Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LwNdQo4zIk.exe

Overview

General Information

Sample Name:LwNdQo4zIk.exe
Analysis ID:778226
MD5:3ccd6b369eb1dde57d181e7550bd7268
SHA1:aee399e263c838570c00133feab275b81009e12a
SHA256:f5717aef9a4323816387603920b652a94ac0d9cedef36391cedd9cdcbfef7f60
Tags:32exe
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for dropped file
Machine Learning detection for sample
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Drops PE files
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • LwNdQo4zIk.exe (PID: 1792 cmdline: C:\Users\user\Desktop\LwNdQo4zIk.exe MD5: 3CCD6B369EB1DDE57D181E7550BD7268)
    • rundll32.exe (PID: 5472 cmdline: "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.309288628.0000000002330000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
00000000.00000002.309087545.0000000002254000.00000040.00000800.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x798:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: LwNdQo4zIk.exeVirustotal: Detection: 49%Perma Link
Source: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmpReversingLabs: Detection: 50%
Source: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmpVirustotal: Detection: 64%Perma Link
Source: LwNdQo4zIk.exeJoe Sandbox ML: detected
Source: 0.2.LwNdQo4zIk.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen2
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A7759 CryptAcquireContextA,0_2_004A7759
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AB9D1 CryptDeriveKey,0_2_004AB9D1
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B01AF CryptExportKey,0_2_004B01AF
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B035E CryptDestroyKey,0_2_004B035E
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B056E CryptReleaseContext,0_2_004B056E
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA67F CryptAcquireContextA,CryptAcquireContextA,0_2_004BA67F
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AF6E3 CryptExportKey,0_2_004AF6E3
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA75C CryptEncrypt,CryptEncrypt,0_2_004BA75C
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA7D8 CryptDestroyKey,CryptDestroyKey,0_2_004BA7D8
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA80E CryptReleaseContext,CryptReleaseContext,0_2_004BA80E
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004BA9DE CryptBinaryToStringA,CryptBinaryToStringA,0_2_004BA9DE
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C2A13 CryptBinaryToStringA,0_2_004C2A13
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AFA91 CryptExportKey,CryptExportKey,0_2_004AFA91
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A5B70 CryptBinaryToStringA,0_2_004A5B70
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AEB1B CryptGenKey,0_2_004AEB1B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D96B6D8 CryptHashData,LoadLibraryW,1_2_6D96B6D8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D979484 CryptHashData,1_2_6D979484
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D980486 CryptHashData,1_2_6D980486
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D980CD9 CryptDestroyKey,1_2_6D980CD9
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D987CD1 CryptReleaseContext,1_2_6D987CD1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D99140C CryptDeriveKey,1_2_6D99140C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D97279D HttpSendRequestW,CryptReleaseContext,1_2_6D97279D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D973F01 CryptHashData,1_2_6D973F01
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D968F2B CryptDeriveKey,1_2_6D968F2B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D9D9750 CryptHashData,1_2_6D9D9750
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D98AF62 CryptHashData,1_2_6D98AF62
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D9646B5 CryptEncrypt,1_2_6D9646B5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D972EF8 GetProcAddress,CryptHashData,1_2_6D972EF8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D9EC13D CryptHashData,1_2_6D9EC13D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D96C080 CryptHashData,1_2_6D96C080
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D97E812 CryptEncrypt,1_2_6D97E812
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D989035 CryptReleaseContext,1_2_6D989035
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D980283 CryptReleaseContext,GetProcAddress,GetProcAddress,1_2_6D980283
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D987ADA CryptDeriveKey,1_2_6D987ADA
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D96EAE5 CryptGetHashParam,1_2_6D96EAE5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D98321F CryptHashData,1_2_6D98321F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D971A58 CryptEncrypt,1_2_6D971A58
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D9B6A70 CryptEncrypt,1_2_6D9B6A70
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D96CA64 CryptEncrypt,1_2_6D96CA64

Compliance

barindex
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeUnpacked PE file: 0.2.LwNdQo4zIk.exe.400000.0.unpack
Source: LwNdQo4zIk.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
Source: Binary string: C:\ruko\kusugu8-fu.pdb source: LwNdQo4zIk.exe
Source: Binary string: >h6C:\ruko\kusugu8-fu.pdb source: LwNdQo4zIk.exe
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B7085 InternetReadFile,0_2_004B7085

System Summary

barindex
Source: 00000000.00000002.309288628.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
Source: 00000000.00000002.309087545.0000000002254000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: LwNdQo4zIk.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 00000000.00000002.309288628.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
Source: 00000000.00000002.309087545.0000000002254000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004FA0B00_2_004FA0B0
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B41150_2_004B4115
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AB2C20_2_004AB2C2
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C13A50_2_004C13A5
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004DE3A70_2_004DE3A7
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A067F0_2_004A067F
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004DD9E80_2_004DD9E8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D99213A1_2_6D99213A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D9A822C1_2_6D9A822C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_6D96CA641_2_6D96CA64
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp 20DC61C5456EA5756F432AEBECF74660ACEBF5ACE0F7C8D1B360757ED79075D8
Source: LwNdQo4zIk.exeStatic PE information: Section: .data ZLIB complexity 0.9918356461560528
Source: LwNdQo4zIk.exeVirustotal: Detection: 49%
Source: LwNdQo4zIk.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B1333 CreateToolhelp32Snapshot,CreateToolhelp32Snapshot,0_2_004B1333
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot
Source: unknownProcess created: C:\Users\user\Desktop\LwNdQo4zIk.exe C:\Users\user\Desktop\LwNdQo4zIk.exe
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",UprsprhaotJump to behavior
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeFile created: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmpJump to behavior
Source: classification engineClassification label: mal84.evad.winEXE@3/1@0/0
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
Source: LwNdQo4zIk.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\ruko\kusugu8-fu.pdb source: LwNdQo4zIk.exe
Source: Binary string: >h6C:\ruko\kusugu8-fu.pdb source: LwNdQo4zIk.exe

