18575->18576 18577 402220 27 API calls 18576->18577 18578 413926 18577->18578 18829 416a90 18578->18829 18580 41394f 18843 402c70 18580->18843 18582 413956 18583 416a90 27 API calls 18582->18583 18584 41396b 18583->18584 18585 402c70 69 API calls 18584->18585 18586 413972 18585->18586 18587 413993 GetUserNameA 18586->18587 18588 4139d7 18587->18588 18588->18588 18589 416f50 27 API calls 18588->18589 18590 4139ef 18589->18590 18591 4139fa GetComputerNameExW 18590->18591 18592 413a50 18591->18592 18592->18592 18939 416cc0 18592->18939 18594 413a72 18953 417bb0 18594->18953 18596 413abf 18597 413b84 GetModuleFileNameA 18596->18597 18598 413bc0 18597->18598 18598->18598 18599 416f50 27 API calls 18598->18599 18600 413bdc 18599->18600 18601 402220 27 API calls 18600->18601 18602 413c7c 18601->18602 18965 4037d0 GetUserNameW GetProcessHeap HeapAlloc GetUserNameW 18602->18965 18608 413ca8 18609 416a90 27 API calls 18608->18609 18610 413cf8 18609->18610 18611 402c70 69 API calls 18610->18611 18612 413d03 18611->18612 18613 402220 27 API calls 18612->18613 18614 413d18 18613->18614 18615 416a90 27 API calls 18614->18615 18616 413d2c 18615->18616 18617 402c70 69 API calls 18616->18617 18618 413d37 18617->18618 18619 416a90 27 API calls 18618->18619 18620 413d55 18619->18620 18621 402c70 69 API calls 18620->18621 18622 413d60 18621->18622 18623 416a90 27 API calls 18622->18623 18624 413d7e 18623->18624 18625 402c70 69 API calls 18624->18625 18626 413d89 18625->18626 18627 416a90 27 API calls 18626->18627 18628 413da7 18627->18628 18629 402c70 69 API calls 18628->18629 18630 413db2 18629->18630 18631 416a90 27 API calls 18630->18631 18632 413dd0 18631->18632 18633 402c70 69 API calls 18632->18633 18634 413ddb 18633->18634 18635 416a90 27 API calls 18634->18635 18636 413df9 18635->18636 18637 402c70 69 API calls 18636->18637 18638 413e04 18637->18638 18639 416a90 27 API calls 18638->18639 18640 413e22 18639->18640 18641 402c70 69 API calls 18640->18641 18642 413e2d 18641->18642 18643 416a90 27 API calls 18642->18643 18644 413e4b 18643->18644 18645 402c70 69 API calls 18644->18645 18646 413e56 18645->18646 18647 416a90 27 API calls 18646->18647 18648 413e72 18647->18648 18649 402c70 69 API calls 18648->18649 18650 413e7d 18649->18650 18651 416a90 27 API calls 18650->18651 18652 413e94 18651->18652 18653 402c70 69 API calls 18652->18653 18654 413e9f 18653->18654 18655 416a90 27 API calls 18654->18655 18656 413eb6 18655->18656 18657 402c70 69 API calls 18656->18657 18658 413ec1 18657->18658 18659 416a90 27 API calls 18658->18659 18660 413edd 18659->18660 18661 402c70 69 API calls 18660->18661 18662 413ee8 18661->18662 19003 4171a0 18662->19003 18664 413efc 19007 4170a0 18664->19007 18666 413f10 18667 4170a0 27 API calls 18666->18667 18668 413f24 18667->18668 18669 4170a0 27 API calls 18668->18669 18670 413f38 18669->18670 18671 4171a0 27 API calls 18670->18671 18672 413f4c 18671->18672 18673 4170a0 27 API calls 18672->18673 18674 413f60 18673->18674 18675 4171a0 27 API calls 18674->18675 18676 413f74 18675->18676 18677 4170a0 27 API calls 18676->18677 18678 413f88 18677->18678 18679 4171a0 27 API calls 18678->18679 18680 413f9c 18679->18680 18681 4170a0 27 API calls 18680->18681 18682 413fb0 18681->18682 18683 4171a0 27 API calls 18682->18683 18684 413fc4 18683->18684 18685 4170a0 27 API calls 18684->18685 18686 413fd8 18685->18686 18687 4171a0 27 API calls 18686->18687 18688 413fec 18687->18688 18689 4170a0 27 API calls 18688->18689 18690 414000 18689->18690 18691 4171a0 27 API calls 18690->18691 18692 414014 18691->18692 18693 4170a0 27 API calls 18692->18693 18694 414028 18693->18694 18695 4171a0 27 API calls 18694->18695 18696 41403c 18695->18696 18697 4170a0 27 API calls 18696->18697 18698 414050 18697->18698 18699 4171a0 27 API calls 18698->18699 18700 414064 18699->18700 18701 4170a0 27 API calls 18700->18701 18702 414078 18701->18702 18703 4170a0 27 API calls 18702->18703 18704 41408c 18703->18704 18705 4170a0 27 API calls 18704->18705 18706 4140a0 18705->18706 18707 4171a0 27 API calls 18706->18707 18708 4140b4 18707->18708 18709 4169d0 25 API calls 18708->18709 18710 4140c2 18709->18710 18711 414eff 18710->18711 18713 414f39 18710->18713 18712 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18711->18712 18714 414f21 18712->18714 18715 41cc3c 25 API calls 18713->18715 18717 4167e0 CreateThread CreateThread CreateThread 18714->18717 18716 414f3e 18715->18716 18718 416820 Sleep 18717->18718 18718->18718 18721 416f6e __InternalCxxFrameHandler 18719->18721 18722 416f94 18719->18722 18720 41707e 18723 402180 Concurrency::cancel_current_task 27 API calls 18720->18723 18721->18565 18722->18720 18724 416fe8 18722->18724 18725 41700d 18722->18725 18726 417088 18723->18726 18724->18720 18728 41835e 27 API calls 18724->18728 18727 41835e 27 API calls 18725->18727 18730 416ff9 __wsopen_s 18725->18730 18727->18730 18728->18730 18729 41cc3c 25 API calls 18729->18720 18730->18729 18731 417060 18730->18731 18731->18565 19015 419630 18732->19015 18734 404cc6 GetVersionExW 18735 404ce8 18734->18735 18800 404e18 18734->18800 18737 416a90 27 API calls 18735->18737 18736 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18738 4053d7 18736->18738 18739 404cf7 18737->18739 18801 402220 18738->18801 18740 402c70 69 API calls 18739->18740 18741 404d02 18740->18741 18742 416a90 27 API calls 18741->18742 18743 404d24 18742->18743 18744 402c70 69 API calls 18743->18744 18745 404d2f GetModuleHandleA GetProcAddress 18744->18745 18748 404d55 18745->18748 18747 404dd6 18749 404e07 GetSystemInfo 18747->18749 18753 404e03 18747->18753 18748->18747 18750 4053de 18748->18750 18749->18753 18751 41cc3c 25 API calls 18750->18751 18752 4053f7 18751->18752 18754 404f49 18753->18754 18755 404e6f 18753->18755 18753->18800 18757 416a90 27 API calls 18754->18757 18756 416a90 27 API calls 18755->18756 18758 404e90 18756->18758 18759 404f5f 18757->18759 18760 402c70 69 API calls 18758->18760 18761 402c70 69 API calls 18759->18761 18762 404e97 18760->18762 18763 404f6a 18761->18763 18764 416a90 27 API calls 18762->18764 18765 416a90 27 API calls 18763->18765 18766 404eaf 18764->18766 18767 404f8a 18765->18767 18768 402c70 69 API calls 18766->18768 18769 402c70 69 API calls 18767->18769 18774 404eb6 18768->18774 18770 404f91 18769->18770 18771 416a90 27 API calls 18770->18771 18772 404fa6 18771->18772 18773 402c70 69 API calls 18772->18773 18777 404fad 18773->18777 19017 41ca5d 18774->19017 18776 416a90 27 API calls 18778 4050ab 18776->18778 18777->18776 18779 402c70 69 API calls 18778->18779 18780 4050b6 18779->18780 18781 416a90 27 API calls 18780->18781 18782 4050d6 18781->18782 18783 402c70 69 API calls 18782->18783 18784 4050dd 18783->18784 18785 416a90 27 API calls 18784->18785 18786 4050f2 18785->18786 18787 402c70 69 API calls 18786->18787 18788 4050f9 18787->18788 18789 416a90 27 API calls 18788->18789 18790 4051f7 18789->18790 18791 402c70 69 API calls 18790->18791 18792 405202 18791->18792 18793 416a90 27 API calls 18792->18793 18794 405222 18793->18794 18795 402c70 69 API calls 18794->18795 18796 405229 18795->18796 18797 416a90 27 API calls 18796->18797 18798 40523e 18797->18798 18799 402c70 69 API calls 18798->18799 18799->18800 18800->18736 18802 402244 18801->18802 18803 4022b7 18802->18803 18804 416f50 27 API calls 18802->18804 18805 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18803->18805 18804->18803 18806 4022c6 18805->18806 18807 405400 18806->18807 18808 419630 ___scrt_fastfail 18807->18808 18809 405465 GetVersionExW 18808->18809 18810 405483 18809->18810 18811 40548d 18809->18811 18814 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18810->18814 18812 416a90 27 API calls 18811->18812 18813 40549c 18812->18813 18815 402c70 69 API calls 18813->18815 18816 4055e5 18814->18816 18817 4054a7 18815->18817 18816->18575 18818 416a90 27 API calls 18817->18818 18819 4054c9 18818->18819 18820 402c70 69 API calls 18819->18820 18821 4054d4 GetModuleHandleA GetProcAddress 18820->18821 18825 4054fa 18821->18825 18823 405577 18823->18810 18826 4055a8 GetSystemInfo 18823->18826 18824 4055ec 18827 41cc3c 25 API calls 18824->18827 18825->18823 18825->18824 18826->18810 18828 4055f1 18827->18828 18830 416ab6 18829->18830 18831 416abd 18830->18831 18832 416b11 18830->18832 18833 416af2 18830->18833 18831->18580 18838 41835e 27 API calls 18832->18838 18840 416b06 __wsopen_s 18832->18840 18834 416b49 18833->18834 18835 416af9 18833->18835 18836 402180 Concurrency::cancel_current_task 27 API calls 18834->18836 18837 41835e 27 API calls 18835->18837 18839 416aff 18836->18839 18837->18839 18838->18840 18839->18840 18841 41cc3c 25 API calls 18839->18841 18840->18580 18842 416b53 18841->18842 19069 402a40 18843->19069 18849 402d65 18851 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18849->18851 18850 402d8b 18852 41cc3c 25 API calls 18850->18852 18854 402d87 18851->18854 18855 402d90 ___scrt_fastfail 18852->18855 18853 402cdb 18853->18849 18853->18850 18854->18582 18856 402df7 RegOpenKeyExA 18855->18856 18857 402e50 RegCloseKey 18856->18857 18858 402e26 RegQueryValueExA 18856->18858 18859 402e76 18857->18859 18858->18857 18859->18859 18860 416f50 27 API calls 18859->18860 18864 402e8e 18860->18864 18861 402ef6 18862 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18861->18862 18865 402f19 18862->18865 18863 402f1d 18866 41cc3c 25 API calls 18863->18866 18864->18861 18864->18863 18865->18582 18867 402f22 RegOpenKeyExA 18866->18867 18869 402f97 RegCloseKey 18867->18869 18870 402f6d RegSetValueExA 18867->18870 18871 402fa8 18869->18871 18870->18869 18872 40304e 18871->18872 18873 403066 18871->18873 18874 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18872->18874 18875 41cc3c 25 API calls 18873->18875 18876 403062 18874->18876 18877 40306b GdiplusStartup 18875->18877 18876->18582 19088 416b60 18877->19088 18881 4030f0 GetDC 18882 416a90 27 API calls 18881->18882 18883 4031eb 18882->18883 18884 402c70 42 API calls 18883->18884 18885 4031f6 18884->18885 18886 416a90 27 API calls 18885->18886 18887 403218 18886->18887 18888 402c70 42 API calls 18887->18888 18889 40321f 18888->18889 18890 416a90 27 API calls 18889->18890 18891 403234 18890->18891 18892 402c70 42 API calls 18891->18892 18893 40323b 18892->18893 18894 416a90 27 API calls 18893->18894 18895 403269 18894->18895 18896 402c70 42 API calls 18895->18896 18897 403274 18896->18897 18898 4170a0 27 API calls 18897->18898 18899 403288 18898->18899 18900 4170a0 27 API calls 18899->18900 18903 403299 18900->18903 18901 4037ad 18902 41cc3c 25 API calls 18901->18902 18905 4037c6 18902->18905 18903->18901 18904 4033db 18903->18904 18906 416a90 27 API calls 18904->18906 18907 40341b 18906->18907 18908 402c70 42 API calls 18907->18908 18909 403426 RegGetValueA 18908->18909 18915 403461 18909->18915 18911 4034a2 GetSystemMetrics 18913 4034b0 18911->18913 18914 4034a9 18911->18914 18912 4034ab GetSystemMetrics 18912->18913 18916 416a90 27 API calls 18913->18916 18914->18912 18915->18911 18915->18912 18917 4034cb 18916->18917 18918 402c70 42 API calls 18917->18918 18919 4034d6 RegGetValueA 18918->18919 18921 40350b 18919->18921 18922 403546 GetSystemMetrics 18921->18922 18923 40354f GetSystemMetrics 18921->18923 18924 403554 6 API calls 18922->18924 18925 40354d 18922->18925 18923->18924 18926 403668 SelectObject DeleteObject DeleteObject ReleaseDC GdipDisposeImage 18924->18926 18927 4035e7 18924->18927 18925->18923 18932 4036c8 18926->18932 18928 41cc8d ___std_exception_copy 15 API calls 18927->18928 18929 4035ed 18928->18929 18929->18926 18931 4035fc GdipGetImageEncoders 18929->18931 18938 403610 18931->18938 18933 403759 GdiplusShutdown 18932->18933 18936 40376a 18933->18936 18934 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18937 4037a9 18934->18937 18935 41ca42 ___std_exception_copy 14 API calls 