Edit tour

Windows Analysis Report
avidump.exe

Overview

General Information

Sample name:avidump.exe
Analysis ID:1354146
MD5:cdc9a6a2ad5ba647ae7a2e772fa40cc1
SHA1:263dfa0e1367504da4549e3e412d98dc46aab607
SHA256:81069462d3d01c052757a0e8033dddae459c2acf47a20b931a4a77b3855a537e
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Tries to load missing DLLs
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • avidump.exe (PID: 892 cmdline: C:\Users\user\Desktop\avidump.exe MD5: CDC9A6A2AD5BA647AE7A2E772FA40CC1)
    • conhost.exe (PID: 180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: avidump.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: avidump.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Fuzzytoo\Desktop\avidump\Debug\avidump.pdb source: avidump.exe
Source: C:\Users\user\Desktop\avidump.exeCode function: 0_2_00F116C00_2_00F116C0
Source: C:\Users\user\Desktop\avidump.exeCode function: 0_2_00F116C00_2_00F116C0
Source: C:\Users\user\Desktop\avidump.exeSection loaded: msvcr100d.dllJump to behavior
Source: avidump.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean4.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:180:120:WilError_03
Source: C:\Users\user\Desktop\avidump.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\avidump.exe C:\Users\user\Desktop\avidump.exe
Source: C:\Users\user\Desktop\avidump.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: avidump.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: avidump.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\Fuzzytoo\Desktop\avidump\Debug\avidump.pdb source: avidump.exe
Source: C:\Users\user\Desktop\avidump.exeCode function: 0_2_00F14400 LoadLibraryW,GetProcAddress,_getMemBlockDataString,lstrlenA,failwithmessage,failwithmessage,0_2_00F14400
Source: avidump.exeStatic PE information: section name: .textbss
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\avidump.exeCode function: 0_2_00F11023 IsDebuggerPresent,0_2_00F11023
Source: C:\Users\user\Desktop\avidump.exeCode function: 0_2_00F14400 LoadLibraryW,GetProcAddress,_getMemBlockDataString,lstrlenA,failwithmessage,failwithmessage,0_2_00F14400
Source: C:\Users\user\Desktop\avidump.exeCode function: 0_2_00F150B0 VirtualQuery,GetModuleFileNameW,GetProcAddress,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,0_2_00F150B0
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\avidump.exeCode function: 0_2_00F14820 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00F14820
Source: C:\Users\user\Desktop\avidump.exeCode function: 0_2_00F14A00 SetUnhandledExceptionFilter,0_2_00F14A00
Source: C:\Users\user\Desktop\avidump.exeCode function: 0_2_00F11069 SetUnhandledExceptionFilter,0_2_00F11069
Source: C:\Users\user\Desktop\avidump.exeCode function: 0_2_00F14CA0 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00F14CA0
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
Valid Accounts1
Native API
1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataSIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
Domain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyData Encrypted for ImpactDNS ServerEmail Addresses
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1354146 Sample: avidump.exe Startdate: 05/12/2023 Architecture: WINDOWS Score: 4 5 avidump.exe 1 2->5         started        process3 7 conhost.exe 5->7         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:38.0.0 Ammolite
Analysis ID:1354146
Start date and time:2023-12-05 19:26:31 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 46s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:avidump.exe
Detection:CLEAN
Classification:clean4.winEXE@2/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 12
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target avidump.exe, PID 892 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: avidump.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (console) Intel 80386, for MS Windows
Entropy (8bit):4.760960775646094
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:avidump.exe
File size:39'936 bytes
MD5:cdc9a6a2ad5ba647ae7a2e772fa40cc1
SHA1:263dfa0e1367504da4549e3e412d98dc46aab607