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeUnpacked PE file: 0.2.LwNdQo4zIk.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeUnpacked PE file: 0.2.LwNdQo4zIk.exe.400000.0.unpack
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004F7054 push 004E123Eh; ret 0_2_004F71C1
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004F0321 push 004ED2FBh; ret 0_2_004F0472
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004D6483 push 0046B803h; ret 0_2_004D6561
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004D85D5 push 004C899Fh; ret 0_2_004D867A
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004EB75E push 004D3CB3h; ret 0_2_004EB891
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A7759 push dword ptr [004FCE43h]; ret 0_2_004A7A9F
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004EA92F push 004DAC2Fh; ret 0_2_004EAA73
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004F59CA push 004B1D5Fh; ret 0_2_004F5B00
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AB9D1 push 0046C15Ah; ret 0_2_004ABA8F
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0046FE63 push 00469E02h; ret 0_2_0046FFC0
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C8FA2 push 004ADFCDh; ret 0_2_004C907D
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C8FA2 push 004B29F4h; ret 0_2_004C947A
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_00491044 push 0046B803h; ret 0_2_00491087
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004F3042 push 004BACA2h; ret 0_2_004F30B2
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0047E048 push 004F3C92h; ret 0_2_0047E101
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004A5057 push 004A4A45h; ret 0_2_004A5090
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004AC057 push 004A024Ch; ret 0_2_004AC0BA
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_00494069 push 0046CDFCh; ret 0_2_004941DE
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0049B068 push 0046CDFCh; ret 0_2_0049B298
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0046D063 push 0046AD57h; ret 0_2_0046D29E
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0049806C push dword ptr [004FC7DBh]; ret 0_2_00498104
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004C5069 push 004ADFCDh; ret 0_2_004C50AC
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0046F07F push dword ptr [004FD207h]; ret 0_2_0046F14E
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_0047B07B push 00469E02h; ret 0_2_0047B1AC
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004D300B push dword ptr [004FD567h]; ret 0_2_004D3029
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_00480001 push dword ptr [004FC7DBh]; ret 0_2_00480022
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004CD000 push 004A0557h; ret 0_2_004CD295
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B8005 push 004AC2A1h; ret 0_2_004B8038
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_00474016 push 0046C15Ah; ret 0_2_004740C1
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004B701A push 004F3C92h; ret 0_2_004B7084
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004D1013 push 004B06B3h; ret 0_2_004D110A
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeFile created: C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeAPI coverage: 9.2 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 3.4 %
Source: rundll32.exe, 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpBinary or memory string: NtSetInformationWorkerFactoryTpSetDefaultPoolStackInformationDosDateTimeToFileTimeSetCurrentDirectoryWHkOleRegisterObjectSetProgmanW
Source: LwNdQo4zIk.exe, 00000000.00000002.309915707.00000000030C0000.00000004.00001000.00020000.00000000.sdmp, Pyupydeoe.tmp.0.drBinary or memory string: #NtSetInformationWorkerFactoryTpSetDefaultPoolStackInformationDosDateTimeToFileTimeSetCurrentDirectoryWHkOleRegisterObjectSetProgmanWindowMicrosoft.Security.ApplicationId.Wizards.AutomaticRuleGenerationWizard.ni.dllSystem.Collections.dllInkSeg.dll0123456789abcdefCNB_0336.DLLMicrosoft.Windows.Diagnosis.Commands.WriteDiagProgress.dllmsscp.dllOSProvider.dllapi-ms-win-core-localization-l1-1-0.dllmscorier.dll0123456789abcdef
Source: rundll32.exe, 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpBinary or memory string: SetProgmanW
Source: LwNdQo4zIk.exe, 00000000.00000002.309915707.00000000030C0000.00000004.00001000.00020000.00000000.sdmp, Pyupydeoe.tmp.0.drBinary or memory string: SetProgmanWindow
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\LwNdQo4zIk.exeCode function: 0_2_004ADA35 GetLocalTime,0_2_004ADA35
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception2
Process Injection
1
Rundll32
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts22
Software Packing
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
Process Injection
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Obfuscated Files or Information
NTDS3
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
LwNdQo4zIk.exe49%VirustotalBrowse
LwNdQo4zIk.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp50%ReversingLabsWin32.Trojan.Lazy
C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp64%VirustotalBrowse
SourceDetectionScannerLabelLinkDownload
0.2.LwNdQo4zIk.exe.2330e67.1.unpack100%AviraHEUR/AGEN.1215478Download File
0.2.LwNdQo4zIk.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.Gen2Download File
0.3.LwNdQo4zIk.exe.2450000.0.unpack100%AviraHEUR/AGEN.1215478Download File
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:36.0.0 Rainbow Opal
Analysis ID:778226
Start date and time:2023-01-05 08:51:27 +01:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 7m 21s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:LwNdQo4zIk.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal84.evad.winEXE@3/1@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmpfile.exeGet hashmaliciousBrowse
    Process:C:\Users\user\Desktop\LwNdQo4zIk.exe
    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):803328
    Entropy (8bit):6.89627808323015
    Encrypted:false
    SSDEEP:24576:l8Jr+SgWH5UB/VdYQ/N7WqpWaQxYZYBsFn:OJrSBYqLY
    MD5:C50C2F17112B6C6B0892CB2C1F502108
    SHA1:3DD1444384BF790F5AA90AE95EF7745FA4CFAF72
    SHA-256:20DC61C5456EA5756F432AEBECF74660ACEBF5ACE0F7C8D1B360757ED79075D8
    SHA-512:BFBFC3A13816A12E25C373F6739215B9DFF559FECFDF26C3358A452BDC833B6EAA64BBAE316F4B29B9E9CE802E9F50C66B533C8C3C1B372025A7F0B7D8B452F1
    Malicious:true
    Antivirus:
    • Antivirus: Joe Sandbox ML, Detection: 100%
    • Antivirus: ReversingLabs, Detection: 50%
    • Antivirus: Virustotal, Detection: 64%, Browse
    Joe Sandbox View:
    • Filename: file.exe, Detection: malicious, Browse
    Reputation:low
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e:..![.@![.@![.@.,.A&[.@.,.A [.@L..A"[.@![.@5[.@.D.@([.@...A [.@...A [.@...A [.@Rich![.@................PE..L.....c...........!.........................................................p............@.............................@.......<................................{......................................................@............................text...p........................... ..`.rdata..............................@..@.data...01.......2..................@....reloc...{.......|..................@..B........................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.853487844881012
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:LwNdQo4zIk.exe
    File size:1034752
    MD5:3ccd6b369eb1dde57d181e7550bd7268
    SHA1:aee399e263c838570c00133feab275b81009e12a
    SHA256:f5717aef9a4323816387603920b652a94ac0d9cedef36391cedd9cdcbfef7f60
    SHA512:00bd3bb981e2a5bd4c30241025f352e9e528d76300e67fcdbe89ee9e12ecbba73b291aebd9b73f73a8aaa32e2a8b2d1b4d49796cdc11a1b891a313cf0a9dcc03
    SSDEEP:24576:RFOWvM7bZBFpXlDpRjJ5JAXVm359Ov9UIrczuX:RguWRNpRjJPgAp9ucz
    TLSH:B7251201329194A7C1CA6A3C4930E7F02D7FBCF29D7CE187EB643A1E9E706B14A55687
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................;.Y.......Z.......L.......................K.......[.......^.....Rich............................PE..L....7.b...
    Icon Hash:9062e090c6e73144
    Entrypoint:0x40600e
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:TERMINAL_SERVER_AWARE
    Time Stamp:0x620337B3 [Wed Feb 9 03:40:35 2022 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:7bca87c7309353055aed194207c93e99
    Instruction
    call 00007F9A3C5343C9h
    jmp 00007F9A3C52ECEEh
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    mov edx, dword ptr [esp+0Ch]
    mov ecx, dword ptr [esp+04h]
    test edx, edx
    je 00007F9A3C52EEDBh
    xor eax, eax
    mov al, byte ptr [esp+08h]
    test al, al
    jne 00007F9A3C52EE88h
    cmp edx, 00000100h
    jc 00007F9A3C52EE80h
    cmp dword ptr [0050CFACh], 00000000h
    je 00007F9A3C52EE77h
    jmp 00007F9A3C53447Dh
    push edi
    mov edi, ecx
    cmp edx, 04h
    jc 00007F9A3C52EEA3h
    neg ecx
    and ecx, 03h
    je 00007F9A3C52EE7Eh
    sub edx, ecx
    mov byte ptr [edi], al
    add edi, 01h
    sub ecx, 01h
    jne 00007F9A3C52EE68h
    mov ecx, eax
    shl eax, 08h
    add eax, ecx
    mov ecx, eax
    shl eax, 10h
    add eax, ecx
    mov ecx, edx
    and edx, 03h
    shr ecx, 02h
    je 00007F9A3C52EE78h
    rep stosd
    test edx, edx
    je 00007F9A3C52EE7Ch
    mov byte ptr [edi], al
    add edi, 01h
    sub edx, 01h
    jne 00007F9A3C52EE68h
    mov eax, dword ptr [esp+08h]
    pop edi
    ret
    mov eax, dword ptr [esp+04h]
    ret
    int3
    int3
    int3
    int3
    int3
    int3
    push ebp
    mov ebp, esp
    push edi
    push esi
    mov esi, dword ptr [ebp+0Ch]
    mov ecx, dword ptr [ebp+10h]
    mov edi, dword ptr [ebp+08h]
    mov eax, ecx
    mov edx, ecx
    add eax, esi
    cmp edi, esi
    jbe 00007F9A3C52EE7Ah
    cmp edi, eax
    jc 00007F9A3C52F01Ah
    cmp ecx, 00000100h
    jc 00007F9A3C52EE91h
    cmp dword ptr [0050CFACh], 00000000h
    je 00007F9A3C52EE88h
    push edi
    push esi
    and edi, 0Fh
    Programming Language:
    • [ASM] VS2008 build 21022
    • [ C ] VS2008 build 21022
    • [IMP] VS2005 build 50727
    • [C++] VS2008 build 21022
    • [RES] VS2008 build 21022
    • [LNK] VS2008 build 21022
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x16dec0x3c.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x10d0000xbcb0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x12200x1c.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43a00x40.text
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x168500x16a00False0.5431198204419889data6.3410785244090935IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .data0x180000xf4fb40xd9e00False0.9918356461560528data7.991407419226785IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x10d0000xbcb00xbe00False0.38569078947368424data4.2370546659086274IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountry
    AFX_DIALOG_LAYOUT0x1160a00x2data
    AFX_DIALOG_LAYOUT0x1160980x2data
    AFX_DIALOG_LAYOUT0x1160a80x2data
    AFX_DIALOG_LAYOUT0x1160b00x2data
    AFX_DIALOG_LAYOUT0x1160b80x2data
    RT_CURSOR0x1160c00x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
    RT_CURSOR0x1162080x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
    RT_CURSOR0x1163380xf0Device independent bitmap graphic, 24 x 48 x 1, image size 0
    RT_CURSOR0x1164280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
    RT_CURSOR0x1175000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
    RT_ICON0x10d6e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SerbianItaly
    RT_ICON0x10dda80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SerbianItaly
    RT_ICON0x10e3100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SerbianItaly
    RT_ICON0x10f3b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SerbianItaly
    RT_ICON0x10f8600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSerbianItaly
    RT_ICON0x1107080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSerbianItaly
    RT_ICON0x110fb00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSerbianItaly
    RT_ICON0x1116780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSerbianItaly
    RT_ICON0x111be00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600SerbianItaly
    RT_ICON0x1141880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224SerbianItaly
    RT_ICON0x1152300x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400SerbianItaly
    RT_ICON0x115bb80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088SerbianItaly
    RT_STRING0x117f180xeadataSerbianItaly
    RT_STRING0x1180080x348dataSerbianItaly
    RT_STRING0x1183500x682dataSerbianItaly
    RT_STRING0x1189d80x2d8dataSerbianItaly
    RT_GROUP_CURSOR0x1161f00x14data
    RT_GROUP_CURSOR0x117da80x14data
    RT_GROUP_CURSOR0x1174d00x30data
    RT_GROUP_ICON0x1160200x76dataSerbianItaly
    RT_GROUP_ICON0x10f8200x3edataSerbianItaly
    RT_VERSION0x117dc00x154Encore not stripped - version 79
    DLLImport
    KERNEL32.dllGetConsoleAliasW, GetModuleHandleW, CreateDirectoryExW, ReadConsoleInputW, GetTempPathW, GetSystemDirectoryW, RemoveDirectoryW, OutputDebugStringA, GetProcAddress, LocalAlloc, GetBinaryTypeA, SearchPathA, VerifyVersionInfoA, SetProcessPriorityBoost, EndUpdateResourceA, FindNextFileW, FindFirstVolumeA, LocalShrink, GlobalFlags, _llseek, UpdateResourceA, CreateActCtxW, CopyFileW, AddConsoleAliasW, CreateMutexA, GetCurrentActCtx, GetDiskFreeSpaceA, MoveFileW, GetLogicalDriveStringsA, SetEvent, MoveFileExA, CreateMailslotA, WriteConsoleInputA, TerminateThread, GetCurrentProcess, RtlCaptureContext, InterlockedCompareExchange, GetFileTime, lstrcatA, FindFirstFileW, FreeEnvironmentStringsA, SetErrorMode, InterlockedExchangeAdd, MoveFileWithProgressA, GetTickCount, SetLastError, GetPrivateProfileStructW, VerSetConditionMask, LoadLibraryA, GetLastError, DeleteFileA, GetStartupInfoW, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetModuleHandleA, HeapFree, HeapAlloc, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, GetCurrentThreadId, InterlockedDecrement, HeapCreate, VirtualFree, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, RaiseException, VirtualAlloc, HeapReAlloc, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, InitializeCriticalSectionAndSpinCount, RtlUnwind, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, ReadFile, HeapSize, CloseHandle, CreateFileA
    GDI32.dllSetBrushOrgEx
    Language of compilation systemCountry where language is spokenMap
    SerbianItaly
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:08:52:18
    Start date:05/01/2023
    Path:C:\Users\user\Desktop\LwNdQo4zIk.exe
    Wow64 process (32bit):true
    Commandline:C:\Users\user\Desktop\LwNdQo4zIk.exe
    Imagebase:0x400000
    File size:1034752 bytes
    MD5 hash:3CCD6B369EB1DDE57D181E7550BD7268
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Yara matches:
    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.309288628.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.309087545.0000000002254000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
    Reputation:low

    Target ID:1
    Start time:08:52:23
    Start date:05/01/2023
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:"C:\Windows\system32\rundll32.exe" "C:\Users\user\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot
    Imagebase:0xa0000
    File size:61952 bytes
    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Reset < >

      Execution Graph

      Execution Coverage:1.2%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:25%
      Total number of Nodes:20
      Total number of Limit Nodes:2
      execution_graph 14937 4c978e FindCloseChangeNotification 14938 4c979c 14937->14938 14939 4a7759 CryptAcquireContextA 14940 4a7782 14939->14940 14949 46fe63 14951 46febf LoadLibraryA 14949->14951 14952 46ff5c 14951->14952 14953 4a6d6c 14954 4a6d8c 14953->14954 14955 4a6d9d CharUpperBuffA 14954->14955 14941 4ab9d1 14942 4ab9d5 CryptDeriveKey 14941->14942 14944 4aba16 14942->14944 14945 46f519 14946 46f55b LoadLibraryA 14945->14946 14947 46f525 14945->14947 14948 46f581 14946->14948 14947->14946 14956 4fa970 14957 4fa977 malloc 14956->14957 14958 4fa974 14956->14958