18935->18926 18936->18934 18937->18582 18938->18935 18940 416ce1 __InternalCxxFrameHandler 18939->18940 18941 416d0c 18939->18941 18940->18594 18943 416dfb 18941->18943 18946 416d60 18941->18946 18947 416d87 18941->18947 18951 416d71 __wsopen_s 18941->18951 18942 41cc3c 25 API calls 18945 416e0a 18942->18945 18944 402180 Concurrency::cancel_current_task 27 API calls 18943->18944 18944->18951 18946->18943 18948 416d6b 18946->18948 18949 41835e 27 API calls 18947->18949 18947->18951 18950 41835e 27 API calls 18948->18950 18949->18951 18950->18951 18951->18942 18952 416de2 18951->18952 18952->18594 18955 417bcb 18953->18955 18964 417cb4 __wsopen_s 18953->18964 18954 417d41 18956 402180 Concurrency::cancel_current_task 27 API calls 18954->18956 18955->18954 18957 417c61 18955->18957 18958 417c3a 18955->18958 18963 417c4b __wsopen_s 18955->18963 18955->18964 18959 417d4b 18956->18959 18960 41835e 27 API calls 18957->18960 18957->18963 18958->18954 18961 41835e 27 API calls 18958->18961 18960->18963 18961->18963 18962 41cc3c 25 API calls 18962->18954 18963->18962 18963->18964 18964->18596 18966 4039c2 7 API calls 18965->18966 18967 403855 LookupAccountNameW GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 18965->18967 18978 4039b4 18966->18978 18967->18966 18968 40389d 18967->18968 18968->18966 18970 4038a5 LookupAccountNameW 18968->18970 18969 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18972 403a03 18969->18972 18970->18966 18971 4038c4 ConvertSidToStringSidW 18970->18971 18971->18966 18973 4038d7 18971->18973 18982 403a10 18972->18982 18974 416f50 27 API calls 18973->18974 18975 403953 18974->18975 18976 416f50 27 API calls 18975->18976 18977 40398e 18976->18977 18977->18978 18979 403a07 18977->18979 18978->18969 18980 41cc3c 25 API calls 18979->18980 18981 403a0c 18980->18981 18996 403ce4 18982->18996 18997 403a88 18982->18997 18983 403da6 19143 417090 18983->19143 18984 403d07 18985 416f50 27 API calls 18984->18985 18993 403d26 18985->18993 18987 403dab 18988 41cc3c 25 API calls 18987->18988 18989 403db0 18988->18989 18990 403d7c 18991 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 18990->18991 18992 403d9f 18991->18992 18998 4169d0 18992->18998 18993->18987 18993->18990 18994 416f50 27 API calls 18994->18997 18996->18983 18996->18984 18997->18983 18997->18987 18997->18994 18997->18996 19138 417d50 18997->19138 18999 416a01 18998->18999 19000 4169de 18998->19000 18999->18608 19000->18999 19001 41cc3c 25 API calls 19000->19001 19002 416a4c 19001->19002 19004 4171b9 19003->19004 19006 4171cd __InternalCxxFrameHandler 19004->19006 19173 4178f0 19004->19173 19006->18664 19008 4170c8 19007->19008 19010 417112 19007->19010 19009 4170d1 19008->19009 19008->19010 19011 417d50 27 API calls 19009->19011 19012 417121 __InternalCxxFrameHandler 19010->19012 19013 4178f0 27 API calls 19010->19013 19014 4170da 19011->19014 19012->18666 19013->19012 19014->18666 19016 419647 19015->19016 19016->18734 19016->19016 19020 41c7af 19017->19020 19038 41c9fd 19020->19038 19022 41c7fa 19023 41bcad __fassign 37 API calls 19022->19023 19030 41c806 19023->19030 19024 41c7c1 19024->19022 19025 41c7d6 19024->19025 19037 41c7e6 19024->19037 19026 41c750 _free 14 API calls 19025->19026 19027 41c7db 19026->19027 19029 41cc2c ___std_exception_copy 25 API calls 19027->19029 19029->19037 19031 41c835 19030->19031 19045 41beac 19030->19045 19034 41c89f 19031->19034 19051 41c9d4 19031->19051 19032 41c9d4 25 API calls 19035 41c967 19032->19035 19034->19032 19036 41c750 _free 14 API calls 19035->19036 19035->19037 19036->19037 19037->18800 19039 41ca02 19038->19039 19040 41ca15 19038->19040 19041 41c750 _free 14 API calls 19039->19041 19040->19024 19042 41ca07 19041->19042 19043 41cc2c ___std_exception_copy 25 API calls 19042->19043 19044 41ca12 19043->19044 19044->19024 19046 41bee9 19045->19046 19047 41beb9 19045->19047 19064 41f60d 19046->19064 19048 41bec8 __fassign 19047->19048 19057 41f631 19047->19057 19048->19030 19052 41c9e5 19051->19052 19053 41c9f9 19051->19053 19052->19053 19054 41c750 _free 14 API calls 19052->19054 19053->19034 19055 41c9ee 19054->19055 19056 41cc2c ___std_exception_copy 25 API calls 19055->19056 19056->19053 19058 41bcad __fassign 37 API calls 19057->19058 19059 41f64e 19058->19059 19060 42246f 40 API calls 19059->19060 19061 41f65e 19059->19061 19060->19061 19062 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 19061->19062 19063 41f6fa 19062->19063 19063->19048 19065 41ee92 _unexpected 37 API calls 19064->19065 19066 41f618 19065->19066 19067 41f58b __fassign 37 API calls 19066->19067 19068 41f628 19067->19068 19068->19048 19102 416e10 19069->19102 19071 402a6a 19072 402ae0 19071->19072 19073 416e10 27 API calls 19072->19073 19076 402b14 19073->19076 19074 402c46 19077 402890 19074->19077 19076->19074 19115 41bf00 19076->19115 19078 41835e 27 API calls 19077->19078 19086 40291a 19078->19086 19079 4029e8 19080 402a0e 19079->19080 19082 402a36 19079->19082 19081 418152 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 19080->19081 19083 402a32 19081->19083 19084 41cc3c 25 API calls 19082->19084 19083->18853 19085 402a3b 19084->19085 19086->19079 19125 4177b0 19086->19125 19089 416b78 19088->19089 19090 416bab 19088->19090 19089->18881 19092 416ca4 19090->19092 19094 416c00 19090->19094 19095 416c27 19090->19095 19100 416c11 19090->19100 19091 41cc3c 25 API calls 19093 416cb3 19091->19093 19096 402180 Concurrency::cancel_current_task 27 API calls 19092->19096 19094->19092 19097 416c0b 19094->19097 19099 41835e 27 API calls 19095->19099 19095->19100 19096->19100 19098 41835e 27 API calls 19097->19098 19098->19100 19099->19100 19100->19091 19101 416c88 19100->19101 19101->18881 19104 416e28 ___scrt_fastfail 19102->19104 19105 416e4f 19102->19105 19103 416f38 19106 402180 Concurrency::cancel_current_task 27 API calls 19103->19106 19104->19071 19105->19103 19107 416ea3 19105->19107 19108 416ec8 19105->19108 19109 416f42 19106->19109 19107->19103 19110 41835e 27 API calls 19107->19110 19111 41835e 27 API calls 19108->19111 19112 416eb4 ___scrt_fastfail 19108->19112 19110->19112 19111->19112 19113 41cc3c 25 API calls 19112->19113 19114 416f1a 19112->19114 19113->19103 19114->19071 19116 41bf1c __fassign 19115->19116 19117 41bf0e 19115->19117 19116->19076 19120 41be73 19117->19120 19121 41bcad __fassign 37 API calls 19120->19121 19122 41be86 19121->19122 19123 41beac 40 API calls 19122->19123 19124 41be97 19123->19124 19124->19076 19126 4177d3 19125->19126 19127 4178d9 19125->19127 19129 417815 19126->19129 19130 41783f 19126->19130 19128 402180 Concurrency::cancel_current_task 27 API calls 19127->19128 19136 417826 __wsopen_s 19128->19136 19129->19127 19131 417820 19129->19131 19132 41835e 27 API calls 19130->19132 19130->19136 19134 41835e 27 API calls 19131->19134 19132->19136 19133 41cc3c 25 API calls 19135 4178e8 19133->19135 19134->19136 19136->19133 19137 41789b __wsopen_s 19136->19137 19137->19086 19139 417d64 19138->19139 19142 417d75 __InternalCxxFrameHandler __wsopen_s 19139->19142 19146 417e10 19139->19146 19141 417dfb 19141->18997 19142->18997 19162 418132 19143->19162 19147 417f49 19146->19147 19148 417e3b 19146->19148 19151 402180 Concurrency::cancel_current_task 27 API calls 19147->19151 19149 417e82 19148->19149 19150 417ea9 19148->19150 19149->19147 19152 417e8d 19149->19152 19155 41835e 27 API calls 19150->19155 19156 417e93 __wsopen_s 19150->19156 19151->19156 19154 41835e 27 API calls 19152->19154 19153 41cc3c 25 API calls 19157 417f58 19153->19157 19154->19156 19155->19156 19156->19153 19161 417f11 __wsopen_s 19156->19161 19158 417f8a 19157->19158 19159 41cc3c 25 API calls 19157->19159 19158->19141 19160 417fae 19159->19160 19161->19141 19167 4180a6 19162->19167 19165 4193e4 Concurrency::cancel_current_task RaiseException 19166 418151 19165->19166 19170 417fc7 19167->19170 19171 4191a9 ___std_exception_copy 26 API calls 19170->19171 19172 417ff3 19171->19172 19172->19165 19174 41791b 19173->19174 19175 417a3e 19173->19175 19177 417962 19174->19177 19178 41798c 19174->19178 19176 402180 Concurrency::cancel_current_task 27 API calls 19175->19176 19184 417973 __wsopen_s 19176->19184 19177->19175 19179 41796d 19177->19179 19182 41835e 27 API calls 19178->19182 19178->19184 19181 41835e 27 API calls 19179->19181 19180 41cc3c 25 API calls 19183 417a4d 19180->19183 19181->19184 19182->19184 19184->19180 19185 4179fc __wsopen_s 19184->19185 19185->19006 19187 41b8ab 19186->19187 19188 41b8bd 19186->19188 19189 418b89 _unexpected GetModuleHandleW 19187->19189 19198 41b744 19188->19198 19191 41b8b0 19189->19191 19191->19188 19214 41b943 GetModuleHandleExW 19191->19214 19193 418857 19193->18095 19197 41b900 19199 41b750 CallCatchBlock 19198->19199 19220 41dea3 EnterCriticalSection 19199->19220 19201 41b75a 19221 41b7b0 19201->19221 19203 41b767 19225 41b785 19203->19225 19206 41b901 19249 41df02 GetPEB 19206->19249 19209 41b930 19211 41b943 _unexpected 3 API calls 19209->19211 19210 41b910 GetPEB 19210->19209 19212 41b920 GetCurrentProcess TerminateProcess 19210->19212 19213 41b938 ExitProcess 19211->19213 19212->19209 19215 41b962 GetProcAddress 19214->19215 19216 41b985 19214->19216 19219 41b977 19215->19219 19217 41b8bc 19216->19217 19218 41b98b FreeLibrary 19216->19218 19217->19188 19218->19217 19219->19216 19220->19201 19222 41b7bc CallCatchBlock 19221->19222 19223 41b81d _unexpected 19222->19223 19228 41d713 19222->19228 19223->19203 19248 41deeb LeaveCriticalSection 19225->19248 19227 41b773 19227->19193 19227->19206 19231 41d444 19228->19231 19232 41d450 CallCatchBlock 19231->19232 19239 41dea3 EnterCriticalSection 19232->19239 19234 41d45e 19240 41d623 19234->19240 19239->19234 19241 41d46b 19240->19241 19242 41d642 19240->19242 19244 41d493 19241->19244 19242->19241 19243 41e5a1 _free 14 API calls 19242->19243 19243->19241 19247 41deeb LeaveCriticalSection 19244->19247 19246 41d47c 19246->19223 19247->19246 19248->19227 19250 41b90b 19249->19250 19251 41df1c 19249->19251 19250->19209 19250->19210 19253 41f296 19251->19253 19254 41f213 _unexpected 5 API calls 19253->19254 19255 41f2b2 19254->19255 19255->19250

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 140 41b901-41b90e call 41df02 143 41b930-41b93c call 41b943 ExitProcess 140->143 144 41b910-41b91e GetPEB 140->144 144->143 146 41b920-41b92a GetCurrentProcess TerminateProcess 144->146 146->143
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(?,?,0041B900,0041BE86,?,NA,0041BE86,0041EF4E), ref: 0041B923
                                                                • TerminateProcess.KERNEL32(00000000,?,0041B900,0041BE86,?,NA,0041BE86,0041EF4E), ref: 0041B92A
                                                                • ExitProcess.KERNEL32 ref: 0041B93C
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CurrentExitTerminate
                                                                • String ID:
                                                                • API String ID: 1703294689-0
                                                                • Opcode ID: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                                • Instruction ID: c3524ad3d233ec0a3a19b1bf7aedcb75de5af13a6c7a41cb1465cf438659ca8f
                                                                • Opcode Fuzzy Hash: 3d3398b3f9dcf73c51e1cd00535af5d0e13f2263922661259b1695b405c8b0d4
                                                                • Instruction Fuzzy Hash: 63E0B671120208EFCB216F65DD49AA97B79FB44751BC44439FA0586231CB39EE93CB98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 148 746356-74636f 149 746371-746373 148->149 150 746375 149->150 151 74637a-746386 CreateToolhelp32Snapshot 149->151 150->151 152 746396-7463a3 Module32First 151->152 153 746388-74638e 151->153 154 7463a5-7463a6 call 746015 152->154 155 7463ac-7463b4 152->155 153->152 159 746390-746394 153->159 160 7463ab 154->160 159->149 159->152 160->155