SHA256:81069462d3d01c052757a0e8033dddae459c2acf47a20b931a4a77b3855a537e
SHA512:d006fd8874fca45af768e2598012c2a96ad00a0802c68b127d2d3e83ca970ed8784aa38c39409ef35696179d278dd6bb47a65e1b55b0bcf53723067999d37bb5
SSDEEP:768:x6Rv+/i0P/jhx5SpHQZI3VJRPMrQAgBo06PsJXf30UIGgt7BjB:x+BN/JXf30U+
TLSH:35030862A600CC3AD2B1C4B655AA6EE751ADF9F40F54D1F323E40EF91D10AE1A43B64E
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......p...4..]4..]4..]/7$]7..]/7.]&..]=.+]6..]4..]q..]/7.]=..]/7"]5..]/7%]5..]Rich4..]................PE..L...r.\e.................Z.
Icon Hash:00928e8e8686b000
Entrypoint:0x41112c
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x655CFF72 [Tue Nov 21 19:05:22 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:9a690d1f62e03577371c8a779777760e
Instruction
jmp 00007F0544E91B64h
jmp 00007F0544E92A6Fh
jmp 00007F0544E92AEAh
jmp 00007F0544E93A13h
jmp 00007F0544E919E8h
jmp 00007F0544E93979h
jmp 00007F0544E93A16h
jmp 00007F0544E91871h
jmp 00007F0544E92D50h
jmp 00007F0544E911C7h
jmp 00007F0544E91772h
jmp 00007F0544E9149Dh
jmp 00007F0544E93980h
jmp 00007F0544E92B83h
jmp 00007F0544E8F4EEh
jmp 00007F0544E9393Bh
jmp 00007F0544E939EAh
jmp 00007F0544E939C7h
jmp 00007F0544E93932h
jmp 00007F0544E919DFh
jmp 00007F0544E93140h
jmp 00007F0544E93941h
jmp 00007F0544E9289Ch
jmp 00007F0544E939B5h
jmp 00007F0544E92F7Ch
jmp 00007F0544E939C9h
jmp 00007F0544E92CFCh
jmp 00007F0544E92E2Bh
jmp 00007F0544E92E38h
jmp 00007F0544E93931h
jmp 00007F0544E9397Ah
jmp 00007F0544E91967h
jmp 00007F0544E916FEh
jmp 00007F0544E938FFh
jmp 00007F0544E939B4h
jmp 00007F0544E92AF5h
jmp 00007F0544E92CD0h
jmp 00007F0544E93939h
jmp 00007F0544E91E66h
jmp 00007F0544E91963h
Programming Language:
  • [IMP] VS2010 SP1 build 40219
  • [ C ] VS2010 SP1 build 40219
  • [IMP] VS2008 SP1 build 30729
  • [C++] VS2010 SP1 build 40219
  • [RES] VS2010 SP1 build 40219
  • [LNK] VS2010 SP1 build 40219
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x380000x3c.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x390000x459.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x3a0000x520.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x177200x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x381dc0x1a0.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.textbss0x10000x100000x0False0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.text0x110000x58b40x5a00False0.3080295138888889data4.9005508617351IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x170000x20710x2200False0.20438878676470587data2.487603845758131IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x1a0000x1dd440x200False0.072265625data0.42378437585596346IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x380000x9640xa00False0.369140625data4.317900375664463IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x390000x4590x600False0.18619791666666666data2.2532907567883185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x3a0000x8330xa00False0.46484375data4.255966405480478IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x391700x196XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.5738916256157636
DLLImport
MSVCR100D.dll?terminate@@YAXXZ, _controlfp_s, _invoke_watson, _unlock, __dllonexit, _crt_debugger_hook, _onexit, _except_handler4_common, _wmakepath_s, wcscpy_s, _wsplitpath_s, _initterm_e, _initterm, _CrtDbgReportW, _CrtSetCheckCount, __initenv, exit, _cexit, _XcptFilter, _exit, __getmainargs, _amsg_exit, __set_app_type, _fmode, _commode, __setusermatherr, _configthreadlocale, _CRT_RTC_INITW, fopen_s, strcpy_s, strcat_s, fclose, feof, memcmp, printf, _fseeki64, _ftelli64, fprintf, _lock, fread
KERNEL32.dllGetModuleHandleW, VirtualQuery, GetModuleFileNameW, GetProcessHeap, HeapAlloc, HeapFree, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, DecodePointer, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, LoadLibraryW, GetProcAddress, lstrlenA, RaiseException, MultiByteToWideChar, IsDebuggerPresent, WideCharToMultiByte, HeapSetInformation, InterlockedCompareExchange, Sleep, InterlockedExchange, EncodePointer, FreeLibrary
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found
050100s020406080100