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 4a7759-4a7780 CryptAcquireContextA 1 4a77c2-4a77f5 0->1 2 4a7782-4a77c0 0->2 3 4a77fb-4a780b 1->3 4 4a88c6-4a88d8 1->4 2->1 5 4a781e-4a7872 call 4a73da 3->5 6 4a780d-4a7817 3->6 7 4a88da-4a88f1 4->7 8 4a8909-4a891a 4->8 13 4a7876-4a7942 5->13 14 4a7874 5->14 6->5 9 4a8920-4a8929 7->9 11 4a88f3-4a8907 7->11 8->9 11->8 15 4a7999-4a79aa 13->15 16 4a7944-4a7967 13->16 14->13 19 4a79ec-4a7a1d 15->19 20 4a79ac-4a79cc 15->20 17 4a7969-4a7987 16->17 18 4a798e-4a7992 16->18 23 4a7989 17->23 24 4a798c 17->24 18->15 21 4a7a1f 19->21 22 4a7a22-4a7a33 19->22 25 4a79ce 20->25 26 4a79d5-4a79ea 20->26 21->22 27 4a7a60-4a7a9f 22->27 28 4a7a35-4a7a49 22->28 23->24 24->18 25->26 26->19 27->4 29 4a7a4b 28->29 30 4a7a51-4a7a5b 28->30 29->30 30->27
      APIs
      • CryptAcquireContextA.ADVAPI32 ref: 004A7768
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AcquireContextCrypt
      • String ID: 7~ $CallWindowProcW$GetVolumeNameForVolumeMountPointW$NlsLexicons004a.dll$RasMigPlugin.dll$RtlCreateTimerQueue$apihex86.dll$devrtl.dll$msxml3r.dll
      • API String ID: 3951991833-1759118181
      • Opcode ID: 7358e2a6632d911ebb6615a09c023d6a935bae8a3ef6d7f88b02a29ff95ce42f
      • Instruction ID: 864f73d61dd2754cb24b74166d1be688390b549063db801f3636d54e48d93abe
      • Opcode Fuzzy Hash: 7358e2a6632d911ebb6615a09c023d6a935bae8a3ef6d7f88b02a29ff95ce42f
      • Instruction Fuzzy Hash: 36A16DB5E042099FCB00DFBAE9D41EE7BB0EB2A310F04817AD955E7762E3780955CB58
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 183 4ab9d1-4ab9d3 184 4ab9d9-4ab9fc 183->184 185 4ab9d5-4ab9d7 183->185 186 4aba02-4aba14 CryptDeriveKey 184->186 185->184 185->186 187 4aba58-4aba73 186->187 188 4aba16-4aba25 186->188 190 4aba79-4aba8f 187->190 191 4ac237-4ac27c 187->191 188->187 189 4aba27-4aba48 188->189 192 4aba4a-4aba4d 189->192 193 4aba54 189->193 190->191 194 4ac281 191->194 192->193 193->187 194->194
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: CryptDerive
      • String ID: FXSRES.DLL$wbemprox.dll
      • API String ID: 963700953-864472841
      • Opcode ID: 6f48a9e3d8a845fa319f77717fccbb300e8f6d0b3750192ee9f2a256972f91a6
      • Instruction ID: f2ca315b04a59662c88b2711d1709a0820e6a57183890c9017ff3987399593be
      • Opcode Fuzzy Hash: 6f48a9e3d8a845fa319f77717fccbb300e8f6d0b3750192ee9f2a256972f91a6
      • Instruction Fuzzy Hash: B82102B1E003059FCB009FA8D9D53EEBBB1EB2A710F44827B895497752E3B90E54C788
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 31 4ec46c-4ec4b9 call 4b06b3 34 4ec4bb-4ec4c0 31->34 35 4ec4d4-4ec50e call 4c89d8 31->35 37 4ec4c9-4ec4d2 34->37 38 4ec4c2-4ec4c7 34->38 40 4ec537-4ec551 35->40 41 4ec510-4ec530 35->41 37->35 38->37 42 4ec553-4ec56e 40->42 43 4ec571-4ec578 40->43 41->40 42->43 44 4ec57a-4ec57d 43->44 45 4ec582-4ec592 43->45 44->45 46 4ec59b-4ec59e 45->46 47 4ec594 45->47 48 4ec5ab-4ec5c1 46->48 49 4ec5a0-4ec5a8 46->49 47->46 50 4ec5cd-4ec5ce 48->50 49->48
      APIs
      • CreateProcessW.KERNELBASE(00000000,?,00000000), ref: 004EC5C7
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: CreateProcess
      • String ID: @Cqt$FXSRES.DLL$NlsLexicons004a.dll$Wlh$WriteFileEx$r&
      • API String ID: 963392458-1840894579
      • Opcode ID: c589032668075253d4b0997476dec812eb91138371010b571f4f34328cbe6b11
      • Instruction ID: 7c91f1378760e961f50db07e3ce39b7fa1196c614006467c9920f1ac7116d833
      • Opcode Fuzzy Hash: c589032668075253d4b0997476dec812eb91138371010b571f4f34328cbe6b11
      • Instruction Fuzzy Hash: EE31FE75E0021A9BDB00EFAAEAD06FE7BB0FF28304F40453AE505E7352E6394950CB48
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 86 46fe63-46febd 87 46feef-46ff17 86->87 88 46febf-46fee8 86->88 90 46ff32-46ff5a LoadLibraryA 87->90 91 46ff19-46ff2d 87->91 88->87 89 46feea 88->89 89->87 92 46ff64-46ff85 90->92 93 46ff5c-46ff62 90->93 91->90 94 46ff8b-46ffc0 92->94 93->92 93->94
      APIs
      • LoadLibraryA.KERNELBASE(?), ref: 0046FF46
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: LibraryLoad
      • String ID: EtwpGetCpuSpeed$Wlh$ZwOpenFile$hpfevw73.dll$sbs_diasymreader.dll
      • API String ID: 1029625771-530310043
      • Opcode ID: 84c2ea79aa9ae2472bf0d13afee29d124ec4b34a6d1f35d1e14fc466ec2a4c3b
      • Instruction ID: 5f9cf8e8bc6aefead99389c9af6ac2026223ccff36b1127e3ada00a722c668e2
      • Opcode Fuzzy Hash: 84c2ea79aa9ae2472bf0d13afee29d124ec4b34a6d1f35d1e14fc466ec2a4c3b
      • Instruction Fuzzy Hash: 4F319C75E40359DFD700DFB8FAC52EE7BB1EB2A310B48403A8944A7362E2790969C749
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 172 46f519-46f523 173 46f525-46f54b 172->173 174 46f55b-46f57f LoadLibraryA 172->174 177 46f554 173->177 178 46f54d 173->178 175 46f581-46f583 174->175 176 46f5be-46f651 call 46c3b9 174->176 179 46f585-46f595 175->179 180 46f599-46f5b8 175->180 177->174 178->177 179->180 180->176
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: LibraryLoad
      • String ID: EtwpGetCpuSpeed$devrtl.dll
      • API String ID: 1029625771-2582432514
      • Opcode ID: a285a531e5daf239845ba61c217765e189ae03a1582bac433da6b99f5ec81368
      • Instruction ID: ef33f599e64732a1e3375540842653c93bdef4a5e839f9d74011e57d83ba48f0
      • Opcode Fuzzy Hash: a285a531e5daf239845ba61c217765e189ae03a1582bac433da6b99f5ec81368
      • Instruction Fuzzy Hash: 5E318F64E44249DFCB00DFB8EAC55ED7BB1FB29320B00407AD45597722E3780A65CB59
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • FindCloseChangeNotification.KERNELBASE ref: 004C9796
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: ChangeCloseFindNotification
      • String ID:
      • API String ID: 2591292051-0
      • Opcode ID: 3992a863efe16b8f63359b138bfd13186a8977471c0d463d6497a29c7974d3d7
      • Instruction ID: 40f782e186dae421e2e5291fc41b6312c26cd0d01877086a23cfcd62d6540203
      • Opcode Fuzzy Hash: 3992a863efe16b8f63359b138bfd13186a8977471c0d463d6497a29c7974d3d7
      • Instruction Fuzzy Hash: 71A0243D300105C7C3014F30F5CD41C371143D030D710C5315403C404CC434D011D100
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CharUpperBuffA.USER32(00000000,?,?), ref: 004A6DA3
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: BuffCharUpper
      • String ID:
      • API String ID: 3964851224-0
      • Opcode ID: c0d1f12392ce7b553b800283bae38bc47d464258fadfbfb328399a4a17ab7e07
      • Instruction ID: 9fdd92384781316f0075c6a200922c60cf00b03dd3c62785e9577931238c8af9
      • Opcode Fuzzy Hash: c0d1f12392ce7b553b800283bae38bc47d464258fadfbfb328399a4a17ab7e07
      • Instruction Fuzzy Hash: B4F0AE35D00108BFCF01AFE9D845A9DBFB1EF04318F1081A5A924AA2A1D7368A24EF44
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: malloc
      • String ID:
      • API String ID: 2803490479-0
      • Opcode ID: af609ad100646c7060bc4ecb92b57e4e724e07d0b9cf465bc3175297e7bdafd8
      • Instruction ID: 5c81a9e60f535cad76a1d6efa1db0b362f67b2df7e96e182e9237fcea45a1aa5
      • Opcode Fuzzy Hash: af609ad100646c7060bc4ecb92b57e4e724e07d0b9cf465bc3175297e7bdafd8
      • Instruction Fuzzy Hash: 85A012CDD1004000EE0410311801423102221E060BBD5C8B9680440124FA3CC018201E
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SetLastError.KERNEL32(0000007F), ref: 004DDD9E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: ErrorLast
      • String ID: Gs$=kt$GetLocalManagedApplications$NetWkstaSetInfo$NlsLexicons004a.dll$RtlInitializeGenericTable$System.Windows.Controls.Ribbon.dll$V*$api-ms-win-core-interlocked-l1-1-0.dll$api-ms-win-core-io-l1-1-0.dll$apihex86.dll$audmigplugin.dll$cngprovider.dll$dxtrans.dll$mfdvdec.dll$wbemprox.dll$wiawow64.exe$2;
      • API String ID: 1452528299-2589147596
      • Opcode ID: 8a7d02bacb0df8d7231105ae6d5741325e06c272fe29310aeabdff8e49e59cca
      • Instruction ID: 05d6b29f830936cf197503655dc14312dda97afb7d531475b55ca1f809a40a4b
      • Opcode Fuzzy Hash: 8a7d02bacb0df8d7231105ae6d5741325e06c272fe29310aeabdff8e49e59cca
      • Instruction Fuzzy Hash: 6642D275E04249CFCB00DFB9EAE12E97BB1EF29314B04817BC94597362E2790965CB5C
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID: $-7$=kt$B\5$CallWindowProcW$EtwpGetCpuSpeed$FXSRES.DLL$GetLocalManagedApplications$GetP$PSEvents.dll$RasMigPlugin.dll$System.Windows.Controls.Ribbon.dll$TSpkg.dll$ZwWow64QueryInformationProcess64$api-ms-win-core-io-l1-1-0.dll$ddre$ddrerocA$devrtl.dll$rocA$scksp.dll$Nqt
      • API String ID: 0-2063702746
      • Opcode ID: 7249d203baedaa77c33435596837b91bd44663c268df7ad3f61fe718c367cf2d
      • Instruction ID: b0def301be00dee447dbe5b571d51c378938ae4c4b3a571c5a6394b2bc8ae00e
      • Opcode Fuzzy Hash: 7249d203baedaa77c33435596837b91bd44663c268df7ad3f61fe718c367cf2d
      • Instruction Fuzzy Hash: F432F676E00248DFCB00DFB9EA941EA7BB2EF69724B05807EC85497362E3350965CB5C
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID: Gs$=kt$CallWindowProcW$GetAppCompatFlags2$GetVolumeNameForVolumeMountPointW$NetWkstaSetInfo$RtlInitializeGenericTable$Wlh$api-ms-win-core-interlocked-l1-1-0.dll$api-ms-win-core-io-l1-1-0.dll$apihex86.dll$dpnathlp.dll$f\r$penusa.dll$qz.$sbs_diasymreader.dll$wiawow64.exe$@/
      • API String ID: 0-3626902700
      • Opcode ID: 73e04fddcb762fd17380410f4abe933b673318dbd42f076f8bd20773ad0de406
      • Instruction ID: 1f16049fa2c29bce1a5847f1875b2538c2141436720408383bd5407f2aa2cf9b
      • Opcode Fuzzy Hash: 73e04fddcb762fd17380410f4abe933b673318dbd42f076f8bd20773ad0de406
      • Instruction Fuzzy Hash: FB32E375E44249CFCB00DFBAEAD52E97BB1EF29324B04817BC85497362E2780965CB5C
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID: !O$GetAppCompatFlags2$GetLocalManagedApplications$GetVolumeNameForVolumeMountPointW$HPBPRO.DLL$NetWkstaSetInfo$RtlCreateTimerQueue$Wlh$ZwOpenFile$api-ms-win-core-io-l1-1-0.dll$f\r$hpfevw73.dll$mfdvdec.dll$sbs_diasymreader.dll$wabimp.dll$wmploc.DLL$}hX