                                                                APIs
                                                                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0074637E
                                                                • Module32First.KERNEL32(00000000,00000224), ref: 0074639E
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.313412358.0000000000745000.00000040.00000020.00020000.00000000.sdmp, Offset: 00745000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_745000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                • String ID:
                                                                • API String ID: 3833638111-0
                                                                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                • Instruction ID: 800ca910bae1827fd7d2c7323629eea0331a8709acb35b0f0cef728f55581133
                                                                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                • Instruction Fuzzy Hash: B3F09636200710AFE7303FF5988DB6E76F8EF4B725F100528E642910C0DB74EC458A62
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 408650-408664 1 408683-40868f call 417a50 0->1 2 408666-408681 0->2 3 408694-40869b 1->3 2->3 5 4086a2-4086c2 CreateMutexW GetLastError 3->5 6 40869d-4086a0 3->6 7 4086c8-4086ce 5->7 6->0 8 4086d0-4086e2 7->8 9 4086fe-408718 7->9 10 4086f4-4086fb call 4185df 8->10 11 4086e4-4086f2 8->11 12 408741-408754 call 418152 9->12 13 40871a-408725 9->13 10->9 11->10 14 408764-4087ae call 41cc3c call 406bb0 call 406590 11->14 21 408759-40875c 12->21 16 408737-40873e call 4185df 13->16 17 408727-408735 13->17 29 4087b3-4087b7 14->29 16->12 17->14 17->16 30 4087b9 29->30 31 4087bb-4087c8 SetCurrentDirectoryA 29->31 30->31 32 4087f6-4088c0 call 416a90 call 402c70 call 416a90 call 402c70 call 416a90 call 402c70 call 4171a0 call 4170a0 call 4171a0 call 417380 call 4170a0 call 4048c0 31->32 33 4087ca-4087d6 31->33 68 4088c5-4088ce 32->68 34 4087d8-4087e6 33->34 35 4087ec-4087f3 call 4185df 33->35 34->35 37 408b10 call 41cc3c 34->37 35->32 44 408b15 call 41cc3c 37->44 48 408b1a-408b1f call 41cc3c 44->48 69 4088d0-4088dc 68->69 70 4088fc-408914 68->70 71 4088f2-4088f9 call 4185df 69->71 72 4088de-4088ec 69->72 73 408942-40895a 70->73 74 408916-408922 70->74 71->70 72->44 72->71 75 40898b-4089a9 73->75 76 40895c-40896b 73->76 78 408924-408932 74->78 79 408938-40893f call 4185df 74->79 82 4089da-4089fe 75->82 83 4089ab-4089ba 75->83 80 408981-408988 call 4185df 76->80 81 40896d-40897b 76->81 78->44 78->79 79->73 80->75 81->44 81->80 89 408a00-408a0f 82->89 90 408a2f-408a50 82->90 87 4089d0-4089d7 call 4185df 83->87 88 4089bc-4089ca 83->88 87->82 88->44 88->87 96 408a11-408a1f 89->96 97 408a25-408a2c call 4185df 89->97 92 408a52-408a5e 90->92 93 408a7e-408a99 90->93 99 408a60-408a6e 92->99 100 408a74-408a7b call 4185df 92->100 101 408ac6-408acc 93->101 102 408a9b-408aaa 93->102 96->44 96->97 97->90 99->44 99->100 100->93 108 408af6-408b0f call 418152 101->108 109 408ace-408ada 101->109 106 408abc-408ac3 call 4185df 102->106 107 408aac-408aba 102->107 106->101 107->44 107->106 110 408aec-408af3 call 4185df 109->110 111 408adc-408aea 109->111 110->108 111->48 111->110
                                                                APIs
                                                                • CreateMutexW.KERNELBASE(00000000,00000000,?,0043A194,E3B8478F,?,00000000,00000000), ref: 004086B1
                                                                • GetLastError.KERNEL32(?,00000000,00000000), ref: 004086B7
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateErrorLastMutex
                                                                • String ID:
                                                                • API String ID: 1925916568-0
                                                                • Opcode ID: f1f2071e9a285aa1a3a2cb53637d1cd3f182b2e936a90f1bb04a7aa8ed66fc7e
                                                                • Instruction ID: d5025c2257f1853fae8f1be1934c88d0cd5ba35f682ee7a5a0e711edb3be859e
                                                                • Opcode Fuzzy Hash: f1f2071e9a285aa1a3a2cb53637d1cd3f182b2e936a90f1bb04a7aa8ed66fc7e
                                                                • Instruction Fuzzy Hash: 57D15C71A001089BEB18DB28CE85BDDB772EF85314F60817EE445B73D6DF395A808B59
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 119 4219a3-4219b8 GetEnvironmentStringsW 120 421a13 119->120 121 4219ba-4219db call 42196c call 4218bf 119->121 122 421a15-421a17 120->122 121->120 129 4219dd-4219de call 41ea8a 121->129 124 421a20-421a26 122->124 125 421a19-421a1a FreeEnvironmentStringsW 122->125 125->124 131 4219e3-4219e8 129->131 132 4219ea-421a00 call 4218bf 131->132 133 421a08 131->133 132->133 139 421a02-421a06 132->139 134 421a0a-421a11 call 41e5a1 133->134 134->122 139->134
                                                                APIs
                                                                • GetEnvironmentStringsW.KERNEL32 ref: 004219AC
                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00421A1A
                                                                  • Part of subcall function 004218BF: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000000,?,00425A80,?,00000000,00000000), ref: 00421961
                                                                  • Part of subcall function 0041EA8A: RtlAllocateHeap.NTDLL(00000000,?,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041EABC
                                                                • _free.LIBCMT ref: 00421A0B
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EnvironmentStrings$AllocateByteCharFreeHeapMultiWide_free
                                                                • String ID:
                                                                • API String ID: 2560199156-0
                                                                • Opcode ID: 9bbd66b76b4a34ca0bab716a56d9e69b7f3100a2bd4ca48c1cc341373bda4218
                                                                • Instruction ID: 29b21772b9320c3fddc08945695e8111c5dc75795407a2b0146b8edf9caf2341
                                                                • Opcode Fuzzy Hash: 9bbd66b76b4a34ca0bab716a56d9e69b7f3100a2bd4ca48c1cc341373bda4218
                                                                • Instruction Fuzzy Hash: DA01FCB2B022753B273125B73CC9DBF696DCED2BA5394013AFD04D7211EE588D0282B8
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 161 41d1bb-41d1c2 162 41d1c4-41d1c6 161->162 163 41d1c7-41d1ce call 421602 call 4219a3 161->163 167 41d1d3-41d1d7 163->167 168 41d1d9-41d1dc 167->168 169 41d1de-41d1e7 call 41d20e 167->169 170 41d202-41d20d call 41e5a1 168->170 174 41d1e9-41d1ec 169->174 175 41d1ee-41d1f5 169->175 177 41d1fa-41d201 call 41e5a1 174->177 175->177 177->170
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID:
                                                                • API String ID: 269201875-0
                                                                • Opcode ID: 9f5dec638c6018a6b24b976b0791b773a56ee0672529c52ab4d44372aafa3d49
                                                                • Instruction ID: f1d333090dd57bfd17dfe39ecb9b07313f9b1ca465b706eabb36e918cd1afe6e
                                                                • Opcode Fuzzy Hash: 9f5dec638c6018a6b24b976b0791b773a56ee0672529c52ab4d44372aafa3d49
                                                                • Instruction Fuzzy Hash: 4FE0E5B6E0242022E211623F7C46AEB11856BD133AB15022FF860861E0DF7C88C2D19E
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 180 408770-4087a7 call 406bb0 183 4087ae call 406590 180->183 184 4087b3-4087b7 183->184 185 4087b9 184->185 186 4087bb-4087c8 SetCurrentDirectoryA 184->186 185->186 187 4087f6-40880a call 416a90 186->187 188 4087ca-4087d6 186->188 197 408810 call 402c70 187->197 189 4087d8-4087e6 188->189 190 4087ec-4087f3 call 4185df 188->190 189->190 192 408b10 call 41cc3c 189->192 190->187 199 408b15 call 41cc3c 192->199 198 408815-408835 call 416a90 197->198 204 408838 call 402c70 198->204 203 408b1a-408b1f call 41cc3c 199->203 206 40883d-408858 call 416a90 204->206 210 40885e call 402c70 206->210 211 408863-4088bd call 4171a0 call 4170a0 call 4171a0 call 417380 call 4170a0 210->211 222 4088c0 call 4048c0 211->222 223 4088c5-4088ce 222->223 224 4088d0-4088dc 223->224 225 4088fc-408914 223->225 226 4088f2-4088f9 call 4185df 224->226 227 4088de-4088ec 224->227 228 408942-40895a 225->228 229 408916-408922 225->229 226->225 227->199 227->226 230 40898b-4089a9 228->230 231 40895c-40896b 228->231 233 408924-408932 229->233 234 408938-40893f call 4185df 229->234 237 4089da-4089fe 230->237 238 4089ab-4089ba 230->238 235 408981-408988 call 4185df 231->235 236 40896d-40897b 231->236 233->199 233->234 234->228 235->230 236->199 236->235 244 408a00-408a0f 237->244 245 408a2f-408a50 237->245 242 4089d0-4089d7 call 4185df 238->242 243 4089bc-4089ca 238->243 242->237 243->199 243->242 251 408a11-408a1f 244->251 252 408a25-408a2c call 4185df 244->252 247 408a52-408a5e 245->247 248 408a7e-408a99 245->248 254 408a60-408a6e 247->254 255 408a74-408a7b call 4185df 247->255 256 408ac6-408acc 248->256 257 408a9b-408aaa 248->257 251->199 251->252 252->245 254->199 254->255 255->248 263 408af6-408b0f call 418152 256->263 264 408ace-408ada 256->264 261 408abc-408ac3 call 4185df 257->261 262 408aac-408aba 257->262 261->256 262->199 262->261 265 408aec-408af3 call 4185df 264->265 266 408adc-408aea 264->266 265->263 266->203 266->265
                                                                APIs
                                                                  • Part of subcall function 00408770: GetModuleFileNameA.KERNEL32(00000000,?,00000104,E3B8478F), ref: 00406BFF
                                                                  • Part of subcall function 00406590: GetModuleFileNameA.KERNEL32(00000000,?,00000104,E3B8478F,?,00000000), ref: 004065F3
                                                                • SetCurrentDirectoryA.KERNEL32(00000000,E3B8478F,00000000), ref: 004087BC
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileModuleName$CurrentDirectory
                                                                • String ID:
                                                                • API String ID: 1135421992-0
                                                                • Opcode ID: d15d28231d876320d4a374a6555e1b741faa2093d9bfaf1a5f49efdbc005a14e
                                                                • Instruction ID: d0dae173410c9e4e1febe3177f2c9113cc4b317fee0fa56548834116e9d8ebca
                                                                • Opcode Fuzzy Hash: d15d28231d876320d4a374a6555e1b741faa2093d9bfaf1a5f49efdbc005a14e
                                                                • Instruction Fuzzy Hash: 4B51FA70E002489BEF14EB64CA45BDDBB72AF42308F6041AED445773C7DB781A84CB5A
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 0040CBD0: GetTempPathA.KERNEL32(00000104,?), ref: 0040B2FE
                                                                  • Part of subcall function 0040CBD0: GetModuleFileNameA.KERNEL32(00000000,?,00000104,E3B8478F), ref: 0040A7BC
                                                                  • Part of subcall function 00406510: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00406540
                                                                  • Part of subcall function 0040CBD0: GetUserNameA.ADVAPI32(?,?), ref: 0040B96E