Click to jump to process

050100s0.0051015MB

Click to jump to process

Click to jump to process

Target ID:0
Start time:19:27:21
Start date:05/12/2023
Path:C:\Users\user\Desktop\avidump.exe
Wow64 process (32bit):true
Commandline:C:\Users\user\Desktop\avidump.exe
Imagebase:0xf00000
File size:39'936 bytes
MD5 hash:CDC9A6A2AD5BA647AE7A2E772FA40CC1
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:19:27:21
Start date:05/12/2023
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Non-executed Functions

APIs
  • _ftelli64.MSVCR100D(?), ref: 00F11702
  • fread.MSVCR100D(00000000,00000004,00000001,?), ref: 00F11737
  • fread.MSVCR100D(?,00000004,00000001,?), ref: 00F117A7
  • _ftelli64.MSVCR100D(?), ref: 00F117DD
  • printf.MSVCR100D(%016llx/%d/%d,?,?,?,?), ref: 00F11821
  • fprintf.MSVCR100D(?,frame %d length %d,?,?), ref: 00F11854
  • _fseeki64.MSVCR100D(?,?,00000000,00000001), ref: 00F11884
  • fprintf.MSVCR100D(?,found frames %d,?), ref: 00F118FA
  • fread.MSVCR100D(?,00000004,00000001,?), ref: 00F11939
  • _fseeki64.MSVCR100D(?,?,00000000,00000001), ref: 00F11978
  • fread.MSVCR100D(?,00000004,00000001,?), ref: 00F119E2
  • fread.MSVCR100D(?,00000004,00000001,?), ref: 00F11A7E
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3279158110.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
  • Associated: 00000000.00000002.3279146733.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279168765.0000000000F17000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279179635.0000000000F38000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279191609.0000000000F39000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_f00000_avidump.jbxd
Similarity
  • API ID: fread$_fseeki64_ftelli64fprintf$printf
  • String ID: %016llx$%016llx/%d/%d$00db$00dc$00ix1$AVI$AVI $AVIX$Avi Header Frames %d$Avi Header X %d, Y %d$AviHeader Bad, Length wrong %d Pushing on to use stream header$Cr8r$FIEL$ICRD$INFO$ISFT$JUNK$LIST$RIFF$StreamHeader Bad, Bytes per pixel wrong %d$Tdat$Total stream frames %d$_PMX$avih$dmlh$found frames %d$frame %d length %d$hdrl$idx1$indx$ix00$movi$odml$pointer %x$rate %d$strf$strh$strl$tc_A$tc_O$type %s$unknown in list
  • API String ID: 4135216957-4268034411
  • Opcode ID: d5b9b0d91c7dda48cc09ae01601b7cbcf8feae9179d02e3974d107fc3d22588d
  • Instruction ID: 50b18b113117ccbe4cbc1b0f2e3cff6e84ce6ebcbb8556c16ca45d1e3d6a3a82
  • Opcode Fuzzy Hash: d5b9b0d91c7dda48cc09ae01601b7cbcf8feae9179d02e3974d107fc3d22588d
  • Instruction Fuzzy Hash: A0C29E71E00208AFEB54EF6CCC42BEE77A5FB08710F408519FE19DB251E675D994AB82
Uniqueness

Uniqueness Score: -1.00%

APIs
  • VirtualQuery.KERNEL32(?,?,0000001C), ref: 00F150D5
  • GetModuleFileNameW.KERNEL32(?,?,?), ref: 00F150F2
  • GetProcAddress.KERNEL32(?,PDBOpenValidate5), ref: 00F15182
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3279158110.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
  • Associated: 00000000.00000002.3279146733.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279168765.0000000000F17000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279179635.0000000000F38000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279191609.0000000000F39000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_f00000_avidump.jbxd
Similarity
  • API ID: AddressFileModuleNameProcQueryVirtual
  • String ID: PDBOpenValidate5
  • API String ID: 3975414188-413491164
  • Opcode ID: 0517b2ddc51a662a2003eab901e4f6f59fafa526610f35f3748b1d5cea6ee9e8
  • Instruction ID: 0113942fba5fa7e0c99fe65512b53ea02cefdb794fa48c884f21f27eeca98e56
  • Opcode Fuzzy Hash: 0517b2ddc51a662a2003eab901e4f6f59fafa526610f35f3748b1d5cea6ee9e8
  • Instruction Fuzzy Hash: 18917F75A00A0AEFDB10DFA4CC80EEEB7BAEF89B50F104159E9159B250D770ED81DB90
Uniqueness