      • API String ID: 0-1915777522
      • Opcode ID: f8de094187cb5aaad40c7fd6e50e254cc11a7612ad419f432a1d4f25ded614f1
      • Instruction ID: 328b9ea172c7fe457b9d8e4ebb097c87c45c34e4d7bc6dcb5dff0e99082a7081
      • Opcode Fuzzy Hash: f8de094187cb5aaad40c7fd6e50e254cc11a7612ad419f432a1d4f25ded614f1
      • Instruction Fuzzy Hash: DB62D466A44245CFCB00DFB9FE946EA7BB5EFAA320708417AC94497363D3740929C76C
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID: GetLocalManagedApplications$HPBPRO.DLL$RasMigPlugin.dll$VarDateFromUdate$Wlh$api-ms-win-core-interlocked-l1-1-0.dll$hpfevw73.dll$mh-$n:
      • API String ID: 0-260067468
      • Opcode ID: 3c935833391de6bbd7c149d5be8d7fbfe6bdad8b8280ff32742df89f8bf0fbde
      • Instruction ID: e54fa58228523b3247f4f32c2abfc5b05b747a5a7893d848b3390674f79041b2
      • Opcode Fuzzy Hash: 3c935833391de6bbd7c149d5be8d7fbfe6bdad8b8280ff32742df89f8bf0fbde
      • Instruction Fuzzy Hash: BEC1B179E0024A9FCB00EFB9EAD46EE7BB1EB29310B44417ED905E7762E3740954CB58
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID: =kt$FXSRES.DLL$GetAppCompatFlags2$GetVolumeNameForVolumeMountPointW$RtlInitializeGenericTable$api-ms-win-core-interlocked-l1-1-0.dll$cngprovider.dll$devrtl.dll$hpfevw73.dll$wbemprox.dll
      • API String ID: 0-649141487
      • Opcode ID: 493700602ed97b5d97610bf3e21186bf99b99b127bb852215559cc7559145844
      • Instruction ID: 072a09430c11f9c01987f29cc09220e59e6ff7fea68ac1a75193fe07c1201d7e
      • Opcode Fuzzy Hash: 493700602ed97b5d97610bf3e21186bf99b99b127bb852215559cc7559145844
      • Instruction Fuzzy Hash: AFC1AE75E403099FCB00DFA9EAD56ED7BB1EB29324F00807ED914A7362E3790A55CB49
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CryptDestroyKey.ADVAPI32(?), ref: 004B0419
      Strings
      • Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll, xrefs: 004B0396
      • scksp.dll, xrefs: 004B03D7
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: CryptDestroy
      • String ID: Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll$scksp.dll
      • API String ID: 1712904745-3817965684
      • Opcode ID: 1ba5fc7c3a257f75d131fcd563011a084cbac11a3c79b3a35215e36621b5dd36
      • Instruction ID: 4c5c17772bd7d973cce85e30be1e16e5128337274f85ef7599db5a0952d93290
      • Opcode Fuzzy Hash: 1ba5fc7c3a257f75d131fcd563011a084cbac11a3c79b3a35215e36621b5dd36
      • Instruction Fuzzy Hash: 5511D525744281CFD7018BB9FE863E93FB1EF66220F44027A8954573A3C2A90D2AC72D
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      • GetVolumeNameForVolumeMountPointW, xrefs: 004A5CC5
      • Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll, xrefs: 004A5C1A
      • wiawow64.exe, xrefs: 004A5BDA
      • scksp.dll, xrefs: 004A5D6E
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID: GetVolumeNameForVolumeMountPointW$Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll$scksp.dll$wiawow64.exe
      • API String ID: 0-3473566360
      • Opcode ID: 6e13d59716830d3138c14c915df6980d24302d5b4ac7062b7bf4873156c791c9
      • Instruction ID: 0e9d8c79414aee5ed3024515340c28f1cd824f4c12ada021047b671772e94a30
      • Opcode Fuzzy Hash: 6e13d59716830d3138c14c915df6980d24302d5b4ac7062b7bf4873156c791c9
      • Instruction Fuzzy Hash: 9151BB69A44749CFC7009FA9FF956E93BB0EB3A320708407BC944D7322E2691965CB6D
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID: RtlCreateTimerQueue$dbgeng.dll$devrtl.dll
      • API String ID: 0-2281805483
      • Opcode ID: 058cc3f21566c971f2538abf272fc56e589d7fe5510ab598018e46a50b3f2ddd
      • Instruction ID: e24532da6f2a289c23c6f4941ae3d256a9864d5727f3a8b66d1e947845f9ad2f
      • Opcode Fuzzy Hash: 058cc3f21566c971f2538abf272fc56e589d7fe5510ab598018e46a50b3f2ddd
      • Instruction Fuzzy Hash: F0410267A402868FC7018FB5FE947E63FB4EB7A7607084176CD4497723D228091ACBAC
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID: ? $GetLocalManagedApplications$Wlh
      • API String ID: 0-2048745350
      • Opcode ID: 509aebd62b0b127d20e357408734fc77926bca3ef38b1c5c4ecf77077112861c
      • Instruction ID: ce70d70ea4648ec9a429ac842834e08205dfe7c7a4c545f87cb37043a012fc17
      • Opcode Fuzzy Hash: 509aebd62b0b127d20e357408734fc77926bca3ef38b1c5c4ecf77077112861c
      • Instruction Fuzzy Hash: D741E375D443598FCB00DBB8EE955EA3BB2EB69310704413AC80097B23D2780D69CBAC
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • GetLocalManagedApplications, xrefs: 004AEB94
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: Crypt
      • String ID: GetLocalManagedApplications
      • API String ID: 993010335-2412223744
      • Opcode ID: 90a7d40cce46aeebd4316900c3109388bdbc03f19d3112e42ff80b423a353ba8
      • Instruction ID: e9d60645f25df3f8ea143010a32424c0cebbac4444ddfb102ce184d604e54b2e
      • Opcode Fuzzy Hash: 90a7d40cce46aeebd4316900c3109388bdbc03f19d3112e42ff80b423a353ba8
      • Instruction Fuzzy Hash: F4317B56A5024A8FCB10DF34FE993E63BA1EB7B3247044177C821977A6D22A0875C76D
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CryptExportKey.ADVAPI32(?), ref: 004B01E1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: CryptExport
      • String ID: ZwOpenFile
      • API String ID: 3389274496-3061432694
      • Opcode ID: cebb804deda6a707b31394c2998f1f8d664a7ab440c0c1b0ba3fe20e9c34a550
      • Instruction ID: 81dda3a31a3bbc86c7ccba9f2d4059ce5bca937f6ce77958a7017cd490775c64
      • Opcode Fuzzy Hash: cebb804deda6a707b31394c2998f1f8d664a7ab440c0c1b0ba3fe20e9c34a550
      • Instruction Fuzzy Hash: 47012663950245DBC300CBFCBE427EA7BB8EB653257044176DD04E3262E66A0D56C3A9
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CryptBinaryToStringA.CRYPT32(?,?,00000001,00000000,?), ref: 004BAA05
      • CryptBinaryToStringA.CRYPT32(?,?,00000001,?,?), ref: 004BAA35
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: BinaryCryptString
      • String ID:
      • API String ID: 80407269-0
      • Opcode ID: 9148eff3da48344e1d12db2789ff7db2dc651f2a83e9d144aa6a0a8387db3559
      • Instruction ID: cd48c6b3742682db978dee803b04635d8b977bde26e391758810dca5e7dd0092
      • Opcode Fuzzy Hash: 9148eff3da48344e1d12db2789ff7db2dc651f2a83e9d144aa6a0a8387db3559
      • Instruction Fuzzy Hash: A511FB75D00108FBDF019F94CC41BEDBB76FF08300F104266B921A22A0E77A8A60DB66
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID: RtlCreateTimerQueue$dxtrans.dll
      • API String ID: 0-3232145319
      • Opcode ID: 04208931043cb9ff03e743e6ffee993e5cc0e3cdd547e3fbb9fa17e028715fe2
      • Instruction ID: 3c92a60d07b910cd797c9cde1ab3375b2d7d7caab9db6e88fc5699dbf90eb3af
      • Opcode Fuzzy Hash: 04208931043cb9ff03e743e6ffee993e5cc0e3cdd547e3fbb9fa17e028715fe2
      • Instruction Fuzzy Hash: 0501E131A102098BE700AF7AEED5BE633A2EB18300F4000369D00C77A5E2665824C75D
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CryptReleaseContext.ADVAPI32 ref: 004B0571
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: ContextCryptRelease
      • String ID:
      • API String ID: 829835001-0
      • Opcode ID: 70aff45a6fd7951611b3732b4208190f89d1dfbd6fa1ea0f08147219fd2359da
      • Instruction ID: b5937936222b717d563e5530a57357b7f1f453a8bb7d3bd6666b10a2515b7fc7
      • Opcode Fuzzy Hash: 70aff45a6fd7951611b3732b4208190f89d1dfbd6fa1ea0f08147219fd2359da
      • Instruction Fuzzy Hash: 9601C066A1120E8FCB11DF38EAC91EA3BA1EB7A714304403BC841A7366E2354874CB5E
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: CryptExport
      • String ID:
      • API String ID: 3389274496-0
      • Opcode ID: e1d6614823048c371383ea307966132602e77c05c50381d0c28b114809448871
      • Instruction ID: d4221534c5ad4299bc9651078f1103edbe157f8ce2e751151f42fad4eb23ba93
      • Opcode Fuzzy Hash: e1d6614823048c371383ea307966132602e77c05c50381d0c28b114809448871
      • Instruction Fuzzy Hash: C9D05E68185280AAC6008B74FE8AA652F649BA6610B4000B5B400492F3C2500929C369
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: LocalTime
      • String ID:
      • API String ID: 481472006-0
      • Opcode ID: b700193c1c86c19e8c6d22a4e5633e12132d6af535861b2157dbeb9f2d8b37bb
      • Instruction ID: 6feaae2b9bacf522af987e2d2991633f8ff704f18c3771b7b1234a28f54250a2
      • Opcode Fuzzy Hash: b700193c1c86c19e8c6d22a4e5633e12132d6af535861b2157dbeb9f2d8b37bb
      • Instruction Fuzzy Hash: 71C04C7081020D4ACF00EB959D429BEB6BCAA40218B5005659911B5291EB61AB1085A6
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b097b0309f89a1192f476928ba68543a92d2c23d50abe5ed894ff1e227a05ad0
      • Instruction ID: e615807677afee63b5c35191c71010c5a06942e99dc5413fa01f24175c4ad080
      • Opcode Fuzzy Hash: b097b0309f89a1192f476928ba68543a92d2c23d50abe5ed894ff1e227a05ad0
      • Instruction Fuzzy Hash: E102E6B1B082254BDB0CCE18C59023DBBE2FBC9341F15496EE59AD7384C678D995CF8A
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 140ba7c6eeb16db4d3db3bcf8a08cd3e9114ae159abc6f95e2c3d7fa4b8f75a0
      • Instruction ID: 13098da43e41b6a377cc122102e0c61971807471e885c152087d7bc7652aa414
      • Opcode Fuzzy Hash: 140ba7c6eeb16db4d3db3bcf8a08cd3e9114ae159abc6f95e2c3d7fa4b8f75a0
      • Instruction Fuzzy Hash: 9FF0A470A5021CEFDB00CF84DD85BDDB7B1BB08304F100166EA40A7394D3B9A924DBA9
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 83cf7fde548232ddf5e1cdd39e8808ef3593ba8cfcc81401b37a56e8730e95d4
      • Instruction ID: dbb2cebe213b8c7046f91811030d7f2f856ec0e24dc2b9e0c3ef74e2b6c3b591
      • Opcode Fuzzy Hash: 83cf7fde548232ddf5e1cdd39e8808ef3593ba8cfcc81401b37a56e8730e95d4
      • Instruction Fuzzy Hash: 6CE00979A0020DAEDF019FD5CD85DEEBFB6EB88714F100069EA1072160D6725D64DB66