                                                                  • Part of subcall function 004138B0: IsUserAnAdmin.SHELL32 ref: 0041390D
                                                                  • Part of subcall function 004138B0: GetUserNameA.ADVAPI32(?,?), ref: 004139B7
                                                                  • Part of subcall function 004138B0: GetComputerNameExW.KERNEL32(00000002,?,?,?,?), ref: 00413A20
                                                                  • Part of subcall function 004167E0: CreateThread.KERNEL32 ref: 004167F6
                                                                  • Part of subcall function 004167E0: CreateThread.KERNEL32 ref: 00416807
                                                                  • Part of subcall function 004167E0: CreateThread.KERNEL32 ref: 00416818
                                                                  • Part of subcall function 004167E0: Sleep.KERNEL32(00007530,?,00416873), ref: 00416825
                                                                • InternetCloseHandle.WININET(00000000), ref: 00416887
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Name$CreateThreadUser$FileModule$AdminCloseComputerHandleInternetPathSleepTemp
                                                                • String ID:
                                                                • API String ID: 1411138196-0
                                                                • Opcode ID: 681845bb7bdad3a9b280c05efa4f412a3339f2d7827d3117315032cc1d5ff116
                                                                • Instruction ID: fcb51b4180ac2c01cd311fc2696d032aed602c74c46a29392a881be8b31f0bff
                                                                • Opcode Fuzzy Hash: 681845bb7bdad3a9b280c05efa4f412a3339f2d7827d3117315032cc1d5ff116
                                                                • Instruction Fuzzy Hash: 21E08671A0050407DA043BBA5D0B64E31184F8134CF94027FB815665D7EE6DD56441FF
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 293 41ea8a-41ea96 294 41eac8-41ead3 call 41c750 293->294 295 41ea98-41ea9a 293->295 303 41ead5-41ead7 294->303 296 41eab3-41eac4 RtlAllocateHeap 295->296 297 41ea9c-41ea9d 295->297 299 41eac6 296->299 300 41ea9f-41eaa6 call 41dc2f 296->300 297->296 299->303 300->294 305 41eaa8-41eab1 call 41cca7 300->305 305->294 305->296
                                                                APIs
                                                                • RtlAllocateHeap.NTDLL(00000000,?,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041EABC
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateHeap
                                                                • String ID:
                                                                • API String ID: 1279760036-0
                                                                • Opcode ID: dfa22ebf96d117e5e2d1e15a0c463ff833afb46ba7fb8ad48bf3f6a11dcdaed7
                                                                • Instruction ID: 5e5b785a8da04b63c94067ca99906f02eb36a9a31bcd46b4234264a7978573d4
                                                                • Opcode Fuzzy Hash: dfa22ebf96d117e5e2d1e15a0c463ff833afb46ba7fb8ad48bf3f6a11dcdaed7
                                                                • Instruction Fuzzy Hash: A5E0E53954012266E62126634C007DB7A48BF813F0F050037EC18962C0DB98DCC182ED
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 308 746015-74604f call 746328 311 746051-746084 VirtualAlloc call 7460a2 308->311 312 74609d 308->312 314 746089-74609b 311->314 312->312 314->312
                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00746066
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.313412358.0000000000745000.00000040.00000020.00020000.00000000.sdmp, Offset: 00745000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_745000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                • Instruction ID: 28e6f838be98979790bbef2cba6f041e401689a40e4813e40c5d73970d9929d1
                                                                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                • Instruction Fuzzy Hash: 27113C79A00208EFDB01DF98C985E98BFF5AF09350F1580A4F9489B362D375EA50DF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403F66
                                                                • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00403FCB
                                                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00403FE4
                                                                • GetThreadContext.KERNEL32(?,00000000), ref: 00403FFF
                                                                • ReadProcessMemory.KERNEL32(?, ,?,00000004,00000000), ref: 00404023
                                                                • GetModuleHandleA.KERNEL32(ntdll.dll,NtUnmapViewOfSection), ref: 0040403E
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00404045
                                                                • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 0040406D
                                                                • WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000), ref: 0040408E
                                                                • WriteProcessMemory.KERNEL32(?,?,?,?,00000000,?,?,00000000), ref: 004040D2
                                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000,?,?,00000000), ref: 0040410E
                                                                • SetThreadContext.KERNEL32(?,00000000,?,?,00000000), ref: 0040412A
                                                                • ResumeThread.KERNEL32(?,?,?,00000000), ref: 00404136
                                                                • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000), ref: 00404144
                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00404165
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$MemoryVirtual$ThreadWrite$AllocContextFreeModule$AddressCreateFileHandleNameProcReadResume
                                                                • String ID: $NtUnmapViewOfSection$ntdll.dll
                                                                • API String ID: 4033543172-1522589568
                                                                • Opcode ID: 2fc5be1b3ec4d92441bc9103c4f92097ff01d4c177745f7de35fcca25cf32f0a
                                                                • Instruction ID: 7185e54e9f5f5e6bc342fc5ffd2bfcf32a837d4cfdcfbf42461452ed81247528
                                                                • Opcode Fuzzy Hash: 2fc5be1b3ec4d92441bc9103c4f92097ff01d4c177745f7de35fcca25cf32f0a
                                                                • Instruction Fuzzy Hash: 66518971600218EBDB209F54DC49FEAB7B8FF48701F9040B6F708AA291D7B1A995CF58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetUserNameW.ADVAPI32(00000000,?), ref: 00403822
                                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403837
                                                                • HeapAlloc.KERNEL32(00000000), ref: 0040383A
                                                                • GetUserNameW.ADVAPI32(00000000,?), ref: 00403848
                                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 0040386B
                                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403876
                                                                • HeapAlloc.KERNEL32(00000000), ref: 00403879
                                                                • GetProcessHeap.KERNEL32(00000008,?), ref: 00403889
                                                                • HeapAlloc.KERNEL32(00000000), ref: 0040388C
                                                                • LookupAccountNameW.ADVAPI32(00000000,?,00000000,?,00000000,?,?), ref: 004038B6
                                                                • ConvertSidToStringSidW.ADVAPI32(00000000,00000000), ref: 004038C9
                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 004039C5
                                                                • HeapFree.KERNEL32(00000000), ref: 004039CE
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004039D3
                                                                • HeapFree.KERNEL32(00000000), ref: 004039D6
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004039DD
                                                                • HeapFree.KERNEL32(00000000), ref: 004039E0
                                                                • LocalFree.KERNEL32(00000000), ref: 004039E5
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Heap$Process$FreeName$Alloc$AccountLookupUser$ConvertLocalString
                                                                • String ID:
                                                                • API String ID: 3326663573-0
                                                                • Opcode ID: 24deddb8270008d93cf80c25edeb7c65e048e87636c7ba757fb88ba172af2b56
                                                                • Instruction ID: 167f534f4a5bc3f8c65bdd595c5ec8e1d54d44385eb9c59962b1969d814595bf
                                                                • Opcode Fuzzy Hash: 24deddb8270008d93cf80c25edeb7c65e048e87636c7ba757fb88ba172af2b56
                                                                • Instruction Fuzzy Hash: EA716DB1E00209ABDB14DFA5DC85BEFBBBCEB48300F40453AE905A7281DB749905CBA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ___free_lconv_mon.LIBCMT ref: 00422653
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422209
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 0042221B
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 0042222D
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 0042223F
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422251
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422263
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422275
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422287
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 00422299
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222AB
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222BD
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222CF
                                                                  • Part of subcall function 004221EC: _free.LIBCMT ref: 004222E1
                                                                • _free.LIBCMT ref: 00422648
                                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                                • _free.LIBCMT ref: 0042266A
                                                                • _free.LIBCMT ref: 0042267F
                                                                • _free.LIBCMT ref: 0042268A
                                                                • _free.LIBCMT ref: 004226AC
                                                                • _free.LIBCMT ref: 004226BF
                                                                • _free.LIBCMT ref: 004226CD
                                                                • _free.LIBCMT ref: 004226D8
                                                                • _free.LIBCMT ref: 00422710
                                                                • _free.LIBCMT ref: 00422717
                                                                • _free.LIBCMT ref: 00422734