Uniqueness Score: -1.00%

APIs
  • SetUnhandledExceptionFilter.KERNEL32(J8), ref: 00F14A0A
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3279158110.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
  • Associated: 00000000.00000002.3279146733.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279168765.0000000000F17000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279179635.0000000000F38000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279191609.0000000000F39000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_f00000_avidump.jbxd
Similarity
  • API ID: ExceptionFilterUnhandled
  • String ID: J8
  • API String ID: 3192549508-3332737933
  • Opcode ID: ada8ced0df6fe25cb18ed4519de964eef3db085fac1f380736978e158144c71a
  • Instruction ID: 806787e96eddfcb372ce2b78254bf27cbd5b28dfb86e8050865ed68d668ea966
  • Opcode Fuzzy Hash: ada8ced0df6fe25cb18ed4519de964eef3db085fac1f380736978e158144c71a
  • Instruction Fuzzy Hash: 00B0127125430C37420013E26C09807BB9DD7C47707410010B21C81001DC61D4015092
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.3279158110.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
  • Associated: 00000000.00000002.3279146733.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279168765.0000000000F17000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279179635.0000000000F38000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279191609.0000000000F39000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_f00000_avidump.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 50c85f9bbf482d3e5d8293228ec2c11f29f83cb4c5aa752fc5643558bc124663
  • Instruction ID: 52405ff573efdbb20ece457efa213ab04d4066d4d2b0e5cce5d67384d4289c94
  • Opcode Fuzzy Hash: 50c85f9bbf482d3e5d8293228ec2c11f29f83cb4c5aa752fc5643558bc124663
  • Instruction Fuzzy Hash:
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.3279158110.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
  • Associated: 00000000.00000002.3279146733.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279168765.0000000000F17000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279179635.0000000000F38000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279191609.0000000000F39000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_f00000_avidump.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 0c9d663b9bbf3eb831bcdda372a78648e176c179e187bd432e1c7ed134dd299b
  • Instruction ID: 6ae80c3bf934bce795b309c99b165838134d0711ca95b8dfcfd680edb4602799
  • Opcode Fuzzy Hash: 0c9d663b9bbf3eb831bcdda372a78648e176c179e187bd432e1c7ed134dd299b
  • Instruction Fuzzy Hash:
Uniqueness

Uniqueness Score: -1.00%

APIs
  • printf.MSVCR100D(output is stored in a new file with .txt appended), ref: 00F13415
  • printf.MSVCR100D(usage: avidump filename), ref: 00F1342C
  • fopen_s.MSVCR100D(?,?,00F17A34), ref: 00F1345E
  • strcpy_s.MSVCR100D(?,00000400,?), ref: 00F13480
  • strcat_s.MSVCR100D(?,00000400,.txt), ref: 00F134A3
  • fopen_s.MSVCR100D(00F1A26C,?,00F17A28), ref: 00F134D0
  • fprintf.MSVCR100D(?,dissassembly of %s,?), ref: 00F134FB
  • fprintf.MSVCR100D(?,expected frames %d,?), ref: 00F1352B
  • fprintf.MSVCR100D(?,processed frames %d,?), ref: 00F1354F
  • fclose.MSVCR100D(00000000), ref: 00F13565
  • fclose.MSVCR100D(?), ref: 00F135A1
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3279158110.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
  • Associated: 00000000.00000002.3279146733.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279168765.0000000000F17000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279179635.0000000000F38000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279191609.0000000000F39000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_f00000_avidump.jbxd
Similarity
  • API ID: fprintf$fclosefopen_sprintf$strcat_sstrcpy_s
  • String ID: .txt$could not open %s$dissassembly of %s$expected frames %d$output is stored in a new file with .txt appended$processed frames %d$usage: avidump filename
  • API String ID: 3403244542-1888248713
  • Opcode ID: d305d17c6cafcc22166ca1d838a61cf878515e75cce4cfa83a449cf518ad5674
  • Instruction ID: 4f5e8b4d2277bcb58a86a1b81fa24152095fa5b2937657d39d086109ea82a3ed
  • Opcode Fuzzy Hash: d305d17c6cafcc22166ca1d838a61cf878515e75cce4cfa83a449cf518ad5674
  • Instruction Fuzzy Hash: 4151C672E012186FCB60BB58DC47AEDB769EB04710F454155FF0AA7361C93A9E84ABC3
Uniqueness