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f1fc9cdc24ae54707d79819bf13c194b06eb89ae4313e78ba5d708260b8d7dd0
      • Instruction ID: 46d84c7a961612567cdf95ea1c411bd4849ccd9e57829e3575dbdf7af3a36cc4
      • Opcode Fuzzy Hash: f1fc9cdc24ae54707d79819bf13c194b06eb89ae4313e78ba5d708260b8d7dd0
      • Instruction Fuzzy Hash: 14E02D79A00219EFDB15DF85E8819AEBBB2FB8D304F1041A4F90067265C7759C62EF64
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 4533122f00e3f06e9b506e558a66b98a654bc9eb808e8eae4e1719417f7615b1
      • Instruction ID: c00efbd50bd566755fdbbb76191db873fa22e01bbac1f8a77da95ba4ad2c2029
      • Opcode Fuzzy Hash: 4533122f00e3f06e9b506e558a66b98a654bc9eb808e8eae4e1719417f7615b1
      • Instruction Fuzzy Hash: 7BC0125978024C8F4350CB289D86F6026A0D35531035440369584E3251E6A58518C708
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 776217f08c024aac371037d3aae5d197dc6381f1f09d6c16ce85a6b876d4883d
      • Instruction ID: 03a5d180bc044da452250d385a0ae2c669391eeb9294f807430b15919c97f41c
      • Opcode Fuzzy Hash: 776217f08c024aac371037d3aae5d197dc6381f1f09d6c16ce85a6b876d4883d
      • Instruction Fuzzy Hash: CDB0923164020CFE9B488F80AEC08783A36E3C0B497100074A10011061C6744D20DB1A
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CreateFileW.KERNEL32(?,80000000,00000000), ref: 004ECB42
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: CreateFile
      • String ID: 6$=kt$FXSRES.DLL$GJ&$GetVolumeNameForVolumeMountPointW$Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll$NetWkstaSetInfo$OO$Q$L$RtlCreateTimerQueue$System.Windows.Controls.Ribbon.dll$ZwOpenFile$hpfevw73.dll$msxml3r.dll
      • API String ID: 823142352-508587202
      • Opcode ID: 2b2ba3889522c386f2f1e895cc741aacfb6442b04e81d5ddaaa1edeff21a088b
      • Instruction ID: 509ea8cbe4a3591b9b0481434c525ec50f11f0bb41db308bb747d028baa70665
      • Opcode Fuzzy Hash: 2b2ba3889522c386f2f1e895cc741aacfb6442b04e81d5ddaaa1edeff21a088b
      • Instruction Fuzzy Hash: EB915556B402858FD7009F7AFED63E63BA1EB29325B04427BD944873A3D26D092AC31D
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 0049981A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: .6&$=kt$CallWindowProcW$GetVolumeNameForVolumeMountPointW$Gr$Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll$ZwOpenFile$ap!$dxtrans.dll$q:6$Nqt
      • API String ID: 190572456-734602352
      • Opcode ID: 950b0f4b12323d790cb6bf90020a46fece1815f7b96e198ff706f8a53d15e09b
      • Instruction ID: 263ed57c7c18ffc7593e93c871394e9c08e5bf1ba25744a908626f4c56d39ddc
      • Opcode Fuzzy Hash: 950b0f4b12323d790cb6bf90020a46fece1815f7b96e198ff706f8a53d15e09b
      • Instruction Fuzzy Hash: D2918A75E54209DFCB00EFB9EAD56ED7BB1EB29310F04407ED904A7322E2394A65CB58
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: ErrorLast
      • String ID: $@Mqt$CallWindowProcW$GetAppCompatFlags2$Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll$System.Windows.Controls.Ribbon.dll$WriteFileEx$ZwOpenFile$api-ms-win-core-interlocked-l1-1-0.dll$f\r$scksp.dll$wabimp.dll$wiawow64.exe
      • API String ID: 1452528299-2799414311
      • Opcode ID: b61d8796a8067f191c03d4fac042a00e920b0d0bde90d28ae46547eb1006d9fe
      • Instruction ID: 420889970987b465808a204f5afa47a40c4ff46ac239ef72e800e05bb5a3cca4
      • Opcode Fuzzy Hash: b61d8796a8067f191c03d4fac042a00e920b0d0bde90d28ae46547eb1006d9fe
      • Instruction Fuzzy Hash: 76712175E5024A9FCB00AFB9D9852ED7BF1EB2A310F44807B9944E7712E3780A51CB59
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 004732C5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: CallWindowProcW$FXSRES.DLL$Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll$NlsLexicons004a.dll$api-ms-win-core-interlocked-l1-1-0.dll$audmigplugin.dll$jlU$wbemprox.dll$Nqt
      • API String ID: 190572456-246030322
      • Opcode ID: 138ca5923c9134c11a710964cd61249e36dcacce325fd96a7f04c88d8201ebe3
      • Instruction ID: 3d373285343c952007e9b153005274380f254a2b7baf0154feed43fe944716d1
      • Opcode Fuzzy Hash: 138ca5923c9134c11a710964cd61249e36dcacce325fd96a7f04c88d8201ebe3
      • Instruction Fuzzy Hash: FD719E75E4024ACFCB00DFB9EAC45ED7BB1EB29311B44817BD958A7312E3781A55CB48
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: CallWindowProcW$GetVolumeNameForVolumeMountPointW$Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll$audmigplugin.dll$dxtrans.dll$mfdvdec.dll$scksp.dll$Nqt$w$
      • API String ID: 190572456-2145969444
      • Opcode ID: 0e0cdbeca731bc113a672962f4016a58f80191c65ce3b9106585f39f14e45c88
      • Instruction ID: f1698880332fac7afd10a60e64ee96bef3fb79fb49aebea202d8aa39a68c1d6a
      • Opcode Fuzzy Hash: 0e0cdbeca731bc113a672962f4016a58f80191c65ce3b9106585f39f14e45c88
      • Instruction Fuzzy Hash: E7715B79A002099FCB00EFA9EAD45EDBFB0FB29314F40407AE644E7356E3785995CB49
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: GetAppCompatFlags2$NetWkstaSetInfo$Wlh$WriteFileEx$ZwOpenFile$api-ms-win-core-namedpipe-l1-1-0.dll$apihex86.dll$mfdvdec.dll$Nqt
      • API String ID: 190572456-3534082631
      • Opcode ID: b43f78d7a9ca0ff4e9a1c68c9bcc8275b987b598861fa8c55ea487eb11309962
      • Instruction ID: d89402bae393aef703c32ad7198458f1212dd78998115b8bfac6aba418e54c21
      • Opcode Fuzzy Hash: b43f78d7a9ca0ff4e9a1c68c9bcc8275b987b598861fa8c55ea487eb11309962
      • Instruction Fuzzy Hash: D2517F71E5020A9FCB00DFA9EAD06EC7BB0EF29314F14407ED944E7352E2395A55CB49
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?,?), ref: 004B988B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: P4&$Q&/$RtlInitializeGenericTable$api-ms-win-core-interlocked-l1-1-0.dll$apihex86.dll$dpnathlp.dll$scksp.dll$Nqt
      • API String ID: 190572456-2587095828
      • Opcode ID: e062b7dcc3efcd7fa60f5e3853cab8d5358fdc6befc702fa0fbbfd0189fd394c
      • Instruction ID: be7a2ec22074aa0e5b7b5717d0116898ab41938bb0cae7cc4e3ed169e44f8695
      • Opcode Fuzzy Hash: e062b7dcc3efcd7fa60f5e3853cab8d5358fdc6befc702fa0fbbfd0189fd394c
      • Instruction Fuzzy Hash: 8861E566E102498FC7009F79EEC46EA7BB5EF2A310B44417AD944D7322E2740D69CBAC
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 0049657F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: CallWindowProcW$FXSRES.DLL$Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll$NetWkstaSetInfo$api-ms-win-core-io-l1-1-0.dll$audmigplugin.dll$dpnathlp.dll$Nqt
      • API String ID: 190572456-2030639918
      • Opcode ID: 8777019d2191e1aa40bc2a2141ff75f0a0523ad0a775bc6dcb96c41d10bfc21c
      • Instruction ID: 78e2aff218d11bfd34384a78dad3f64bd060e82e0c8a0ef5f0e60ce38db63009
      • Opcode Fuzzy Hash: 8777019d2191e1aa40bc2a2141ff75f0a0523ad0a775bc6dcb96c41d10bfc21c
      • Instruction Fuzzy Hash: 2E717E74E402099FDB00DFB9EAD56ED7BB0EB18324F44817AE544E7312E3795991CB48
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(00000000), ref: 00476466
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: 0K'$FXSRES.DLL$GetVolumeNameForVolumeMountPointW$Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll$RtlCreateTimerQueue$api-ms-win-core-interlocked-l1-1-0.dll$dpnathlp.dll$Nqt
      • API String ID: 190572456-836657864
      • Opcode ID: 0c5fb8a9b7ff7b2b80b91cf14ac07e4ac3ef1cabe6bd2389533f2cda667ad8ac
      • Instruction ID: 2d7d1640e88f5fae0fa9df824b272f517f4d9c5d8e2a04585298fcae2a55bc90
      • Opcode Fuzzy Hash: 0c5fb8a9b7ff7b2b80b91cf14ac07e4ac3ef1cabe6bd2389533f2cda667ad8ac
      • Instruction Fuzzy Hash: 12510965E406098FDB009F79EBD12E93BB2EF29310F45817AC94897367E3780969C74D
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 0046CA7E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: RtlCreateTimerQueue$System.Windows.Controls.Ribbon.dll$api-ms-win-core-interlocked-l1-1-0.dll$api-ms-win-core-io-l1-1-0.dll$f\r$wiawow64.exe$ 1.$Nqt
      • API String ID: 190572456-2152620153
      • Opcode ID: 27401d0d2726a9b191bfd9aa9ca358e754fce464cdde78d746d65144ab7bd141
      • Instruction ID: 586f1475809b64e79bf91d7602bd4fb8e1f1a0bca0285b548caa3de515fbf639
      • Opcode Fuzzy Hash: 27401d0d2726a9b191bfd9aa9ca358e754fce464cdde78d746d65144ab7bd141
      • Instruction Fuzzy Hash: 1641165A640244CFC3008FBAFED56F62BA4EF6A714304417BD958D7363E3240929C7AD
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 0049CC9E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: GetAppCompatFlags2$RasMigPlugin.dll$[`-$api-ms-win-core-io-l1-1-0.dll$inetmgr.dll$wabimp.dll$wiawow64.exe$Nqt
      • API String ID: 190572456-1239910560
      • Opcode ID: 3e5e37e6993037c2112f34d00a5f71534c251473bd5735ab50b9216db42cd6b8
      • Instruction ID: 7f6660039ba0b0a5edd7626fbf2e16e18d4bd122dca507be7c7474acf0f0adbc
      • Opcode Fuzzy Hash: 3e5e37e6993037c2112f34d00a5f71534c251473bd5735ab50b9216db42cd6b8
      • Instruction Fuzzy Hash: B051AF75E9020A8BDF00DFB9DAD51EA7FB1EB29320F44413AD944A7366E3380965CB4D
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(00000000,ZwOpenFile), ref: 00488ACF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: ZwOpenFile$dpnathlp.dll$dxtrans.dll$f\r$mfdvdec.dll$wiawow64.exe$<4$Nqt
      • API String ID: 190572456-1549795477
      • Opcode ID: 87ff3050cb803f3620d154755cad0e1055062b8ab163cf4b5157cd667f825b05
      • Instruction ID: cec6222b5558c424c60c96249a8bee6645661b902af6dedb69316337e7c192ca
      • Opcode Fuzzy Hash: 87ff3050cb803f3620d154755cad0e1055062b8ab163cf4b5157cd667f825b05
      • Instruction Fuzzy Hash: 8E41E176E002099FCB00EFB5EEC06ED7BB1EB28314F84447AE944E3312E6791959CB58
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • InternetQueryOptionW.WININET(?), ref: 004CD0F1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: InternetOptionQuery
      • String ID: HPBPRO.DLL$NlsLexicons004a.dll$RtlInitializeGenericTable$Wlh$WriteFileEx$wabimp.dll$~N%