                                                                • _free.LIBCMT ref: 0042274C
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                • String ID:
                                                                • API String ID: 161543041-0
                                                                • Opcode ID: 2ebc8ac26202a0620aa625b36a1d2a8fe7bc692bad1c871fd446d657effbc3a9
                                                                • Instruction ID: 87a383156b0838ac626f9c2c6038cf6ce1f5ffd7cd3d592d57855f9c4539c293
                                                                • Opcode Fuzzy Hash: 2ebc8ac26202a0620aa625b36a1d2a8fe7bc692bad1c871fd446d657effbc3a9
                                                                • Instruction Fuzzy Hash: B6319272604211BFEB205A76EA45B9B73E5AF80358F50441FE849D7251DFBCED80DB18
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 00419C22
                                                                • type_info::operator==.LIBVCRUNTIME ref: 00419C49
                                                                • ___TypeMatch.LIBVCRUNTIME ref: 00419D55
                                                                • IsInExceptionSpec.LIBVCRUNTIME ref: 00419E30
                                                                • _UnwindNestedFrames.LIBCMT ref: 00419EB7
                                                                • CallUnexpected.LIBVCRUNTIME ref: 00419ED2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                • String ID: csm$csm$csm
                                                                • API String ID: 2123188842-393685449
                                                                • Opcode ID: 7c1fb931e7428280153d6c09b5a5c630754522480dfed903c9c8a59691bc5c1e
                                                                • Instruction ID: d03aefa22aee8cf5aa416bea0a170c685dbf4c7cd79984a2e6415da9b3a38480
                                                                • Opcode Fuzzy Hash: 7c1fb931e7428280153d6c09b5a5c630754522480dfed903c9c8a59691bc5c1e
                                                                • Instruction Fuzzy Hash: 49C18871900209EFCF29DFA5D8A19EEBBB5BF04314F14405BE8516B242D339DE91CB9A
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00408BAC
                                                                • InternetOpenA.WININET(0043432B,00000000,00000000,00000000,00000000), ref: 00408BC2
                                                                • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 00408BE2
                                                                • InternetReadFile.WININET(00000000,00000000,?,?), ref: 00408BF3
                                                                • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00408C15
                                                                • InternetReadFile.WININET(00000000,00000000,?,?), ref: 00408C20
                                                                • CloseHandle.KERNEL32(?), ref: 00408C32
                                                                • InternetCloseHandle.WININET(?), ref: 00408C41
                                                                • InternetCloseHandle.WININET(00000000), ref: 00408C44
                                                                • RemoveDirectoryA.KERNEL32(00000000,?,?,?), ref: 00408CFD
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Internet$File$CloseHandle$OpenRead$CreateDirectoryRemoveWrite
                                                                • String ID:
                                                                • API String ID: 1496009958-0
                                                                • Opcode ID: f0e68a228d38e1b1568164ddce2365734541be2ccb1222d6eed42596258d13e1
                                                                • Instruction ID: e39da941a42be4000a8416f9d2a6f8c848e32a180712f45a109694aa4e2734ce
                                                                • Opcode Fuzzy Hash: f0e68a228d38e1b1568164ddce2365734541be2ccb1222d6eed42596258d13e1
                                                                • Instruction Fuzzy Hash: 6E71EF71600208ABEB14DF64DD85BEE7735EF44304F50423EF945AB2D1DB38A980CB68
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 0041ED90
                                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                                • _free.LIBCMT ref: 0041ED9C
                                                                • _free.LIBCMT ref: 0041EDA7
                                                                • _free.LIBCMT ref: 0041EDB2
                                                                • _free.LIBCMT ref: 0041EDBD
                                                                • _free.LIBCMT ref: 0041EDC8
                                                                • _free.LIBCMT ref: 0041EDD3
                                                                • _free.LIBCMT ref: 0041EDDE
                                                                • _free.LIBCMT ref: 0041EDE9
                                                                • _free.LIBCMT ref: 0041EDF7
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: b518f20b764996853f57fbd2a3fdc4e7bf3deb810a08f9cd0b2a52dd965201da
                                                                • Instruction ID: e610bd300bd5c2f85586062e27af9f16ff799e012d6f089a2169b26ee7872c24
                                                                • Opcode Fuzzy Hash: b518f20b764996853f57fbd2a3fdc4e7bf3deb810a08f9cd0b2a52dd965201da
                                                                • Instruction Fuzzy Hash: ED219CBA910108BFCB41EF96C941DDD7BF6BF88344F00416AF9199B121EB35DA84DB84
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • InternetOpenW.WININET(00434EF4,00000000,00000000,00000000,00000000), ref: 0040425C
                                                                • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,00000000,00000000), ref: 0040426E
                                                                • InternetReadFile.WININET(00000000,?,03E80000,03E80000), ref: 00404281
                                                                • InternetCloseHandle.WININET(00000000), ref: 00404292
                                                                • InternetCloseHandle.WININET(00000000), ref: 00404295
                                                                • InternetCloseHandle.WININET(00000000), ref: 004042A3
                                                                • InternetCloseHandle.WININET(00000000), ref: 004042A6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Internet$CloseHandle$Open$FileRead
                                                                • String ID: runas
                                                                • API String ID: 4294395943-4000483414
                                                                • Opcode ID: 28ad086152bd7b8e8c5954caccd98e56c6d06132053c0a63dc99d43c85a75fa5
                                                                • Instruction ID: ba1dc25ec83469701d4c7edc2e7ba4793e46b241d410edfdecdbeb0a0fce58bd
                                                                • Opcode Fuzzy Hash: 28ad086152bd7b8e8c5954caccd98e56c6d06132053c0a63dc99d43c85a75fa5
                                                                • Instruction Fuzzy Hash: 4951D571E00108ABDB14DFA4DC41BEEBB75EF85300F60816EF915B7291D7389945CBA8
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1a78892049de11e46c50fbd2fa855718c5aabf05d02eef10ffa1756f3991459e
                                                                • Instruction ID: 5128a0cef717139e7719faf6ed0b9fe75c650819d7ce78bb109199c1610a9dbc
                                                                • Opcode Fuzzy Hash: 1a78892049de11e46c50fbd2fa855718c5aabf05d02eef10ffa1756f3991459e
                                                                • Instruction Fuzzy Hash: D3C114B4B002159FDF11DF99E880BAEBBB0BF49304F51406AE914A7382C7789D81CF69
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 004232B6: CreateFileW.KERNEL32(00000000,00000000,?,004236A6,?,?,00000000,?,004236A6,00000000,0000000C), ref: 004232D3
                                                                • GetLastError.KERNEL32 ref: 00423711
                                                                • __dosmaperr.LIBCMT ref: 00423718
                                                                • GetFileType.KERNEL32(00000000), ref: 00423724
                                                                • GetLastError.KERNEL32 ref: 0042372E
                                                                • __dosmaperr.LIBCMT ref: 00423737
                                                                • CloseHandle.KERNEL32(00000000), ref: 00423757
                                                                • CloseHandle.KERNEL32(?), ref: 004238A4
                                                                • GetLastError.KERNEL32 ref: 004238D6
                                                                • __dosmaperr.LIBCMT ref: 004238DD
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                • String ID:
                                                                • API String ID: 4237864984-0
                                                                • Opcode ID: 0d649afaf30192c5c19431845a951fd0479d0f23fa76b0b367cd72335b8b290c
                                                                • Instruction ID: c7b97c56f1a0d1b911df166da15c54d720095dd6c25035754b532be6d98a6b0c
                                                                • Opcode Fuzzy Hash: 0d649afaf30192c5c19431845a951fd0479d0f23fa76b0b367cd72335b8b290c
                                                                • Instruction Fuzzy Hash: 7CA15872A041149FCF19DF68EC917AE3BB1AB06325F54016EF811AB391CB7C8952CB5A
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$___from_strstr_to_strchr
                                                                • String ID:
                                                                • API String ID: 3409252457-0
                                                                • Opcode ID: 17a2c5d05d88992eb6c4295c13d4ba7d46687f58b453e92c494b9aad345095be
                                                                • Instruction ID: f188bb2de727b7b751c2d84351da10a70f250225146cef8743706f99745805fe
                                                                • Opcode Fuzzy Hash: 17a2c5d05d88992eb6c4295c13d4ba7d46687f58b453e92c494b9aad345095be
                                                                • Instruction Fuzzy Hash: 0E518C74F44324AFDB24AFB7A881A6E7BB4AF11314F54416FE410972A1EA3D8940CB5D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _ValidateLocalCookies.LIBCMT ref: 00419507
                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 0041950F
                                                                • _ValidateLocalCookies.LIBCMT ref: 00419598
                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 004195C3
                                                                • _ValidateLocalCookies.LIBCMT ref: 00419618
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                • String ID: csm
                                                                • API String ID: 1170836740-1018135373
                                                                • Opcode ID: 170db4f13a52bbc04fbb15fe7ab42c90d24a7c19ae8ceb0e3c19913b98646896
                                                                • Instruction ID: cf6a3be1c1e6f4323defd25786acadca5afaa418f9c93884064ec3a043526e94