Uniqueness Score: -1.00%

APIs
  • LoadLibraryW.KERNEL32(ADVAPI32.DLL,?), ref: 00F1556B
  • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 00F15593
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3279158110.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
  • Associated: 00000000.00000002.3279146733.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279168765.0000000000F17000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279179635.0000000000F38000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279191609.0000000000F39000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_f00000_avidump.jbxd
Similarity
  • API ID: AddressLibraryLoadProc
  • String ID: ADVAPI32.DLL$EnvironmentDirectory$MSPDB100.DLL$RegCloseKey$RegOpenKeyExW$RegQueryValueExW$SOFTWARE\Microsoft\VisualStudio\10.0\Setup\VS$\
  • API String ID: 2574300362-326676442
  • Opcode ID: 9a9c97c03ff5e112b355da5b84263bfcc87cb2dfd878f657e6f1a2d0714f3c35
  • Instruction ID: c620c378239075bcae6744213288967af74cd29492da7e1a4529c62dbf58acf0
  • Opcode Fuzzy Hash: 9a9c97c03ff5e112b355da5b84263bfcc87cb2dfd878f657e6f1a2d0714f3c35
  • Instruction Fuzzy Hash: 0C413A70A0161CCBCB24DF59DD48AD9B3A6EF98764F15819AE80993250DF70CE82AF50
Uniqueness

Uniqueness Score: -1.00%

APIs
  • fread.MSVCR100D(00F1A3A8,00000008,00000001,?), ref: 00F13137
  • fprintf.MSVCR100D(?,RIFF %d,00000000), ref: 00F13188
  • fread.MSVCR100D(00F1A3A8,00000004,00000001,?), ref: 00F131A7
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3279158110.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
  • Associated: 00000000.00000002.3279146733.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279168765.0000000000F17000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279179635.0000000000F38000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279191609.0000000000F39000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_f00000_avidump.jbxd
Similarity
  • API ID: fread$fprintf
  • String ID: LIST$RIFF$RIFF %d$pointer %x$unknown in raw
  • API String ID: 2176144599-3481428552
  • Opcode ID: bb978c8c04139ccc23715edaf853670bd3439a27cd52a4b93810d511c7451827
  • Instruction ID: f35518f18d56d433b62505b6550f5e846d9dd3ac606e2c04199d3d4a795056ec
  • Opcode Fuzzy Hash: bb978c8c04139ccc23715edaf853670bd3439a27cd52a4b93810d511c7451827
  • Instruction Fuzzy Hash: BF51C772E042147BEB20BB68DC47BE97669AB08750F404014FE19E7351E57ADEC4A7D3
Uniqueness

Uniqueness Score: -1.00%

APIs
  • _ftelli64.MSVCR100D(00000000), ref: 00F11482
  • fprintf.MSVCR100D(?,%016llx: ,00000000), ref: 00F114A2
  • fread.MSVCR100D(00F1A3A8,00000010,00000001,00000000), ref: 00F114C1
  • fprintf.MSVCR100D(?,%02X ,?), ref: 00F11510
  • fprintf.MSVCR100D(?,%c ,?), ref: 00F1156D
  • fprintf.MSVCR100D(?,00F17740), ref: 00F1158C
  • fprintf.MSVCR100D(?,00F1773C), ref: 00F115AB
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3279158110.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
  • Associated: 00000000.00000002.3279146733.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279168765.0000000000F17000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279179635.0000000000F38000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279191609.0000000000F39000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_f00000_avidump.jbxd
Similarity
  • API ID: fprintf$_ftelli64fread
  • String ID: %016llx: $%02X $%c
  • API String ID: 493066381-3845985378
  • Opcode ID: d501b57f7561e1a4450a567f2f8f4b52e3f596a82b8f13d28ff559b9222fa0c1
  • Instruction ID: ea0ac22af9e01ed6483a1a250e1fc2a1b5eac8a4fde538d1624aeafb4b7a31fd
  • Opcode Fuzzy Hash: d501b57f7561e1a4450a567f2f8f4b52e3f596a82b8f13d28ff559b9222fa0c1
  • Instruction Fuzzy Hash: F341B432E05228ABDB20A758DC467EDB7B5BB05750F444141FA0AB7351C72A9984BBE3
Uniqueness