      • API String ID: 2202126096-1700376548
      • Opcode ID: 3be41d65dddcc7a9415b30e8ddcd0fe2837f5f22b7e86ad8b4cebec6cadade39
      • Instruction ID: 1f6483ca92b94503da3dd425239bc6d5f2a6660ff60c625d448469d08e61ab1e
      • Opcode Fuzzy Hash: 3be41d65dddcc7a9415b30e8ddcd0fe2837f5f22b7e86ad8b4cebec6cadade39
      • Instruction Fuzzy Hash: 5671162AE40249DFC7009FB9EED5BE53BB1EB25314B04417AD958D7363D2780A29CB5C
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: ZwOpenFile$`gqt$inetmgr.dll$scksp.dll$yj'$Nqt
      • API String ID: 190572456-634381080
      • Opcode ID: d69b150830a1518217a1eae4d561175c49900a846425838c4300dcf47a6d1d00
      • Instruction ID: ef07b13d1d99affa26c6ce296e4d6fa7720a618206067c2f0eacbfd159cdb61b
      • Opcode Fuzzy Hash: d69b150830a1518217a1eae4d561175c49900a846425838c4300dcf47a6d1d00
      • Instruction Fuzzy Hash: 11510465E402098FDB00EFB8EAD05ED7BB0EB3A310F04857BD844E7362E2780965CB49
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 0047D7F9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: @Cqt$WriteFileEx$api-ms-win-core-io-l1-1-0.dll$dxtrans.dll$sbs_diasymreader.dll$Nqt
      • API String ID: 190572456-3126933523
      • Opcode ID: a05e590cb87d8b219fe9381197e6fab523294f391e83d3708016a1190239def0
      • Instruction ID: d8d6c77eb36d917750cc31694d9e327978bec80bc6780a29df67510d93ccca69
      • Opcode Fuzzy Hash: a05e590cb87d8b219fe9381197e6fab523294f391e83d3708016a1190239def0
      • Instruction Fuzzy Hash: A5514975E502099BCB00EFA9DAD15EDBBB1FF29310F40417AE549E7311E3381A91CB49
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: Microsoft.VisualStudio.Tools.Office.Word.HostAdapter.v10.0.ni.dll$RasMigPlugin.dll$RtlInitializeGenericTable$dpnathlp.dll$scksp.dll$Nqt
      • API String ID: 190572456-1022013135
      • Opcode ID: c67e63ac1a1bd716244e4eb48e14bec7b5c76f6484eeea1873dd6bf11fc2089b
      • Instruction ID: 0cc622f0d10128cc4ec125b743cd141e5e84cd1b78dacbd23a6895dbffd5522d
      • Opcode Fuzzy Hash: c67e63ac1a1bd716244e4eb48e14bec7b5c76f6484eeea1873dd6bf11fc2089b
      • Instruction Fuzzy Hash: 4141B575E4070A9BCB00AFBAE6D61ED7BB0EB29310F54413BD94497352E3380965CB8D
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CharUpperBuffW.USER32(?,?), ref: 004BFACF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: BuffCharUpper
      • String ID: u5$EtwpGetCpuSpeed$GetAppCompatFlags2$System.Windows.Controls.Ribbon.dll$api-ms-win-core-io-l1-1-0.dll
      • API String ID: 3964851224-751922521
      • Opcode ID: e4a7a080d35a1bda451a368d3a76420545da68d3b0c8d208e7234316bf920882
      • Instruction ID: 71876c9c725b289ee84beb7b770499bf46ca1ddb4dea28d9e5b035f24e8f1ffb
      • Opcode Fuzzy Hash: e4a7a080d35a1bda451a368d3a76420545da68d3b0c8d208e7234316bf920882
      • Instruction Fuzzy Hash: 6C414A75E4020A9BCB00DFB5EAD45ED7FB0EF29310F14857AD945E3322E2385AA5CB48
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: IconLoad
      • String ID: !2$$GetAppCompatFlags2$System.Windows.Controls.Ribbon.dll$WriteFileEx$hpfevw73.dll
      • API String ID: 2457776203-3013433113
      • Opcode ID: 4004841eed7d9b324f471ff78b90535ca08352c73641601e7379af7bbb6d2a15
      • Instruction ID: 73ab5866575103e279124b0719fc094a4053c6411aa1317e4e67182a777a25ac
      • Opcode Fuzzy Hash: 4004841eed7d9b324f471ff78b90535ca08352c73641601e7379af7bbb6d2a15
      • Instruction Fuzzy Hash: 8731836AF456459FC740CFBDED90BA83FB1EB2931070880BED954E7362E6780A54CB58
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • ShellExecuteExW.SHELL32(?), ref: 004DA0AE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: ExecuteShell
      • String ID: ZwOpenFile$api-ms-win-core-interlocked-l1-1-0.dll$wmploc.DLL$}%;
      • API String ID: 587946157-3010588181
      • Opcode ID: ada2ede9d9efa5d487685b457b6b3e7b9a82c8ee1fedee9980ff5e225c333848
      • Instruction ID: f3049cc26fdf65618d1996f1d09277dc0458492589d39e311f8c4acd5cbd1bdf
      • Opcode Fuzzy Hash: ada2ede9d9efa5d487685b457b6b3e7b9a82c8ee1fedee9980ff5e225c333848
      • Instruction Fuzzy Hash: 4B41A175E0020A8FDB00DF69EAD06ED7BF1EB2A320F04857BD945A7352D3784964CB49
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 004941A2
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: NetWkstaSetInfo$WriteFileEx$inetmgr.dll$Nqt
      • API String ID: 190572456-3048739813
      • Opcode ID: 0725b60063dc021a5549db0e2d410ccfa316986c7fc66416e13acb27001f1cdd
      • Instruction ID: 3390adc6ac023f0e1fc66dfe149eebb6da0f0a6ef91f876a88f443f5e40ec5e9
      • Opcode Fuzzy Hash: 0725b60063dc021a5549db0e2d410ccfa316986c7fc66416e13acb27001f1cdd
      • Instruction Fuzzy Hash: F441D175E002098FDF00DFA8E9956EEBFB1FB69310F444176D954977A2E3390992CB48
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetStockObject.GDI32(00000000), ref: 004C792A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: ObjectStock
      • String ID: CallWindowProcW$RasMigPlugin.dll$ZwWow64QueryInformationProcess64$wbemprox.dll
      • API String ID: 3428563643-1069739028
      • Opcode ID: bcb54660717496e91d53ea9e7964a11ccba8ccdb5d07c82dad5319d3e6af4794
      • Instruction ID: 23306fa00bf0a22dc5f4b0ba74b163c49e1a502d805b9202fc59a27c1aff3a31
      • Opcode Fuzzy Hash: bcb54660717496e91d53ea9e7964a11ccba8ccdb5d07c82dad5319d3e6af4794
      • Instruction Fuzzy Hash: 9431DF6AA44255CFD7408F79FA856E96BA0EB39704B05407ECE64A7323E2240928CB6C
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: ErrorLast
      • String ID: @Mqt$EtwpGetCpuSpeed$GetAppCompatFlags2$Wlh
      • API String ID: 1452528299-2437382692
      • Opcode ID: c8ce28d19551e3fc7d7be65f6f670caa4e7a389136db18d4adc62b6c3410e924
      • Instruction ID: 27f3cc80a7cffb45c2bb46245841d907c204607ec495aba33d5dc80b68facf54
      • Opcode Fuzzy Hash: c8ce28d19551e3fc7d7be65f6f670caa4e7a389136db18d4adc62b6c3410e924
      • Instruction Fuzzy Hash: FD11DF34A402099FCB00DF68DAD42EC3BB1EB29320F80423AD455DB765E37949A6CB49
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • Process32NextW.KERNEL32(?,?), ref: 004B1BB3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: NextProcess32
      • String ID: GetAppCompatFlags2$NlsLexicons004a.dll$jlU
      • API String ID: 1850201408-3509816254
      • Opcode ID: 6b750cf77f285eb5bf2c5ff84f360669ba058dc9b78811f13a22a3bf81d75724
      • Instruction ID: fe7099a753a3362f5ce67a67023cdfa020222f2d062b64511a398e6984fe4e5d
      • Opcode Fuzzy Hash: 6b750cf77f285eb5bf2c5ff84f360669ba058dc9b78811f13a22a3bf81d75724
      • Instruction Fuzzy Hash: 6A7148A7A942458FCB009B78FEA57F92FB5EB26324F08017BD854D7362D2680D58C768
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: Close
      • String ID: NlsLexicons004a.dll$RtlCreateTimerQueue$ws5
      • API String ID: 3535843008-3428923293
      • Opcode ID: 0ba40fdd6aa3c709b10cf640fcd9cd6ee546f59bf0d32b7effd132fad7f4ab21
      • Instruction ID: d1032accd18dd52a62887ea3e630660ca56d9afdd978b34d08ae8e34fcc50012
      • Opcode Fuzzy Hash: 0ba40fdd6aa3c709b10cf640fcd9cd6ee546f59bf0d32b7effd132fad7f4ab21
      • Instruction Fuzzy Hash: CD41D479E40249DFC700CFBDEE84AE97FB5EB69310B1581BAD864D7362D2740915CB18
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: FileRead
      • String ID: Gs$RtlInitializeGenericTable$jlU
      • API String ID: 2738559852-981784394
      • Opcode ID: 823e1dcf19d285d4bd569e073d0bd3212d073ac6b7608a317c68722cb841b301
      • Instruction ID: 3bbe37fc7f392fd5ef0392c747824183246433b28416b44ed5c175b6896b828e
      • Opcode Fuzzy Hash: 823e1dcf19d285d4bd569e073d0bd3212d073ac6b7608a317c68722cb841b301
      • Instruction Fuzzy Hash: 3831E16AA002499FD700DFB9EE856E67BB5FF29310B00013AD918D7322E3790866CB58
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 0047A58C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: 0c;$NlsLexicons004a.dll$Nqt
      • API String ID: 190572456-3050484845
      • Opcode ID: d5b6c9e844a1212bee7a262ec7b619d8934b7a1294a48baf09739441e49dff90
      • Instruction ID: f080d47f1ffe26e6def55263c599a7ac07bf9d01609a1821e5584af28ba73779
      • Opcode Fuzzy Hash: d5b6c9e844a1212bee7a262ec7b619d8934b7a1294a48baf09739441e49dff90
      • Instruction Fuzzy Hash: 34218D65E40349DFC7009FB4EE942EE3BB1EB29314704853AD908A7726E3394924CB4D
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CreateToolhelp32Snapshot.KERNEL32(00000002), ref: 004BD968
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: CreateSnapshotToolhelp32
      • String ID: NlsLexicons004a.dll$scksp.dll
      • API String ID: 3332741929-3673066732
      • Opcode ID: 20d0d9d3ff3d912e6c1c85e58b40230c14d0478dfcbb23b20299ff70cfd926a7
      • Instruction ID: ed37f31bb527acc4fa013b0727943f79d6ba0fa87a1477efef9a413ea67b372e
      • Opcode Fuzzy Hash: 20d0d9d3ff3d912e6c1c85e58b40230c14d0478dfcbb23b20299ff70cfd926a7
      • Instruction Fuzzy Hash: 67318975E4020A9FCB00DFB8EAD52ED7BB0EB29710F0440BAD944E7352E2780A56CB48
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • QueryPerformanceCounter.KERNEL32(?), ref: 004BA65D
      • GetTickCount.KERNEL32 ref: 004BA672
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.308636603.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_LwNdQo4zIk.jbxd
      Similarity
      • API ID: CountCounterPerformanceQueryTick
      • String ID: 0vt
      • API String ID: 3881823799-3114708698
      • Opcode ID: 6d3a1a6efbe516c650128eb2034792e7b45b2cf039f25268abe0ca7f5dd13f93
      • Instruction ID: 041fac8532e129302a055075b57edf370340bab4589eba28654d4201e989bfa7
      • Opcode Fuzzy Hash: 6d3a1a6efbe516c650128eb2034792e7b45b2cf039f25268abe0ca7f5dd13f93
      • Instruction Fuzzy Hash: F7E0ECB0C15208DBCB00DF60D9895ADB7B4E604311B104173D852D2260EB319A20DE59
      Uniqueness