                                                                • Opcode Fuzzy Hash: 170db4f13a52bbc04fbb15fe7ab42c90d24a7c19ae8ceb0e3c19913b98646896
                                                                • Instruction Fuzzy Hash: 09411A31A00214AFCF11DF69C890ADEBBB1BF45318F54806BE8146B352D739DE96CB99
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: api-ms-$ext-ms-
                                                                • API String ID: 0-537541572
                                                                • Opcode ID: d346eea9aafd959945e16ecfc9ebbe047e966c499b5e8e0d3b3e0bbc48b51e8c
                                                                • Instruction ID: 8946f5363388c355846af12649c4142b4e9cf4c5f65ba016e67a922269825e5f
                                                                • Opcode Fuzzy Hash: d346eea9aafd959945e16ecfc9ebbe047e966c499b5e8e0d3b3e0bbc48b51e8c
                                                                • Instruction Fuzzy Hash: 3521C672A41221FBCB318A24DC45A9B3778AB017A0F650532ED15A7391D638ED4BC5DC
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 00422353: _free.LIBCMT ref: 00422378
                                                                • _free.LIBCMT ref: 004223D9
                                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                                • _free.LIBCMT ref: 004223E4
                                                                • _free.LIBCMT ref: 004223EF
                                                                • _free.LIBCMT ref: 00422443
                                                                • _free.LIBCMT ref: 0042244E
                                                                • _free.LIBCMT ref: 00422459
                                                                • _free.LIBCMT ref: 00422464
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 745ba4c7df38b0c8b3501d58b22aa89868de86b005191e755d783c3d27d16807
                                                                • Instruction ID: 3666b1e76cecdb1a9706d82e7bd79ae187b091a1e89744abee2c0a3d449e73e2
                                                                • Opcode Fuzzy Hash: 745ba4c7df38b0c8b3501d58b22aa89868de86b005191e755d783c3d27d16807
                                                                • Instruction Fuzzy Hash: C611E471601714BAD921F7B2DD47FCB77DD5F0834CF84881EBACD6A052D6ACB6514604
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetConsoleCP.KERNEL32(?,00405880,00000000), ref: 00423A8E
                                                                • __fassign.LIBCMT ref: 00423C6D
                                                                • __fassign.LIBCMT ref: 00423C8A
                                                                • WriteFile.KERNEL32(?,00405880,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00423CD2
                                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00423D12
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00423DBE
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileWrite__fassign$ConsoleErrorLast
                                                                • String ID:
                                                                • API String ID: 4031098158-0
                                                                • Opcode ID: 5a0c35df1f21bdc5310913443ad541efee69954072d07ce9ea6e444a121a2afd
                                                                • Instruction ID: 55294dd1ed643e62d688e25fe7fc8b93d32e6dca02253c809cdcf0ede3e7f937
                                                                • Opcode Fuzzy Hash: 5a0c35df1f21bdc5310913443ad541efee69954072d07ce9ea6e444a121a2afd
                                                                • Instruction Fuzzy Hash: 21D1A075E002689FCF15CFA8D8809EDBBB5BF48314F64016AE455FB342D738AA46CB58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,004197E7,004193D7,00418C1C), ref: 004197FE
                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0041980C
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00419825
                                                                • SetLastError.KERNEL32(00000000,004197E7,004193D7,00418C1C), ref: 00419877
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastValue___vcrt_
                                                                • String ID:
                                                                • API String ID: 3852720340-0
                                                                • Opcode ID: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                                • Instruction ID: 71a7697fc03e6214697c45e1a132a8316019e6706060db725442c6d2a3e753c8
                                                                • Opcode Fuzzy Hash: 0f6e51aa0c255468b6a622d8c735b9b5b069fdda8c7ed9770d7dbe64c9198e0d
                                                                • Instruction Fuzzy Hash: F101D8326293115EE62C3B76AE959D72774EF067B8720023FF120441F1EF594C95D58D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                • C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe, xrefs: 00420F81
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                                                                • API String ID: 0-2701828164
                                                                • Opcode ID: d9fd3d3f386e086f16d5e96c86dfc6c05a3e177acafcacdda8c025444d2164cb
                                                                • Instruction ID: f2c65a4c72dcbe00dc32dc221c8eb50b3435d1ebdf66b1fbb5bbc6e11338d05a
                                                                • Opcode Fuzzy Hash: d9fd3d3f386e086f16d5e96c86dfc6c05a3e177acafcacdda8c025444d2164cb
                                                                • Instruction Fuzzy Hash: CB210A713001257F97206F71ED81D6BB7ADAF103A8750462BF828D7691D778DC818799
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _wcsrchr
                                                                • String ID: .bat$.cmd$.com$.exe
                                                                • API String ID: 1752292252-4019086052
                                                                • Opcode ID: 19671788b65354572937ca0f5259cacd468799deb2890a42aa5f1fe1ebfecd1d
                                                                • Instruction ID: baa428b651ab7fadd2aefce0a8d8cefe58070258f098f4f191bca89b56dcb2ea
                                                                • Opcode Fuzzy Hash: 19671788b65354572937ca0f5259cacd468799deb2890a42aa5f1fe1ebfecd1d
                                                                • Instruction Fuzzy Hash: 7E012B3BA8C635212624101AEC62BF717988B96FB8B25412FF854F72C1ED9DEC8205DC
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: api-ms-
                                                                • API String ID: 0-2084034818
                                                                • Opcode ID: d7b12ed5c3c764c8b82cc7f1cf76b5788b814adb9963f19d14a8505e8bb0b4a8
                                                                • Instruction ID: 8addbc20e8b4f1572ca5f78bff053ba989236767de5a1c4d832f47c373f0c560
                                                                • Opcode Fuzzy Hash: d7b12ed5c3c764c8b82cc7f1cf76b5788b814adb9963f19d14a8505e8bb0b4a8
                                                                • Instruction Fuzzy Hash: 2B112C71A12221EBC7314B249D44AAB37689F017B4B624933ED45AB390D738DDE1C5DE
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,0041B938,?,?,0041B900,0041BE86,?,NA), ref: 0041B958
                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0041B96B
                                                                • FreeLibrary.KERNEL32(00000000,?,?,0041B938,?,?,0041B900,0041BE86,?,NA), ref: 0041B98E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                • String ID: CorExitProcess$mscoree.dll
                                                                • API String ID: 4061214504-1276376045
                                                                • Opcode ID: af14fd2dde53d7be7e540de01eeb28501674720f1683c90e0ca13ac16e635f3d
                                                                • Instruction ID: 6ab08718997dcf592451d77b1cbf540418157bbc441c253cf8170436862d5d78
                                                                • Opcode Fuzzy Hash: af14fd2dde53d7be7e540de01eeb28501674720f1683c90e0ca13ac16e635f3d
                                                                • Instruction Fuzzy Hash: 52F08230651218FBDB259B50DD0ABEEBA78DF44759F900175A504A1260CB788E46DA98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$InformationTimeZone
                                                                • String ID:
                                                                • API String ID: 597776487-0
                                                                • Opcode ID: 8c2b88b9d242ee917946bc58aad9aca9963a64eab752d66957554f7044879769
                                                                • Instruction ID: 2c4f844ee906d1c5b8a05b7d4d89c1c9074c071bb98950a21f89e01ce9d05ddf
                                                                • Opcode Fuzzy Hash: 8c2b88b9d242ee917946bc58aad9aca9963a64eab752d66957554f7044879769
                                                                • Instruction Fuzzy Hash: 1FC17835B00128ABDB209F69EC41BAB7BA9EFC5354F94416FE550D7381E7388E01CB88
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetCPInfo.KERNEL32(00763A80,00763A80,?,7FFFFFFF,?,?,00427265,00763A80,00763A80,?,00763A80,?,?,?,?,00763A80), ref: 0042704C
                                                                • __alloca_probe_16.LIBCMT ref: 00427102
                                                                • __alloca_probe_16.LIBCMT ref: 00427198
                                                                • __freea.LIBCMT ref: 00427203
                                                                • __freea.LIBCMT ref: 0042720F
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __alloca_probe_16__freea$Info
                                                                • String ID:
                                                                • API String ID: 2330168043-0
                                                                • Opcode ID: 5f2a50e45296c4ab9ea81c751da5de9d4fb401d4688c96eb67b443e93606af8c
                                                                • Instruction ID: f6d9b8f12c634194a1b411eace1e19527ea88e01b30f60a4b5a6e0b516c13e2d
                                                                • Opcode Fuzzy Hash: 5f2a50e45296c4ab9ea81c751da5de9d4fb401d4688c96eb67b443e93606af8c
                                                                • Instruction Fuzzy Hash: 4481E472B082259BDF219EA5AC41EEF7BB5EF09354F98005BF804A7341D62DCC458BB9
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • __alloca_probe_16.LIBCMT ref: 00425958
                                                                • __alloca_probe_16.LIBCMT ref: 00425A1E
                                                                • __freea.LIBCMT ref: 00425A8A
                                                                  • Part of subcall function 0041EA8A: RtlAllocateHeap.NTDLL(00000000,?,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041EABC
                                                                • __freea.LIBCMT ref: 00425A93
                                                                • __freea.LIBCMT ref: 00425AB6
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                • String ID:
                                                                • API String ID: 1423051803-0