Uniqueness Score: -1.00%

APIs
  • GetModuleHandleW.KERNEL32(MSVCR100D.dll,00000000,?), ref: 00F15469
  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00F1548C
  • LoadLibraryW.KERNEL32(?), ref: 00F154B8
  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00F154CC
  • LoadLibraryW.KERNEL32(?), ref: 00F154F8
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3279158110.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
  • Associated: 00000000.00000002.3279146733.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279168765.0000000000F17000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279179635.0000000000F38000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279191609.0000000000F39000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_f00000_avidump.jbxd
Similarity
  • API ID: Module$FileLibraryLoadName$Handle
  • String ID: MSVCR100D.dll
  • API String ID: 2349647968-3445637155
  • Opcode ID: 0e95e8b07e91c1fbcf11f600d388f67f3eeaf01c7e3b8dfdb048f5ecb536169f
  • Instruction ID: 12bc4d8ea1b1b3af3d149b83f515eca2507ecf0416b6a524fe99d05be736f10e
  • Opcode Fuzzy Hash: 0e95e8b07e91c1fbcf11f600d388f67f3eeaf01c7e3b8dfdb048f5ecb536169f
  • Instruction Fuzzy Hash: 9C2107B1E0030CDADB30E7748D05FEA37699BC4B60F4441A5AE05D2081EE79DAC8EAA1
Uniqueness

Uniqueness Score: -1.00%

APIs
  • _ftelli64.MSVCR100D(00000000), ref: 00F11482
  • fprintf.MSVCR100D(?,%016llx: ,00000000), ref: 00F114A2
  • fread.MSVCR100D(00F1A3A8,00000010,00000001,00000000), ref: 00F114C1
  • fprintf.MSVCR100D(?,%02X ,?), ref: 00F11510
  • fprintf.MSVCR100D(?,%c ,?), ref: 00F1156D
  • fprintf.MSVCR100D(?,00F17740), ref: 00F1158C
  • fprintf.MSVCR100D(?,00F1773C), ref: 00F115AB
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3279158110.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
  • Associated: 00000000.00000002.3279146733.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279168765.0000000000F17000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279179635.0000000000F38000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279191609.0000000000F39000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_f00000_avidump.jbxd
Similarity
  • API ID: fprintf$_ftelli64fread
  • String ID: %016llx:
  • API String ID: 493066381-511893447
  • Opcode ID: 3ad5e6493208e2329542a577b54951b09d0663ba9915dc13dd18567a644f63f1
  • Instruction ID: 68d19005521f93231ff4fcb37daeb20e19bb6b2eedf4df8767a943313062dc49
  • Opcode Fuzzy Hash: 3ad5e6493208e2329542a577b54951b09d0663ba9915dc13dd18567a644f63f1
  • Instruction Fuzzy Hash: 7D018F32A002186BDB60AB68DC42BE9B7AAEB04750F444051FE19A7341D62A9DD06AD3
Uniqueness

Uniqueness Score: -1.00%

APIs
  • failwithmessage.LIBCMTD ref: 00F13E57
    • Part of subcall function 00F13EA0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 00F13F0D
    • Part of subcall function 00F13EA0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000000), ref: 00F13F28
    • Part of subcall function 00F13EA0: DebuggerProbe.LIBCMTD ref: 00F13F4B
    • Part of subcall function 00F13EA0: DebuggerRuntime.LIBCMTD ref: 00F13F6E
    • Part of subcall function 00F13EA0: IsDebuggerPresent.KERNEL32 ref: 00F13F9F
  • failwithmessage.LIBCMTD ref: 00F13E77
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3279158110.0000000000F11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F00000, based on PE: true
  • Associated: 00000000.00000002.3279146733.0000000000F00000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279168765.0000000000F17000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279179635.0000000000F38000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.3279191609.0000000000F39000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_f00000_avidump.jbxd
Similarity
  • API ID: Debugger$ByteCharMultiWidefailwithmessage$PresentProbeRuntime
  • String ID: Unknown Runtime Check Error
  • API String ID: 3941055102-2722348778
  • Opcode ID: 77f307a5fb98d231abab383efe336a1c6ede7c433416f50d99c47c1f131c8241
  • Instruction ID: 82cbd0994a55eac1d44aa55c5c8a74bc18936fc1065790b4a83a05f2782cf8cb
  • Opcode Fuzzy Hash: 77f307a5fb98d231abab383efe336a1c6ede7c433416f50d99c47c1f131c8241
  • Instruction Fuzzy Hash: D5E06DB59002086BEB04EA5CEC55EAB33AED7C8734F548244F51C87292E636EEA55760
Uniqueness

Uniqueness Score: -1.00%