      Uniqueness Score: -1.00%

      Execution Graph

      Execution Coverage:0.7%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:0%
      Total number of Nodes:17
      Total number of Limit Nodes:0
      execution_graph 8830 6d96a423 8831 6d96a42c LoadLibraryA 8830->8831 8833 6d96a4d6 8831->8833 8834 6d9689ae 8835 6d9689b2 8834->8835 8836 6d968d19 LoadLibraryA 8835->8836 8837 6d968d56 8836->8837 8838 6d9ac036 8839 6d9ac056 8838->8839 8840 6d9ac067 CharUpperBuffA 8839->8840 8841 6d96b6d8 8842 6d96b6dc 8841->8842 8843 6d96b7de LoadLibraryW 8842->8843 8845 6d96b029 8846 6d96b03e 8845->8846 8847 6d96b19d 8846->8847 8848 6da077b2 LoadLibraryW 8847->8848

      Control-flow Graph

      APIs
      • LoadLibraryA.KERNELBASE(?), ref: 6D968D2C
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: LibraryLoad
      • String ID: 0hlN$Brmf3wia.dll$DisplayExitWindowsWarnings$ElfDeregisterEventSource$RtlGetCompressionWorkSpaceSize$System.Data.DataSetExtensions.dll$UnRegisterTypeLibForUser$bhlag$clrcompression.dll$compstui.dll$p?o$vsstrace.dll$xrWPcpst.dll$dO
      • API String ID: 1029625771-63786393
      • Opcode ID: 4af1f2d58ca49fce96b394ae24799fc4f4f679a50f925c15ec974a47f680adad
      • Instruction ID: 0b46041870c8912e9e63673fe9a26ce488359d16701f3837f49ba7fabccc0f72
      • Opcode Fuzzy Hash: 4af1f2d58ca49fce96b394ae24799fc4f4f679a50f925c15ec974a47f680adad
      • Instruction Fuzzy Hash: 52D1AC66A5A3828FDF04DFB8D9907D93BB0EB6F318B04C22E991487786E3640507CB61
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 51 6d96a423-6d96a42a 52 6d96a442-6d96a444 51->52 53 6d96a42c-6d96a43f 51->53 54 6d96a446-6d96a472 52->54 55 6d96a479-6d96a498 52->55 53->52 54->55 56 6d96a4ad-6d96a4b7 55->56 57 6d96a49a-6d96a49f 55->57 59 6d96a4bc-6d96a4d4 LoadLibraryA 56->59 58 6d96a4a1-6d96a4a7 57->58 57->59 58->56 60 6d96a4d6-6d96a4fa 59->60 61 6d96a4ff-6d96a567 call 6d9648dc 59->61 60->61 64 6d96a57c-6d96a5ec 61->64 65 6d96a569-6d96a577 61->65 66 6d96a5ee-6d96a608 64->66 67 6d96a61d-6d96a669 64->67 65->64 68 6d96a610-6d96a614 66->68 69 6d96a60a 66->69 70 6d96a672-6d96a6a0 67->70 71 6d96a66b 67->71 68->67 72 6d96a616 68->72 69->68 71->70 72->67
      APIs
      • LoadLibraryA.KERNELBASE(?), ref: 6D96A4C1
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: LibraryLoad
      • String ID: >lj$Brmf3wia.dll$System.Data.DataSetExtensions.dll$UnRegisterTypeLibForUser$ZwSetInformationEnlistment$lag$setup16.exe
      • API String ID: 1029625771-3660322804
      • Opcode ID: 2666618648ebff708d50c729eb54ff28726354351d8dbbd0be87d60bc713db8b
      • Instruction ID: b9fc5f410048864ec00616c529bfd68b69b13161c621e70ee9a35bad31f1ae84
      • Opcode Fuzzy Hash: 2666618648ebff708d50c729eb54ff28726354351d8dbbd0be87d60bc713db8b
      • Instruction Fuzzy Hash: 1451CD26A5E3818FDF018FB8D9947C93BB1EBAE308F05C16ED655AB782E3640447C721
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 104 6d9ac036-6d9ac077 call 6d9a4a0d call 6d9abfc6 CharUpperBuffA
      APIs
      • CharUpperBuffA.USER32(00000000,?,?), ref: 6D9AC06D
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: BuffCharUpper
      • String ID:
      • API String ID: 3964851224-0
      • Opcode ID: c2f963b714e7d77b31bac4ed5a5013999aad52d8b75af7b9bab3e6addd6e8797
      • Instruction ID: 9cb1a922730d3c80d7d65d6f6d840cc3a9a40fd58a40f5d9cf6103951d3af578
      • Opcode Fuzzy Hash: c2f963b714e7d77b31bac4ed5a5013999aad52d8b75af7b9bab3e6addd6e8797
      • Instruction Fuzzy Hash: E0F0AE32D0410CBFCF019FA8C840A8CBBB1AF04318F14C1A4A928A6260D7328A20EF40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: RaiseException$correngine.dll
      • API String ID: 190572456-270107267
      • Opcode ID: 4bb3f6d51d1abe4bdeb7ebd8d8d332ae930514dd76603a215a5240e0f300feb0
      • Instruction ID: a9fe1d3c58c99efbecde3c3e72d81a8be980704cac4f78de76ca2286985220b0
      • Opcode Fuzzy Hash: 4bb3f6d51d1abe4bdeb7ebd8d8d332ae930514dd76603a215a5240e0f300feb0
      • Instruction Fuzzy Hash: AE21FE36A593419FCF00CBB9D984B99BBB0EB9E328B54C22EE500E7742E3340943CB50
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 309 6d96658e-6d966597 310 6d9665b9-6d9665d2 309->310 311 6d966599-6d9665b3 309->311 312 6d9665d4-6d9665f2 310->312 313 6d9665fc-6d9666fd LoadLibraryA call 6d963373 310->313 311->310 315 6d9665f4 312->315 316 6d9665fa 312->316 318 6d9666ff-6d966716 313->318 319 6d96671d-6d966735 313->319 315->316 316->313 318->319 320 6d966766-6d966790 319->320 321 6d966737-6d96673a 319->321 324 6d966792-6d966799 320->324 325 6d96679c-6d9667e0 320->325 322 6d966755-6d966761 321->322 323 6d96673c-6d96674f 321->323 322->320 323->322 324->325 326 6d9667e2-6d9667ef 325->326 327 6d96683b-6d96684c 325->327 330 6d966834 326->330 331 6d9667f1-6d9667f4 326->331 328 6d96684e-6d96686c 327->328 329 6d966888-6d96688b 327->329 332 6d96686e-6d966873 328->332 333 6d96688d-6d966890 328->333 329->333 330->327 334 6d9667f6-6d966814 331->334 335 6d966819-6d966820 331->335 338 6d966875-6d96687c 332->338 339 6d966881-6d966883 332->339 340 6d966895-6d9668bd 333->340 341 6d966892 333->341 334->335 336 6d966822-6d966828 335->336 337 6d96682b-6d96682d 335->337 336->337 337->330 338->339 339->329 342 6d9668ff 340->342 343 6d9668bf-6d9668c7 340->343 341->340 344 6d966901-6d966938 call 6d961aa8 342->344 345 6d9668cf-6d9668e2 343->345 346 6d9668c9-6d9668cd 343->346 350 6d96699e-6d966a09 344->350 351 6d96693a-6d966940 344->351 345->344 348 6d9668e4-6d9668f9 345->348 346->342 346->345 348->342 354 6d966a12-6d966a8e call 6d963373 350->354 355 6d966a0b 350->355 352 6d966942-6d966974 351->352 353 6d966979-6d96697d 351->353 352->353 356 6d966986-6d96699a 353->356 357 6d96697f-6d966984 353->357 360 6d966ae2-6d966b2e call 6d9fd83a 354->360 361 6d966a90-6d966adf 354->361 355->354 356->350 357->356 361->360
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: LibraryLoad
      • String ID: 0hlN$4b'$A"B$BRURD23A.DLL$Brmf3wia.dll$M!"$correngine.dll$metadata.dll$qEv$xrWPcpst.dll
      • API String ID: 1029625771-3674605508
      • Opcode ID: 75bafdd2451f32f7bd3d36b97f0012972d449503bb6d9c0ea1f21d92b8189f55
      • Instruction ID: 53161fb48d59c70141ef67f7ad07219bd0883cb66939bc60570ed90be1addbd1
      • Opcode Fuzzy Hash: 75bafdd2451f32f7bd3d36b97f0012972d449503bb6d9c0ea1f21d92b8189f55
      • Instruction Fuzzy Hash: 99D1DF66A5E3828FCF009FB999947D93BB0EB6B328B08C26ED85497781E3740507CB51
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 364 6d970621-6d9706c9 GetProcAddress 365 6d9706f4-6d9706f9 364->365 366 6d9706cb-6d9706ce 364->366 368 6d970748-6d97079a 365->368 369 6d9706fb-6d970709 365->369 367 6d9706d0-6d9706ee 366->367 366->368 367->365 372 6d9707a7-6d9707aa 368->372 373 6d97079c-6d9707a0 368->373 370 6d970735-6d970741 369->370 371 6d97070b-6d970733 369->371 370->368 371->370 374 6d9707b1-6d970853 call 6d961aa8 372->374 375 6d9707ac 372->375 373->372 378 6d970855-6d970878 374->378 379 6d97087f-6d970925 374->379 375->374 378->379 380 6d970927-6d970947 379->380 381 6d97094c-6d970951 379->381 380->381 382 6d970953-6d970964 381->382 383 6d970969-6d970a20 381->383 382->383 384 6d970966 382->384 385 6d970a22-6d970a24 383->385 386 6d970a2d-6d970a51 383->386 384->383 387 6d970a26 385->387 388 6d970a28 385->388 389 6d970a53-6d970a59 386->389 390 6d970a5e-6d970a8b 386->390 387->388 388->386 389->390
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: @BW$Brmf3wia.dll$ElfDeregisterEventSource$GetSidSubAuthorityCount$Microsoft.Office.Tools.Common.ni.dll$RaiseException$api-ms-win-core-synch-l1-1-0.dll$bhlag$lN$setup16.exe
      • API String ID: 190572456-3866897338
      • Opcode ID: dc125b66c5a6dad7c997aac72fb227319fef7050d0c2c4d5964e17b336fe6ccb
      • Instruction ID: 92e7eed8400139e1767605d3ba52d6e1148eebbf79fb64182f530c987939936e
      • Opcode Fuzzy Hash: dc125b66c5a6dad7c997aac72fb227319fef7050d0c2c4d5964e17b336fe6ccb
      • Instruction Fuzzy Hash: 7FB1BA6AA593468FCF00CFB9D9847D97BB0EB6E318B04C26ED9289B745E3350907CB51
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 391 6d976574-6d976675 GetProcAddress 392 6d976677-6d9766b4 391->392 393 6d9766b6-6d976715 391->393 392->393 394 6d976717-6d976719 393->394 395 6d976744-6d976762 393->395 396 6d976733-6d976740 394->396 397 6d97671b-6d97672e 394->397 398 6d976775-6d9767d7 395->398 399 6d976764-6d97676f 395->399 396->395 397->396 400 6d9767e0-6d9767f1 398->400 401 6d9767d9 398->401 399->398 402 6d9767f3-6d9767fe 400->402 403 6d97680d 400->403 401->400 404 6d976800-6d976807 402->404 405 6d97680f-6d9768a7 402->405 403->405 404->403
      APIs
      • GetProcAddress.KERNEL32(?), ref: 6D976663
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: &!`$B]-$Brmf3wia.dll$CDQ$RtlTimeToTimeFields$X&G$m@P$qEv$xrWPcpst.dll$lN
      • API String ID: 190572456-4068470198
      • Opcode ID: dc706024609b38d6df31855b9a7f2508e39c233c20b8335d659e1cccd421f9c9
      • Instruction ID: 151b6590fa4b4b09a60417fa70443999803da64bfb6e8f7df7d09b82e6f8b6d3
      • Opcode Fuzzy Hash: dc706024609b38d6df31855b9a7f2508e39c233c20b8335d659e1cccd421f9c9
      • Instruction Fuzzy Hash: 1581AD66A1A3429FCF009FB8DA547D93BB1EB6E328B04C66ED864D7786E3340503CB55
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 6D97BE38
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: MessageBoxA$PhotoBase.dll$RtlTimeToTimeFields$clrcompression.dll$compstui.dll$lN$lag$setup16.exe
      • API String ID: 190572456-3070735637
      • Opcode ID: 673977db5249738788952c49549bcaf0aae0d80f1c6c8133703780aedd53cb30
      • Instruction ID: e7ccbf5e9aae3f439fad47704fecc75ffd9b332ebf6834258ca10f810f4404a3