                                                                • Opcode ID: c74094a0c6d5729c86e1c932978b4c2ceda6b25e6d516f0e0492038c5d5f24b8
                                                                • Instruction ID: 7e0d7c363e2f027523b7077ca53f82abc72318da18e9cc0c3b19bc4bba63112a
                                                                • Opcode Fuzzy Hash: c74094a0c6d5729c86e1c932978b4c2ceda6b25e6d516f0e0492038c5d5f24b8
                                                                • Instruction Fuzzy Hash: 8351E672700626AFDB209F95EC86EBF37A9EF44764F95422AFC04D7240E778DC418698
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFileType.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0041C040), ref: 0041C130
                                                                • GetFileInformationByHandle.KERNEL32(?,?), ref: 0041C18A
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0041C040,?,000000FF,00000000,00000000), ref: 0041C218
                                                                • __dosmaperr.LIBCMT ref: 0041C21F
                                                                • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 0041C25C
                                                                  • Part of subcall function 0041C484: __dosmaperr.LIBCMT ref: 0041C4B9
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                                • String ID:
                                                                • API String ID: 1206951868-0
                                                                • Opcode ID: 8e7ecedbbb3726c11739f19b321c018a01a8de47d4bdd8436282d5c79af9c44f
                                                                • Instruction ID: 0071a9752275d4edb8b9c21b1954eb469a97b67ce05b4548820d0adabff3a4d5
                                                                • Opcode Fuzzy Hash: 8e7ecedbbb3726c11739f19b321c018a01a8de47d4bdd8436282d5c79af9c44f
                                                                • Instruction Fuzzy Hash: B7413C75940204AFDB249FA5DC859EFBBF9EF89700B00452EF856D3610E7389885CB24
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 00422302
                                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                                • _free.LIBCMT ref: 00422314
                                                                • _free.LIBCMT ref: 00422326
                                                                • _free.LIBCMT ref: 00422338
                                                                • _free.LIBCMT ref: 0042234A
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: a090e3dca2e19da394a01cead958df991e42452585b2f6658ee12e14c4d52992
                                                                • Instruction ID: 8eed935d1f0a41e2b9dbe60b1656bd2ba3e28f3ae1fefd92f9cbf16fd4f54630
                                                                • Opcode Fuzzy Hash: a090e3dca2e19da394a01cead958df991e42452585b2f6658ee12e14c4d52992
                                                                • Instruction Fuzzy Hash: 04F04472501210B78520DBA6F6C2C4B73DAAB94355794180AF809D7641C77CFD81866C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: *?
                                                                • API String ID: 269201875-2564092906
                                                                • Opcode ID: 4349432449d004c56f1fbb459abf86acb5202655a551f523de74eb3488688e5f
                                                                • Instruction ID: 7415b14c5d0124b7c9719d17695bca9e12f23279d28e73ebbb8fdbf8e8460f59
                                                                • Opcode Fuzzy Hash: 4349432449d004c56f1fbb459abf86acb5202655a551f523de74eb3488688e5f
                                                                • Instruction Fuzzy Hash: 5661A1B5E002299FCB14CFA9D8815EEFBF5EF48314B54816AE805F7301E735AE418B94
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AdjustPointer
                                                                • String ID:
                                                                • API String ID: 1740715915-0
                                                                • Opcode ID: 7e8d2a906245dc524fe8c50e746b229fe3151c293ccc1eab8f3b2c5d31764d92
                                                                • Instruction ID: a8cd01a110c9a5ba9b93cdf8b6ca506de852c713b8af7688bfec1274bd28d331
                                                                • Opcode Fuzzy Hash: 7e8d2a906245dc524fe8c50e746b229fe3151c293ccc1eab8f3b2c5d31764d92
                                                                • Instruction Fuzzy Hash: 3251D0B2601286AFDB298F15D861BEA77A4EF04314F24012FE84646391E739ECC1C799
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetVersionExW.KERNEL32(0000011C,?,E3B8478F,00000000), ref: 00405479
                                                                • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004054E0
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004054E7
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressHandleModuleProcVersion
                                                                • String ID:
                                                                • API String ID: 3310240892-0
                                                                • Opcode ID: 5f7b47061abc6791dac321b9274febf74b70e5b52455e87435bb2734be5b4ea5
                                                                • Instruction ID: 1307c1e28f23caf99c3cad6e9d6b2b61846357279e254348caa37701d54b456e
                                                                • Opcode Fuzzy Hash: 5f7b47061abc6791dac321b9274febf74b70e5b52455e87435bb2734be5b4ea5
                                                                • Instruction Fuzzy Hash: B8513971900608ABDB14DB24DD497DE7B76EB46314F5042BAE805B73C1DB389EC48F99
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 00425FDE
                                                                • _free.LIBCMT ref: 00426007
                                                                • SetEndOfFile.KERNEL32(00000000,0042354B,00000000,?,?,?,?,?,?,?,?,0042354B,?,00000000), ref: 00426039
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,0042354B,?,00000000,?,?,?,?,?), ref: 00426055
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFileLast
                                                                • String ID:
                                                                • API String ID: 1547350101-0
                                                                • Opcode ID: 005ab2c57f032726cdaaa7f9df82d6b6984aac1401b59b4031c376f8f621a61a
                                                                • Instruction ID: 61c1fed18fa2e053e229d2c366b1320fca6b3d495f3fb51fd3c042a4ee27fee9
                                                                • Opcode Fuzzy Hash: 005ab2c57f032726cdaaa7f9df82d6b6984aac1401b59b4031c376f8f621a61a
                                                                • Instruction Fuzzy Hash: 6C413E72B006115BDB11ABB5ED41B8E37B6AF44364F560017F424E72D2EB7CC840576D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 0041BD6F: _free.LIBCMT ref: 0041BD7D
                                                                  • Part of subcall function 004218BF: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000000,?,00425A80,?,00000000,00000000), ref: 00421961
                                                                • GetLastError.KERNEL32 ref: 00420950
                                                                • __dosmaperr.LIBCMT ref: 00420957
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 00420996
                                                                • __dosmaperr.LIBCMT ref: 0042099D
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                • String ID:
                                                                • API String ID: 167067550-0
                                                                • Opcode ID: 2cc476a48764411ac7d7f7841f806bb526956e32d48153aac2d156f6a7af72d6
                                                                • Instruction ID: 91911ec1de34df9e01eb008ea9a24e12f878ac442d2ad626700c96a69c790fc9
                                                                • Opcode Fuzzy Hash: 2cc476a48764411ac7d7f7841f806bb526956e32d48153aac2d156f6a7af72d6
                                                                • Instruction Fuzzy Hash: 2721F0B1700225AFA710AF62ACC196B77EDEF00374790851AF86697253D738DCC08B94
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,00000000,?,0041BCED,00000000,?,?,?,0041BE86,?), ref: 0041EE97
                                                                • _free.LIBCMT ref: 0041EEF4
                                                                • _free.LIBCMT ref: 0041EF2A
                                                                • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,?,0041BE86,?), ref: 0041EF35
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast_free
                                                                • String ID:
                                                                • API String ID: 2283115069-0
                                                                • Opcode ID: 120db594496689011f9c139fa4ddd92dcfd12b70a1cc6502b103967e01bc71cb
                                                                • Instruction ID: 26790fddcd24ef136aadc0cc0bf27d5f777129a8301660e6568487d79e7ca8b5
                                                                • Opcode Fuzzy Hash: 120db594496689011f9c139fa4ddd92dcfd12b70a1cc6502b103967e01bc71cb
                                                                • Instruction Fuzzy Hash: 2411CA3A6002017AD61427B79CC59EB256997C1779B25013BFD39832D2FE6D8CDB811D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,?,0041C755,0041EACD,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041EFEE
                                                                • _free.LIBCMT ref: 0041F04B
                                                                • _free.LIBCMT ref: 0041F081
                                                                • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,004191D3,?,?,?,?,?,004020F3,?,?), ref: 0041F08C
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast_free
                                                                • String ID:
                                                                • API String ID: 2283115069-0
                                                                • Opcode ID: 048b735e334959feaa5e4ce77df0ba5808e7239d9d4b1868442944ab324b2044
                                                                • Instruction ID: d1a755533480a66cbcbdd6da6f61a8fcfdc6096e1f08231a3cc2ec091d2cf52b
                                                                • Opcode Fuzzy Hash: 048b735e334959feaa5e4ce77df0ba5808e7239d9d4b1868442944ab324b2044
                                                                • Instruction Fuzzy Hash: FB114C322045016AC7102B76ACC1DEB2969DBC8778765023BF92A822E3EF6CCCDF511C
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0041F930,00000000,?,00424658,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 0041F7E1
                                                                • GetLastError.KERNEL32(?,00424658,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,0041F930,00000000,00000104,?), ref: 0041F7EB
                                                                • __dosmaperr.LIBCMT ref: 0041F7F2
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                                • String ID:
                                                                • API String ID: 2398240785-0
                                                                • Opcode ID: 05d28394caa5e79c84551c055246600de674f2baba94b68408dd47ae0dfcca9d
                                                                • Instruction ID: 3e1febbc0a8defaca1089d50814ae8bcfad4f789bcb8220d5dd2739c2ed7ebaf
                                                                • Opcode Fuzzy Hash: 05d28394caa5e79c84551c055246600de674f2baba94b68408dd47ae0dfcca9d
                                                                • Instruction Fuzzy Hash: 1DF06D36600115BB8B202FA2DD08C9BBFA9FF443A03444136F52DC7561DB35E8A6CBE8
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0041F930,00000000,?,004245E3,00000000,00000000,0041F930,?,?,00000000,00000000,00000001), ref: 0041F84A
                                                                • GetLastError.KERNEL32(?,004245E3,00000000,00000000,0041F930,?,?,00000000,00000000,00000001,00000000,00000000,?,0041F930,00000000,00000104), ref: 0041F854
                                                                • __dosmaperr.LIBCMT ref: 0041F85B
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorFullLastNamePath__dosmaperr
                                                                • String ID:
                                                                • API String ID: 2398240785-0
                                                                • Opcode ID: e95b58acd20ff03b7de0604d3f95648f78153c488b68a8cfe7999cd59df17e1a
                                                                • Instruction ID: 5356ccb821a571137923583999cca56af5607f561d8780d9d137012589ba4a16
                                                                • Opcode Fuzzy Hash: e95b58acd20ff03b7de0604d3f95648f78153c488b68a8cfe7999cd59df17e1a
                                                                • Instruction Fuzzy Hash: FBF01231600115BB8B207BA6DC0499BBFA9FF443A03404536F52DC6521C735E8A6DBD4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • WriteConsoleW.KERNEL32(00405880,00000000,00437A28,00000000,00405880,?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880), ref: 004272E6
                                                                • GetLastError.KERNEL32(?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880,00000000,00405880,?,0042436F,00405880), ref: 004272F2
                                                                  • Part of subcall function 004272B8: CloseHandle.KERNEL32(FFFFFFFE,00427302,?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880,00000000,00405880), ref: 004272C8
                                                                • ___initconout.LIBCMT ref: 00427302
                                                                  • Part of subcall function 0042727A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004272A9,004269D4,00405880,?,00423E1B,00000000,?,00405880,00000000), ref: 0042728D
                                                                • WriteConsoleW.KERNEL32(00405880,00000000,00437A28,00000000,?,004269E7,00405880,00000001,00405880,00405880,?,00423E1B,00000000,?,00405880,00000000), ref: 00427317
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                • String ID:
                                                                • API String ID: 2744216297-0
                                                                • Opcode ID: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                                • Instruction ID: 5b8baa1da4bb66d128bbbdf819d740daca6d0282673a7c9b135cb97f91750bdc
                                                                • Opcode Fuzzy Hash: 654839e4b531a485c8561e35f9c6b1b80fe1c4fa203d6a6e5454fb2027dc39d5
                                                                • Instruction Fuzzy Hash: 46F01C36201129FBCF221F95EC04A8A3F66FF093A1B814075FE1C86231D6328820EB98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateThread$Sleep
                                                                • String ID:
                                                                • API String ID: 422425972-0
                                                                • Opcode ID: c7ec29c90368d79a70c95a5ee9845132da8938ab2cedaa7c12f416f09ab0d9a8
                                                                • Instruction ID: 3e58bb4c01d1f945cb402fb00719d76fe511b7683de936d62f19d1048555ce50
                                                                • Opcode Fuzzy Hash: c7ec29c90368d79a70c95a5ee9845132da8938ab2cedaa7c12f416f09ab0d9a8
                                                                • Instruction Fuzzy Hash: 69E09231BE8334B6F47126A45C03F891E545B08F95FB20023B70CBE4D084C87485CAEE
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • _free.LIBCMT ref: 0041D822
                                                                  • Part of subcall function 0041E5A1: HeapFree.KERNEL32(00000000,00000000,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?), ref: 0041E5B7
                                                                  • Part of subcall function 0041E5A1: GetLastError.KERNEL32(?,?,0042237D,?,00000000,?,?,?,004223A4,?,00000007,?,?,004227A6,?,?), ref: 0041E5C9
                                                                • _free.LIBCMT ref: 0041D835
                                                                • _free.LIBCMT ref: 0041D846
                                                                • _free.LIBCMT ref: 0041D857
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 5b4b832eec97106c71e74c3abf3533cea5e390173416251ec6b9798646083543
                                                                • Instruction ID: 2f128d3171f244c94fc48b8332bc88089a284fec835ab8af747093701a289460
                                                                • Opcode Fuzzy Hash: 5b4b832eec97106c71e74c3abf3533cea5e390173416251ec6b9798646083543
                                                                • Instruction Fuzzy Hash: C3E04FB4801520AFCE012F53FE055953BA2FB947EC340302AF81406232DB390261EFCE
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • std::_Xinvalid_argument.LIBCPMT ref: 00412FEF
                                                                  • Part of subcall function 00416F50: Concurrency::cancel_current_task.LIBCPMT ref: 00417083
                                                                Strings
                                                                • invalid stoi argument, xrefs: 00412FEA
                                                                • stoi argument out of range, xrefs: 00412FF9
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Concurrency::cancel_current_taskXinvalid_argumentstd::_
                                                                • String ID: invalid stoi argument$stoi argument out of range
                                                                • API String ID: 3646673767-1606216832
                                                                • Opcode ID: 8144e7b91affbd64eda4419a9c47eec50b32785b06bb4bebaeb4e700ccc872c7
                                                                • Instruction ID: 6d18bec53ddcbea06decae191a6eae5fb5e1180c669e5708db714ed38e612d95
                                                                • Opcode Fuzzy Hash: 8144e7b91affbd64eda4419a9c47eec50b32785b06bb4bebaeb4e700ccc872c7
                                                                • Instruction Fuzzy Hash: 60E1D171A001189BEF28DF28CE857DDBB72EB46304F50819EE419972C1DB799AD1CF98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
                                                                • API String ID: 0-2701828164
                                                                • Opcode ID: 31fa4e4f4f0bc981144b5b3ffc5fea1ddf45f4662b4ea0433f5b95f05539bbed
                                                                • Instruction ID: 3e019bb9f1f37e8f56b3af26f626c64f14fa1fa210d5d8f79d997b38734a4c96
                                                                • Opcode Fuzzy Hash: 31fa4e4f4f0bc981144b5b3ffc5fea1ddf45f4662b4ea0433f5b95f05539bbed
                                                                • Instruction Fuzzy Hash: 9A41A271A80214AFDB11DF9A9CC19EFBBB9EB85710F10006BF40497251D7788E82CB5D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00419F02
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EncodePointer
                                                                • String ID: MOC$RCC
                                                                • API String ID: 2118026453-2084237596
                                                                • Opcode ID: 56cf5a80f9e67a63b3ea8228320d3624bd09d448c8f94bbe6aa890cfa768ed17
                                                                • Instruction ID: ef4240616421f5d170a5d1c4fd7b0d446090a164c11462a96303fe54a6744129
                                                                • Opcode Fuzzy Hash: 56cf5a80f9e67a63b3ea8228320d3624bd09d448c8f94bbe6aa890cfa768ed17
                                                                • Instruction Fuzzy Hash: 5C414872900209EFCF16DF98C981AEEBBB5FF48304F18819AF904A7251D3399DA1DB55
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00412D18
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileModuleName
                                                                • String ID: .$5120
                                                                • API String ID: 514040917-2446372808
                                                                • Opcode ID: d5977a1847af3593c6d2360099aed04a1f4c529663bf82042b77ea6028604958
                                                                • Instruction ID: 9696d8c15566c1d42fadb68592e21f39738dfdc301de5d2260ec8dd83da14f2d
                                                                • Opcode Fuzzy Hash: d5977a1847af3593c6d2360099aed04a1f4c529663bf82042b77ea6028604958
                                                                • Instruction Fuzzy Hash: D421E2B09002489BDB14EF69C90A7DD7FB49F06348F5001CEE44567282D7B99A498BE7
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 0041FDF2: EnterCriticalSection.KERNEL32(00405880,?,00424223,00405880,00437D48,00000010,0041EA11,00000000,C032C301,00000000,00000000,00405880,?,0041BB1A,00405880,00000000), ref: 0041FE0D
                                                                • FlushFileBuffers.KERNEL32(00000000,00437D28,0000000C,00423A2E,nA,?,00000001,?,0041E96E,?), ref: 00423970
                                                                • GetLastError.KERNEL32 ref: 00423981
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.312844293.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000004.00000002.312933356.000000000043E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_400000_gntuud.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: BuffersCriticalEnterErrorFileFlushLastSection
                                                                • String ID: nA
                                                                • API String ID: 4109680722-4035868545
                                                                • Opcode ID: f003fc8eaf19488ae7f9339aa40c70496bc05c9f4a2d22a8ae3e610d030b7c35
                                                                • Instruction ID: 0418fce989e2f534913a4f38d2ce8aa3e5464a19317c2ea272403c313fbf0c0e
                                                                • Opcode Fuzzy Hash: f003fc8eaf19488ae7f9339aa40c70496bc05c9f4a2d22a8ae3e610d030b7c35
                                                                • Instruction Fuzzy Hash: 45018076B002108FC714AF69E90569D7BB5AF49724F50412FF4219B3D2DBBC9982CB98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%