      • Opcode Fuzzy Hash: 673977db5249738788952c49549bcaf0aae0d80f1c6c8133703780aedd53cb30
      • Instruction Fuzzy Hash: 53E1B766A197469BCF00DFB8CA907D93BB1EFAB328B04C26DD9249B781E3744543CB41
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 6D981025
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: Brmf3wia.dll$FHn$KBDTH1.DLL$Microsoft.Office.Tools.Common.ni.dll$PhotoBase.dll$f[T$vsstrace.dll$lN
      • API String ID: 190572456-4117702296
      • Opcode ID: 5b7799951d83a136172537e123edfd0b6f2fbbca7544d2025da8ff034eb25321
      • Instruction ID: 245fbff8f93b8b2c73b0cc94d31693574005f989f2ed292bfb90ef3c0abe3155
      • Opcode Fuzzy Hash: 5b7799951d83a136172537e123edfd0b6f2fbbca7544d2025da8ff034eb25321
      • Instruction Fuzzy Hash: 4371E067A6E3818FCF018E74D9807D93BB1EBBB728B09C66DD858A7786E3250407C711
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: j4b'$>lj$ElfDeregisterEventSource$OEMHelpIns.dll$RaiseException$RtlQueryRegistryValues$bhlag$lN
      • API String ID: 190572456-497976401
      • Opcode ID: 88c0aa325397d3dffc7a42321fe2f236d9aaa251aaeafe9d4ddafdc7be6bc2a7
      • Instruction ID: d3a4608f0fcc58b73732710eb1bb5df9ec92ac6fe794b36a37c20d0b041b9b35
      • Opcode Fuzzy Hash: 88c0aa325397d3dffc7a42321fe2f236d9aaa251aaeafe9d4ddafdc7be6bc2a7
      • Instruction Fuzzy Hash: 2D717466A59302DBCF00DF78D6957D93BB1EBAB328B04C22EC95497B85E3384507C715
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 6D9725DD
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: 4b'$ElfDeregisterEventSource$MessageBoxA$PhotoBase.dll$RW5$System.Data.DataSetExtensions.dll$hlN$kE3
      • API String ID: 190572456-225836787
      • Opcode ID: 6e9696b2264ef535d1d3d762024afd46d07bfed8e7cb5867fa2dfd957622a998
      • Instruction ID: 7e66daaaef427ba50bc62ef9361a65874bb1d270535e985f60a64649bb8f074a
      • Opcode Fuzzy Hash: 6e9696b2264ef535d1d3d762024afd46d07bfed8e7cb5867fa2dfd957622a998
      • Instruction Fuzzy Hash: 7051AA6A9693468FCF11DFA8C5A07D97BB1EBAE328B00C16EC954DB745E3304543CB21
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: CancelTimerQueueTimer$FHn$api-ms-win-core-synch-l1-1-0.dll$ieframe.dll$lag$x!,$xrWPcpst.dll
      • API String ID: 190572456-19324304
      • Opcode ID: e9eecd787e21da3dbca6e647737f316a4d8022afe793cceb7767af00028ddb6f
      • Instruction ID: 56d061a68ce3e8643e9121fa34fd6973c368dc0f8d11c37aed272215e53eece7
      • Opcode Fuzzy Hash: e9eecd787e21da3dbca6e647737f316a4d8022afe793cceb7767af00028ddb6f
      • Instruction Fuzzy Hash: A4519766E283469BCF00DF78CA94BD93BB0EB6B328B04C26DD955A3786E3344543CB45
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 6D96586A
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: DisplayExitWindowsWarnings$ElfDeregisterEventSource$I:B$RtlQueryRegistryValues$RtlTimeToTimeFields$api-ms-win-core-synch-l1-1-0.dll$lN
      • API String ID: 190572456-3450814590
      • Opcode ID: 9e3c35d6e05c494ae07e2e67b2f909b62b2e3bcda95ec19c52ee05a769ebfc32
      • Instruction ID: 3599d67ea31229c11aa2d614dc830c16046153d5d6c8a5fd982118c28175157a
      • Opcode Fuzzy Hash: 9e3c35d6e05c494ae07e2e67b2f909b62b2e3bcda95ec19c52ee05a769ebfc32
      • Instruction Fuzzy Hash: A551DF62E5A3428FDF048F75C9903E97BB1FB6A318B48C22DC81597B46E3350507CB62
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 6D96D794
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: -/:$DisplayExitWindowsWarnings$PhotoBase.dll$clrcompression.dll$hlN$vsstrace.dll
      • API String ID: 190572456-3767241438
      • Opcode ID: 58d1b0d44d102e6878c48b684ea7dd2c50492cb86519a509f7ebf9fde856cb1c
      • Instruction ID: a817e7ef3ce25c5dc0657c102f84a2f5fb80701e7b6f9a4aa3837346683cffec
      • Opcode Fuzzy Hash: 58d1b0d44d102e6878c48b684ea7dd2c50492cb86519a509f7ebf9fde856cb1c
      • Instruction Fuzzy Hash: F7819E66A593469FCF00DFB8D9847D97BB0EBAE318B04826ED924DB702E3740543CB61
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: 0hlN$7$7$8y8$F?#$KBDTH1.DLL$MessageBoxA
      • API String ID: 190572456-1703494151
      • Opcode ID: e54f82e7f74b9a871a257243acf98be97b31bcffe8435eb88158ec7d936eb0e9
      • Instruction ID: f3a2e83eb6adda28e4f23f882ec0ce5c0d81f79abb87acc4d855215986987170
      • Opcode Fuzzy Hash: e54f82e7f74b9a871a257243acf98be97b31bcffe8435eb88158ec7d936eb0e9
      • Instruction Fuzzy Hash: 7471BC6795E3418FCF01DFB8C9947C93BB1EBAB228B04C25EE8249B741E3640643CB51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 6D97C456
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: >lj$@x%$GetSidSubAuthorityCount$OEMHelpIns.dll$System.Web.DynamicData.Design.dll$lN
      • API String ID: 190572456-4072339296
      • Opcode ID: 087cac2b92d95b5cf2ea7e90a5d82637454ac1399d97f9420c5bdbb5ad72b903
      • Instruction ID: d76cc8825a379b9fd00b44dc3a8ca28082f37658ab07cf4089992f949efdb5b5
      • Opcode Fuzzy Hash: 087cac2b92d95b5cf2ea7e90a5d82637454ac1399d97f9420c5bdbb5ad72b903
      • Instruction Fuzzy Hash: 24517666A5E3818FCF01CFB8D5947D93BB1EB6F218B04C26E995497B82E3304543CB12
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: &J7$*7I$HL?$ieframe.dll$qEv$setup16.exe
      • API String ID: 190572456-1028871580
      • Opcode ID: 49bbc44a965baa2b2c14bba27beafbc4c3663b0d2927fee4198c447967f16263
      • Instruction ID: 918e42d973a5f46467f090395c57a4f246b4de082f69043958459a479524582f
      • Opcode Fuzzy Hash: 49bbc44a965baa2b2c14bba27beafbc4c3663b0d2927fee4198c447967f16263
      • Instruction Fuzzy Hash: A231C366A5D342DFDF019B68D5623E93B71EBAF72CB08C61E884587B87E3690403C705
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: LibraryLoad
      • String ID: BRURD23A.DLL$ElfDeregisterEventSource$OEMHelpIns.dll$ieframe.dll$lN
      • API String ID: 1029625771-1011742970
      • Opcode ID: f299b51f0f78d16eb56148553f78e70fac80c2b4ed3be049958111a7bb92e0f5
      • Instruction ID: 0396cb8aacc5321659c7a9975e1f646896c0de3be91568575d5734d6ae09cf0e
      • Opcode Fuzzy Hash: f299b51f0f78d16eb56148553f78e70fac80c2b4ed3be049958111a7bb92e0f5
      • Instruction Fuzzy Hash: 85B1A926A6A3828FCF059FB8C9947D97BB1EB6F318B08C26EC94497786E3350543C711
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 6D9645D7
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: CoGetInterceptorFromTypeInfo$g"$wf9$g<
      • API String ID: 190572456-4209002683
      • Opcode ID: 6ac25ad9cb4c8ada80554f05f46443c76dd9ca14df1b54bfec4c784f15f99e06
      • Instruction ID: 3efd60557acc6742583dd5cd65a80da70597bb200a11134434b47c033ce412ca
      • Opcode Fuzzy Hash: 6ac25ad9cb4c8ada80554f05f46443c76dd9ca14df1b54bfec4c784f15f99e06
      • Instruction Fuzzy Hash: FA71F62B61E3908FDB018A7CD8947D93BF8DBAF618B05C26ED854D7742E3650407CBA1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?,00000001), ref: 6D9695C0
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: Brmf3wia.dll$Microsoft.Office.Tools.Common.ni.dll$PATHPING.EXE
      • API String ID: 190572456-915997367
      • Opcode ID: 6468b4177abfc66c3ba5904422cf6290b9a11c0707fb98f22000a60b66015a7e
      • Instruction ID: 43394338dd7d68aaf1f4f537f3ca74288b036c7f690fca495eeb00fe639edd3b
      • Opcode Fuzzy Hash: 6468b4177abfc66c3ba5904422cf6290b9a11c0707fb98f22000a60b66015a7e
      • Instruction Fuzzy Hash: 2151BE62A2E3819FCF018F7985947893BB1EBAF318B09C27DD95897B46E3710843C791
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: FHn$lN
      • API String ID: 190572456-2710608911
      • Opcode ID: 9fd157ec86c26ef0f4c63501a5a258019b5df9e1da640f6e98e4ba86e57b572c
      • Instruction ID: a54af28f5e7906821c79b0eedd40241cb512fc799c74d90437aa417f0bac07a9
      • Opcode Fuzzy Hash: 9fd157ec86c26ef0f4c63501a5a258019b5df9e1da640f6e98e4ba86e57b572c
      • Instruction Fuzzy Hash: 0F519926A197069FCF00DFB9C9807C97BB1EB6E328B04C26ED564AB392E3350543CB10
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcAddress.KERNEL32(?), ref: 6D97466E
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: 'UN$correngine.dll
      • API String ID: 190572456-1488156376
      • Opcode ID: fdd64613e09e3c4ba326c214a4bb9867594ed6c03a5618c98eb303b615039a17
      • Instruction ID: 305407285b153240281096881bb59fb8894533f7ca1f06368952d80c3eafc645
      • Opcode Fuzzy Hash: fdd64613e09e3c4ba326c214a4bb9867594ed6c03a5618c98eb303b615039a17
      • Instruction Fuzzy Hash: ED218975A19381CBCF01DFB8C580BDC7BB1EB6E218B05826EC8209BB46E3714083CB52
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.689640906.000000006D961000.00000020.00000001.01000000.00000004.sdmp, Offset: 6D960000, based on PE: true
      • Associated: 00000001.00000002.689637078.000000006D960000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689773460.000000006DA0A000.00000002.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689792009.000000006DA0B000.00000004.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689810579.000000006DA0E000.00000008.00000001.01000000.00000004.sdmpDownload File
      • Associated: 00000001.00000002.689826505.000000006DA0F000.00000002.00000001.01000000.00000004.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_6d960000_rundll32.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: Eg5$^ !
      • API String ID: 190572456-1743815323
      • Opcode ID: e584dcef19a3c8321ee41feefdb5219ab120011cbf563e1bff2a24192f9ee4dd
      • Instruction ID: 9cc3199e9cec92b0f9ea260046fc7dda3f4cbb8532388d54e77e806a3e3cd6b6
      • Opcode Fuzzy Hash: e584dcef19a3c8321ee41feefdb5219ab120011cbf563e1bff2a24192f9ee4dd
      • Instruction Fuzzy Hash: 6D219A66A5A3409FDF10CF79C8907E87BB4EBAB308F04C15EA814A3642E3784907CB25
      Uniqueness

      Uniqueness Score: -1.00%